id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0507032
Robert Ogden Dr.
R. D. Ogden
Introduction to Quantum Message Space
LaTeX, 19 pages
null
null
null
cs.IT math.IT math.OA quant-ph
null
This paper develops the quantum analog of the message ensemble of classical information theory as developed by Shannon and Khinchin. The principal mathematical tool is harmonic analysis on the free group with two generators.
[ { "version": "v1", "created": "Tue, 12 Jul 2005 04:37:07 GMT" }, { "version": "v2", "created": "Fri, 4 Nov 2005 04:00:29 GMT" } ]
2007-07-16T00:00:00
[ [ "Ogden", "R. D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OA", "description": "Algebras of operators on Hilbert space, C^*-algebras, von Neumann algebras, non-commutative geometry", "span": "(Operator Algebras)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0507033
Marco Cuturi
Marco Cuturi, Kenji Fukumizu
Multiresolution Kernels
8 pages
null
null
null
cs.LG
null
We present in this work a new methodology to design kernels on data which is structured with smaller components, such as text, images or sequences. This methodology is a template procedure which can be applied on most kernels on measures and takes advantage of a more detailed "bag of components" representation of the objects. To obtain such a detailed description, we consider possible decompositions of the original bag into a collection of nested bags, following a prior knowledge on the objects' structure. We then consider these smaller bags to compare two objects both in a detailed perspective, stressing local matches between the smaller bags, and in a global or coarse perspective, by considering the entire bag. This multiresolution approach is likely to be best suited for tasks where the coarse approach is not precise enough, and where a more subtle mixture of both local and global similarities is necessary to compare objects. The approach presented here would not be computationally tractable without a factorization trick that we introduce before presenting promising results on an image retrieval task.
[ { "version": "v1", "created": "Wed, 13 Jul 2005 05:45:28 GMT" }, { "version": "v2", "created": "Mon, 14 Nov 2005 08:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Cuturi", "Marco", "" ], [ "Fukumizu", "Kenji", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0507034
Ittai Abraham
Ittai Abraham and Dahlia Malkhi and Gurmeet Singh Manku
Papillon: Greedy Routing in Rings
null
null
null
null
cs.DC cs.NI
null
We study {\sc greedy} routing over $n$ nodes placed in a ring, with the \emph{distance} between two nodes defined to be the clockwise or the absolute distance between them along the ring. Such graphs arise in the context of modeling social networks and in routing networks for peer-to-peer systems. We construct the first network over $n$ nodes in which {\sc greedy} routing takes $O(\log n / \log d)$ hops in the worst-case, with $d$ out-going links per node. Our result has the first asymptotically optimal greedy routing complexity. Previous constructions required $O(\frac{\log^2 n}{d})$ hops.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 00:34:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Ittai", "" ], [ "Malkhi", "Dahlia", "" ], [ "Manku", "Gurmeet Singh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0507035
Yi-Dong Shen
Yi-Dong Shen, Jia-Huai You and Li-Yan Yuan
Enhancing Global SLS-Resolution with Loop Cutting and Tabling Mechanisms
null
Theoretical Computer Science 328(3):271-287, 2004
null
null
cs.LO cs.AI
null
Global SLS-resolution is a well-known procedural semantics for top-down computation of queries under the well-founded model. It inherits from SLDNF-resolution the {\em linearity} property of derivations, which makes it easy and efficient to implement using a simple stack-based memory structure. However, like SLDNF-resolution it suffers from the problem of infinite loops and redundant computations. To resolve this problem, in this paper we develop a new procedural semantics, called {\em SLTNF-resolution}, by enhancing Global SLS-resolution with loop cutting and tabling mechanisms. SLTNF-resolution is sound and complete w.r.t. the well-founded semantics for logic programs with the bounded-term-size property, and is superior to existing linear tabling procedural semantics such as SLT-resolution.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:24:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "You", "Jia-Huai", "" ], [ "Yuan", "Li-Yan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0507036
Martin Sulzmann
Peter J Stuckey, Martin Sulzmann, Jeremy Wazny
Improved Inference for Checking Annotations
null
null
null
null
cs.PL cs.LO
null
We consider type inference in the Hindley/Milner system extended with type annotations and constraints with a particular focus on Haskell-style type classes. We observe that standard inference algorithms are incomplete in the presence of nested type annotations. To improve the situation we introduce a novel inference scheme for checking type annotations. Our inference scheme is also incomplete in general but improves over existing implementations as found e.g. in the Glasgow Haskell Compiler (GHC). For certain cases (e.g. Haskell 98) our inference scheme is complete. Our approach has been fully implemented as part of the Chameleon system (experimental version of Haskell).
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:47:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckey", "Peter J", "" ], [ "Sulzmann", "Martin", "" ], [ "Wazny", "Jeremy", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0507037
Martin Sulzmann
Peter J. Stuckey, Martin Sulzmann
Type Inference for Guarded Recursive Data Types
null
null
null
null
cs.PL cs.LO
null
We consider type inference for guarded recursive data types (GRDTs) -- a recent generalization of algebraic data types. We reduce type inference for GRDTs to unification under a mixed prefix. Thus, we obtain efficient type inference. Inference is incomplete because the set of type constraints allowed to appear in the type system is only a subset of those type constraints generated by type inference. Hence, inference only succeeds if the program is sufficiently type annotated. We present refined procedures to infer types incrementally and to assist the user in identifying which pieces of type information are missing. Additionally, we introduce procedures to test if a type is not principal and to find a principal type if one exists.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 08:58:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckey", "Peter J.", "" ], [ "Sulzmann", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0507038
Zvi Lotker
Khaled Elbassioni, Zvi Lotker, Raimund Seidel
Upper Bound on the Number of Vertices of Polyhedra with $0,1$-Constraint Matrices
3 pages
null
null
null
cs.CG
null
In this note we show that the maximum number of vertices in any polyhedron $P=\{x\in \mathbb{R}^d : Ax\leq b\}$ with $0,1$-constraint matrix $A$ and a real vector $b$ is at most $d!$.
[ { "version": "v1", "created": "Thu, 14 Jul 2005 18:45:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Elbassioni", "Khaled", "" ], [ "Lotker", "Zvi", "" ], [ "Seidel", "Raimund", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0507039
Joel Predd
Joel B. Predd and Sanjeev R. Kulkarni and H. Vincent Poor
Distributed Regression in Sensor Networks: Training Distributively with Alternating Projections
To appear in the Proceedings of the SPIE Conference on Advanced Signal Processing Algorithms, Architectures and Implementations XV, San Diego, CA, July 31 - August 4, 2005
null
10.1117/12.620194
null
cs.LG cs.AI cs.CV cs.DC cs.IT math.IT
null
Wireless sensor networks (WSNs) have attracted considerable attention in recent years and motivate a host of new challenges for distributed signal processing. The problem of distributed or decentralized estimation has often been considered in the context of parametric models. However, the success of parametric methods is limited by the appropriateness of the strong statistical assumptions made by the models. In this paper, a more flexible nonparametric model for distributed regression is considered that is applicable in a variety of WSN applications including field estimation. Here, starting with the standard regularized kernel least-squares estimator, a message-passing algorithm for distributed estimation in WSNs is derived. The algorithm can be viewed as an instantiation of the successive orthogonal projection (SOP) algorithm. Various practical aspects of the algorithm are discussed and several numerical simulations validate the potential of the approach.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 00:45:12 GMT" } ]
2009-11-11T00:00:00
[ [ "Predd", "Joel B.", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507040
Daniil Ryabko
Daniil Ryabko
Pattern Recognition for Conditionally Independent Data
parts of results published at ALT'04 and ICML'04
Journal of Machine Learning Research 7(Apr):645-664, 2006
null
null
cs.LG cs.AI cs.CV
null
In this work we consider the task of relaxing the i.i.d assumption in pattern recognition (or classification), aiming to make existing learning algorithms applicable to a wider range of tasks. Pattern recognition is guessing a discrete label of some object based on a set of given examples (pairs of objects and labels). We consider the case of deterministically defined labels. Traditionally, this task is studied under the assumption that examples are independent and identically distributed. However, it turns out that many results of pattern recognition theory carry over a weaker assumption. Namely, under the assumption of conditional independence and identical distribution of objects, while the only assumption on the distribution of labels is that the rate of occurrence of each label should be above some positive threshold. We find a broad class of learning algorithms for which estimations of the probability of a classification error achieved under the classical i.i.d. assumption can be generalised to the similar estimates for the case of conditionally i.i.d. examples.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 08:10:10 GMT" } ]
2012-02-28T00:00:00
[ [ "Ryabko", "Daniil", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0507041
Marcus Hutter
Alexey Chernov and Marcus Hutter
Monotone Conditional Complexity Bounds on Future Prediction Errors
16 LaTeX pages
Proc. 16th International Conf. on Algorithmic Learning Theory (ALT 2005) 414-428
null
IDSIA-16-05
cs.LG cs.AI cs.IT math.IT
null
We bound the future loss when predicting any (computably) stochastic sequence online. Solomonoff finitely bounded the total deviation of his universal predictor M from the true distribution m by the algorithmic complexity of m. Here we assume we are at a time t>1 and already observed x=x_1...x_t. We bound the future prediction performance on x_{t+1}x_{t+2}... by a new variant of algorithmic complexity of m given x, plus the complexity of the randomness deficiency of x. The new complexity is monotone in its condition in the sense that this complexity can only decrease if the condition is prolonged. We also briefly discuss potential generalizations to Bayesian model classes and to classification problems.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 12:34:53 GMT" } ]
2007-07-16T00:00:00
[ [ "Chernov", "Alexey", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507042
Richard McClatchey
Florida Estrella, Richard McClatchey, Dmitry Rogulin
The MammoGrid Virtual Organisation - Federating Distributed Mammograms
^ pages, 3 figures, 2 tables
null
null
Medical Informatics Europe MIE2005 paper publication
cs.DC cs.DB
null
The MammoGrid project aims to deliver a prototype which enables the effective collaboration between radiologists using grid, service-orientation and database solutions. The grid technologies and service-based database management solution provide the platform for integrating diverse and distributed resources, creating what is called a virtual organisation. The MammoGrid Virtual Organisation facilitates the sharing and coordinated access to mammography data, medical imaging software and computing resources of participating hospitals. Hospitals manage their local database of mammograms, but in addition, radiologists who are part of this organisation can share mammograms, reports, results and image analysis software. The MammoGrid Virtual Organisation is a federation of autonomous multi-centres sites which transcends national boundaries. This paper outlines the service-based approach in the creation and management of the federated distributed mammography database and discusses the role of virtual organisations in distributed image analysis.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 12:17:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Estrella", "Florida", "" ], [ "McClatchey", "Richard", "" ], [ "Rogulin", "Dmitry", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0507043
Yuan Feng
Yuan Feng, Runyao Duan, Zhengfeng Ji, and Mingsheng Ying
Proof rules for purely quantum programs
Now 12 pages, introduction and Section 3 rewritten, some errors corrected
null
null
null
cs.PL quant-ph
null
We apply the notion of quantum predicate proposed by D'Hondt and Panangaden to analyze a purely quantum language fragment which describes the quantum part of a future quantum computer in Knill's architecture. The denotational semantics, weakest precondition semantics, and weakest liberal precondition semantics of this language fragment are introduced. To help reasoning about quantum programs involving quantum loops, we extend proof rules for classical probabilistic programs to our purely quantum programs.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 13:06:13 GMT" }, { "version": "v2", "created": "Mon, 1 Aug 2005 16:08:40 GMT" }, { "version": "v3", "created": "Thu, 16 Mar 2006 08:24:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Feng", "Yuan", "" ], [ "Duan", "Runyao", "" ], [ "Ji", "Zhengfeng", "" ], [ "Ying", "Mingsheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0507044
Marcus Hutter
Jan Poland and Marcus Hutter
Defensive Universal Learning with Experts
15 LaTeX pages
Proc. 16th International Conf. on Algorithmic Learning Theory (ALT 2005) 356-370
null
IDSIA-15-05
cs.LG
null
This paper shows how universal learning can be achieved with expert advice. To this aim, we specify an experts algorithm with the following characteristics: (a) it uses only feedback from the actions actually chosen (bandit setup), (b) it can be applied with countably infinite expert classes, and (c) it copes with losses that may grow in time appropriately slowly. We prove loss bounds against an adaptive adversary. From this, we obtain a master algorithm for "reactive" experts problems, which means that the master's actions may influence the behavior of the adversary. Our algorithm can significantly outperform standard experts algorithms on such problems. Finally, we combine it with a universal expert class. The resulting universal learner performs -- in a certain sense -- almost as well as any computable strategy, for any online decision problem. We also specify the (worst-case) convergence speed, which is very slow.
