id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0507032
|
Robert Ogden Dr.
|
R. D. Ogden
|
Introduction to Quantum Message Space
|
LaTeX, 19 pages
| null | null | null |
cs.IT math.IT math.OA quant-ph
| null |
This paper develops the quantum analog of the message ensemble of classical
information theory as developed by Shannon and Khinchin. The principal
mathematical tool is harmonic analysis on the free group with two generators.
|
[
{
"version": "v1",
"created": "Tue, 12 Jul 2005 04:37:07 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Nov 2005 04:00:29 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Ogden",
"R. D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OA",
"description": "Algebras of operators on Hilbert space, C^*-algebras, von Neumann algebras, non-commutative geometry",
"span": "(Operator Algebras)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0507033
|
Marco Cuturi
|
Marco Cuturi, Kenji Fukumizu
|
Multiresolution Kernels
|
8 pages
| null | null | null |
cs.LG
| null |
We present in this work a new methodology to design kernels on data which is
structured with smaller components, such as text, images or sequences. This
methodology is a template procedure which can be applied on most kernels on
measures and takes advantage of a more detailed "bag of components"
representation of the objects. To obtain such a detailed description, we
consider possible decompositions of the original bag into a collection of
nested bags, following a prior knowledge on the objects' structure. We then
consider these smaller bags to compare two objects both in a detailed
perspective, stressing local matches between the smaller bags, and in a global
or coarse perspective, by considering the entire bag. This multiresolution
approach is likely to be best suited for tasks where the coarse approach is not
precise enough, and where a more subtle mixture of both local and global
similarities is necessary to compare objects. The approach presented here would
not be computationally tractable without a factorization trick that we
introduce before presenting promising results on an image retrieval task.
|
[
{
"version": "v1",
"created": "Wed, 13 Jul 2005 05:45:28 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Nov 2005 08:18:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cuturi",
"Marco",
""
],
[
"Fukumizu",
"Kenji",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0507034
|
Ittai Abraham
|
Ittai Abraham and Dahlia Malkhi and Gurmeet Singh Manku
|
Papillon: Greedy Routing in Rings
| null | null | null | null |
cs.DC cs.NI
| null |
We study {\sc greedy} routing over $n$ nodes placed in a ring, with the
\emph{distance} between two nodes defined to be the clockwise or the absolute
distance between them along the ring. Such graphs arise in the context of
modeling social networks and in routing networks for peer-to-peer systems. We
construct the first network over $n$ nodes in which {\sc greedy} routing takes
$O(\log n / \log d)$ hops in the worst-case, with $d$ out-going links per node.
Our result has the first asymptotically optimal greedy routing complexity.
Previous constructions required $O(\frac{\log^2 n}{d})$ hops.
|
[
{
"version": "v1",
"created": "Thu, 14 Jul 2005 00:34:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Abraham",
"Ittai",
""
],
[
"Malkhi",
"Dahlia",
""
],
[
"Manku",
"Gurmeet Singh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0507035
|
Yi-Dong Shen
|
Yi-Dong Shen, Jia-Huai You and Li-Yan Yuan
|
Enhancing Global SLS-Resolution with Loop Cutting and Tabling Mechanisms
| null |
Theoretical Computer Science 328(3):271-287, 2004
| null | null |
cs.LO cs.AI
| null |
Global SLS-resolution is a well-known procedural semantics for top-down
computation of queries under the well-founded model. It inherits from
SLDNF-resolution the {\em linearity} property of derivations, which makes it
easy and efficient to implement using a simple stack-based memory structure.
However, like SLDNF-resolution it suffers from the problem of infinite loops
and redundant computations. To resolve this problem, in this paper we develop a
new procedural semantics, called {\em SLTNF-resolution}, by enhancing Global
SLS-resolution with loop cutting and tabling mechanisms. SLTNF-resolution is
sound and complete w.r.t. the well-founded semantics for logic programs with
the bounded-term-size property, and is superior to existing linear tabling
procedural semantics such as SLT-resolution.
|
[
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:24:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shen",
"Yi-Dong",
""
],
[
"You",
"Jia-Huai",
""
],
[
"Yuan",
"Li-Yan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0507036
|
Martin Sulzmann
|
Peter J Stuckey, Martin Sulzmann, Jeremy Wazny
|
Improved Inference for Checking Annotations
| null | null | null | null |
cs.PL cs.LO
| null |
We consider type inference in the Hindley/Milner system extended with type
annotations and constraints with a particular focus on Haskell-style type
classes. We observe that standard inference algorithms are incomplete in the
presence of nested type annotations. To improve the situation we introduce a
novel inference scheme for checking type annotations. Our inference scheme is
also incomplete in general but improves over existing implementations as found
e.g. in the Glasgow Haskell Compiler (GHC). For certain cases (e.g. Haskell 98)
our inference scheme is complete. Our approach has been fully implemented as
part of the Chameleon system (experimental version of Haskell).
|
[
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:47:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Stuckey",
"Peter J",
""
],
[
"Sulzmann",
"Martin",
""
],
[
"Wazny",
"Jeremy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0507037
|
Martin Sulzmann
|
Peter J. Stuckey, Martin Sulzmann
|
Type Inference for Guarded Recursive Data Types
| null | null | null | null |
cs.PL cs.LO
| null |
We consider type inference for guarded recursive data types (GRDTs) -- a
recent generalization of algebraic data types. We reduce type inference for
GRDTs to unification under a mixed prefix. Thus, we obtain efficient type
inference. Inference is incomplete because the set of type constraints allowed
to appear in the type system is only a subset of those type constraints
generated by type inference. Hence, inference only succeeds if the program is
sufficiently type annotated. We present refined procedures to infer types
incrementally and to assist the user in identifying which pieces of type
information are missing. Additionally, we introduce procedures to test if a
type is not principal and to find a principal type if one exists.
|
[
{
"version": "v1",
"created": "Thu, 14 Jul 2005 08:58:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Stuckey",
"Peter J.",
""
],
[
"Sulzmann",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0507038
|
Zvi Lotker
|
Khaled Elbassioni, Zvi Lotker, Raimund Seidel
|
Upper Bound on the Number of Vertices of Polyhedra with $0,1$-Constraint
Matrices
|
3 pages
| null | null | null |
cs.CG
| null |
In this note we show that the maximum number of vertices in any polyhedron
$P=\{x\in \mathbb{R}^d : Ax\leq b\}$ with $0,1$-constraint matrix $A$ and a
real vector $b$ is at most $d!$.
|
[
{
"version": "v1",
"created": "Thu, 14 Jul 2005 18:45:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Elbassioni",
"Khaled",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Seidel",
"Raimund",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0507039
|
Joel Predd
|
Joel B. Predd and Sanjeev R. Kulkarni and H. Vincent Poor
|
Distributed Regression in Sensor Networks: Training Distributively with
Alternating Projections
|
To appear in the Proceedings of the SPIE Conference on Advanced
Signal Processing Algorithms, Architectures and Implementations XV, San
Diego, CA, July 31 - August 4, 2005
| null |
10.1117/12.620194
| null |
cs.LG cs.AI cs.CV cs.DC cs.IT math.IT
| null |
Wireless sensor networks (WSNs) have attracted considerable attention in
recent years and motivate a host of new challenges for distributed signal
processing. The problem of distributed or decentralized estimation has often
been considered in the context of parametric models. However, the success of
parametric methods is limited by the appropriateness of the strong statistical
assumptions made by the models. In this paper, a more flexible nonparametric
model for distributed regression is considered that is applicable in a variety
of WSN applications including field estimation. Here, starting with the
standard regularized kernel least-squares estimator, a message-passing
algorithm for distributed estimation in WSNs is derived. The algorithm can be
viewed as an instantiation of the successive orthogonal projection (SOP)
algorithm. Various practical aspects of the algorithm are discussed and several
numerical simulations validate the potential of the approach.
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2005 00:45:12 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Predd",
"Joel B.",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507040
|
Daniil Ryabko
|
Daniil Ryabko
|
Pattern Recognition for Conditionally Independent Data
|
parts of results published at ALT'04 and ICML'04
|
Journal of Machine Learning Research 7(Apr):645-664, 2006
| null | null |
cs.LG cs.AI cs.CV
| null |
In this work we consider the task of relaxing the i.i.d assumption in pattern
recognition (or classification), aiming to make existing learning algorithms
applicable to a wider range of tasks. Pattern recognition is guessing a
discrete label of some object based on a set of given examples (pairs of
objects and labels). We consider the case of deterministically defined labels.
Traditionally, this task is studied under the assumption that examples are
independent and identically distributed. However, it turns out that many
results of pattern recognition theory carry over a weaker assumption. Namely,
under the assumption of conditional independence and identical distribution of
objects, while the only assumption on the distribution of labels is that the
rate of occurrence of each label should be above some positive threshold.
We find a broad class of learning algorithms for which estimations of the
probability of a classification error achieved under the classical i.i.d.
assumption can be generalised to the similar estimates for the case of
conditionally i.i.d. examples.
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2005 08:10:10 GMT"
}
] | 2012-02-28T00:00:00 |
[
[
"Ryabko",
"Daniil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0507041
|
Marcus Hutter
|
Alexey Chernov and Marcus Hutter
|
Monotone Conditional Complexity Bounds on Future Prediction Errors
|
16 LaTeX pages
|
Proc. 16th International Conf. on Algorithmic Learning Theory (ALT
2005) 414-428
| null |
IDSIA-16-05
|
cs.LG cs.AI cs.IT math.IT
| null |
We bound the future loss when predicting any (computably) stochastic sequence
online. Solomonoff finitely bounded the total deviation of his universal
predictor M from the true distribution m by the algorithmic complexity of m.
Here we assume we are at a time t>1 and already observed x=x_1...x_t. We bound
the future prediction performance on x_{t+1}x_{t+2}... by a new variant of
algorithmic complexity of m given x, plus the complexity of the randomness
deficiency of x. The new complexity is monotone in its condition in the sense
that this complexity can only decrease if the condition is prolonged. We also
briefly discuss potential generalizations to Bayesian model classes and to
classification problems.
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2005 12:34:53 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Chernov",
"Alexey",
""
],
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507042
|
Richard McClatchey
|
Florida Estrella, Richard McClatchey, Dmitry Rogulin
|
The MammoGrid Virtual Organisation - Federating Distributed Mammograms
|
^ pages, 3 figures, 2 tables
| null | null |
Medical Informatics Europe MIE2005 paper publication
|
cs.DC cs.DB
| null |
The MammoGrid project aims to deliver a prototype which enables the effective
collaboration between radiologists using grid, service-orientation and database
solutions. The grid technologies and service-based database management solution
provide the platform for integrating diverse and distributed resources,
creating what is called a virtual organisation. The MammoGrid Virtual
Organisation facilitates the sharing and coordinated access to mammography
data, medical imaging software and computing resources of participating
hospitals. Hospitals manage their local database of mammograms, but in
addition, radiologists who are part of this organisation can share mammograms,
reports, results and image analysis software. The MammoGrid Virtual
Organisation is a federation of autonomous multi-centres sites which transcends
national boundaries. This paper outlines the service-based approach in the
creation and management of the federated distributed mammography database and
discusses the role of virtual organisations in distributed image analysis.