[ { "version": "v1", "created": "Mon, 18 Jul 2005 14:33:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0507045
Giorgi Japaridze
Giorgi Japaridze
In the beginning was game semantics
To appear in: "Games: Unifying Logic, Language and Philosophy". O. Majer, A.-V. Pietarinen and T. Tulenheimo, eds. Springer Verlag, Berlin
Games: Unifying Logic, Language and Philosophy. O. Majer, A.-V. Pietarinen and T. Tulenheimo, eds. Springer 2009, pp. 249-350
10.1007/978-1-4020-9374-6_11
null
cs.LO cs.AI math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents an overview of computability logic -- the game-semantically constructed logic of interactive computational tasks and resources. There is only one non-overview, technical section in it, devoted to a proof of the soundness of affine logic with respect to the semantics of computability logic. A comprehensive online source on the subject can be found at http://www.cis.upenn.edu/~giorgi/cl.html
[ { "version": "v1", "created": "Mon, 18 Jul 2005 18:45:38 GMT" }, { "version": "v2", "created": "Fri, 23 Dec 2005 15:32:45 GMT" }, { "version": "v3", "created": "Fri, 24 Oct 2008 08:30:57 GMT" } ]
2011-04-15T00:00:00
[ [ "Japaridze", "Giorgi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
cs/0507046
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley
Revisiting Internet AS-level Topology Discovery
null
PAM 2005; LNCS 3431, p. 177, 2005
10.1007/b135479
null
cs.NI
null
The development of veracious models of the Internet topology has received a lot of attention in the last few years. Many proposed models are based on topologies derived from RouteViews BGP table dumps (BTDs). However, BTDs do not capture all AS-links of the Internet topology and most importantly the number of the hidden AS-links is unknown, resulting in AS-graphs of questionable quality. As a first step to address this problem, we introduce a new AS-topology discovery methodology that results in more complete and accurate graphs. Moreover, we use data available from existing measurement facilities, circumventing the burden of additional measurement infrastructure. We deploy our methodology and construct an AS-topology that has at least 61.5% more AS-links than BTD-derived AS-topologies we examined. Finally, we analyze the temporal and topological properties of the augmented graph and pinpoint the differences from BTD-derived AS-topologies.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 07:15:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Riley", "George", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0507047
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, Bradley Huffaker, kc claffy, George Riley
Inferring AS Relationships: Dead End or Lively Beginning?
null
WEA 2005; LNCS 3503, p. 113, 2005
10.1007/11427186_12
null
cs.NI cs.DS
null
Recent techniques for inferring business relationships between ASs have yielded maps that have extremely few invalid BGP paths in the terminology of Gao. However, some relationships inferred by these newer algorithms are incorrect, leading to the deduction of unrealistic AS hierarchies. We investigate this problem and discover what causes it. Having obtained such insight, we generalize the problem of AS relationship inference as a multiobjective optimization problem with node-degree-based corrections to the original objective function of minimizing the number of invalid paths. We solve the generalized version of the problem using the semidefinite programming relaxation of the MAX2SAT problem. Keeping the number of invalid paths small, we obtain a more veracious solution than that yielded by recent heuristics.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 09:32:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Huffaker", "Bradley", "" ], [ "claffy", "kc", "" ], [ "Riley", "George", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0507048
Paolo Liberatore
Paolo Liberatore
Redundancy in Logic III: Non-Mononotonic Reasoning
minor corrections
null
10.1016/j.artint.2008.02.003
null
cs.LO cs.AI cs.CC
null
Results about the redundancy of circumscriptive and default theories are presented. In particular, the complexity of establishing whether a given theory is redundant is establihsed.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 19:25:11 GMT" }, { "version": "v2", "created": "Wed, 12 Oct 2005 13:47:07 GMT" } ]
2021-04-12T00:00:00
[ [ "Liberatore", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0507049
David Eppstein
David Eppstein, Michael T. Goodrich, Jonathan Z. Sun
The Skip Quadtree: A Simple Dynamic Data Structure for Multidimensional Data
12 pages, 3 figures. A preliminary version of this paper appeared in the 21st ACM Symp. Comp. Geom., Pisa, 2005, pp. 296-305
null
null
null
cs.CG
null
We present a new multi-dimensional data structure, which we call the skip quadtree (for point data in R^2) or the skip octree (for point data in R^d, with constant d>2). Our data structure combines the best features of two well-known data structures, in that it has the well-defined "box"-shaped regions of region quadtrees and the logarithmic-height search and update hierarchical structure of skip lists. Indeed, the bottom level of our structure is exactly a region quadtree (or octree for higher dimensional data). We describe efficient algorithms for inserting and deleting points in a skip quadtree, as well as fast methods for performing point location and approximate range queries.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 20:17:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Sun", "Jonathan Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0507050
David Eppstein
Lars Arge, David Eppstein, Michael T. Goodrich
Skip-Webs: Efficient Distributed Data Structures for Multi-Dimensional Data Sets
8 pages, 4 figures. Appearing at 24th ACM SIGACT-SIGOPS Symp. Principles of Distributed Computing (PODC 2005), Las Vegas
null
null
null
cs.DC cs.CG cs.DS
null
We present a framework for designing efficient distributed data structures for multi-dimensional data. Our structures, which we call skip-webs, extend and improve previous randomized distributed data structures, including skipnets and skip graphs. Our framework applies to a general class of data querying scenarios, which include linear (one-dimensional) data, such as sorted sets, as well as multi-dimensional data, such as d-dimensional octrees and digital tries of character strings defined over a fixed alphabet. We show how to perform a query over such a set of n items spread among n hosts using O(log n / log log n) messages for one-dimensional data, or O(log n) messages for fixed-dimensional data, while using only O(log n) space per host. We also show how to make such structures dynamic so as to allow for insertions and deletions in O(log n) messages for quadtrees, octrees, and digital tries, and O(log n / log log n) messages for one-dimensional data. Finally, we show how to apply a blocking strategy to skip-webs to further improve message complexity for one-dimensional data when hosts can store more data.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 20:30:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Arge", "Lars", "" ], [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0507051
David Eppstein
David Eppstein, Michael T. Goodrich, Jeremy Yu Meng
Confluent Layered Drawings
11 pages, 6 figures. A preliminary version of this paper appeared in Proc. 12th Int. Symp. Graph Drawing, New York, 2004, Lecture Notes in Comp. Sci. 3383, 2004, pp. 184-194
Algorithmica 47(4):439-452, 2007
10.1007/s00453-006-0159-8
null
cs.CG cs.DS
null
We combine the idea of confluent drawings with Sugiyama style drawings, in order to reduce the edge crossings in the resultant drawings. Furthermore, it is easier to understand the structures of graphs from the mixed style drawings. The basic idea is to cover a layered graph by complete bipartite subgraphs (bicliques), then replace bicliques with tree-like structures. The biclique cover problem is reduced to a special edge coloring problem and solved by heuristic coloring algorithms. Our method can be extended to obtain multi-depth confluent layered drawings.
[ { "version": "v1", "created": "Tue, 19 Jul 2005 22:25:53 GMT" } ]
2007-06-14T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Meng", "Jeremy Yu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0507052
Qiang Li
Qiang Li, Hui-Min Xie
Finite automata for testing uniqueness of Eulerian trails
null
J. Comput. System Sci., 2008. 74(5): 870-874
10.1016/j.jcss.2007.10.004
null
cs.CC cs.LO
null
We investigate the condition under which the Eulerian trail of a digraph is unique, and design a finite automaton to examine it. The algorithm is effective, for if the condition is violated, it will be noticed immediately without the need to trace through the whole trail.
[ { "version": "v1", "created": "Wed, 20 Jul 2005 18:55:45 GMT" } ]
2008-05-20T00:00:00
[ [ "Li", "Qiang", "" ], [ "Xie", "Hui-Min", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0507053
David Eppstein
David Eppstein
Nonrepetitive Paths and Cycles in Graphs with Application to Sudoku
17 pages, 11 figures
null
null
null
cs.DS cs.AI
null
We provide a simple linear time transformation from a directed or undirected graph with labeled edges to an unlabeled digraph, such that paths in the input graph in which no two consecutive edges have the same label correspond to paths in the transformed graph and vice versa. Using this transformation, we provide efficient algorithms for finding paths and cycles with no two consecutive equal labels. We also consider related problems where the paths and cycles are required to be simple; we find efficient algorithms for the undirected case of these problems but show the directed case to be NP-complete. We apply our path and cycle finding algorithms in a program for generating and solving Sudoku puzzles, and show experimentally that they lead to effective puzzle-solving rules that may also be of interest to human Sudoku puzzle solvers.
[ { "version": "v1", "created": "Wed, 20 Jul 2005 15:58:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0507054
Andrey Siver S.
A. S. Siver
f2mma: FORTRAN to Mathematica translator
null
null
null
null
cs.OH
null
f2mma program can be used to translate programs written in some subset of the FORTRAN language into {\sl Mathematica} system's programming language. This subset have been enough to translate GAPP (Global Analysis of Particle Properties) programm into {\sl Mathematica} language automatically. Observables table calculated with GAPP({\sl Mathematica}) is presented.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 13:32:15 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 06:48:26 GMT" }, { "version": "v3", "created": "Fri, 5 Aug 2005 09:26:15 GMT" }, { "version": "v4", "created": "Mon, 23 Jan 2006 14:27:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0507055
Andrey Siver S.
A. S. Siver
ReacProc: A Tool to Process Reactions Describing Particle Interactions
5 pages
null
null
null
cs.CE
null
ReacProc is a program written in C/C++ programming language which can be used (1) to check out of reactions describing particles interactions against conservation laws and (2) to reduce input reaction into some canonical form. A table with particles properties is available within ReacProc package.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 14:17:47 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2005 07:14:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Siver", "A. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0507056
Christopher Lee
Candace L. Sidner, Christopher Lee, Cory Kidd, Neal Lesh, Charles Rich
Explorations in engagement for humans and robots
31 pages, 5 figures, 3 tables
Artificial Intelligence, volume 166, issues 1-2, August 2005, pp. 140-164
null
MERL TR2005-017
cs.AI cs.CL cs.RO
null
This paper explores the concept of engagement, the process by which individuals in an interaction start, maintain and end their perceived connection to one another. The paper reports on one aspect of engagement among human interactors--the effect of tracking faces during an interaction. It also describes the architecture of a robot that can participate in conversational, collaborative interactions with engagement gestures. Finally, the paper reports on findings of experiments with human participants who interacted with a robot when it either performed or did not perform engagement gestures. Results of the human-robot studies indicate that people become engaged with robots: they direct their attention to the robot more often in interactions where engagement gestures are present, and they find interactions more appropriate when engagement gestures are present than when they are not.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 21:56:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidner", "Candace L.", "" ], [ "Lee", "Christopher", "" ], [ "Kidd", "Cory", "" ], [ "Lesh", "Neal", "" ], [ "Rich", "Charles", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0507057
Tereza Tu\v{s}arov\'a
Tereza Tusarova
A new sibling of BQP
extended abstract, submitted to UC'05
null
null
null
cs.CC
null
We present a new quantum complexity class, called MQ^2, which is contained in AWPP. This class has a compact and simple mathematical definition, involving only polynomial-time computable functions and a unitarity condition. It contains both Deutsch-Jozsa's and Shor's algorithm, while its relation to BQP is unknown. This shows that in the complexity class hierarchy, BQP is not an extraordinary isolated island, but has ''siblings'' which as well can solve prime-factorization.
[ { "version": "v1", "created": "Thu, 21 Jul 2005 22:36:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Tusarova", "Tereza", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0507058
Emanuel Diamant
Emanuel Diamant
Paving the Way for Image Understanding: A New Kind of Image Decomposition is Desired
14th Scandinavian Conference on Image Analysis (SCIA 2005)
LNCS vol. 3540, pp. 17-24, Springer Verlag, 2005
null
null
cs.CV
null
In this paper we present an unconventional image segmentation approach which is devised to meet the requirements of image understanding and pattern recognition tasks. Generally image understanding assumes interplay of two sub-processes: image information content discovery and image information content interpretation. Despite of its widespread use, the notion of "image information content" is still ill defined, intuitive, and ambiguous. Most often, it is used in the Shannon's sense, which means information content assessment averaged over the whole signal ensemble. Humans, however,rarely resort to such estimates. They are very effective in decomposing images into their meaningful constituents and focusing attention to the perceptually relevant image parts. We posit that following the latest findings in human attention vision studies and the concepts of Kolmogorov's complexity theory an unorthodox segmentation approach can be proposed that provides effective image decomposition to information preserving image fragments well suited for subsequent image interpretation. We provide some illustrative examples, demonstrating effectiveness of this approach.
[ { "version": "v1", "created": "Fri, 22 Jul 2005 12:18:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0507059
M. Magdalena Ortiz de la Fuente
M. Magdalena Ortiz de la Fuente, Diego Calvanese, Thomas Eiter and Enrico Franconi
Data complexity of answering conjunctive queries over SHIQ knowledge bases
Technical Report, 22 pages
null
null
null
cs.LO cs.AI cs.CC
null
An algorithm for answering conjunctive queries over SHIQ knowledge bases that is coNP in data complexity is given. The algorithm is based on the tableau algorithm for reasoning with individuals in SHIQ. The blocking conditions of the tableau are weakened in such a way that the set of models the modified algorithm yields suffices to check query entailment. The modified blocking conditions are based on the ones proposed by Levy and Rousset for reasoning with Horn Rules in the description logic ALCNR.