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2005 12:17:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Estrella",
"Florida",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Rogulin",
"Dmitry",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0507043
|
Yuan Feng
|
Yuan Feng, Runyao Duan, Zhengfeng Ji, and Mingsheng Ying
|
Proof rules for purely quantum programs
|
Now 12 pages, introduction and Section 3 rewritten, some errors
corrected
| null | null | null |
cs.PL quant-ph
| null |
We apply the notion of quantum predicate proposed by D'Hondt and Panangaden
to analyze a purely quantum language fragment which describes the quantum part
of a future quantum computer in Knill's architecture. The denotational
semantics, weakest precondition semantics, and weakest liberal precondition
semantics of this language fragment are introduced. To help reasoning about
quantum programs involving quantum loops, we extend proof rules for classical
probabilistic programs to our purely quantum programs.
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2005 13:06:13 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Aug 2005 16:08:40 GMT"
},
{
"version": "v3",
"created": "Thu, 16 Mar 2006 08:24:17 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Feng",
"Yuan",
""
],
[
"Duan",
"Runyao",
""
],
[
"Ji",
"Zhengfeng",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0507044
|
Marcus Hutter
|
Jan Poland and Marcus Hutter
|
Defensive Universal Learning with Experts
|
15 LaTeX pages
|
Proc. 16th International Conf. on Algorithmic Learning Theory (ALT
2005) 356-370
| null |
IDSIA-15-05
|
cs.LG
| null |
This paper shows how universal learning can be achieved with expert advice.
To this aim, we specify an experts algorithm with the following
characteristics: (a) it uses only feedback from the actions actually chosen
(bandit setup), (b) it can be applied with countably infinite expert classes,
and (c) it copes with losses that may grow in time appropriately slowly. We
prove loss bounds against an adaptive adversary. From this, we obtain a master
algorithm for "reactive" experts problems, which means that the master's
actions may influence the behavior of the adversary. Our algorithm can
significantly outperform standard experts algorithms on such problems. Finally,
we combine it with a universal expert class. The resulting universal learner
performs -- in a certain sense -- almost as well as any computable strategy,
for any online decision problem. We also specify the (worst-case) convergence
speed, which is very slow.
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2005 14:33:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0507045
|
Giorgi Japaridze
|
Giorgi Japaridze
|
In the beginning was game semantics
|
To appear in: "Games: Unifying Logic, Language and Philosophy". O.
Majer, A.-V. Pietarinen and T. Tulenheimo, eds. Springer Verlag, Berlin
|
Games: Unifying Logic, Language and Philosophy. O. Majer, A.-V.
Pietarinen and T. Tulenheimo, eds. Springer 2009, pp. 249-350
|
10.1007/978-1-4020-9374-6_11
| null |
cs.LO cs.AI math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article presents an overview of computability logic -- the
game-semantically constructed logic of interactive computational tasks and
resources. There is only one non-overview, technical section in it, devoted to
a proof of the soundness of affine logic with respect to the semantics of
computability logic. A comprehensive online source on the subject can be found
at http://www.cis.upenn.edu/~giorgi/cl.html
|
[
{
"version": "v1",
"created": "Mon, 18 Jul 2005 18:45:38 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Dec 2005 15:32:45 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Oct 2008 08:30:57 GMT"
}
] | 2011-04-15T00:00:00 |
[
[
"Japaridze",
"Giorgi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
cs/0507046
|
Dmitri Krioukov
|
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley
|
Revisiting Internet AS-level Topology Discovery
| null |
PAM 2005; LNCS 3431, p. 177, 2005
|
10.1007/b135479
| null |
cs.NI
| null |
The development of veracious models of the Internet topology has received a
lot of attention in the last few years. Many proposed models are based on
topologies derived from RouteViews BGP table dumps (BTDs). However, BTDs do not
capture all AS-links of the Internet topology and most importantly the number
of the hidden AS-links is unknown, resulting in AS-graphs of questionable
quality. As a first step to address this problem, we introduce a new
AS-topology discovery methodology that results in more complete and accurate
graphs. Moreover, we use data available from existing measurement facilities,
circumventing the burden of additional measurement infrastructure. We deploy
our methodology and construct an AS-topology that has at least 61.5% more
AS-links than BTD-derived AS-topologies we examined. Finally, we analyze the
temporal and topological properties of the augmented graph and pinpoint the
differences from BTD-derived AS-topologies.
|
[
{
"version": "v1",
"created": "Tue, 19 Jul 2005 07:15:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Riley",
"George",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0507047
|
Dmitri Krioukov
|
Xenofontas Dimitropoulos, Dmitri Krioukov, Bradley Huffaker, kc
claffy, George Riley
|
Inferring AS Relationships: Dead End or Lively Beginning?
| null |
WEA 2005; LNCS 3503, p. 113, 2005
|
10.1007/11427186_12
| null |
cs.NI cs.DS
| null |
Recent techniques for inferring business relationships between ASs have
yielded maps that have extremely few invalid BGP paths in the terminology of
Gao. However, some relationships inferred by these newer algorithms are
incorrect, leading to the deduction of unrealistic AS hierarchies. We
investigate this problem and discover what causes it. Having obtained such
insight, we generalize the problem of AS relationship inference as a
multiobjective optimization problem with node-degree-based corrections to the
original objective function of minimizing the number of invalid paths. We solve
the generalized version of the problem using the semidefinite programming
relaxation of the MAX2SAT problem. Keeping the number of invalid paths small,
we obtain a more veracious solution than that yielded by recent heuristics.
|
[
{
"version": "v1",
"created": "Tue, 19 Jul 2005 09:32:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"claffy",
"kc",
""
],
[
"Riley",
"George",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0507048
|
Paolo Liberatore
|
Paolo Liberatore
|
Redundancy in Logic III: Non-Mononotonic Reasoning
|
minor corrections
| null |
10.1016/j.artint.2008.02.003
| null |
cs.LO cs.AI cs.CC
| null |
Results about the redundancy of circumscriptive and default theories are
presented. In particular, the complexity of establishing whether a given theory
is redundant is establihsed.
|
[
{
"version": "v1",
"created": "Tue, 19 Jul 2005 19:25:11 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Oct 2005 13:47:07 GMT"
}
] | 2021-04-12T00:00:00 |
[
[
"Liberatore",
"Paolo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0507049
|
David Eppstein
|
David Eppstein, Michael T. Goodrich, Jonathan Z. Sun
|
The Skip Quadtree: A Simple Dynamic Data Structure for Multidimensional
Data
|
12 pages, 3 figures. A preliminary version of this paper appeared in
the 21st ACM Symp. Comp. Geom., Pisa, 2005, pp. 296-305
| null | null | null |
cs.CG
| null |
We present a new multi-dimensional data structure, which we call the skip
quadtree (for point data in R^2) or the skip octree (for point data in R^d,
with constant d>2). Our data structure combines the best features of two
well-known data structures, in that it has the well-defined "box"-shaped
regions of region quadtrees and the logarithmic-height search and update
hierarchical structure of skip lists. Indeed, the bottom level of our structure
is exactly a region quadtree (or octree for higher dimensional data). We
describe efficient algorithms for inserting and deleting points in a skip
quadtree, as well as fast methods for performing point location and approximate
range queries.
|
[
{
"version": "v1",
"created": "Tue, 19 Jul 2005 20:17:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Sun",
"Jonathan Z.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0507050
|
David Eppstein
|
Lars Arge, David Eppstein, Michael T. Goodrich
|
Skip-Webs: Efficient Distributed Data Structures for Multi-Dimensional
Data Sets
|
8 pages, 4 figures. Appearing at 24th ACM SIGACT-SIGOPS Symp.
Principles of Distributed Computing (PODC 2005), Las Vegas
| null | null | null |
cs.DC cs.CG cs.DS
| null |
We present a framework for designing efficient distributed data structures
for multi-dimensional data. Our structures, which we call skip-webs, extend and
improve previous randomized distributed data structures, including skipnets and
skip graphs. Our framework applies to a general class of data querying
scenarios, which include linear (one-dimensional) data, such as sorted sets, as
well as multi-dimensional data, such as d-dimensional octrees and digital tries
of character strings defined over a fixed alphabet. We show how to perform a
query over such a set of n items spread among n hosts using O(log n / log log
n) messages for one-dimensional data, or O(log n) messages for
fixed-dimensional data, while using only O(log n) space per host. We also show
how to make such structures dynamic so as to allow for insertions and deletions
in O(log n) messages for quadtrees, octrees, and digital tries, and O(log n /
log log n) messages for one-dimensional data. Finally, we show how to apply a
blocking strategy to skip-webs to further improve message complexity for
one-dimensional data when hosts can store more data.
|
[
{
"version": "v1",
"created": "Tue, 19 Jul 2005 20:30:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Arge",
"Lars",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0507051
|
David Eppstein
|
David Eppstein, Michael T. Goodrich, Jeremy Yu Meng
|
Confluent Layered Drawings
|
11 pages, 6 figures. A preliminary version of this paper appeared in
Proc. 12th Int. Symp. Graph Drawing, New York, 2004, Lecture Notes in Comp.
Sci. 3383, 2004, pp. 184-194
|
Algorithmica 47(4):439-452, 2007
|
10.1007/s00453-006-0159-8
| null |
cs.CG cs.DS
| null |
We combine the idea of confluent drawings with Sugiyama style drawings, in
order to reduce the edge crossings in the resultant drawings. Furthermore, it
is easier to understand the structures of graphs from the mixed style drawings.
The basic idea is to cover a layered graph by complete bipartite subgraphs
(bicliques), then replace bicliques with tree-like structures. The biclique
cover problem is reduced to a special edge coloring problem and solved by
heuristic coloring algorithms. Our method can be extended to obtain multi-depth
confluent layered drawings.
|
[
{
"version": "v1",
"created": "Tue, 19 Jul 2005 22:25:53 GMT"
}
] | 2007-06-14T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Meng",
"Jeremy Yu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0507052
|
Qiang Li
|
Qiang Li, Hui-Min Xie
|
Finite automata for testing uniqueness of Eulerian trails
| null |
J. Comput. System Sci., 2008. 74(5): 870-874
|
10.1016/j.jcss.2007.10.004
| null |
cs.CC cs.LO
| null |
We investigate the condition under which the Eulerian trail of a digraph is
unique, and design a finite automaton to examine it. The algorithm is
effective, for if the condition is violated, it will be noticed immediately
without the need to trace through the whole trail.
|
[
{
"version": "v1",
"created": "Wed, 20 Jul 2005 18:55:45 GMT"
}
] | 2008-05-20T00:00:00 |
[
[
"Li",
"Qiang",
""
],
[
"Xie",
"Hui-Min",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0507053
|
David Eppstein
|
David Eppstein
|
Nonrepetitive Paths and Cycles in Graphs with Application to Sudoku
|
17 pages, 11 figures
| null | null | null |
cs.DS cs.AI
| null |
We provide a simple linear time transformation from a directed or undirected
graph with labeled edges to an unlabeled digraph, such that paths in the input
graph in which no two consecutive edges have the same label correspond to paths
in the transformed graph and vice versa. Using this transformation, we provide
efficient algorithms for finding paths and cycles with no two consecutive equal
labels. We also consider related problems where the paths and cycles are
required to be simple; we find efficient algorithms for the undirected case of
these problems but show the directed case to be NP-complete. We apply our path
and cycle finding algorithms in a program for generating and solving Sudoku
puzzles, and show experimentally that they lead to effective puzzle-solving
rules that may also be of interest to human Sudoku puzzle solvers.
|
[
{
"version": "v1",
"created": "Wed, 20 Jul 2005 15:58:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Eppstein",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0507054
|
Andrey Siver S.
|
A. S. Siver
|
f2mma: FORTRAN to Mathematica translator
| null | null | null | null |
cs.OH
| null |
f2mma program can be used to translate programs written in some subset of the
FORTRAN language into {\sl Mathematica} system's programming language. This
subset have been enough to translate GAPP (Global Analysis of Particle
Properties) programm into {\sl Mathematica} language automatically. Observables
table calculated with GAPP({\sl Mathematica}) is presented.
|
[
{
"version": "v1",
"created": "Thu, 21 Jul 2005 13:32:15 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Aug 2005 06:48:26 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Aug 2005 09:26:15 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Jan 2006 14:27:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Siver",
"A. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0507055
|
Andrey Siver S.
|
A. S. Siver
|
ReacProc: A Tool to Process Reactions Describing Particle Interactions
|
5 pages
| null | null | null |
cs.CE
| null |
ReacProc is a program written in C/C++ programming language which can be used
(1) to check out of reactions describing particles interactions against
conservation laws and (2) to reduce input reaction into some canonical form. A
table with particles properties is available within ReacProc package.
|
[
{
"version": "v1",
"created": "Thu, 21 Jul 2005 14:17:47 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Aug 2005 07:14:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Siver",
"A. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0507056
|
Christopher Lee
|
Candace L. Sidner, Christopher Lee, Cory Kidd, Neal Lesh, Charles Rich
|
Explorations in engagement for humans and robots
|
31 pages, 5 figures, 3 tables
|
Artificial Intelligence, volume 166, issues 1-2, August 2005, pp.
140-164
| null |
MERL TR2005-017
|
cs.AI cs.CL cs.RO
| null |
This paper explores the concept of engagement, the process by which
individuals in an interaction start, maintain and end their perceived
connection to one another. The paper reports on one aspect of engagement among
human interactors--the effect of tracking faces during an interaction. It also
describes the architecture of a robot that can participate in conversational,
collaborative interactions with engagement gestures. Finally, the paper reports
on findings of experiments with human participants who interacted with a robot
when it either performed or did not perform engagement gestures. Results of the
human-robot studies indicate that people become engaged with robots: they
direct their attention to the robot more often in interactions where engagement
gestures are present, and they find interactions more appropriate when
engagement gestures are present than when they are not.
|
[
{
"version": "v1",
"created": "Thu, 21 Jul 2005 21:56:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sidner",
"Candace L.",
""
],
[
"Lee",
"Christopher",
""
],
[
"Kidd",
"Cory",
""
],
[
"Lesh",
"Neal",
""
],
[
"Rich",
"Charles",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0507057
|
Tereza Tu\v{s}arov\'a
|
Tereza Tusarova
|
A new sibling of BQP
|
extended abstract, submitted to UC'05
| null | null | null |
cs.CC
| null |
We present a new quantum complexity class, called MQ^2, which is contained in
AWPP. This class has a compact and simple mathematical definition, involving
only polynomial-time computable functions and a unitarity condition. It
contains both Deutsch-Jozsa's and Shor's algorithm, while its relation to BQP
is unknown. This shows that in the complexity class hierarchy, BQP is not an
extraordinary isolated island, but has ''siblings'' which as well can solve
prime-factorization.
|
[
{
"version": "v1",
"created": "Thu, 21 Jul 2005 22:36:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Tusarova",
"Tereza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0507058
|
Emanuel Diamant
|
Emanuel Diamant
|
Paving the Way for Image Understanding: A New Kind of Image
Decomposition is Desired
|
14th Scandinavian Conference on Image Analysis (SCIA 2005)
|
LNCS vol. 3540, pp. 17-24, Springer Verlag, 2005
| null | null |
cs.CV
| null |
In this paper we present an unconventional image segmentation approach which
is devised to meet the requirements of image understanding and pattern
recognition tasks. Generally image understanding assumes interplay of two
sub-processes: image information content discovery and image information
content interpretation. Despite of its widespread use, the notion of "image
information content" is still ill defined, intuitive, and ambiguous. Most
often, it is used in the Shannon's sense, which means information content
assessment averaged over the whole signal ensemble. Humans, however,rarely
resort to such estimates. They are very effective in decomposing images into
their meaningful constituents and focusing attention to the perceptually
relevant image parts. We posit that following the latest findings in human
attention vision studies and the concepts of Kolmogorov's complexity theory an
unorthodox segmentation approach can be proposed that provides effective image
decomposition to information preserving image fragments well suited for
subsequent image interpretation. We provide some illustrative examples,
demonstrating effectiveness of this approach.
|
[
{
"version": "v1",
"created": "Fri, 22 Jul 2005 12:18:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Diamant",
"Emanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0507059
|
M. Magdalena Ortiz de la Fuente
|
M. Magdalena Ortiz de la Fuente, Diego Calvanese, Thomas Eiter and
Enrico Franconi
|
Data complexity of answering conjunctive queries over SHIQ knowledge
bases
|
Technical Report, 22 pages
| null | null | null |
cs.LO cs.AI cs.CC
| null |
An algorithm for answering conjunctive queries over SHIQ knowledge bases that
is coNP in data complexity is given. The algorithm is based on the tableau
algorithm for reasoning with individuals in SHIQ. The blocking conditions of
the tableau are weakened in such a way that the set of models the modified
algorithm yields suffices to check query entailment. The modified blocking
conditions are based on the ones proposed by Levy and Rousset for reasoning
with Horn Rules in the description logic ALCNR.
|
[
{
"version": "v1",
"created": "Fri, 22 Jul 2005 15:43:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"de la Fuente",
"M. Magdalena Ortiz",
""
],
[
"Calvanese",
"Diego",
""
],
[
"Eiter",
"Thomas",
""
],
[
"Franconi",
"Enrico",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0507060
|
Eytan Domany
|
O. Zuk, I. Kanter, E. Domany
|
The Entropy of a Binary Hidden Markov Process
| null | null |
10.1007/s10955-005-7576-y
| null |
cs.IT cond-mat.stat-mech math.IT math.ST stat.TH
| null |
The entropy of a binary symmetric Hidden Markov Process is calculated as an
expansion in the noise parameter epsilon. We map the problem onto a
one-dimensional Ising model in a large field of random signs and calculate the
expansion coefficients up to second order in epsilon. Using a conjecture we
extend the calculation to 11th order and discuss the convergence of the
resulting series.
|
[
{
"version": "v1",
"created": "Sat, 23 Jul 2005 17:15:49 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Zuk",
"O.",
""
],
[
"Kanter",
"I.",
""
],
[
"Domany",
"E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0507061
|
Andre Adrian
|
Andre Adrian
|
Software Architecture Overview
|
9 pages, version 23jul2005
| null | null | null |
cs.SE
| null |
What is Software Architecture? The rules, paradigmen, pattern that help to
construct, build and test a serious piece of software. It is the practical
experience boiled down to abstract level. Software Architecture builds on
System Engineering and the scientific method as established by Galileo Galilei:
Measure what you can and make measureable what you can not. The experiment
(test) is more important then the deduction. Pieces of information about
software architecture are all over the internet. This paper uses citation as
much as possible. The aim is to bring together an overview, not to rephrase the
wording.
|
[
{
"version": "v1",
"created": "Sun, 24 Jul 2005 09:43:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Adrian",
"Andre",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0507062
|
Jan Poland
|
Jan Poland
|
FPL Analysis for Adaptive Bandits
| null | null | null | null |
cs.LG
| null |
A main problem of "Follow the Perturbed Leader" strategies for online
decision problems is that regret bounds are typically proven against oblivious
adversary. In partial observation cases, it was not clear how to obtain
performance guarantees against adaptive adversary, without worsening the
bounds. We propose a conceptually simple argument to resolve this problem.
Using this, a regret bound of O(t^(2/3)) for FPL in the adversarial multi-armed
bandit problem is shown. This bound holds for the common FPL variant using only
the observations from designated exploration rounds. Using all observations
allows for the stronger bound of O(t^(1/2)), matching the best bound known so
far (and essentially the known lower bound) for adversarial bandits.
Surprisingly, this variant does not even need explicit exploration, it is
self-stabilizing. However the sampling probabilities have to be either
externally provided or approximated to sufficient accuracy, using O(t^2 log t)
samples in each step.
|
[
{
"version": "v1",
"created": "Tue, 26 Jul 2005 05:00:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Poland",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0507063
|
Boaz Tsaban
|
Boaz Tsaban
|
Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1
|
To appear in JoC
|
Journal of Cryptology 20 (2007), 389-392
|
10.1007/s00145-007-0564-4
| null |
cs.CR cs.CC
| null |
The internal state of the Klimov-Shamir number generator TF-1 consists of
four words of size w bits each, whereas its intended strength is 2^{2w}. We
exploit an asymmetry in its output function to show that the internal state can
be recovered after having 2^w outputs, using 2^{1.5w} operations. For w=32 the
attack is practical, but for their recommended w=64 it is only of theoretical
interest.
|
[
{
"version": "v1",
"created": "Tue, 26 Jul 2005 15:30:17 GMT"
},
{
"version": "v2",
"created": "Sun, 20 May 2007 13:58:32 GMT"
}
] | 2010-08-02T00:00:00 |
[
[
"Tsaban",
"Boaz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0507064
|
Isabelle Gnaedig
|
Isabelle Gnaedig and Helene Kirchner
|
Termination of rewriting strategies: a generic approach
|
49 pages
| null | null | null |
cs.LO
| null |
We propose a generic termination proof method for rewriting under strategies,
based on an explicit induction on the termination property. Rewriting trees on
ground terms are modeled by proof trees, generated by alternatively applying
narrowing and abstracting steps. The induction principle is applied through the
abstraction mechanism, where terms are replaced by variables representing any
of their normal forms. The induction ordering is not given a priori, but
defined with ordering constraints, incrementally set during the proof.
Abstraction constraints can be used to control the narrowing mechanism, well
known to easily diverge. The generic method is then instantiated for the
innermost, outermost and local strategies.
|
[
{
"version": "v1",
"created": "Tue, 26 Jul 2005 20:18:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gnaedig",
"Isabelle",
""
],
[
"Kirchner",
"Helene",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0507065
|
Zengyou He
|
Zengyou He, Xiaofei Xu, Shengchun Deng
|
A Fast Greedy Algorithm for Outlier Mining
|
11 pages
| null | null |
Tr-05-0406
|
cs.DB cs.AI
| null |
The task of outlier detection is to find small groups of data objects that
are exceptional when compared with rest large amount of data. In [38], the
problem of outlier detection in categorical data is defined as an optimization
problem and a local-search heuristic based algorithm (LSA) is presented.
However, as is the case with most iterative type algorithms, the LSA algorithm
is still very time-consuming on very large datasets. In this paper, we present
a very fast greedy algorithm for mining outliers under the same optimization
model. Experimental results on real datasets and large synthetic datasets show
that: (1) Our algorithm has comparable performance with respect to those
state-of-art outlier detection algorithms on identifying true outliers and (2)
Our algorithm can be an order of magnitude faster than LSA algorithm.
|
[
{
"version": "v1",
"created": "Wed, 27 Jul 2005 02:14:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0507066
|
Atul Chaturvedi Mr.
|
Sunder Lal and Atul Chaturvedi (Department of Mathematics Institute of
Basic Science)
|
Authentication Schemes Using Braid Groups
|
6 pages, 2 figures
| null | null | null |
cs.CR cs.CY
| null |
In this paper we proposed two identification schemes based on the root
problem. The proposed schemes are secure against passive attacks assuming that
the root problem (RP) is hard in braid groups.
|
[
{
"version": "v1",
"created": "Wed, 27 Jul 2005 10:14:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lal",
"Sunder",
"",
"Department of Mathematics Institute of\n Basic Science"
],
[
"Chaturvedi",
"Atul",
"",
"Department of Mathematics Institute of\n Basic Science"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0507067
|
Diego Calvanese
|
Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini
|
Conjunctive Query Containment and Answering under Description Logics
Constraints
| null | null | null | null |
cs.DB cs.AI
| null |
Query containment and query answering are two important computational tasks
in databases. While query answering amounts to compute the result of a query
over a database, query containment is the problem of checking whether for every
database, the result of one query is a subset of the result of another query.