[ { "version": "v1", "created": "Fri, 22 Jul 2005 15:43:07 GMT" } ]
2007-05-23T00:00:00
[ [ "de la Fuente", "M. Magdalena Ortiz", "" ], [ "Calvanese", "Diego", "" ], [ "Eiter", "Thomas", "" ], [ "Franconi", "Enrico", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0507060
Eytan Domany
O. Zuk, I. Kanter, E. Domany
The Entropy of a Binary Hidden Markov Process
null
null
10.1007/s10955-005-7576-y
null
cs.IT cond-mat.stat-mech math.IT math.ST stat.TH
null
The entropy of a binary symmetric Hidden Markov Process is calculated as an expansion in the noise parameter epsilon. We map the problem onto a one-dimensional Ising model in a large field of random signs and calculate the expansion coefficients up to second order in epsilon. Using a conjecture we extend the calculation to 11th order and discuss the convergence of the resulting series.
[ { "version": "v1", "created": "Sat, 23 Jul 2005 17:15:49 GMT" } ]
2009-11-11T00:00:00
[ [ "Zuk", "O.", "" ], [ "Kanter", "I.", "" ], [ "Domany", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
cs/0507061
Andre Adrian
Andre Adrian
Software Architecture Overview
9 pages, version 23jul2005
null
null
null
cs.SE
null
What is Software Architecture? The rules, paradigmen, pattern that help to construct, build and test a serious piece of software. It is the practical experience boiled down to abstract level. Software Architecture builds on System Engineering and the scientific method as established by Galileo Galilei: Measure what you can and make measureable what you can not. The experiment (test) is more important then the deduction. Pieces of information about software architecture are all over the internet. This paper uses citation as much as possible. The aim is to bring together an overview, not to rephrase the wording.
[ { "version": "v1", "created": "Sun, 24 Jul 2005 09:43:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Adrian", "Andre", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0507062
Jan Poland
Jan Poland
FPL Analysis for Adaptive Bandits
null
null
null
null
cs.LG
null
A main problem of "Follow the Perturbed Leader" strategies for online decision problems is that regret bounds are typically proven against oblivious adversary. In partial observation cases, it was not clear how to obtain performance guarantees against adaptive adversary, without worsening the bounds. We propose a conceptually simple argument to resolve this problem. Using this, a regret bound of O(t^(2/3)) for FPL in the adversarial multi-armed bandit problem is shown. This bound holds for the common FPL variant using only the observations from designated exploration rounds. Using all observations allows for the stronger bound of O(t^(1/2)), matching the best bound known so far (and essentially the known lower bound) for adversarial bandits. Surprisingly, this variant does not even need explicit exploration, it is self-stabilizing. However the sampling probabilities have to be either externally provided or approximated to sufficient accuracy, using O(t^2 log t) samples in each step.
[ { "version": "v1", "created": "Tue, 26 Jul 2005 05:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Poland", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0507063
Boaz Tsaban
Boaz Tsaban
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
To appear in JoC
Journal of Cryptology 20 (2007), 389-392
10.1007/s00145-007-0564-4
null
cs.CR cs.CC
null
The internal state of the Klimov-Shamir number generator TF-1 consists of four words of size w bits each, whereas its intended strength is 2^{2w}. We exploit an asymmetry in its output function to show that the internal state can be recovered after having 2^w outputs, using 2^{1.5w} operations. For w=32 the attack is practical, but for their recommended w=64 it is only of theoretical interest.
[ { "version": "v1", "created": "Tue, 26 Jul 2005 15:30:17 GMT" }, { "version": "v2", "created": "Sun, 20 May 2007 13:58:32 GMT" } ]
2010-08-02T00:00:00
[ [ "Tsaban", "Boaz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0507064
Isabelle Gnaedig
Isabelle Gnaedig and Helene Kirchner
Termination of rewriting strategies: a generic approach
49 pages
null
null
null
cs.LO
null
We propose a generic termination proof method for rewriting under strategies, based on an explicit induction on the termination property. Rewriting trees on ground terms are modeled by proof trees, generated by alternatively applying narrowing and abstracting steps. The induction principle is applied through the abstraction mechanism, where terms are replaced by variables representing any of their normal forms. The induction ordering is not given a priori, but defined with ordering constraints, incrementally set during the proof. Abstraction constraints can be used to control the narrowing mechanism, well known to easily diverge. The generic method is then instantiated for the innermost, outermost and local strategies.
[ { "version": "v1", "created": "Tue, 26 Jul 2005 20:18:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gnaedig", "Isabelle", "" ], [ "Kirchner", "Helene", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0507065
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
A Fast Greedy Algorithm for Outlier Mining
11 pages
null
null
Tr-05-0406
cs.DB cs.AI
null
The task of outlier detection is to find small groups of data objects that are exceptional when compared with rest large amount of data. In [38], the problem of outlier detection in categorical data is defined as an optimization problem and a local-search heuristic based algorithm (LSA) is presented. However, as is the case with most iterative type algorithms, the LSA algorithm is still very time-consuming on very large datasets. In this paper, we present a very fast greedy algorithm for mining outliers under the same optimization model. Experimental results on real datasets and large synthetic datasets show that: (1) Our algorithm has comparable performance with respect to those state-of-art outlier detection algorithms on identifying true outliers and (2) Our algorithm can be an order of magnitude faster than LSA algorithm.
[ { "version": "v1", "created": "Wed, 27 Jul 2005 02:14:02 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0507066
Atul Chaturvedi Mr.
Sunder Lal and Atul Chaturvedi (Department of Mathematics Institute of Basic Science)
Authentication Schemes Using Braid Groups
6 pages, 2 figures
null
null
null
cs.CR cs.CY
null
In this paper we proposed two identification schemes based on the root problem. The proposed schemes are secure against passive attacks assuming that the root problem (RP) is hard in braid groups.
[ { "version": "v1", "created": "Wed, 27 Jul 2005 10:14:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lal", "Sunder", "", "Department of Mathematics Institute of\n Basic Science" ], [ "Chaturvedi", "Atul", "", "Department of Mathematics Institute of\n Basic Science" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0507067
Diego Calvanese
Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini
Conjunctive Query Containment and Answering under Description Logics Constraints
null
null
null
null
cs.DB cs.AI
null
Query containment and query answering are two important computational tasks in databases. While query answering amounts to compute the result of a query over a database, query containment is the problem of checking whether for every database, the result of one query is a subset of the result of another query. In this paper, we deal with unions of conjunctive queries, and we address query containment and query answering under Description Logic constraints. Every such constraint is essentially an inclusion dependencies between concepts and relations, and their expressive power is due to the possibility of using complex expressions, e.g., intersection and difference of relations, special forms of quantification, regular expressions over binary relations, in the specification of the dependencies. These types of constraints capture a great variety of data models, including the relational, the entity-relationship, and the object-oriented model, all extended with various forms of constraints, and also the basic features of the ontology languages used in the context of the Semantic Web. We present the following results on both query containment and query answering. We provide a method for query containment under Description Logic constraints, thus showing that the problem is decidable, and analyze its computational complexity. We prove that query containment is undecidable in the case where we allow inequalities in the right-hand side query, even for very simple constraints and queries. We show that query answering under Description Logic constraints can be reduced to query containment, and illustrate how such a reduction provides upper bound results with respect to both combined and data complexity.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 08:25:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Calvanese", "Diego", "" ], [ "De Giacomo", "Giuseppe", "" ], [ "Lenzerini", "Maurizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0507068
Ludo M.G.M. Tolhuizen
Henk D. L. Hollmann, Ludo M. G. M. Tolhuizen (Philips Research Laboratories, Eindhoven, Netherlands)
On parity check collections for iterative erasure decoding that correct all correctable erasure patterns of a given size
13 pages, no figures. Submitted to IEEE Transactions on Information Theory, July 28, 2005
null
10.1109/TIT.2006.888996
PR-MS 25.332
cs.IT cs.DM math.IT
null
Recently there has been interest in the construction of small parity check sets for iterative decoding of the Hamming code with the property that each uncorrectable (or stopping) set of size three is the support of a codeword and hence uncorrectable anyway. Here we reformulate and generalise the problem, and improve on this construction. First we show that a parity check collection that corrects all correctable erasure patterns of size m for the r-th order Hamming code (i.e, the Hamming code with codimension r) provides for all codes of codimension $r$ a corresponding ``generic'' parity check collection with this property. This leads naturally to a necessary and sufficient condition on such generic parity check collections. We use this condition to construct a generic parity check collection for codes of codimension r correcting all correctable erasure patterns of size at most m, for all r and m <= r, thus generalising the known construction for m=3. Then we discussoptimality of our construction and show that it can be improved for m>=3 and r large enough. Finally we discuss some directions for further research.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 11:55:28 GMT" } ]
2016-11-17T00:00:00
[ [ "Hollmann", "Henk D. L.", "", "Philips Research\n Laboratories, Eindhoven, Netherlands" ], [ "Tolhuizen", "Ludo M. G. M.", "", "Philips Research\n Laboratories, Eindhoven, Netherlands" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0507069
Anne-Marie Vercoustre
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
Users and Assessors in the Context of INEX: Are Relevance Dimensions Relevant?
null
Dans INEX 2005 Workshop on Element Retrieval Methodology [OAI : oai:hal.inria.fr:inria-00000182_v1] - http://hal.inria.fr/inria-00000182
null
null
cs.IR
null
The main aspects of XML retrieval are identified by analysing and comparing the following two behaviours: the behaviour of the assessor when judging the relevance of returned document components; and the behaviour of users when interacting with components of XML documents. We argue that the two INEX relevance dimensions, Exhaustivity and Specificity, are not orthogonal dimensions; indeed, an empirical analysis of each dimension reveals that the grades of the two dimensions are correlated to each other. By analysing the level of agreement between the assessor and the users, we aim at identifying the best units of retrieval. The results of our analysis show that the highest level of agreement is on highly relevant and on non-relevant document components, suggesting that only the end points of the INEX 10-point relevance scale are perceived in the same way by both the assessor and the users. We propose a new definition of relevance for XML retrieval and argue that its corresponding relevance scale would be a better choice for INEX.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 15:02:04 GMT" } ]
2019-05-01T00:00:00
[ [ "Pehcevski", "Jovan", "", "RMIT" ], [ "Thom", "James A.", "", "RMIT" ], [ "Vercoustre", "Anne-Marie", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0507070
Anne-Marie Vercoustre
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
Hybrid XML Retrieval: Combining Information Retrieval and a Native XML Database
Postprint version. The editor version can be accessed through the DOI
null
10.1007/s10791-005-0748-1
null
cs.IR
null
This paper investigates the impact of three approaches to XML retrieval: using Zettair, a full-text information retrieval system; using eXist, a native XML database; and using a hybrid system that takes full article answers from Zettair and uses eXist to extract elements from those articles. For the content-only topics, we undertake a preliminary analysis of the INEX 2003 relevance assessments in order to identify the types of highly relevant document components. Further analysis identifies two complementary sub-cases of relevance assessments ("General" and "Specific") and two categories of topics ("Broad" and "Narrow"). We develop a novel retrieval module that for a content-only topic utilises the information from the resulting answer list of a native XML database and dynamically determines the preferable units of retrieval, which we call "Coherent Retrieval Elements". The results of our experiments show that -- when each of the three systems is evaluated against different retrieval scenarios (such as different cases of relevance assessments, different topic categories and different choices of evaluation metrics) -- the XML retrieval systems exhibit varying behaviour and the best performance can be reached for different values of the retrieval parameters. In the case of INEX 2003 relevance assessments for the content-only topics, our newly developed hybrid XML retrieval system is substantially more effective than either Zettair or eXist, and yields a robust and a very effective XML retrieval.
[ { "version": "v1", "created": "Thu, 28 Jul 2005 19:19:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Pehcevski", "Jovan", "", "RMIT" ], [ "Thom", "James A.", "", "RMIT" ], [ "Vercoustre", "Anne-Marie", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0507071
Andreas U. Schmidt
Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt
Security for Distributed Web-Applications via Aspect-Oriented Programming
Refereed contribution to the Conference Information Security South Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005
null
null
null
cs.CR
null
Identity Management is becoming more and more important in business systems as they are opened for third parties including trading partners, consumers and suppliers. This paper presents an approach securing a system without any knowledge of the system source code. The security module adds to the existing system authentication and authorisation based on aspect oriented programming and the liberty alliance framework, an upcoming industrie standard providing single sign on. In an initial training phase the module is adapted to the application which is to be secured. Moreover the use of hardware tokens and proactive computing is demonstrated. The high modularisation is achived through use of AspectJ, a programming language extension of Java.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 10:44:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Rauch", "Thomas", "" ], [ "Schmidt", "Andreas U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0507072
Matthew Leslie
Matthew Leslie
Reliable Data Storage in Distributed Hash Tables
null
null
null
null
cs.DC cs.NI
null
Distributed Hash Tables offer a resilient lookup service for unstable distributed environments. Resilient data storage, however, requires additional data replication and maintenance algorithms. These algorithms can have an impact on both the performance and the scalability of the system. In this paper, we describe the goals and design space of these replication algorithms. We examine an existing replication algorithm, and present a new analysis of its reliability. We then present a new dynamic replication algorithm which can operate in unstable environments. We give several possible replica placement strategies for this algorithm, and show how they impact reliability and performance. Finally we compare all replication algorithms through simulation, showing quantitatively the difference between their bandwidth use, fault tolerance and performance.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 16:54:00 GMT" }, { "version": "v2", "created": "Fri, 29 Jul 2005 21:49:19 GMT" }, { "version": "v3", "created": "Tue, 2 Aug 2005 22:47:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Leslie", "Matthew", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0507073
Michel Dagenais
Michel R. Dagenais (Dept. of Computer Engineering, Ecole Polytechnique, Montreal, Canada) Karim Yaghmour (Opersys, Montreal, Canada) Charles Levert (Ericsson Research, Montreal, Canada) Makan Pourzandi (Ericsson Research, Montreal, Canada)
Software Performance Analysis
null
null
null
null
cs.PF cs.OS
null
The key to speeding up applications is often understanding where the elapsed time is spent, and why. This document reviews in depth the full array of performance analysis tools and techniques available on Linux for this task, from the traditional tools like gcov and gprof, to the more advanced tools still under development like oprofile and the Linux Trace Toolkit. The focus is more on the underlying data collection and processing algorithms, and their overhead and precision, than on the cosmetic details of the graphical user interface frontends.
[ { "version": "v1", "created": "Fri, 29 Jul 2005 19:33:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Dagenais", "Michel R.", "", "Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada" ], [ "Yaghmour", "Karim", "", "Opersys, Montreal, Canada" ], [ "Levert", "Charles", "", "Ericsson Research, Montreal, Canada" ], [ "Pourzandi", "Makan", "", "Ericsson Research, Montreal, Canada" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
cs/0508001
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz, Philippe Moser
Dimensions of Copeland-Erdos Sequences
19 pages
null
null
null
cs.CC cs.IT math.IT
null
The base-$k$ {\em Copeland-Erd\"os sequence} given by an infinite set $A$ of positive integers is the infinite sequence $\CE_k(A)$ formed by concatenating the base-$k$ representations of the elements of $A$ in numerical order. This paper concerns the following four quantities. The {\em finite-state dimension} $\dimfs (\CE_k(A))$, a finite-state version of classical Hausdorff dimension introduced in 2001. The {\em finite-state strong dimension} $\Dimfs(\CE_k(A))$, a finite-state version of classical packing dimension introduced in 2004. This is a dual of $\dimfs(\CE_k(A))$ satisfying $\Dimfs(\CE_k(A))$ $\geq \dimfs(\CE_k(A))$. The {\em zeta-dimension} $\Dimzeta(A)$, a kind of discrete fractal dimension discovered many times over the past few decades. The {\em lower zeta-dimension} $\dimzeta(A)$, a dual of $\Dimzeta(A)$ satisfying $\dimzeta(A)\leq \Dimzeta(A)$. We prove the following. $\dimfs(\CE_k(A))\geq \dimzeta(A)$. This extends the 1946 proof by Copeland and Erd\"os that the sequence $\CE_k(\mathrm{PRIMES})$ is Borel normal. $\Dimfs(\CE_k(A))\geq \Dimzeta(A)$. These bounds are tight in the strong sense that these four quantities can have (simultaneously) any four values in $[0,1]$ satisfying the four above-mentioned inequalities.
[ { "version": "v1", "created": "Sat, 30 Jul 2005 04:30:05 GMT" } ]
2007-07-13T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ], [ "Moser", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508002
Adilson Xavier V.
Gilson A. Giraldi, Luis C. da Costa, Adilson V. Xavier, Paulo S. Rodrigues
Methods for Analytical Understanding of Agent-Based Modeling of Complex Systems
null
null
null
null
cs.GR
null
Von Neuman's work on universal machines and the hardware development have allowed the simulation of dynamical systems through a large set of interacting agents. This is a bottom-up approach which tries to derive global properties of a complex system through local interaction rules and agent behaviour. Traditionally, such systems are modeled and simulated through top-down methods based on differential equations. Agent-Based Modeling has the advantage of simplicity and low computational cost. However, unlike differential equations, there is no standard way to express agent behaviour. Besides, it is not clear how to analytically predict the results obtained by the simulation. In this paper we survey some of these methods. For expressing agent behaviour formal methods, like Stochastic Process Algebras have been used. Such approach is useful if the global properties of interest can be expressed as a function of stochastic time series. However, if space variables must be considered, we shall change the focus. In this case, multiscale techniques, based on Chapman-Enskog expansion, was used to establish the connection between the microscopic dynamics and the macroscopic observables. Also, we use data mining techniques,like Principal Component Analysis (PCA), to study agent systems like Cellular Automata. With the help of these tools we will discuss a simple society model, a Lattice Gas Automaton for fluid modeling, and knowledge discovery in CA databases. Besides, we show the capabilities of the NetLogo, a software for agent simulation of complex system and show our experience about.
[ { "version": "v1", "created": "Sat, 30 Jul 2005 12:31:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "da Costa", "Luis C.", "" ], [ "Xavier", "Adilson V.", "" ], [ "Rodrigues", "Paulo S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0508003
Anton\'in Ku\v{c}era
Javier Esparza, Antonin Kucera, Richard Mayr
Model Checking Probabilistic Pushdown Automata
null
Logical Methods in Computer Science, Volume 2, Issue 1 (March 7, 2006) lmcs:2256
10.2168/LMCS-2(1:2)2006
null
cs.LO
null
We consider the model checking problem for probabilistic pushdown automata (pPDA) and properties expressible in various probabilistic logics. We start with properties that can be formulated as instances of a generalized random walk problem. We prove that both qualitative and quantitative model checking for this class of properties and pPDA is decidable. Then we show that model checking for the qualitative fragment of the logic PCTL and pPDA is also decidable. Moreover, we develop an error-tolerant model checking algorithm for PCTL and the subclass of stateless pPDA. Finally, we consider the class of omega-regular properties and show that both qualitative and quantitative model checking for pPDA is decidable.
[ { "version": "v1", "created": "Sun, 31 Jul 2005 18:33:43 GMT" }, { "version": "v2", "created": "Sat, 4 Mar 2006 11:45:56 GMT" }, { "version": "v3", "created": "Tue, 7 Mar 2006 00:43:22 GMT" }, { "version": "v4", "created": "Wed, 8 Mar 2006 15:31:58 GMT" }, { "version": "v5", "created": "Thu, 9 Mar 2006 17:30:20 GMT" } ]
2017-01-11T00:00:00
[ [ "Esparza", "Javier", "" ], [ "Kucera", "Antonin", "" ], [ "Mayr", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0508004
Lee Naish
Lee Naish
A three-valued semantics for logic programmers
31 pages, 5 figures
Theory and Practice of Logic Programming 6(5), September 2006, pp. 509-538.
null
null
cs.LO
null
This paper describes a simpler way for programmers to reason about the correctness of their code. The study of semantics of logic programs has shown strong links between the model theoretic semantics (truth and falsity of atoms in the programmer's interpretation of a program), procedural semantics (for example, SLD resolution) and fixpoint semantics (which is useful for program analysis and alternative execution mechanisms). Most of this work assumes that intended interpretations are two-valued: a ground atom is true (and should succeed according to the procedural semantics) or false (and should not succeed). In reality, intended interpretations are less precise. Programmers consider that some atoms "should not occur" or are "ill-typed" or "inadmissible". Programmers don't know and don't care whether such atoms succeed. In this paper we propose a three-valued semantics for (essentially) pure Prolog programs with (ground) negation as failure which reflects this. The semantics of Fitting is similar but only associates the third truth value with non-termination. We provide tools to reason about correctness of programs without the need for unnatural precision or undue restrictions on programming style. As well as theoretical results, we provide a programmer-oriented synopsis. This work has come out of work on declarative debugging, where it has been recognised that inadmissible calls are important. This paper has been accepted to appear in Theory and Practice of Logic Programming.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 05:23:44 GMT" } ]
2014-11-17T00:00:00
[ [ "Naish", "Lee", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0508005
Riccardo Pucella
Nick Papanikolaou
Logic Column 13: Reasoning Formally about Quantum Systems: An Overview
17 pages
SIGACT News, 36(3), pp. 51-66, 2005
null
null
cs.LO
null
This article is intended as an introduction to the subject of quantum logic, and as a brief survey of the relevant literature. Also discussed here are logics for specification and analysis of quantum information systems, in particular, recent work by P. Mateus and A. Sernadas, and also by R. van der Meyden and M. Patra. Overall, our objective is to provide a high-level presentation of the logical aspects of quantum theory. Mateus' and Sernadas' EQPL logic is illustrated with a small example, namely the state of an entangled pair of qubits. The "KT" logic of van der Meyden and Patra is demonstrated briefly in the context of the B92 protocol for quantum key distribution.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 14:34:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Papanikolaou", "Nick", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0508006
Sandor P. Fekete
Sandor P. Fekete, Michael Kaufmann, Alexander Kroeller, and Katharina Lehmann
A New Approach for Boundary Recognition in Geometric Sensor Networks
4 pages, 5 figures, Latex, to appear in Canadian Conference on Computational Geometry (CCCG 2005)
null
null
null
cs.DS cs.DC
null
We describe a new approach for dealing with the following central problem in the self-organization of a geometric sensor network: Given a polygonal region R, and a large, dense set of sensor nodes that are scattered uniformly at random in R. There is no central control unit, and nodes can only communicate locally by wireless radio to all other nodes that are within communication radius r, without knowing their coordinates or distances to other nodes. The objective is to develop a simple distributed protocol that allows nodes to identify themselves as being located near the boundary of R and form connected pieces of the boundary. We give a comparison of several centrality measures commonly used in the analysis of social networks and show that restricted stress centrality is particularly suited for geometric networks; we provide mathematical as well as experimental evidence for the quality of this measure.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 19:44:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Kaufmann", "Michael", "" ], [ "Kroeller", "Alexander", "" ], [ "Lehmann", "Katharina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0508007
Manfred Harringer
Manfred Harringer
Regularity of Position Sequences
14 pages
null
null
null
cs.CV cs.AI cs.LG q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A person is given a numbered sequence of positions on a sheet of paper. The person is asked, "Which will be the next (or the next after that) position?" Everyone has an opinion as to how he or she would proceed. There are regular sequences for which there is general agreement on how to continue. However, there are less regular sequences for which this assessment is less certain. There are sequences for which every continuation is perceived to be arbitrary. I would like to present a mathematical model that reflects these opinions and perceptions with the aid of a valuation function. It is necessary to apply a rich set of invariant features of position sequences to ensure the quality of this model. All other properties of the model are arbitrary.