In this paper, we deal with unions of conjunctive queries, and we address
query containment and query answering under Description Logic constraints.
Every such constraint is essentially an inclusion dependencies between concepts
and relations, and their expressive power is due to the possibility of using
complex expressions, e.g., intersection and difference of relations, special
forms of quantification, regular expressions over binary relations, in the
specification of the dependencies. These types of constraints capture a great
variety of data models, including the relational, the entity-relationship, and
the object-oriented model, all extended with various forms of constraints, and
also the basic features of the ontology languages used in the context of the
Semantic Web.
We present the following results on both query containment and query
answering. We provide a method for query containment under Description Logic
constraints, thus showing that the problem is decidable, and analyze its
computational complexity. We prove that query containment is undecidable in the
case where we allow inequalities in the right-hand side query, even for very
simple constraints and queries. We show that query answering under Description
Logic constraints can be reduced to query containment, and illustrate how such
a reduction provides upper bound results with respect to both combined and data
complexity.
|
[
{
"version": "v1",
"created": "Thu, 28 Jul 2005 08:25:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Calvanese",
"Diego",
""
],
[
"De Giacomo",
"Giuseppe",
""
],
[
"Lenzerini",
"Maurizio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0507068
|
Ludo M.G.M. Tolhuizen
|
Henk D. L. Hollmann, Ludo M. G. M. Tolhuizen (Philips Research
Laboratories, Eindhoven, Netherlands)
|
On parity check collections for iterative erasure decoding that correct
all correctable erasure patterns of a given size
|
13 pages, no figures. Submitted to IEEE Transactions on Information
Theory, July 28, 2005
| null |
10.1109/TIT.2006.888996
|
PR-MS 25.332
|
cs.IT cs.DM math.IT
| null |
Recently there has been interest in the construction of small parity check
sets for iterative decoding of the Hamming code with the property that each
uncorrectable (or stopping) set of size three is the support of a codeword and
hence uncorrectable anyway. Here we reformulate and generalise the problem, and
improve on this construction. First we show that a parity check collection that
corrects all correctable erasure patterns of size m for the r-th order Hamming
code (i.e, the Hamming code with codimension r) provides for all codes of
codimension $r$ a corresponding ``generic'' parity check collection with this
property. This leads naturally to a necessary and sufficient condition on such
generic parity check collections. We use this condition to construct a generic
parity check collection for codes of codimension r correcting all correctable
erasure patterns of size at most m, for all r and m <= r, thus generalising the
known construction for m=3. Then we discussoptimality of our construction and
show that it can be improved for m>=3 and r large enough. Finally we discuss
some directions for further research.
|
[
{
"version": "v1",
"created": "Thu, 28 Jul 2005 11:55:28 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Hollmann",
"Henk D. L.",
"",
"Philips Research\n Laboratories, Eindhoven, Netherlands"
],
[
"Tolhuizen",
"Ludo M. G. M.",
"",
"Philips Research\n Laboratories, Eindhoven, Netherlands"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0507069
|
Anne-Marie Vercoustre
|
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
|
Users and Assessors in the Context of INEX: Are Relevance Dimensions
Relevant?
| null |
Dans INEX 2005 Workshop on Element Retrieval Methodology [OAI :
oai:hal.inria.fr:inria-00000182_v1] - http://hal.inria.fr/inria-00000182
| null | null |
cs.IR
| null |
The main aspects of XML retrieval are identified by analysing and comparing
the following two behaviours: the behaviour of the assessor when judging the
relevance of returned document components; and the behaviour of users when
interacting with components of XML documents. We argue that the two INEX
relevance dimensions, Exhaustivity and Specificity, are not orthogonal
dimensions; indeed, an empirical analysis of each dimension reveals that the
grades of the two dimensions are correlated to each other. By analysing the
level of agreement between the assessor and the users, we aim at identifying
the best units of retrieval. The results of our analysis show that the highest
level of agreement is on highly relevant and on non-relevant document
components, suggesting that only the end points of the INEX 10-point relevance
scale are perceived in the same way by both the assessor and the users. We
propose a new definition of relevance for XML retrieval and argue that its
corresponding relevance scale would be a better choice for INEX.
|
[
{
"version": "v1",
"created": "Thu, 28 Jul 2005 15:02:04 GMT"
}
] | 2019-05-01T00:00:00 |
[
[
"Pehcevski",
"Jovan",
"",
"RMIT"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Vercoustre",
"Anne-Marie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0507070
|
Anne-Marie Vercoustre
|
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
|
Hybrid XML Retrieval: Combining Information Retrieval and a Native XML
Database
|
Postprint version. The editor version can be accessed through the DOI
| null |
10.1007/s10791-005-0748-1
| null |
cs.IR
| null |
This paper investigates the impact of three approaches to XML retrieval:
using Zettair, a full-text information retrieval system; using eXist, a native
XML database; and using a hybrid system that takes full article answers from
Zettair and uses eXist to extract elements from those articles. For the
content-only topics, we undertake a preliminary analysis of the INEX 2003
relevance assessments in order to identify the types of highly relevant
document components. Further analysis identifies two complementary sub-cases of
relevance assessments ("General" and "Specific") and two categories of topics
("Broad" and "Narrow"). We develop a novel retrieval module that for a
content-only topic utilises the information from the resulting answer list of a
native XML database and dynamically determines the preferable units of
retrieval, which we call "Coherent Retrieval Elements". The results of our
experiments show that -- when each of the three systems is evaluated against
different retrieval scenarios (such as different cases of relevance
assessments, different topic categories and different choices of evaluation
metrics) -- the XML retrieval systems exhibit varying behaviour and the best
performance can be reached for different values of the retrieval parameters. In
the case of INEX 2003 relevance assessments for the content-only topics, our
newly developed hybrid XML retrieval system is substantially more effective
than either Zettair or eXist, and yields a robust and a very effective XML
retrieval.
|
[
{
"version": "v1",
"created": "Thu, 28 Jul 2005 19:19:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pehcevski",
"Jovan",
"",
"RMIT"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Vercoustre",
"Anne-Marie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0507071
|
Andreas U. Schmidt
|
Nicolai Kuntze, Thomas Rauch, Andreas U. Schmidt
|
Security for Distributed Web-Applications via Aspect-Oriented
Programming
|
Refereed contribution to the Conference Information Security South
Africa (ISSA 2005) Sandton, South Africa, 29. June - 1. July 2005
| null | null | null |
cs.CR
| null |
Identity Management is becoming more and more important in business systems
as they are opened for third parties including trading partners, consumers and
suppliers. This paper presents an approach securing a system without any
knowledge of the system source code. The security module adds to the existing
system authentication and authorisation based on aspect oriented programming
and the liberty alliance framework, an upcoming industrie standard providing
single sign on. In an initial training phase the module is adapted to the
application which is to be secured. Moreover the use of hardware tokens and
proactive computing is demonstrated. The high modularisation is achived through
use of AspectJ, a programming language extension of Java.
|
[
{
"version": "v1",
"created": "Fri, 29 Jul 2005 10:44:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kuntze",
"Nicolai",
""
],
[
"Rauch",
"Thomas",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0507072
|
Matthew Leslie
|
Matthew Leslie
|
Reliable Data Storage in Distributed Hash Tables
| null | null | null | null |
cs.DC cs.NI
| null |
Distributed Hash Tables offer a resilient lookup service for unstable
distributed environments. Resilient data storage, however, requires additional
data replication and maintenance algorithms. These algorithms can have an
impact on both the performance and the scalability of the system. In this
paper, we describe the goals and design space of these replication algorithms.
We examine an existing replication algorithm, and present a new analysis of
its reliability. We then present a new dynamic replication algorithm which can
operate in unstable environments. We give several possible replica placement
strategies for this algorithm, and show how they impact reliability and
performance.
Finally we compare all replication algorithms through simulation, showing
quantitatively the difference between their bandwidth use, fault tolerance and
performance.
|
[
{
"version": "v1",
"created": "Fri, 29 Jul 2005 16:54:00 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Jul 2005 21:49:19 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Aug 2005 22:47:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Leslie",
"Matthew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0507073
|
Michel Dagenais
|
Michel R. Dagenais (Dept. of Computer Engineering, Ecole
Polytechnique, Montreal, Canada) Karim Yaghmour (Opersys, Montreal, Canada)
Charles Levert (Ericsson Research, Montreal, Canada) Makan Pourzandi
(Ericsson Research, Montreal, Canada)
|
Software Performance Analysis
| null | null | null | null |
cs.PF cs.OS
| null |
The key to speeding up applications is often understanding where the elapsed
time is spent, and why. This document reviews in depth the full array of
performance analysis tools and techniques available on Linux for this task,
from the traditional tools like gcov and gprof, to the more advanced tools
still under development like oprofile and the Linux Trace Toolkit. The focus is
more on the underlying data collection and processing algorithms, and their
overhead and precision, than on the cosmetic details of the graphical user
interface frontends.
|
[
{
"version": "v1",
"created": "Fri, 29 Jul 2005 19:33:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dagenais",
"Michel R.",
"",
"Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada"
],
[
"Yaghmour",
"Karim",
"",
"Opersys, Montreal, Canada"
],
[
"Levert",
"Charles",
"",
"Ericsson Research, Montreal, Canada"
],
[
"Pourzandi",
"Makan",
"",
"Ericsson Research, Montreal, Canada"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0508001
|
Xiaoyang Gu
|
Xiaoyang Gu, Jack H. Lutz, Philippe Moser
|
Dimensions of Copeland-Erdos Sequences
|
19 pages
| null | null | null |
cs.CC cs.IT math.IT
| null |
The base-$k$ {\em Copeland-Erd\"os sequence} given by an infinite set $A$ of
positive integers is the infinite sequence $\CE_k(A)$ formed by concatenating
the base-$k$ representations of the elements of $A$ in numerical order. This
paper concerns the following four quantities.
The {\em finite-state dimension} $\dimfs (\CE_k(A))$, a finite-state version
of classical Hausdorff dimension introduced in 2001.
The {\em finite-state strong dimension} $\Dimfs(\CE_k(A))$, a finite-state
version of classical packing dimension introduced in 2004. This is a dual of
$\dimfs(\CE_k(A))$ satisfying $\Dimfs(\CE_k(A))$ $\geq \dimfs(\CE_k(A))$.
The {\em zeta-dimension} $\Dimzeta(A)$, a kind of discrete fractal dimension
discovered many times over the past few decades.
The {\em lower zeta-dimension} $\dimzeta(A)$, a dual of $\Dimzeta(A)$
satisfying $\dimzeta(A)\leq \Dimzeta(A)$.
We prove the following.
$\dimfs(\CE_k(A))\geq \dimzeta(A)$. This extends the 1946 proof by Copeland
and Erd\"os that the sequence $\CE_k(\mathrm{PRIMES})$ is Borel normal.
$\Dimfs(\CE_k(A))\geq \Dimzeta(A)$.