[ { "version": "v1", "created": "Mon, 1 Aug 2005 18:55:57 GMT" }, { "version": "v2", "created": "Thu, 4 Aug 2005 18:31:34 GMT" }, { "version": "v3", "created": "Sun, 15 Aug 2010 09:50:12 GMT" }, { "version": "v4", "created": "Mon, 27 Dec 2010 08:29:34 GMT" } ]
2010-12-30T00:00:00
[ [ "Harringer", "Manfred", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
cs/0508008
Kentaro Kondo
Kentaro Kondo
The accurate optimal-success/error-rate calculations applied to the realizations of the reliable and short-period integer ambiguity resolution in carrier-phase GPS/GNSS positioning
LaTeX, 17 pages, 7 figures. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The maximum-marginal-a-posteriori success rate of statistical decision under multivariate Gaussian error distribution on an integer lattice is almost rigorously calculated by using union-bound approximation and Monte Carlo integration. These calculations are applied to the revelation of the various possible realizations of the reliable and short-period integer ambiguity resolution in precise carrier-phase relative positioning by GPS/GNSS. The theoretical foundation and efficient methodology are systematically developed, and two types of the enhancement of union-bound approximation are proposed and examined. The results revealed include an extremely high reliability under the condition of accurate carrier-phase measurements and a large number of visible satellites, its heavy degradation caused by the slight amount of differentiated ionospheric delays due to the nonvanishing baseline length between rover and reference receivers, and the advantages of the use of the multiple carrier frequencies. The succeeding initialization of the integer ambiguities is shown to overcome the disadvantageous condition of the nonvanishing baseline length effectively due to the reasonably assumed temporal and spatial constancy of differentiated ionospheric delays.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 06:07:58 GMT" }, { "version": "v2", "created": "Fri, 5 Aug 2005 00:33:31 GMT" }, { "version": "v3", "created": "Tue, 8 Nov 2005 07:55:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Kondo", "Kentaro", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508009
Wei-jen Hsu
Wei-jen Hsu, Ahmed Helmy
IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis
16 pages, 31 figures
null
null
null
cs.NI
null
We conduct the most comprehensive study of WLAN traces to date. Measurements collected from four major university campuses are analyzed with the aim of developing fundamental understanding of realistic user behavior in wireless networks. Both individual user and inter-node (group) behaviors are investigated and two classes of metrics are devised to capture the underlying structure of such behaviors. For individual user behavior we observe distinct patterns in which most users are 'on' for a small fraction of the time, the number of access points visited is very small and the overall on-line user mobility is quite low. We clearly identify categories of heavy and light users. In general, users exhibit high degree of similarity over days and weeks. For group behavior, we define metrics for encounter patterns and friendship. Surprisingly, we find that a user, on average, encounters less than 6% of the network user population within a month, and that encounter and friendship relations are highly asymmetric. We establish that number of encounters follows a biPareto distribution, while friendship indexes follow an exponential distribution. We capture the encounter graph using a small world model, the characteristics of which reach steady state after only one day. We hope for our study to have a great impact on realistic modeling of network usage and mobility patterns in wireless networks.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 01:54:05 GMT" } ]
2009-09-29T00:00:00
[ [ "Hsu", "Wei-jen", "" ], [ "Helmy", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0508010
Yongjin Kim
Yongjin Kim, Ahmed Helmy
ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION
null
null
null
null
cs.NI
null
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promising solution to take a proper countermeasure near the attack origins, to discourage attackers from launching attacks, and for forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a challenging problem due to the dynamic topology, and limited network resources. It is especially difficult to trace back attacker(s) when they are moving to avoid traceback. In this paper, we introduce the ATTENTION protocol framework, which pays special attention to MAC layer abnormal activity under attack. ATTENTION consists of three classes, namely, coarse-grained traceback, fine-grained traceback and spatio-temporal fusion architecture. For energy-efficient attacker searching in MANETs, we also utilize small-world model. Our simulation analysis shows 79% of success rate in DoS attacker traceback with coarse-grained attack signature. In addition, with fine-grained attack signature, it shows 97% of success rate in DoS attacker traceback and 83% of success rate in DDoS attacker traceback. We also show that ATTENTION has robustness against node collusion and mobility.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 04:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Kim", "Yongjin", "" ], [ "Helmy", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0508011
Kazuto Ogawa
Kazuto Ogawa, Goichiro Hanaoka and Hideki Imai
A Secure Traitor Tracing Scheme against Key Exposure
5 pages, IEEE International Symposium on Information Theory 2005 (ISIT 2005)
null
10.1109/ISIT.2005.1523670
null
cs.CR
null
Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure {\it traitor tracing scheme against key exposure (TTaKE)} which contains the properties of both a traitor tracing scheme and a forward secure public key cryptosystem. Its structure fits current digital broadcasting systems and it may be useful in preventing traitors from making illegal decoders and in minimizing the damage from accidental key exposure. It can improve usability through these properties.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 07:36:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Ogawa", "Kazuto", "" ], [ "Hanaoka", "Goichiro", "" ], [ "Imai", "Hideki", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0508012
Jan Ostergaard
Jan Ostergaard, Richard Heusdens, and Jesper Jensen
n-Channel Asymmetric Multiple-Description Lattice Vector Quantization
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523654
null
cs.IT math.IT
null
We present analytical expressions for optimal entropy-constrained multiple-description lattice vector quantizers which, under high-resolutions assumptions, minimize the expected distortion for given packet-loss probabilities. We consider the asymmetric case where packet-loss probabilities and side entropies are allowed to be unequal and find optimal quantizers for any number of descriptions in any dimension. We show that the normalized second moments of the side-quantizers are given by that of an $L$-dimensional sphere independent of the choice of lattices. Furthermore, we show that the optimal bit-distribution among the descriptions is not unique. In fact, within certain limits, bits can be arbitrarily distributed.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 07:52:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Ostergaard", "Jan", "" ], [ "Heusdens", "Richard", "" ], [ "Jensen", "Jesper", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508013
Kenji Yasunaga
Kenji Yasunaga, Toru Fujiwara
Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode
5 pages, 2 figures. To appear in the Proceedings of IEEE International Symposium on Information Theory, Sept. 4-9, 2005, Adelaide, Australia
null
10.1109/ISIT.2005.1523360
null
cs.IT math.IT
null
Relations between the local weight distributions of a binary linear code, its extended code, and its even weight subcode are presented. In particular, for a code of which the extended code is transitive invariant and contains only codewords with weight multiples of four, the local weight distribution can be obtained from that of the extended code. Using the relations, the local weight distributions of the $(127,k)$ primitive BCH codes for $k\leq50$, the $(127,64)$ punctured third-order Reed-Muller, and their even weight subcodes are obtained from the local weight distribution of the $(128,k)$ extended primitive BCH codes for $k\leq50$ and the $(128,64)$ third-order Reed-Muller code. We also show an approach to improve an algorithm for computing the local weight distribution proposed before.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 08:25:57 GMT" } ]
2016-11-17T00:00:00
[ [ "Yasunaga", "Kenji", "" ], [ "Fujiwara", "Toru", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508014
Pascal Vontobel
Jon Feldman, Ralf Koetter, Pascal O. Vontobel
The Benefit of Thresholding in LP Decoding of LDPC Codes
To appear in Proc. 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523344
null
cs.IT math.IT
null
Consider data transmission over a binary-input additive white Gaussian noise channel using a binary low-density parity-check code. We ask the following question: Given a decoder that takes log-likelihood ratios as input, does it help to modify the log-likelihood ratios before decoding? If we use an optimal decoder then it is clear that modifying the log-likelihoods cannot possibly help the decoder's performance, and so the answer is "no." However, for a suboptimal decoder like the linear programming decoder, the answer might be "yes": In this paper we prove that for certain interesting classes of low-density parity-check codes and large enough SNRs, it is advantageous to truncate the log-likelihood ratios before passing them to the linear programming decoder.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 16:52:11 GMT" } ]
2016-11-17T00:00:00
[ [ "Feldman", "Jon", "" ], [ "Koetter", "Ralf", "" ], [ "Vontobel", "Pascal O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508015
Stanislav Bulygin V.
Stanislav Bulygin
Chosen-ciphertext attack on noncommutative Polly Cracker
null
null
null
null
cs.IT cs.CR math.IT
null
We propose a chosen-ciphertext attack on recently presented noncommutative variant of the well-known Polly Cracker cryptosystem. We show that if one chooses parameters for this noncommutative Polly Cracker as initially proposed, than the system should be claimed as insecure.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 09:48:43 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2005 19:11:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Bulygin", "Stanislav", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508016
Jang-Won Lee
Jang-Won Lee, Mung Chiang, and A. Robert Calderbank
Distributed Algorithms for Optimal Rate-Reliability Tradeoff in Networks
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.NI
null
The current framework of network utility maximization for distributed rate allocation assumes fixed channel code rates. However, by adapting the physical layer channel coding, different rate-reliability tradeoffs can be achieved on each link and for each end user. Consider a network where each user has a utility function that depends on both signal quality and data rate, and each link may provide a `fatter' (`thinner') information `pipe' by allowing a higher (lower) decoding error probability. We propose two distributed, pricing-based algorithms to attain optimal rate-reliability tradeoff, with an interpretation that each user provides its willingness to pay for reliability to the network and the network feeds back congestion prices to users. The proposed algorithms converge to a tradeoff point between rate and reliability, which is proved to be globally optimal for codes with sufficiently large codeword lengths and user utilities with sufficiently negative curvatures.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 14:35:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Lee", "Jang-Won", "" ], [ "Chiang", "Mung", "" ], [ "Calderbank", "A. Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0508017
Anne-Marie Vercoustre
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
Enhancing Content-And-Structure Information Retrieval using a Native XML Database
null
null
null
null
cs.IR
null
Three approaches to content-and-structure XML retrieval are analysed in this paper: first by using Zettair, a full-text information retrieval system; second by using eXist, a native XML database, and third by using a hybrid XML retrieval system that uses eXist to produce the final answers from likely relevant articles retrieved by Zettair. INEX 2003 content-and-structure topics can be classified in two categories: the first retrieving full articles as final answers, and the second retrieving more specific elements within articles as final answers. We show that for both topic categories our initial hybrid system improves the retrieval effectiveness of a native XML database. For ranking the final answer elements, we propose and evaluate a novel retrieval model that utilises the structural relationships between the answer elements of a native XML database and retrieves Coherent Retrieval Elements. The final results of our experiments show that when the XML retrieval task focusses on highly relevant elements our hybrid XML retrieval system with the Coherent Retrieval Elements module is 1.8 times more effective than Zettair and 3 times more effective than eXist, and yields an effective content-and-structure XML retrieval.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 15:05:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Pehcevski", "Jovan", "", "RMIT" ], [ "Thom", "James A.", "", "RMIT" ], [ "Vercoustre", "Anne-Marie", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0508018
Volker Pohl
Holger Boche and Volker Pohl
Spectral Factorization, Whitening- and Estimation Filter -- Stability, Smoothness Properties and FIR Approximation Behavior
To appear in the proceedings of the IEEE International Symposium on Information Theory, Adelaide, Astralia, Sept. 4-9, 2005
null
null
null
cs.IT math.IT
null
A Wiener filter can be interpreted as a cascade of a whitening- and an estimation filter. This paper gives a detailed investigates of the properties of these two filters. Then the practical consequences for the overall Wiener filter are ascertained. It is shown that if the given spectral densities are smooth (Hoelder continuous) functions, the resulting Wiener filter will always be stable and can be approximated arbitrarily well by a finite impulse response (FIR) filter. Moreover, the smoothness of the spectral densities characterizes how fast the FIR filter approximates the desired filter characteristic. If on the other hand the spectral densities are continuous but not smooth enough, the resulting Wiener filter may not be stable.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 15:41:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Boche", "Holger", "" ], [ "Pohl", "Volker", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508019
Pascal Vontobel
Pascal O. Vontobel, Roxana Smarandache, Negar Kiyavash, Jason Teutsch, Dejan Vukobratovic
On the Minimal Pseudo-Codewords of Codes from Finite Geometries
To appear in Proc. 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523484
null
cs.IT cs.DM math.IT
null
In order to understand the performance of a code under maximum-likelihood (ML) decoding, it is crucial to know the minimal codewords. In the context of linear programming (LP) decoding, it turns out to be necessary to know the minimal pseudo-codewords. This paper studies the minimal codewords and minimal pseudo-codewords of some families of codes derived from projective and Euclidean planes. Although our numerical results are only for codes of very modest length, they suggest that these code families exhibit an interesting property. Namely, all minimal pseudo-codewords that are not multiples of a minimal codeword have an AWGNC pseudo-weight that is strictly larger than the minimum Hamming weight of the code. This observation has positive consequences not only for LP decoding but also for iterative decoding.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 16:34:05 GMT" } ]
2016-11-17T00:00:00
[ [ "Vontobel", "Pascal O.", "" ], [ "Smarandache", "Roxana", "" ], [ "Kiyavash", "Negar", "" ], [ "Teutsch", "Jason", "" ], [ "Vukobratovic", "Dejan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508020
Chris Ng
Chris T. K. Ng and Andrea J. Goldsmith