These bounds are tight in the strong sense that these four quantities can
have (simultaneously) any four values in $[0,1]$ satisfying the four
above-mentioned inequalities.
|
[
{
"version": "v1",
"created": "Sat, 30 Jul 2005 04:30:05 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gu",
"Xiaoyang",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Moser",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508002
|
Adilson Xavier V.
|
Gilson A. Giraldi, Luis C. da Costa, Adilson V. Xavier, Paulo S.
Rodrigues
|
Methods for Analytical Understanding of Agent-Based Modeling of Complex
Systems
| null | null | null | null |
cs.GR
| null |
Von Neuman's work on universal machines and the hardware development have
allowed the simulation of dynamical systems through a large set of interacting
agents. This is a bottom-up approach which tries to derive global properties of
a complex system through local interaction rules and agent behaviour.
Traditionally, such systems are modeled and simulated through top-down methods
based on differential equations. Agent-Based Modeling has the advantage of
simplicity and low computational cost. However, unlike differential equations,
there is no standard way to express agent behaviour. Besides, it is not clear
how to analytically predict the results obtained by the simulation. In this
paper we survey some of these methods. For expressing agent behaviour formal
methods, like Stochastic Process Algebras have been used. Such approach is
useful if the global properties of interest can be expressed as a function of
stochastic time series. However, if space variables must be considered, we
shall change the focus. In this case, multiscale techniques, based on
Chapman-Enskog expansion, was used to establish the connection between the
microscopic dynamics and the macroscopic observables. Also, we use data mining
techniques,like Principal Component Analysis (PCA), to study agent systems like
Cellular Automata. With the help of these tools we will discuss a simple
society model, a Lattice Gas Automaton for fluid modeling, and knowledge
discovery in CA databases. Besides, we show the capabilities of the NetLogo, a
software for agent simulation of complex system and show our experience about.
|
[
{
"version": "v1",
"created": "Sat, 30 Jul 2005 12:31:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Giraldi",
"Gilson A.",
""
],
[
"da Costa",
"Luis C.",
""
],
[
"Xavier",
"Adilson V.",
""
],
[
"Rodrigues",
"Paulo S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0508003
|
Anton\'in Ku\v{c}era
|
Javier Esparza, Antonin Kucera, Richard Mayr
|
Model Checking Probabilistic Pushdown Automata
| null |
Logical Methods in Computer Science, Volume 2, Issue 1 (March 7,
2006) lmcs:2256
|
10.2168/LMCS-2(1:2)2006
| null |
cs.LO
| null |
We consider the model checking problem for probabilistic pushdown automata
(pPDA) and properties expressible in various probabilistic logics. We start
with properties that can be formulated as instances of a generalized random
walk problem. We prove that both qualitative and quantitative model checking
for this class of properties and pPDA is decidable. Then we show that model
checking for the qualitative fragment of the logic PCTL and pPDA is also
decidable. Moreover, we develop an error-tolerant model checking algorithm for
PCTL and the subclass of stateless pPDA. Finally, we consider the class of
omega-regular properties and show that both qualitative and quantitative model
checking for pPDA is decidable.
|
[
{
"version": "v1",
"created": "Sun, 31 Jul 2005 18:33:43 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Mar 2006 11:45:56 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Mar 2006 00:43:22 GMT"
},
{
"version": "v4",
"created": "Wed, 8 Mar 2006 15:31:58 GMT"
},
{
"version": "v5",
"created": "Thu, 9 Mar 2006 17:30:20 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Esparza",
"Javier",
""
],
[
"Kucera",
"Antonin",
""
],
[
"Mayr",
"Richard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0508004
|
Lee Naish
|
Lee Naish
|
A three-valued semantics for logic programmers
|
31 pages, 5 figures
|
Theory and Practice of Logic Programming 6(5), September 2006, pp.
509-538.
| null | null |
cs.LO
| null |
This paper describes a simpler way for programmers to reason about the
correctness of their code. The study of semantics of logic programs has shown
strong links between the model theoretic semantics (truth and falsity of atoms
in the programmer's interpretation of a program), procedural semantics (for
example, SLD resolution) and fixpoint semantics (which is useful for program
analysis and alternative execution mechanisms). Most of this work assumes that
intended interpretations are two-valued: a ground atom is true (and should
succeed according to the procedural semantics) or false (and should not
succeed). In reality, intended interpretations are less precise. Programmers
consider that some atoms "should not occur" or are "ill-typed" or
"inadmissible". Programmers don't know and don't care whether such atoms
succeed. In this paper we propose a three-valued semantics for (essentially)
pure Prolog programs with (ground) negation as failure which reflects this. The
semantics of Fitting is similar but only associates the third truth value with
non-termination. We provide tools to reason about correctness of programs
without the need for unnatural precision or undue restrictions on programming
style. As well as theoretical results, we provide a programmer-oriented
synopsis. This work has come out of work on declarative debugging, where it has
been recognised that inadmissible calls are important. This paper has been
accepted to appear in Theory and Practice of Logic Programming.
|
[
{
"version": "v1",
"created": "Mon, 1 Aug 2005 05:23:44 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Naish",
"Lee",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0508005
|
Riccardo Pucella
|
Nick Papanikolaou
|
Logic Column 13: Reasoning Formally about Quantum Systems: An Overview
|
17 pages
|
SIGACT News, 36(3), pp. 51-66, 2005
| null | null |
cs.LO
| null |
This article is intended as an introduction to the subject of quantum logic,
and as a brief survey of the relevant literature. Also discussed here are
logics for specification and analysis of quantum information systems, in
particular, recent work by P. Mateus and A. Sernadas, and also by R. van der
Meyden and M. Patra. Overall, our objective is to provide a high-level
presentation of the logical aspects of quantum theory. Mateus' and Sernadas'
EQPL logic is illustrated with a small example, namely the state of an
entangled pair of qubits. The "KT" logic of van der Meyden and Patra is
demonstrated briefly in the context of the B92 protocol for quantum key
distribution.
|
[
{
"version": "v1",
"created": "Mon, 1 Aug 2005 14:34:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Papanikolaou",
"Nick",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0508006
|
Sandor P. Fekete
|
Sandor P. Fekete, Michael Kaufmann, Alexander Kroeller, and Katharina
Lehmann
|
A New Approach for Boundary Recognition in Geometric Sensor Networks
|
4 pages, 5 figures, Latex, to appear in Canadian Conference on
Computational Geometry (CCCG 2005)
| null | null | null |
cs.DS cs.DC
| null |
We describe a new approach for dealing with the following central problem in
the self-organization of a geometric sensor network: Given a polygonal region
R, and a large, dense set of sensor nodes that are scattered uniformly at
random in R. There is no central control unit, and nodes can only communicate
locally by wireless radio to all other nodes that are within communication
radius r, without knowing their coordinates or distances to other nodes. The
objective is to develop a simple distributed protocol that allows nodes to
identify themselves as being located near the boundary of R and form connected
pieces of the boundary. We give a comparison of several centrality measures
commonly used in the analysis of social networks and show that restricted
stress centrality is particularly suited for geometric networks; we provide
mathematical as well as experimental evidence for the quality of this measure.
|
[
{
"version": "v1",
"created": "Mon, 1 Aug 2005 19:44:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fekete",
"Sandor P.",
""
],
[
"Kaufmann",
"Michael",
""
],
[
"Kroeller",
"Alexander",
""
],
[
"Lehmann",
"Katharina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0508007
|
Manfred Harringer
|
Manfred Harringer
|
Regularity of Position Sequences
|
14 pages
| null | null | null |
cs.CV cs.AI cs.LG q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A person is given a numbered sequence of positions on a sheet of paper. The
person is asked, "Which will be the next (or the next after that) position?"
Everyone has an opinion as to how he or she would proceed. There are regular
sequences for which there is general agreement on how to continue. However,
there are less regular sequences for which this assessment is less certain.
There are sequences for which every continuation is perceived to be arbitrary.
I would like to present a mathematical model that reflects these opinions and
perceptions with the aid of a valuation function. It is necessary to apply a
rich set of invariant features of position sequences to ensure the quality of
this model. All other properties of the model are arbitrary.
|
[
{
"version": "v1",
"created": "Mon, 1 Aug 2005 18:55:57 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Aug 2005 18:31:34 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Aug 2010 09:50:12 GMT"
},
{
"version": "v4",
"created": "Mon, 27 Dec 2010 08:29:34 GMT"
}
] | 2010-12-30T00:00:00 |
[
[
"Harringer",
"Manfred",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
cs/0508008
|
Kentaro Kondo
|
Kentaro Kondo
|
The accurate optimal-success/error-rate calculations applied to the
realizations of the reliable and short-period integer ambiguity resolution in
carrier-phase GPS/GNSS positioning
|
LaTeX, 17 pages, 7 figures. Submitted to IEEE Transactions on
Information Theory
| null | null | null |
cs.IT math.IT
| null |
The maximum-marginal-a-posteriori success rate of statistical decision under
multivariate Gaussian error distribution on an integer lattice is almost
rigorously calculated by using union-bound approximation and Monte Carlo
integration. These calculations are applied to the revelation of the various
possible realizations of the reliable and short-period integer ambiguity
resolution in precise carrier-phase relative positioning by GPS/GNSS. The
theoretical foundation and efficient methodology are systematically developed,
and two types of the enhancement of union-bound approximation are proposed and
examined.
The results revealed include an extremely high reliability under the
condition of accurate carrier-phase measurements and a large number of visible
satellites, its heavy degradation caused by the slight amount of differentiated
ionospheric delays due to the nonvanishing baseline length between rover and
reference receivers, and the advantages of the use of the multiple carrier
frequencies. The succeeding initialization of the integer ambiguities is shown
to overcome the disadvantageous condition of the nonvanishing baseline length
effectively due to the reasonably assumed temporal and spatial constancy of
differentiated ionospheric delays.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 06:07:58 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Aug 2005 00:33:31 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Nov 2005 07:55:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kondo",
"Kentaro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508009
|
Wei-jen Hsu
|
Wei-jen Hsu, Ahmed Helmy
|
IMPACT: Investigation of Mobile-user Patterns Across University Campuses
using WLAN Trace Analysis
|
16 pages, 31 figures
| null | null | null |
cs.NI
| null |
We conduct the most comprehensive study of WLAN traces to date. Measurements
collected from four major university campuses are analyzed with the aim of
developing fundamental understanding of realistic user behavior in wireless
networks. Both individual user and inter-node (group) behaviors are
investigated and two classes of metrics are devised to capture the underlying
structure of such behaviors.
For individual user behavior we observe distinct patterns in which most users
are 'on' for a small fraction of the time, the number of access points visited
is very small and the overall on-line user mobility is quite low. We clearly
identify categories of heavy and light users. In general, users exhibit high
degree of similarity over days and weeks.
For group behavior, we define metrics for encounter patterns and friendship.
Surprisingly, we find that a user, on average, encounters less than 6% of the
network user population within a month, and that encounter and friendship
relations are highly asymmetric. We establish that number of encounters follows
a biPareto distribution, while friendship indexes follow an exponential
distribution. We capture the encounter graph using a small world model, the
characteristics of which reach steady state after only one day.
We hope for our study to have a great impact on realistic modeling of network
usage and mobility patterns in wireless networks.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 01:54:05 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Hsu",
"Wei-jen",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0508010
|
Yongjin Kim
|
Yongjin Kim, Ahmed Helmy
|
ATTENTION: ATTackEr traceback using MAC layer abNormality detecTION
| null | null | null | null |
cs.NI
| null |
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious
problems in wireless networks due to limited network and host resources.
Attacker traceback is a promising solution to take a proper countermeasure near
the attack origins, to discourage attackers from launching attacks, and for
forensics. However, attacker traceback in Mobile Ad-hoc Networks (MANETs) is a
challenging problem due to the dynamic topology, and limited network resources.
It is especially difficult to trace back attacker(s) when they are moving to
avoid traceback. In this paper, we introduce the ATTENTION protocol framework,
which pays special attention to MAC layer abnormal activity under attack.
ATTENTION consists of three classes, namely, coarse-grained traceback,
fine-grained traceback and spatio-temporal fusion architecture. For
energy-efficient attacker searching in MANETs, we also utilize small-world
model. Our simulation analysis shows 79% of success rate in DoS attacker
traceback with coarse-grained attack signature. In addition, with fine-grained
attack signature, it shows 97% of success rate in DoS attacker traceback and
83% of success rate in DDoS attacker traceback. We also show that ATTENTION has
robustness against node collusion and mobility.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 04:04:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kim",
"Yongjin",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0508011
|
Kazuto Ogawa
|
Kazuto Ogawa, Goichiro Hanaoka and Hideki Imai
|
A Secure Traitor Tracing Scheme against Key Exposure
|
5 pages, IEEE International Symposium on Information Theory 2005
(ISIT 2005)
| null |
10.1109/ISIT.2005.1523670
| null |
cs.CR
| null |
Copyright protection is a major issue in distributing digital content. On the
other hand, improvements to usability are sought by content users. In this
paper, we propose a secure {\it traitor tracing scheme against key exposure
(TTaKE)} which contains the properties of both a traitor tracing scheme and a
forward secure public key cryptosystem. Its structure fits current digital
broadcasting systems and it may be useful in preventing traitors from making
illegal decoders and in minimizing the damage from accidental key exposure. It
can improve usability through these properties.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 07:36:51 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Ogawa",
"Kazuto",
""
],
[
"Hanaoka",
"Goichiro",
""
],
[
"Imai",
"Hideki",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0508012
|
Jan Ostergaard
|
Jan Ostergaard, Richard Heusdens, and Jesper Jensen
|
n-Channel Asymmetric Multiple-Description Lattice Vector Quantization
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523654
| null |
cs.IT math.IT
| null |
We present analytical expressions for optimal entropy-constrained
multiple-description lattice vector quantizers which, under high-resolutions
assumptions, minimize the expected distortion for given packet-loss
probabilities. We consider the asymmetric case where packet-loss probabilities
and side entropies are allowed to be unequal and find optimal quantizers for
any number of descriptions in any dimension. We show that the normalized second
moments of the side-quantizers are given by that of an $L$-dimensional sphere
independent of the choice of lattices. Furthermore, we show that the optimal
bit-distribution among the descriptions is not unique. In fact, within certain
limits, bits can be arbitrarily distributed.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 07:52:14 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Ostergaard",
"Jan",
""
],
[
"Heusdens",
"Richard",
""
],
[
"Jensen",
"Jesper",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508013
|
Kenji Yasunaga
|
Kenji Yasunaga, Toru Fujiwara
|
Relations between the Local Weight Distributions of a Linear Block Code,
Its Extended Code, and Its Even Weight Subcode
|
5 pages, 2 figures. To appear in the Proceedings of IEEE
International Symposium on Information Theory, Sept. 4-9, 2005, Adelaide,
Australia
| null |
10.1109/ISIT.2005.1523360
| null |
cs.IT math.IT
| null |
Relations between the local weight distributions of a binary linear code, its
extended code, and its even weight subcode are presented. In particular, for a
code of which the extended code is transitive invariant and contains only
codewords with weight multiples of four, the local weight distribution can be
obtained from that of the extended code. Using the relations, the local weight
distributions of the $(127,k)$ primitive BCH codes for $k\leq50$, the
$(127,64)$ punctured third-order Reed-Muller, and their even weight subcodes
are obtained from the local weight distribution of the $(128,k)$ extended
primitive BCH codes for $k\leq50$ and the $(128,64)$ third-order Reed-Muller
code. We also show an approach to improve an algorithm for computing the local
weight distribution proposed before.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 08:25:57 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Yasunaga",
"Kenji",
""
],
[
"Fujiwara",
"Toru",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508014
|
Pascal Vontobel
|
Jon Feldman, Ralf Koetter, Pascal O. Vontobel
|
The Benefit of Thresholding in LP Decoding of LDPC Codes
|
To appear in Proc. 2005 IEEE International Symposium on Information
Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523344
| null |
cs.IT math.IT
| null |
Consider data transmission over a binary-input additive white Gaussian noise
channel using a binary low-density parity-check code. We ask the following
question: Given a decoder that takes log-likelihood ratios as input, does it
help to modify the log-likelihood ratios before decoding? If we use an optimal
decoder then it is clear that modifying the log-likelihoods cannot possibly
help the decoder's performance, and so the answer is "no." However, for a
suboptimal decoder like the linear programming decoder, the answer might be
"yes": In this paper we prove that for certain interesting classes of
low-density parity-check codes and large enough SNRs, it is advantageous to
truncate the log-likelihood ratios before passing them to the linear
programming decoder.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 16:52:11 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Feldman",
"Jon",
""
],
[
"Koetter",
"Ralf",
""
],
[
"Vontobel",
"Pascal O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508015
|
Stanislav Bulygin V.
|
Stanislav Bulygin
|
Chosen-ciphertext attack on noncommutative Polly Cracker
| null | null | null | null |
cs.IT cs.CR math.IT
| null |
We propose a chosen-ciphertext attack on recently presented noncommutative
variant of the well-known Polly Cracker cryptosystem. We show that if one
chooses parameters for this noncommutative Polly Cracker as initially proposed,
than the system should be claimed as insecure.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 09:48:43 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Nov 2005 19:11:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bulygin",
"Stanislav",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508016
|
Jang-Won Lee
|
Jang-Won Lee, Mung Chiang, and A. Robert Calderbank
|
Distributed Algorithms for Optimal Rate-Reliability Tradeoff in Networks
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.NI
| null |
The current framework of network utility maximization for distributed rate
allocation assumes fixed channel code rates. However, by adapting the physical
layer channel coding, different rate-reliability tradeoffs can be achieved on
each link and for each end user. Consider a network where each user has a
utility function that depends on both signal quality and data rate, and each
link may provide a `fatter' (`thinner') information `pipe' by allowing a higher
(lower) decoding error probability. We propose two distributed, pricing-based
algorithms to attain optimal rate-reliability tradeoff, with an interpretation
that each user provides its willingness to pay for reliability to the network
and the network feeds back congestion prices to users. The proposed algorithms
converge to a tradeoff point between rate and reliability, which is proved to
be globally optimal for codes with sufficiently large codeword lengths and user
utilities with sufficiently negative curvatures.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 14:35:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lee",
"Jang-Won",
""
],
[
"Chiang",
"Mung",
""
],
[
"Calderbank",
"A. Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0508017
|
Anne-Marie Vercoustre
|
Jovan Pehcevski (RMIT), James A. Thom (RMIT), Anne-Marie Vercoustre
|
Enhancing Content-And-Structure Information Retrieval using a Native XML
Database
| null | null | null | null |
cs.IR
| null |
Three approaches to content-and-structure XML retrieval are analysed in this
paper: first by using Zettair, a full-text information retrieval system; second
by using eXist, a native XML database, and third by using a hybrid XML
retrieval system that uses eXist to produce the final answers from likely
relevant articles retrieved by Zettair. INEX 2003 content-and-structure topics
can be classified in two categories: the first retrieving full articles as
final answers, and the second retrieving more specific elements within articles
as final answers. We show that for both topic categories our initial hybrid
system improves the retrieval effectiveness of a native XML database. For
ranking the final answer elements, we propose and evaluate a novel retrieval
model that utilises the structural relationships between the answer elements of
a native XML database and retrieves Coherent Retrieval Elements. The final
results of our experiments show that when the XML retrieval task focusses on
highly relevant elements our hybrid XML retrieval system with the Coherent
Retrieval Elements module is 1.8 times more effective than Zettair and 3 times
more effective than eXist, and yields an effective content-and-structure XML
retrieval.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 15:05:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pehcevski",
"Jovan",
"",
"RMIT"
],
[
"Thom",
"James A.",
"",
"RMIT"
],
[
"Vercoustre",
"Anne-Marie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0508018
|
Volker Pohl
|
Holger Boche and Volker Pohl
|
Spectral Factorization, Whitening- and Estimation Filter -- Stability,
Smoothness Properties and FIR Approximation Behavior
|
To appear in the proceedings of the IEEE International Symposium on
Information Theory, Adelaide, Astralia, Sept. 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
A Wiener filter can be interpreted as a cascade of a whitening- and an
estimation filter. This paper gives a detailed investigates of the properties
of these two filters. Then the practical consequences for the overall Wiener
filter are ascertained. It is shown that if the given spectral densities are
smooth (Hoelder continuous) functions, the resulting Wiener filter will always
be stable and can be approximated arbitrarily well by a finite impulse response
(FIR) filter. Moreover, the smoothness of the spectral densities characterizes
how fast the FIR filter approximates the desired filter characteristic. If on
the other hand the spectral densities are continuous but not smooth enough, the
resulting Wiener filter may not be stable.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 15:41:40 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Boche",
"Holger",
""
],
[
"Pohl",
"Volker",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508019
|
Pascal Vontobel
|
Pascal O. Vontobel, Roxana Smarandache, Negar Kiyavash, Jason Teutsch,
Dejan Vukobratovic
|
On the Minimal Pseudo-Codewords of Codes from Finite Geometries
|
To appear in Proc. 2005 IEEE International Symposium on Information
Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523484
| null |
cs.IT cs.DM math.IT
| null |
In order to understand the performance of a code under maximum-likelihood
(ML) decoding, it is crucial to know the minimal codewords. In the context of
linear programming (LP) decoding, it turns out to be necessary to know the
minimal pseudo-codewords. This paper studies the minimal codewords and minimal
pseudo-codewords of some families of codes derived from projective and
Euclidean planes. Although our numerical results are only for codes of very
modest length, they suggest that these code families exhibit an interesting
property. Namely, all minimal pseudo-codewords that are not multiples of a
minimal codeword have an AWGNC pseudo-weight that is strictly larger than the
minimum Hamming weight of the code. This observation has positive consequences
not only for LP decoding but also for iterative decoding.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 16:34:05 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Vontobel",
"Pascal O.",
""
],
[
"Smarandache",
"Roxana",
""
],
[
"Kiyavash",
"Negar",
""
],
[
"Teutsch",
"Jason",
""
],
[
"Vukobratovic",
"Dejan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508020
|
Chris Ng
|
Chris T. K. Ng and Andrea J. Goldsmith
|
Capacity Gain from Transmitter and Receiver Cooperation
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
Capacity gain from transmitter and receiver cooperation are compared in a
relay network where the cooperating nodes are close together. When all nodes
have equal average transmit power along with full channel state information
(CSI), it is proved that transmitter cooperation outperforms receiver
cooperation, whereas the opposite is true when power is optimally allocated
among the nodes but only receiver phase CSI is available. In addition, when the
nodes have equal average power with receiver phase CSI only, cooperation is
shown to offer no capacity improvement over a non-cooperative scheme with the
same average network power. When the system is under optimal power allocation
with full CSI, the decode-and-forward transmitter cooperation rate is close to
its cut-set capacity upper bound, and outperforms compress-and-forward receiver
cooperation. Moreover, it is shown that full CSI is essential in transmitter
cooperation, while optimal power allocation is essential in receiver
cooperation.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 18:03:14 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ng",
"Chris T. K.",
""
],
[
"Goldsmith",
"Andrea J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508021
|
Dmitri Krioukov
|
Dmitri Krioukov, kc claffy
|
Toward Compact Interdomain Routing
| null | null | null | null |
cs.NI
| null |
Despite prevailing concerns that the current Internet interdomain routing
system will not scale to meet the needs of the 21st century global Internet,
networking research has not yet led to the construction of a new routing
architecture with satisfactory and mathematically provable scalability
characteristics. Worse, continuing empirical trends of the existing routing and
topology structure of the Internet are alarming: the foundational principles of
the current routing and addressing architecture are an inherently bad match for
the naturally evolving structure of Internet interdomain topology. We are
fortunate that a sister discipline, theory of distributed computation, has
developed routing algorithms that offer promising potential for genuinely
scalable routing on realistic Internet-like topologies. Indeed, there are many
recent breakthroughs in the area of compact routing, which has been shown to
drastically outperform, in terms of efficiency and scalability, even the
boldest proposals developed in networking research. Many open questions remain,
but we believe the applicability of compact routing techniques to Internet
interdomain routing is a research area whose potential payoff for the future of
networking is too high to ignore.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 19:32:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Krioukov",
"Dmitri",
""
],
[
"claffy",
"kc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0508022
|
Andrew Tirkel
|
Andrew Z Tirkel and Tom E Hall
|
Matrix Construction Using Cyclic Shifts of a Column
| null | null | null | null |
cs.DM cs.CR cs.IT math.IT
| null |
This paper describes the synthesis of matrices with good correlation, from
cyclic shifts of pseudonoise columns. Optimum matrices result whenever the
shift sequence satisfies the constant difference property. Known shift
sequences with the constant (or almost constant) difference property are:
Quadratic (Polynomial) and Reciprocal Shift modulo prime, Exponential Shift,
Legendre Shift, Zech Logarithm Shift, and the shift sequences of some m-arrays.