Capacity Gain from Transmitter and Receiver Cooperation
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
Capacity gain from transmitter and receiver cooperation are compared in a relay network where the cooperating nodes are close together. When all nodes have equal average transmit power along with full channel state information (CSI), it is proved that transmitter cooperation outperforms receiver cooperation, whereas the opposite is true when power is optimally allocated among the nodes but only receiver phase CSI is available. In addition, when the nodes have equal average power with receiver phase CSI only, cooperation is shown to offer no capacity improvement over a non-cooperative scheme with the same average network power. When the system is under optimal power allocation with full CSI, the decode-and-forward transmitter cooperation rate is close to its cut-set capacity upper bound, and outperforms compress-and-forward receiver cooperation. Moreover, it is shown that full CSI is essential in transmitter cooperation, while optimal power allocation is essential in receiver cooperation.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 18:03:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Ng", "Chris T. K.", "" ], [ "Goldsmith", "Andrea J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508021
Dmitri Krioukov
Dmitri Krioukov, kc claffy
Toward Compact Interdomain Routing
null
null
null
null
cs.NI
null
Despite prevailing concerns that the current Internet interdomain routing system will not scale to meet the needs of the 21st century global Internet, networking research has not yet led to the construction of a new routing architecture with satisfactory and mathematically provable scalability characteristics. Worse, continuing empirical trends of the existing routing and topology structure of the Internet are alarming: the foundational principles of the current routing and addressing architecture are an inherently bad match for the naturally evolving structure of Internet interdomain topology. We are fortunate that a sister discipline, theory of distributed computation, has developed routing algorithms that offer promising potential for genuinely scalable routing on realistic Internet-like topologies. Indeed, there are many recent breakthroughs in the area of compact routing, which has been shown to drastically outperform, in terms of efficiency and scalability, even the boldest proposals developed in networking research. Many open questions remain, but we believe the applicability of compact routing techniques to Internet interdomain routing is a research area whose potential payoff for the future of networking is too high to ignore.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 19:32:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Krioukov", "Dmitri", "" ], [ "claffy", "kc", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0508022
Andrew Tirkel
Andrew Z Tirkel and Tom E Hall
Matrix Construction Using Cyclic Shifts of a Column
null
null
null
null
cs.DM cs.CR cs.IT math.IT
null
This paper describes the synthesis of matrices with good correlation, from cyclic shifts of pseudonoise columns. Optimum matrices result whenever the shift sequence satisfies the constant difference property. Known shift sequences with the constant (or almost constant) difference property are: Quadratic (Polynomial) and Reciprocal Shift modulo prime, Exponential Shift, Legendre Shift, Zech Logarithm Shift, and the shift sequences of some m-arrays. We use these shift sequences to produce arrays for watermarking of digital images. Matrices can also be unfolded into long sequences by diagonal unfolding (with no deterioration in correlation) or row-by-row unfolding, with some degradation in correlation.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 21:17:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Tirkel", "Andrew Z", "" ], [ "Hall", "Tom E", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508023
Todd Veldhuizen
Todd L. Veldhuizen
Software Libraries and Their Reuse: Entropy, Kolmogorov Complexity, and Zipf's Law
null
Library-Centric Software Design (LCSD 2005), an OOPSLA 2005 workshop
null
null
cs.SE cs.IT cs.PL math.IT
null
We analyze software reuse from the perspective of information theory and Kolmogorov complexity, assessing our ability to ``compress'' programs by expressing them in terms of software components reused from libraries. A common theme in the software reuse literature is that if we can only get the right environment in place-- the right tools, the right generalizations, economic incentives, a ``culture of reuse'' -- then reuse of software will soar, with consequent improvements in productivity and software quality. The analysis developed in this paper paints a different picture: the extent to which software reuse can occur is an intrinsic property of a problem domain, and better tools and culture can have only marginal impact on reuse rates if the domain is inherently resistant to reuse. We define an entropy parameter $H \in [0,1]$ of problem domains that measures program diversity, and deduce from this upper bounds on code reuse and the scale of components with which we may work. For ``low entropy'' domains with $H$ near 0, programs are highly similar to one another and the domain is amenable to the Component-Based Software Engineering (CBSE) dream of programming by composing large-scale components. For problem domains with $H$ near 1, programs require substantial quantities of new code, with only a modest proportion of an application comprised of reused, small-scale components. Preliminary empirical results from Unix platforms support some of the predictions of our model.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 04:20:11 GMT" }, { "version": "v2", "created": "Tue, 9 Aug 2005 14:06:44 GMT" }, { "version": "v3", "created": "Sun, 2 Oct 2005 16:25:10 GMT" } ]
2016-08-31T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508024
Kai-Uwe Schmidt
Kai-Uwe Schmidt and Adolf Finger
New Codes for OFDM with Low PMEPR
To appear in the Proceedings of IEEE International Symposium on Information Theory, Sept. 4-9, 2005, Adelaide, Australia
null
null
null
cs.IT math.IT
null
In this paper new codes for orthogonal frequency-division multiplexing (OFDM) with tightly controlled peak-to-mean envelope power ratio (PMEPR) are proposed. We identify a new family of sequences occuring in complementary sets and show that such sequences form subsets of a new generalization of the Reed--Muller codes. Contrarily to previous constructions we present a compact description of such codes, which makes them suitable even for larger block lengths. We also show that some previous constructions just occur as special cases in our construction.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 07:22:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Kai-Uwe", "" ], [ "Finger", "Adolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508025
S\'andor Gy\H{o}ri
S\'andor Gy\H{o}ri
Signature coding for OR channel with asynchronous access
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
Signature coding for multiple access OR channel is considered. We prove that in block asynchronous case the upper bound on the minimum code length asymptotically is the same as in the case of synchronous access.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 10:47:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Győri", "Sándor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508026
Kai-Uwe Schmidt
Kai-Uwe Schmidt and Adolf Finger
Simple Maximum-Likelihood Decoding of Generalized First-order Reed-Muller Codes
5 pages, accepted for publication in IEEE Communications Letters
IEEE Commun. Lett., vol. 9, no. 10, pp. 912-914, Oct. 2005
null
null
cs.IT math.IT
null
An efficient decoder for the generalized first-order Reed-Muller code RM_q(1,m) is essential for the decoding of various block-coding schemes for orthogonal frequency-division multiplexing with reduced peak-to-mean power ratio. We present an efficient and simple maximum-likelihood decoding algorithm for RM_q(1,m). It is shown that this algorithm has lower complexity than other previously known maximum-likelihood decoders for RM_q(1,m).
[ { "version": "v1", "created": "Wed, 3 Aug 2005 12:46:11 GMT" } ]
2007-07-16T00:00:00
[ [ "Schmidt", "Kai-Uwe", "" ], [ "Finger", "Adolf", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508027
Hans-Andrea Loeliger
J. Dauwels, S. Korl, H.-A. Loeliger
Expectation maximization as message passing
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523402
null
cs.IT cs.LG math.IT
null
Based on prior work by Eckford, it is shown how expectation maximization (EM) may be viewed, and used, as a message passing algorithm in factor graphs.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 16:09:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Dauwels", "J.", "" ], [ "Korl", "S.", "" ], [ "Loeliger", "H. -A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508028
Bernardo Huberman
Fang Wu, Zi Zhang and Bernardo A. Huberman
Truth-telling Reservations
null
null
null
null
cs.GT cond-mat.stat-mech cs.MA
null
We present a mechanism for reservations of bursty resources that is both truthful and robust. It consists of option contracts whose pricing structure induces users to reveal the true likelihoods that they will purchase a given resource. Users are also allowed to adjust their options as their likelihood changes. This scheme helps users save cost and the providers to plan ahead so as to reduce the risk of under-utilization and overbooking. The mechanism extracts revenue similar to that of a monopoly provider practicing temporal pricing discrimination with a user population whose preference distribution is known in advance.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 17:11:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Fang", "" ], [ "Zhang", "Zi", "" ], [ "Huberman", "Bernardo A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0508029
Johannes Schneider
Johannes J. Schneider and Scott Kirkpatrick
Selfish vs. Unselfish Optimization of Network Creation
16 pages, 6 figures
null
10.1088/1742-5468/2005/08/P08007
null
cs.NI cs.AR cs.MA
null
We investigate several variants of a network creation model: a group of agents builds up a network between them while trying to keep the costs of this network small. The cost function consists of two addends, namely (i) a constant amount for each edge an agent buys and (ii) the minimum number of hops it takes sending messages to other agents. Despite the simplicity of this model, various complex network structures emerge depending on the weight between the two addends of the cost function and on the selfish or unselfish behaviour of the agents.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 18:16:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Schneider", "Johannes J.", "" ], [ "Kirkpatrick", "Scott", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0508030
Michael Lentmaier
Michael Lentmaier, Arvind Sridharan, Kamil Sh. Zigangirov, and Daniel J. Costello Jr
Terminated LDPC Convolutional Codes with Thresholds Close to Capacity
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523567
null
cs.IT math.IT
null
An ensemble of LDPC convolutional codes with parity-check matrices composed of permutation matrices is considered. The convergence of the iterative belief propagation based decoder for terminated convolutional codes in the ensemble is analyzed for binary-input output-symmetric memoryless channels using density evolution techniques. We observe that the structured irregularity in the Tanner graph of the codes leads to significantly better thresholds when compared to corresponding LDPC block codes.
[ { "version": "v1", "created": "Wed, 3 Aug 2005 22:27:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Lentmaier", "Michael", "" ], [ "Sridharan", "Arvind", "" ], [ "Zigangirov", "Kamil Sh.", "" ], [ "Costello", "Daniel J.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508031
Jon Yard
Jon Yard, Igor Devetak, Patrick Hayden
Capacity Theorems for Quantum Multiple Access Channels
5 pages. Conference version of quant-ph/0501045, to appear in the proceedings of the IEEE International Symposium on Information Theory, Adelaide, Australia, 2005
Proceedings of the IEEE Symposium on Information Theory, Adelaide, pp. 884-888, 2005
10.1109/ISIT.2005.1523464
null
cs.IT math.IT quant-ph
null
We consider quantum channels with two senders and one receiver. For an arbitrary such channel, we give multi-letter characterizations of two different two-dimensional capacity regions. The first region characterizes the rates at which it is possible for one sender to send classical information while the other sends quantum information. The second region gives the rates at which each sender can send quantum information. We give an example of a channel for which each region has a single-letter description, concluding with a characterization of the rates at which each user can simultaneously send classical and quantum information.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 01:49:14 GMT" } ]
2011-10-25T00:00:00
[ [ "Yard", "Jon", "" ], [ "Devetak", "Igor", "" ], [ "Hayden", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0508032
Derek Messie
Derek Messie (1) and Jae C. Oh (1) ((1) Syracuse University)
Polymorphic Self-* Agents for Stigmergic Fault Mitigation in Large-Scale Real-Time Embedded Systems
Fourth International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS), Utrecht, Netherlands, July, 2005
null
null
null
cs.AI cs.MA
null
Organization and coordination of agents within large-scale, complex, distributed environments is one of the primary challenges in the field of multi-agent systems. A lot of interest has surfaced recently around self-* (self-organizing, self-managing, self-optimizing, self-protecting) agents. This paper presents polymorphic self-* agents that evolve a core set of roles and behavior based on environmental cues. The agents adapt these roles based on the changing demands of the environment, and are directly implementable in computer systems applications. The design combines strategies from game theory, stigmergy, and other biologically inspired models to address fault mitigation in large-scale, real-time, distributed systems. The agents are embedded within the individual digital signal processors of BTeV, a High Energy Physics experiment consisting of 2500 such processors. Results obtained using a SWARM simulation of the BTeV environment demonstrate the polymorphic character of the agents, and show how this design exceeds performance and reliability metrics obtained from comparable centralized, and even traditional decentralized approaches.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 01:43:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Messie", "Derek", "", "Syracuse University" ], [ "Oh", "Jae C.", "", "Syracuse University" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0508033
Dmitri Krioukov
Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Lessons from Three Views of the Internet Topology
null
null
null
CAIDA-TR-2005-02
cs.NI physics.soc-ph
null
Network topology plays a vital role in understanding the performance of network applications and protocols. Thus, recently there has been tremendous interest in generating realistic network topologies. Such work must begin with an understanding of existing network topologies, which today typically consists of a relatively small number of data sources. In this paper, we calculate an extensive set of important characteristics of Internet AS-level topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP, and WHOIS. We find that traceroute and BGP topologies are similar to one another but differ substantially from the WHOIS topology. We discuss the interplay between the properties of the data sources that result from specific data collection mechanisms and the resulting topology views. We find that, among metrics widely considered, the joint degree distribution appears to fundamentally characterize Internet AS-topologies: it narrowly defines values for other important metrics. We also introduce an evaluation criteria for the accuracy of topology generators and verify previous observations that generators solely reproducing degree distributions cannot capture the full spectrum of critical topological characteristics of any of the three topologies. Finally, we release to the community the input topology datasets, along with the scripts and output of our calculations. This supplement should enable researchers to validate their models against real data and to make more informed selection of topology data sources for their specific needs.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 02:35:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahadevan", "Priya", "" ], [ "Krioukov", "Dmitri", "" ], [ "Fomenkov", "Marina", "" ], [ "Huffaker", "Bradley", "" ], [ "Dimitropoulos", "Xenofontas", "" ], [ "claffy", "kc", "" ], [ "Vahdat", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0508034