We use these shift sequences to produce arrays for watermarking of digital
images. Matrices can also be unfolded into long sequences by diagonal unfolding
(with no deterioration in correlation) or row-by-row unfolding, with some
degradation in correlation.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2005 21:17:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Tirkel",
"Andrew Z",
""
],
[
"Hall",
"Tom E",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508023
|
Todd Veldhuizen
|
Todd L. Veldhuizen
|
Software Libraries and Their Reuse: Entropy, Kolmogorov Complexity, and
Zipf's Law
| null |
Library-Centric Software Design (LCSD 2005), an OOPSLA 2005
workshop
| null | null |
cs.SE cs.IT cs.PL math.IT
| null |
We analyze software reuse from the perspective of information theory and
Kolmogorov complexity, assessing our ability to ``compress'' programs by
expressing them in terms of software components reused from libraries. A common
theme in the software reuse literature is that if we can only get the right
environment in place-- the right tools, the right generalizations, economic
incentives, a ``culture of reuse'' -- then reuse of software will soar, with
consequent improvements in productivity and software quality. The analysis
developed in this paper paints a different picture: the extent to which
software reuse can occur is an intrinsic property of a problem domain, and
better tools and culture can have only marginal impact on reuse rates if the
domain is inherently resistant to reuse. We define an entropy parameter $H \in
[0,1]$ of problem domains that measures program diversity, and deduce from this
upper bounds on code reuse and the scale of components with which we may work.
For ``low entropy'' domains with $H$ near 0, programs are highly similar to one
another and the domain is amenable to the Component-Based Software Engineering
(CBSE) dream of programming by composing large-scale components. For problem
domains with $H$ near 1, programs require substantial quantities of new code,
with only a modest proportion of an application comprised of reused,
small-scale components. Preliminary empirical results from Unix platforms
support some of the predictions of our model.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 04:20:11 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2005 14:06:44 GMT"
},
{
"version": "v3",
"created": "Sun, 2 Oct 2005 16:25:10 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Veldhuizen",
"Todd L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508024
|
Kai-Uwe Schmidt
|
Kai-Uwe Schmidt and Adolf Finger
|
New Codes for OFDM with Low PMEPR
|
To appear in the Proceedings of IEEE International Symposium on
Information Theory, Sept. 4-9, 2005, Adelaide, Australia
| null | null | null |
cs.IT math.IT
| null |
In this paper new codes for orthogonal frequency-division multiplexing (OFDM)
with tightly controlled peak-to-mean envelope power ratio (PMEPR) are proposed.
We identify a new family of sequences occuring in complementary sets and show
that such sequences form subsets of a new generalization of the Reed--Muller
codes. Contrarily to previous constructions we present a compact description of
such codes, which makes them suitable even for larger block lengths. We also
show that some previous constructions just occur as special cases in our
construction.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 07:22:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Schmidt",
"Kai-Uwe",
""
],
[
"Finger",
"Adolf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508025
|
S\'andor Gy\H{o}ri
|
S\'andor Gy\H{o}ri
|
Signature coding for OR channel with asynchronous access
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
Signature coding for multiple access OR channel is considered. We prove that
in block asynchronous case the upper bound on the minimum code length
asymptotically is the same as in the case of synchronous access.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 10:47:00 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Győri",
"Sándor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508026
|
Kai-Uwe Schmidt
|
Kai-Uwe Schmidt and Adolf Finger
|
Simple Maximum-Likelihood Decoding of Generalized First-order
Reed-Muller Codes
|
5 pages, accepted for publication in IEEE Communications Letters
|
IEEE Commun. Lett., vol. 9, no. 10, pp. 912-914, Oct. 2005
| null | null |
cs.IT math.IT
| null |
An efficient decoder for the generalized first-order Reed-Muller code
RM_q(1,m) is essential for the decoding of various block-coding schemes for
orthogonal frequency-division multiplexing with reduced peak-to-mean power
ratio. We present an efficient and simple maximum-likelihood decoding algorithm
for RM_q(1,m). It is shown that this algorithm has lower complexity than other
previously known maximum-likelihood decoders for RM_q(1,m).
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 12:46:11 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Schmidt",
"Kai-Uwe",
""
],
[
"Finger",
"Adolf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508027
|
Hans-Andrea Loeliger
|
J. Dauwels, S. Korl, H.-A. Loeliger
|
Expectation maximization as message passing
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523402
| null |
cs.IT cs.LG math.IT
| null |
Based on prior work by Eckford, it is shown how expectation maximization (EM)
may be viewed, and used, as a message passing algorithm in factor graphs.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 16:09:00 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Dauwels",
"J.",
""
],
[
"Korl",
"S.",
""
],
[
"Loeliger",
"H. -A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508028
|
Bernardo Huberman
|
Fang Wu, Zi Zhang and Bernardo A. Huberman
|
Truth-telling Reservations
| null | null | null | null |
cs.GT cond-mat.stat-mech cs.MA
| null |
We present a mechanism for reservations of bursty resources that is both
truthful and robust. It consists of option contracts whose pricing structure
induces users to reveal the true likelihoods that they will purchase a given
resource. Users are also allowed to adjust their options as their likelihood
changes. This scheme helps users save cost and the providers to plan ahead so
as to reduce the risk of under-utilization and overbooking. The mechanism
extracts revenue similar to that of a monopoly provider practicing temporal
pricing discrimination with a user population whose preference distribution is
known in advance.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 17:11:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wu",
"Fang",
""
],
[
"Zhang",
"Zi",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0508029
|
Johannes Schneider
|
Johannes J. Schneider and Scott Kirkpatrick
|
Selfish vs. Unselfish Optimization of Network Creation
|
16 pages, 6 figures
| null |
10.1088/1742-5468/2005/08/P08007
| null |
cs.NI cs.AR cs.MA
| null |
We investigate several variants of a network creation model: a group of
agents builds up a network between them while trying to keep the costs of this
network small. The cost function consists of two addends, namely (i) a constant
amount for each edge an agent buys and (ii) the minimum number of hops it takes
sending messages to other agents. Despite the simplicity of this model, various
complex network structures emerge depending on the weight between the two
addends of the cost function and on the selfish or unselfish behaviour of the
agents.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 18:16:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schneider",
"Johannes J.",
""
],
[
"Kirkpatrick",
"Scott",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0508030
|
Michael Lentmaier
|
Michael Lentmaier, Arvind Sridharan, Kamil Sh. Zigangirov, and Daniel
J. Costello Jr
|
Terminated LDPC Convolutional Codes with Thresholds Close to Capacity
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523567
| null |
cs.IT math.IT
| null |
An ensemble of LDPC convolutional codes with parity-check matrices composed
of permutation matrices is considered. The convergence of the iterative belief
propagation based decoder for terminated convolutional codes in the ensemble is
analyzed for binary-input output-symmetric memoryless channels using density
evolution techniques. We observe that the structured irregularity in the Tanner
graph of the codes leads to significantly better thresholds when compared to
corresponding LDPC block codes.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2005 22:27:03 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Lentmaier",
"Michael",
""
],
[
"Sridharan",
"Arvind",
""
],
[
"Zigangirov",
"Kamil Sh.",
""
],
[
"Costello",
"Daniel J.",
"Jr"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508031
|
Jon Yard
|
Jon Yard, Igor Devetak, Patrick Hayden
|
Capacity Theorems for Quantum Multiple Access Channels
|
5 pages. Conference version of quant-ph/0501045, to appear in the
proceedings of the IEEE International Symposium on Information Theory,
Adelaide, Australia, 2005
|
Proceedings of the IEEE Symposium on Information Theory, Adelaide,
pp. 884-888, 2005
|
10.1109/ISIT.2005.1523464
| null |
cs.IT math.IT quant-ph
| null |
We consider quantum channels with two senders and one receiver. For an
arbitrary such channel, we give multi-letter characterizations of two different
two-dimensional capacity regions. The first region characterizes the rates at
which it is possible for one sender to send classical information while the
other sends quantum information. The second region gives the rates at which
each sender can send quantum information. We give an example of a channel for
which each region has a single-letter description, concluding with a
characterization of the rates at which each user can simultaneously send
classical and quantum information.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 01:49:14 GMT"
}
] | 2011-10-25T00:00:00 |
[
[
"Yard",
"Jon",
""
],
[
"Devetak",
"Igor",
""
],
[
"Hayden",
"Patrick",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0508032
|
Derek Messie
|
Derek Messie (1) and Jae C. Oh (1) ((1) Syracuse University)
|
Polymorphic Self-* Agents for Stigmergic Fault Mitigation in Large-Scale
Real-Time Embedded Systems
|
Fourth International Joint Conference on Autonomous Agents and
Multi-Agent Systems (AAMAS), Utrecht, Netherlands, July, 2005
| null | null | null |
cs.AI cs.MA
| null |
Organization and coordination of agents within large-scale, complex,
distributed environments is one of the primary challenges in the field of
multi-agent systems. A lot of interest has surfaced recently around self-*
(self-organizing, self-managing, self-optimizing, self-protecting) agents. This
paper presents polymorphic self-* agents that evolve a core set of roles and
behavior based on environmental cues. The agents adapt these roles based on the
changing demands of the environment, and are directly implementable in computer
systems applications. The design combines strategies from game theory,
stigmergy, and other biologically inspired models to address fault mitigation
in large-scale, real-time, distributed systems. The agents are embedded within
the individual digital signal processors of BTeV, a High Energy Physics
experiment consisting of 2500 such processors. Results obtained using a SWARM
simulation of the BTeV environment demonstrate the polymorphic character of the
agents, and show how this design exceeds performance and reliability metrics
obtained from comparable centralized, and even traditional decentralized
approaches.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 01:43:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Messie",
"Derek",
"",
"Syracuse University"
],
[
"Oh",
"Jae C.",
"",
"Syracuse University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0508033
|
Dmitri Krioukov
|
Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker,
Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
|
Lessons from Three Views of the Internet Topology
| null | null | null |
CAIDA-TR-2005-02
|
cs.NI physics.soc-ph
| null |
Network topology plays a vital role in understanding the performance of
network applications and protocols. Thus, recently there has been tremendous
interest in generating realistic network topologies. Such work must begin with
an understanding of existing network topologies, which today typically consists
of a relatively small number of data sources. In this paper, we calculate an
extensive set of important characteristics of Internet AS-level topologies
extracted from the three data sources most frequently used by the research
community: traceroutes, BGP, and WHOIS. We find that traceroute and BGP
topologies are similar to one another but differ substantially from the WHOIS