Erdal Arikan
Erdal Arikan
Channel combining and splitting for cutoff rate improvement
5 pages, 7 figures, 2005 IEEE International Symposium on Information Theory, Adelaide, Sept. 4-9, 2005
null
null
null
cs.IT math.IT
null
The cutoff rate $R_0(W)$ of a discrete memoryless channel (DMC) $W$ is often used as a figure of merit, alongside the channel capacity $C(W)$. Given a channel $W$ consisting of two possibly correlated subchannels $W_1$, $W_2$, the capacity function always satisfies $C(W_1)+C(W_2) \le C(W)$, while there are examples for which $R_0(W_1)+R_0(W_2) > R_0(W)$. This fact that cutoff rate can be ``created'' by channel splitting was noticed by Massey in his study of an optical modulation system modeled as a $M$'ary erasure channel. This paper demonstrates that similar gains in cutoff rate can be achieved for general DMC's by methods of channel combining and splitting. Relation of the proposed method to Pinsker's early work on cutoff rate improvement and to Imai-Hirakawa multi-level coding are also discussed.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 07:33:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Arikan", "Erdal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508035
Irina Naydenova
Irina Naydenova, Torleiv Klove
Codes for error detection, good or not good
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
Linear codes for error detection on a q-ary symmetric channel are studied. It is shown that for given dimension k and minimum distance d, there exists a value \mu(d,k) such that if C is a code of length n >= \mu(d,k), then neither C nor its dual are good for error detection. For d >> k or k << d good approximations for \mu(d,k) are given. A generalization to non-linear codes is also given.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 12:48:03 GMT" } ]
2007-07-16T00:00:00
[ [ "Naydenova", "Irina", "" ], [ "Klove", "Torleiv", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508036
Anne-Marie Vercoustre
Thierry Despeyroux, Yves Lechevallier, Brigitte Trousse, Anne-Marie Vercoustre
Exp\'{e}riences de classification d'une collection de documents XML de structure homog\`{e}ne
Cette version corrige des erreurs dans le nom de 2 auteurs cites dans la bibliographie
Dans 5\`{e}me Journ\'{e}es d' Extraction et de Gestion des Connaissances (EGC 2005)
null
null
cs.IR
null
This paper presents some experiments in clustering homogeneous XMLdocuments to validate an existing classification or more generally anorganisational structure. Our approach integrates techniques for extracting knowledge from documents with unsupervised classification (clustering) of documents. We focus on the feature selection used for representing documents and its impact on the emerging classification. We mix the selection of structured features with fine textual selection based on syntactic characteristics.We illustrate and evaluate this approach with a collection of Inria activity reports for the year 2003. The objective is to cluster projects into larger groups (Themes), based on the keywords or different chapters of these activity reports. We then compare the results of clustering using different feature selections, with the official theme structure used by Inria.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 14:14:59 GMT" }, { "version": "v2", "created": "Tue, 9 Aug 2005 13:15:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Despeyroux", "Thierry", "" ], [ "Lechevallier", "Yves", "" ], [ "Trousse", "Brigitte", "" ], [ "Vercoustre", "Anne-Marie", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0508037
Vamsikrishna Kalapala
Vamsi Kalapala, Cris Moore
The Phase Transition in Exact Cover
9 pages, 1 figure, 1 table
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study EC3, a variant of Exact Cover which is equivalent to Positive 1-in-3 SAT. Random instances of EC3 were recently used as benchmarks for simulations of an adiabatic quantum algorithm. Empirical results suggest that EC3 has a phase transition from satisfiability to unsatisfiability when the number of clauses per variable r exceeds some threshold r* ~= 0.62 +- 0.01. Using the method of differential equations, we show that if r <= 0.546 w.h.p. a random instance of EC3 is satisfiable. Combined with previous results this limits the location of the threshold, if it exists, to the range 0.546 < r* < 0.644.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 15:01:48 GMT" }, { "version": "v2", "created": "Wed, 8 Oct 2008 04:43:29 GMT" } ]
2008-10-08T00:00:00
[ [ "Kalapala", "Vamsi", "" ], [ "Moore", "Cris", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0508038
Robert Burger PhD
John Robert Burger
Quantum Algorithm Processor For Finding Exact Divisors
null
null
null
null
cs.AR
null
Wiring diagrams are given for a quantum algorithm processor in CMOS to compute, in parallel, all divisors of an n-bit integer. Lines required in a wiring diagram are proportional to n. Execution time is proportional to the square of n.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 17:35:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0508039
Soheil Mohajer
Soheil Mohajer, Payam Pakzad and Ali Kakhbod
Tight Bounds on the Redundancy of Huffman Codes
23 pages, 7 figures, accepted for publication in IEEE Transaction on Information Theory
null
10.1109/ITW.2006.1633796
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the redundancy of Huffman codes. In particular, we consider sources for which the probability of one of the source symbols is known. We prove a conjecture of Ye and Yeung regarding the upper bound on the redundancy of such Huffman codes, which yields in a tight upper bound. We also derive a tight lower bound for the redundancy under the same assumption. We further apply the method introduced in this paper to other related problems. It is shown that several other previously known bounds with different constraints follow immediately from our results.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 19:29:18 GMT" }, { "version": "v2", "created": "Fri, 5 Aug 2005 14:21:25 GMT" }, { "version": "v3", "created": "Thu, 14 Jun 2012 18:45:06 GMT" } ]
2016-11-17T00:00:00
[ [ "Mohajer", "Soheil", "" ], [ "Pakzad", "Payam", "" ], [ "Kakhbod", "Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508040
Daniel Cunha
Daniel C. Cunha and Jaime Portugheis
Bounds on the Capacity of the Blockwise Noncoherent APSK-AWGN Channels
4 pages, 5 figures, to appear in Proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
Capacity of M-ary Amplitude and Phase-Shift Keying(M-APSK) over an Additive White Gaussian Noise(AWGN) channel that also introduces an unknown carrier phase rotation is considered. The phase remains constant over a block of L symbols and it is independent from block to block. Aiming to design codes with equally probable symbols, uniformly distributed channel inputs are assumed. Based on results of Peleg and Shamai for M-ary Phase Shift Keying(M-PSK) modulation, easily computable upper and lower bounds on the effective M-APSK capacity are derived. For moderate M and L and a broad range of Signal-to-Noise Ratios(SNR's), the bounds come close together. As in the case of M-PSK modulation, for large L the coherent capacity is approached.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 21:14:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Cunha", "Daniel C.", "" ], [ "Portugheis", "Jaime", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508041
Tian-Jian Jiang
Tian-Jian Jiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
4 pages
null
null
null
cs.HC
null
Input method (IM) is a sine qua non for text entry of many Asian languages, but its potential applications on other languages remain under-explored. This paper proposes a philosophy of input method design by seeing it as a nonintrusive plug-in text service framework. Such design allows new functionalities of text processing to be attached onto a running application without any tweaking of code. We also introduce OpenVanilla, a cross-platform framework that is designed with the above-mentioned model in mind. Frameworks like OpenVanilla have shown that an input method can be more than just a text entry tool: it offers a convenient way for developing various text service and language tools.
[ { "version": "v1", "created": "Thu, 4 Aug 2005 22:39:49 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 06:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Jiang", "Tian-Jian", "" ], [ "Deng-Liu", "", "" ], [ "Liu", "Kang-min", "" ], [ "Yang", "Weizhong", "" ], [ "Tan", "Pek-tiong", "" ], [ "Hsieh", "Mengjuei", "" ], [ "Chang", "Tsung-hsiang", "" ], [ "Hsu", "Wen-Lien", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0508042
Tian-Jian Jiang
Tien-chien Chiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
This paper has been withdrawn
null
null
null
cs.HC
null
This paper has been withdrawn by the author, because it was merged into cs.HC/0508041
[ { "version": "v1", "created": "Thu, 4 Aug 2005 22:49:38 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 06:46:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Chiang", "Tien-chien", "" ], [ "Deng-Liu", "", "" ], [ "Liu", "Kang-min", "" ], [ "Yang", "Weizhong", "" ], [ "Tan", "Pek-tiong", "" ], [ "Hsieh", "Mengjuei", "" ], [ "Chang", "Tsung-hsiang", "" ], [ "Hsu", "Wen-Lien", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0508043
Marcus Hutter
Marcus Hutter
Sequential Predictions based on Algorithmic Complexity
26 pages, LaTeX
Journal of Computer and System Sciences, 72:1 (2006) pages 95-117
null
IDSIA-16-04
cs.IT cs.LG math.IT
null
This paper studies sequence prediction based on the monotone Kolmogorov complexity Km=-log m, i.e. based on universal deterministic/one-part MDL. m is extremely close to Solomonoff's universal prior M, the latter being an excellent predictor in deterministic as well as probabilistic environments, where performance is measured in terms of convergence of posteriors or losses. Despite this closeness to M, it is difficult to assess the prediction quality of m, since little is known about the closeness of their posteriors, which are the important quantities for prediction. We show that for deterministic computable environments, the "posterior" and losses of m converge, but rapid convergence could only be shown on-sequence; the off-sequence convergence can be slow. In probabilistic environments, neither the posterior nor the losses converge, in general.
[ { "version": "v1", "created": "Fri, 5 Aug 2005 10:16:16 GMT" } ]
2007-07-16T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508044
Sanjit Seshia
Sanjit A. Seshia, Randal E. Bryant
Deciding Quantifier-Free Presburger Formulas Using Parameterized Solution Bounds
26 pages
Logical Methods in Computer Science, Volume 1, Issue 2 (December 19, 2005) lmcs:2270
10.2168/LMCS-1(2:6)2005
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a formula in quantifier-free Presburger arithmetic, if it has a satisfying solution, there is one whose size, measured in bits, is polynomially bounded in the size of the formula. In this paper, we consider a special class of quantifier-free Presburger formulas in which most linear constraints are difference (separation) constraints, and the non-difference constraints are sparse. This class has been observed to commonly occur in software verification. We derive a new solution bound in terms of parameters characterizing the sparseness of linear constraints and the number of non-difference constraints, in addition to traditional measures of formula size. In particular, we show that the number of bits needed per integer variable is linear in the number of non-difference constraints and logarithmic in the number and size of non-zero coefficients in them, but is otherwise independent of the total number of linear constraints in the formula. The derived bound can be used in a decision procedure based on instantiating integer variables over a finite domain and translating the input quantifier-free Presburger formula to an equi-satisfiable Boolean formula, which is then checked using a Boolean satisfiability solver. In addition to our main theoretical result, we discuss several optimizations for deriving tighter bounds in practice. Empirical evidence indicates that our decision procedure can greatly outperform other decision procedures.
[ { "version": "v1", "created": "Fri, 5 Aug 2005 11:09:32 GMT" }, { "version": "v2", "created": "Mon, 19 Dec 2005 14:22:52 GMT" }, { "version": "v3", "created": "Wed, 26 Jul 2006 15:27:32 GMT" }, { "version": "v4", "created": "Thu, 27 Jul 2006 12:18:32 GMT" }, { "version": "v5", "created": "Tue, 7 Oct 2008 12:14:26 GMT" } ]
2017-01-11T00:00:00
[ [ "Seshia", "Sanjit A.", "" ], [ "Bryant", "Randal E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0508045
Ion Mandoiu
Christoph Albrecht, Andrew B. Kahng, Ion I. Mandoiu, and Alexander Zelikovsky
Multicommodity Flow Algorithms for Buffered Global Routing
null
null
null
null
cs.DS
null
In this paper we describe a new algorithm for buffered global routing according to a prescribed buffer site map. Specifically, we describe a provably good multi-commodity flow based algorithm that finds a global routing minimizing buffer and wire congestion subject to given constraints on routing area (wirelength and number of buffers) and sink delays. Our algorithm allows computing the tradeoff curve between routing area and wire/buffer congestion under any combination of delay and capacity constraints, and simultaneously performs buffer/wire sizing, as well as layer and pin assignment. Experimental results show that near-optimal results are obtained with a practical runtime.
[ { "version": "v1", "created": "Sat, 6 Aug 2005 12:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Albrecht", "Christoph", "" ], [ "Kahng", "Andrew B.", "" ], [ "Mandoiu", "Ion I.", "" ], [ "Zelikovsky", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0508046
Panu Chaichanavong
Panu Chaichanavong, Paul H. Siegel
Relaxation Bounds on the Minimum Pseudo-Weight of Linear Block Codes
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523448
null
cs.IT math.IT
null
Just as the Hamming weight spectrum of a linear block code sheds light on the performance of a maximum likelihood decoder, the pseudo-weight spectrum provides insight into the performance of a linear programming decoder. Using properties of polyhedral cones, we find the pseudo-weight spectrum of some short codes. We also present two general lower bounds on the minimum pseudo-weight. The first bound is based on the column weight of the parity-check matrix. The second bound is computed by solving an optimization problem. In some cases, this bound is more tractable to compute than previously known bounds and thus can be applied to longer codes.
[ { "version": "v1", "created": "Sun, 7 Aug 2005 19:32:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Chaichanavong", "Panu", "" ], [ "Siegel", "Paul H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508047
Desmond Lun
Desmond S. Lun, Muriel Medard, Ralf Koetter, Michelle Effros
Further Results on Coding for Reliable Communication over Packet Networks
5 pages; to appear in Proc. 2005 IEEE International Symposium on Information Theory (ISIT 2005)
Proc. 2005 IEEE International Symposium on Information Theory (ISIT 2005), pages 1848-1852, September 2005
10.1109/ISIT.2005.1523665
null
cs.IT cs.NI math.IT
null
In "On Coding for Reliable Communication over Packet Networks" (Lun, Medard, and Effros, Proc. 42nd Annu. Allerton Conf. Communication, Control, and Computing, 2004), a capacity-achieving coding scheme for unicast or multicast over lossy wireline or wireless packet networks is presented. We extend that paper's results in two ways: First, we extend the network model to allow packets received on a link to arrive according to any process with an average rate, as opposed to the assumption of Poisson traffic with i.i.d. losses that was previously made. Second, in the case of Poisson traffic with i.i.d. losses, we derive error exponents that quantify the rate at which the probability of error decays with coding delay.
[ { "version": "v1", "created": "Mon, 8 Aug 2005 02:09:13 GMT" } ]
2007-07-16T00:00:00
[ [ "Lun", "Desmond S.", "" ], [ "Medard", "Muriel", "" ], [ "Koetter", "Ralf", "" ], [ "Effros", "Michelle", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508048
Olivier Danvy
Malgorzata Biernacka and Dariusz Biernacki and Olivier Danvy
An Operational Foundation for Delimited Continuations in the CPS Hierarchy
39 pages
Logical Methods in Computer Science, Volume 1, Issue 2 (November 8, 2005) lmcs:2269
10.2168/LMCS-1(2:5)2005
null
cs.LO cs.PL
null
We present an abstract machine and a reduction semantics for the lambda-calculus extended with control operators that give access to delimited continuations in the CPS hierarchy. The abstract machine is derived from an evaluator in continuation-passing style (CPS); the reduction semantics (i.e., a small-step operational semantics with an explicit representation of evaluation contexts) is constructed from the abstract machine; and the control operators are the shift and reset family. We also present new applications of delimited continuations in the CPS hierarchy: finding list prefixes and normalization by evaluation for a hierarchical language of units and products.
[ { "version": "v1", "created": "Mon, 8 Aug 2005 13:57:34 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2005 13:47:20 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2005 13:03:30 GMT" }, { "version": "v4", "created": "Thu, 8 Dec 2005 13:40:54 GMT" } ]
2023-06-27T00:00:00
[ [ "Biernacka", "Malgorzata", "" ], [ "Biernacki", "Dariusz", "" ], [ "Danvy", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0508049
Pascal Vontobel
Ralf Koetter, Wen-Ching W. Li, Pascal O. Vontobel, Judy L. Walker
Characterizations of Pseudo-Codewords of LDPC Codes
Submitted, August 2005
null
null
null
cs.IT cs.DM math.IT
null
An important property of high-performance, low complexity codes is the existence of highly efficient algorithms for their decoding. Many of the most efficient, recent graph-based algorithms, e.g. message passing algorithms and decoding based on linear programming, crucially depend on the efficient representation of a code in a graphical model. In order to understand the performance of these algorithms, we argue for the characterization of codes in terms of a so called fundamental cone in Euclidean space which is a function of a given parity check matrix of a code, rather than of the code itself. We give a number of properties of this fundamental cone derived from its connection to unramified covers of the graphical models on which the decoding algorithms operate. For the class of cycle codes, these developments naturally lead to a characterization of the fundamental polytope as the Newton polytope of the Hashimoto edge zeta function of the underlying graph.
[ { "version": "v1", "created": "Tue, 9 Aug 2005 00:10:03 GMT" }, { "version": "v2", "created": "Wed, 10 Aug 2005 12:41:05 GMT" }, { "version": "v3", "created": "Wed, 17 Aug 2005 22:53:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Koetter", "Ralf", "" ], [ "Li", "Wen-Ching W.", "" ], [ "Vontobel", "Pascal O.", "" ], [ "Walker", "Judy L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508050
Chee Tan
T. M. Cover and M. Chiang
Duality between channel capacity and rate distortion with two-sided state information
null
null
null
null
cs.IT math.IT
null
We show that the duality between channel capacity and data compression is retained when state information is available to the sender, to the receiver, to both, or to neither. We present a unified theory for eight special cases of channel capacity and rate distortion with state information, which also extends existing results to arbitrary pairs of independent and identically distributed (i.i.d.) correlated state information available at the sender and at the receiver, respectively. In particular, the resulting general formula for channel capacity assumes the same form as the generalized Wyner Ziv rate distortion function.
[ { "version": "v1", "created": "Tue, 9 Aug 2005 03:01:18 GMT" } ]
2007-07-13T00:00:00
[ [ "Cover", "T. M.", "" ], [ "Chiang", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508051
Jan Mietzner
Jan Mietzner, Sabah Badri-Hoeher, Ingmar Land, and Peter A. Hoeher
Trellis-Based Equalization for Sparse ISI Channels Revisited
To be presented at the 2005 IEEE Int. Symp. Inform. Theory (ISIT 2005), September 4-9, 2005, Adelaide, Australia
null
10.1109/ISIT.2005.1523328
null
cs.IT math.IT
null
Sparse intersymbol-interference (ISI) channels are encountered in a variety of high-data-rate communication systems. Such channels have a large channel memory length, but only a small number of significant channel coefficients. In this paper, trellis-based equalization of sparse ISI channels is revisited. Due to the large channel memory length, the complexity of maximum-likelihood detection, e.g., by means of the Viterbi algorithm (VA), is normally prohibitive. In the first part of the paper, a unified framework based on factor graphs is presented for complexity reduction without loss of optimality. In this new context, two known reduced-complexity algorithms for sparse ISI channels are recapitulated: The multi-trellis VA (M-VA) and the parallel-trellis VA (P-VA). It is shown that the M-VA, although claimed, does not lead to a reduced computational complexity. The P-VA, on the other hand, leads to a significant complexity reduction, but can only be applied for a certain class of sparse channels. In the second part of the paper, a unified approach is investigated to tackle general sparse channels: It is shown that the use of a linear filter at the receiver renders the application of standard reduced-state trellis-based equalizer algorithms feasible, without significant loss of optimality. Numerical results verify the efficiency of the proposed receiver structure.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 09:37:52 GMT" } ]
2016-11-17T00:00:00
[ [ "Mietzner", "Jan", "" ], [ "Badri-Hoeher", "Sabah", "" ], [ "Land", "Ingmar", "" ], [ "Hoeher", "Peter A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508052
Olivier Powell
Pierre Leone, Olivier Powell and Jose Rolim
Energy Optimal Data Propagation in Wireless Sensor Networks
19 pages
Journal of Parallel and Distributed Computing Volume 67, Issue 3 , March 2007, Pages 302-317
10.1016/j.jpdc.2006.10.007
null
cs.DC
null
We propose an algorithm which produces a randomized strategy reaching optimal data propagation in wireless sensor networks (WSN).In [6] and [8], an energy balanced solution is sought using an approximation algorithm. Our algorithm improves by (a) when an energy-balanced solution does not exist, it still finds an optimal solution (whereas previous algorithms did not consider this case and provide no useful solution) (b) instead of being an approximation algorithm, it finds the exact solution in one pass. We also provide a rigorous proof of the optimality of our solution.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 15:54:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Leone", "Pierre", "" ], [ "Powell", "Olivier", "" ], [ "Rolim", "Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0508053
Peter Turney
Peter D. Turney (National Research Council of Canada)
Measuring Semantic Similarity by Latent Relational Analysis
6 pages, related work available at http://purl.org/peter.turney/
Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence (IJCAI-05), (2005), Edinburgh, Scotland, 1136-1141
null
NRC-48255
cs.LG cs.CL cs.IR
null
This paper introduces Latent Relational Analysis (LRA), a method for measuring semantic similarity. LRA measures similarity in the semantic relations between two pairs of words. When two pairs have a high degree of relational similarity, they are analogous. For example, the pair cat:meow is analogous to the pair dog:bark. There is evidence from cognitive science that relational similarity is fundamental to many cognitive and linguistic tasks (e.g., analogical reasoning). In the Vector Space Model (VSM) approach to measuring relational similarity, the similarity between two pairs is calculated by the cosine of the angle between the vectors that represent the two pairs. The elements in the vectors are based on the frequencies of manually constructed patterns in a large corpus. LRA extends the VSM approach in three ways: (1) patterns are derived automatically from the corpus, (2) Singular Value Decomposition is used to smooth the frequency data, and (3) synonyms are used to reformulate word pairs. This paper describes the LRA algorithm and experimentally compares LRA to VSM on two tasks, answering college-level multiple-choice word analogy questions and classifying semantic relations in noun-modifier expressions. LRA achieves state-of-the-art results, reaching human-level performance on the analogy questions and significantly exceeding VSM performance on both tasks.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 19:35:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0508054
Yaron Rachlin
Yaron Rachlin, Rohit Negi, and Pradeep Khosla
Sensing Capacity for Markov Random Fields
To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523308
null
cs.IT math.IT
null
This paper computes the sensing capacity of a sensor network, with sensors of limited range, sensing a two-dimensional Markov random field, by modeling the sensing operation as an encoder. Sensor observations are dependent across sensors, and the sensor network output across different states of the environment is neither identically nor independently distributed. Using a random coding argument, based on the theory of types, we prove a lower bound on the sensing capacity of the network, which characterizes the ability of the sensor network to distinguish among environments with Markov structure, to within a desired accuracy.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 20:13:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Rachlin", "Yaron", "" ], [ "Negi", "Rohit", "" ], [ "Khosla", "Pradeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508055
Navin Kashyap
Olgica Milenkovic, Navin Kashyap
DNA Codes that Avoid Secondary Structures
to appear in Proc. 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, Sept. 4-9, 2005; 5 pages
null
10.1109/ISIT.2005.1523340
null
cs.DM cs.IT math.IT
null
In this paper, we consider the problem of designing DNA sequences (codewords) for DNA storage systems and DNA computing that are unlikely to fold back onto themselves to form undesirable secondary structures. The paper addresses both the issue of enumerating the sequences with such properties and the problem of practical code construction.
[ { "version": "v1", "created": "Wed, 10 Aug 2005 21:41:38 GMT" } ]
2016-11-17T00:00:00
[ [ "Milenkovic", "Olgica", "" ], [ "Kashyap", "Navin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508056
Michael Stay
Michael Stay
Very Simple Chaitin Machines for Concrete AIT
null
Fundamenta Informaticae 68 (3) 2005. pp. 231--247
null
CDMTCS Report 265
cs.IT math.IT
null
In 1975, Chaitin introduced his celebrated Omega number, the halting probability of a universal Chaitin machine, a universal Turing machine with a prefix-free domain. The Omega number's bits are {\em algorithmically random}--there is no reason the bits should be the way they are, if we define ``reason'' to be a computable explanation smaller than the data itself. Since that time, only {\em two} explicit universal Chaitin machines have been proposed, both by Chaitin himself. Concrete algorithmic information theory involves the study of particular universal Turing machines, about which one can state theorems with specific numerical bounds, rather than include terms like O(1). We present several new tiny Chaitin machines (those with a prefix-free domain) suitable for the study of concrete algorithmic information theory. One of the machines, which we call Keraia, is a binary encoding of lambda calculus based on a curried lambda operator. Source code is included in the appendices. We also give an algorithm for restricting the domain of blank-endmarker machines to a prefix-free domain over an alphabet that does not include the endmarker; this allows one to take many universal Turing machines and construct universal Chaitin machines from them.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 06:57:48 GMT" } ]
2007-07-16T00:00:00
[ [ "Stay", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508057
Miguel Rodrigues PhD
M. R. D. Rodrigues, I. Chatzigeorgiou, I. J. Wassell and R. Carrasco
On the Performance of Turbo Codes in Quasi-Static Fading Channels
To appear in the Proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523410
null
cs.IT math.IT
null
In this paper, we investigate in detail the performance of turbo codes in quasi-static fading channels both with and without antenna diversity. First, we develop a simple and accurate analytic technique to evaluate the performance of turbo codes in quasi-static fading channels. The proposed analytic technique relates the frame error rate of a turbo code to the iterative decoder convergence threshold, rather than to the turbo code distance spectrum. Subsequently, we compare the performance of various turbo codes in quasi-static fading channels. We show that, in contrast to the situation in the AWGN channel, turbo codes with different interleaver sizes or turbo codes based on RSC codes with different constraint lengths and generator polynomials exhibit identical performance. Moreover, we also compare the performance of turbo codes and convolutional codes in quasi-static fading channels under the condition of identical decoding complexity. In particular, we show that turbo codes do not outperform convolutional codes in quasi-static fading channels with no antenna diversity; and that turbo codes only outperform convolutional codes in quasi-static fading channels with antenna diversity.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 10:14:52 GMT" } ]
2016-11-17T00:00:00
[ [ "Rodrigues", "M. R. D.", "" ], [ "Chatzigeorgiou", "I.", "" ], [ "Wassell", "I. J.", "" ], [ "Carrasco", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0508058
Herve Jegou
Herve Jegou and Christine Guillemot
Entropy coding with Variable Length Re-writing Systems
6 pages, To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
null
null
cs.IT math.IT
null
This paper describes a new set of block source codes well suited for data compression. These codes are defined by sets of productions rules of the form a.l->b, where a in A represents a value from the source alphabet A and l, b are -small- sequences of bits. These codes naturally encompass other Variable Length Codes (VLCs) such as Huffman codes. It is shown that these codes may have a similar or even a shorter mean description length than Huffman codes for the same encoding and decoding complexity. A first code design method allowing to preserve the lexicographic order in the bit domain is described. The corresponding codes have the same mean description length (mdl) as Huffman codes from which they are constructed. Therefore, they outperform from a compression point of view the Hu-Tucker codes designed to offer the lexicographic property in the bit domain. A second construction method allows to obtain codes such that the marginal bit probability converges to 0.5 as the sequence length increases and this is achieved even if the probability distribution function is not known by the encoder.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 15:41:19 GMT" } ]
2009-09-29T00:00:00
[ [ "Jegou", "Herve", "" ], [ "Guillemot", "Christine", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]