topology. We discuss the interplay between the properties of the data sources
that result from specific data collection mechanisms and the resulting topology
views. We find that, among metrics widely considered, the joint degree
distribution appears to fundamentally characterize Internet AS-topologies: it
narrowly defines values for other important metrics. We also introduce an
evaluation criteria for the accuracy of topology generators and verify previous
observations that generators solely reproducing degree distributions cannot
capture the full spectrum of critical topological characteristics of any of the
three topologies. Finally, we release to the community the input topology
datasets, along with the scripts and output of our calculations. This
supplement should enable researchers to validate their models against real data
and to make more informed selection of topology data sources for their specific
needs.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 02:35:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mahadevan",
"Priya",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Fomenkov",
"Marina",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"claffy",
"kc",
""
],
[
"Vahdat",
"Amin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0508034
|
Erdal Arikan
|
Erdal Arikan
|
Channel combining and splitting for cutoff rate improvement
|
5 pages, 7 figures, 2005 IEEE International Symposium on Information
Theory, Adelaide, Sept. 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
The cutoff rate $R_0(W)$ of a discrete memoryless channel (DMC) $W$ is often
used as a figure of merit, alongside the channel capacity $C(W)$. Given a
channel $W$ consisting of two possibly correlated subchannels $W_1$, $W_2$, the
capacity function always satisfies $C(W_1)+C(W_2) \le C(W)$, while there are
examples for which $R_0(W_1)+R_0(W_2) > R_0(W)$. This fact that cutoff rate can
be ``created'' by channel splitting was noticed by Massey in his study of an
optical modulation system modeled as a $M$'ary erasure channel. This paper
demonstrates that similar gains in cutoff rate can be achieved for general
DMC's by methods of channel combining and splitting. Relation of the proposed
method to Pinsker's early work on cutoff rate improvement and to Imai-Hirakawa
multi-level coding are also discussed.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 07:33:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Arikan",
"Erdal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508035
|
Irina Naydenova
|
Irina Naydenova, Torleiv Klove
|
Codes for error detection, good or not good
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
Linear codes for error detection on a q-ary symmetric channel are studied. It
is shown that for given dimension k and minimum distance d, there exists a
value \mu(d,k) such that if C is a code of length n >= \mu(d,k), then neither C
nor its dual are good for error detection. For d >> k or k << d good
approximations for \mu(d,k) are given. A generalization to non-linear codes is
also given.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 12:48:03 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Naydenova",
"Irina",
""
],
[
"Klove",
"Torleiv",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508036
|
Anne-Marie Vercoustre
|
Thierry Despeyroux, Yves Lechevallier, Brigitte Trousse, Anne-Marie
Vercoustre
|
Exp\'{e}riences de classification d'une collection de documents XML de
structure homog\`{e}ne
|
Cette version corrige des erreurs dans le nom de 2 auteurs cites dans
la bibliographie
|
Dans 5\`{e}me Journ\'{e}es d' Extraction et de Gestion des
Connaissances (EGC 2005)
| null | null |
cs.IR
| null |
This paper presents some experiments in clustering homogeneous XMLdocuments
to validate an existing classification or more generally anorganisational
structure. Our approach integrates techniques for extracting knowledge from
documents with unsupervised classification (clustering) of documents. We focus
on the feature selection used for representing documents and its impact on the
emerging classification. We mix the selection of structured features with fine
textual selection based on syntactic characteristics.We illustrate and evaluate
this approach with a collection of Inria activity reports for the year 2003.
The objective is to cluster projects into larger groups (Themes), based on the
keywords or different chapters of these activity reports. We then compare the
results of clustering using different feature selections, with the official
theme structure used by Inria.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 14:14:59 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2005 13:15:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Despeyroux",
"Thierry",
""
],
[
"Lechevallier",
"Yves",
""
],
[
"Trousse",
"Brigitte",
""
],
[
"Vercoustre",
"Anne-Marie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0508037
|
Vamsikrishna Kalapala
|
Vamsi Kalapala, Cris Moore
|
The Phase Transition in Exact Cover
|
9 pages, 1 figure, 1 table
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study EC3, a variant of Exact Cover which is equivalent to Positive 1-in-3
SAT. Random instances of EC3 were recently used as benchmarks for simulations
of an adiabatic quantum algorithm. Empirical results suggest that EC3 has a
phase transition from satisfiability to unsatisfiability when the number of
clauses per variable r exceeds some threshold r* ~= 0.62 +- 0.01. Using the
method of differential equations, we show that if r <= 0.546 w.h.p. a random
instance of EC3 is satisfiable. Combined with previous results this limits the
location of the threshold, if it exists, to the range 0.546 < r* < 0.644.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 15:01:48 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Oct 2008 04:43:29 GMT"
}
] | 2008-10-08T00:00:00 |
[
[
"Kalapala",
"Vamsi",
""
],
[
"Moore",
"Cris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0508038
|
Robert Burger PhD
|
John Robert Burger
|
Quantum Algorithm Processor For Finding Exact Divisors
| null | null | null | null |
cs.AR
| null |
Wiring diagrams are given for a quantum algorithm processor in CMOS to
compute, in parallel, all divisors of an n-bit integer. Lines required in a
wiring diagram are proportional to n. Execution time is proportional to the
square of n.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 17:35:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Burger",
"John Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0508039
|
Soheil Mohajer
|
Soheil Mohajer, Payam Pakzad and Ali Kakhbod
|
Tight Bounds on the Redundancy of Huffman Codes
|
23 pages, 7 figures, accepted for publication in IEEE Transaction on
Information Theory
| null |
10.1109/ITW.2006.1633796
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study the redundancy of Huffman codes. In particular, we
consider sources for which the probability of one of the source symbols is
known. We prove a conjecture of Ye and Yeung regarding the upper bound on the
redundancy of such Huffman codes, which yields in a tight upper bound. We also
derive a tight lower bound for the redundancy under the same assumption.
We further apply the method introduced in this paper to other related
problems. It is shown that several other previously known bounds with different
constraints follow immediately from our results.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 19:29:18 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Aug 2005 14:21:25 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Jun 2012 18:45:06 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Mohajer",
"Soheil",
""
],
[
"Pakzad",
"Payam",
""
],
[
"Kakhbod",
"Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508040
|
Daniel Cunha
|
Daniel C. Cunha and Jaime Portugheis
|
Bounds on the Capacity of the Blockwise Noncoherent APSK-AWGN Channels
|
4 pages, 5 figures, to appear in Proceedings of the 2005 IEEE
International Symposium on Information Theory, Adelaide, Australia, September
4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
Capacity of M-ary Amplitude and Phase-Shift Keying(M-APSK) over an Additive
White Gaussian Noise(AWGN) channel that also introduces an unknown carrier
phase rotation is considered. The phase remains constant over a block of L
symbols and it is independent from block to block. Aiming to design codes with
equally probable symbols, uniformly distributed channel inputs are assumed.
Based on results of Peleg and Shamai for M-ary Phase Shift Keying(M-PSK)
modulation, easily computable upper and lower bounds on the effective M-APSK
capacity are derived. For moderate M and L and a broad range of Signal-to-Noise
Ratios(SNR's), the bounds come close together. As in the case of M-PSK
modulation, for large L the coherent capacity is approached.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 21:14:02 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Cunha",
"Daniel C.",
""
],
[
"Portugheis",
"Jaime",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508041
|
Tian-Jian Jiang
|
Tian-Jian Jiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong Tan,
Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
|
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
|
4 pages
| null | null | null |
cs.HC
| null |
Input method (IM) is a sine qua non for text entry of many Asian languages,
but its potential applications on other languages remain under-explored. This
paper proposes a philosophy of input method design by seeing it as a
nonintrusive plug-in text service framework. Such design allows new
functionalities of text processing to be attached onto a running application
without any tweaking of code. We also introduce OpenVanilla, a cross-platform
framework that is designed with the above-mentioned model in mind. Frameworks
like OpenVanilla have shown that an input method can be more than just a text
entry tool: it offers a convenient way for developing various text service and
language tools.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 22:39:49 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jun 2006 06:41:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jiang",
"Tian-Jian",
""
],
[
"Deng-Liu",
"",
""
],
[
"Liu",
"Kang-min",
""
],
[
"Yang",
"Weizhong",
""
],
[
"Tan",
"Pek-tiong",
""
],
[
"Hsieh",
"Mengjuei",
""
],
[
"Chang",
"Tsung-hsiang",
""
],
[
"Hsu",
"Wen-Lien",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0508042
|
Tian-Jian Jiang
|
Tien-chien Chiang, Deng-Liu, Kang-min Liu, Weizhong Yang, Pek-tiong
Tan, Mengjuei Hsieh, Tsung-hsiang Chang, Wen-Lien Hsu
|
OpenVanilla - A Non-Intrusive Plug-In Framework of Text Services
|
This paper has been withdrawn
| null | null | null |
cs.HC
| null |
This paper has been withdrawn by the author, because it was merged into
cs.HC/0508041
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2005 22:49:38 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jun 2006 06:46:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chiang",
"Tien-chien",
""
],
[
"Deng-Liu",
"",
""
],
[
"Liu",
"Kang-min",
""
],
[
"Yang",
"Weizhong",
""
],
[
"Tan",
"Pek-tiong",
""
],
[
"Hsieh",
"Mengjuei",
""
],
[
"Chang",
"Tsung-hsiang",
""
],
[
"Hsu",
"Wen-Lien",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0508043
|
Marcus Hutter
|
Marcus Hutter
|
Sequential Predictions based on Algorithmic Complexity
|
26 pages, LaTeX
|
Journal of Computer and System Sciences, 72:1 (2006) pages 95-117
| null |
IDSIA-16-04
|
cs.IT cs.LG math.IT
| null |
This paper studies sequence prediction based on the monotone Kolmogorov
complexity Km=-log m, i.e. based on universal deterministic/one-part MDL. m is
extremely close to Solomonoff's universal prior M, the latter being an
excellent predictor in deterministic as well as probabilistic environments,
where performance is measured in terms of convergence of posteriors or losses.
Despite this closeness to M, it is difficult to assess the prediction quality
of m, since little is known about the closeness of their posteriors, which are
the important quantities for prediction. We show that for deterministic
computable environments, the "posterior" and losses of m converge, but rapid
convergence could only be shown on-sequence; the off-sequence convergence can
be slow. In probabilistic environments, neither the posterior nor the losses
converge, in general.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2005 10:16:16 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508044
|
Sanjit Seshia
|
Sanjit A. Seshia, Randal E. Bryant
|
Deciding Quantifier-Free Presburger Formulas Using Parameterized
Solution Bounds
|
26 pages
|
Logical Methods in Computer Science, Volume 1, Issue 2 (December
19, 2005) lmcs:2270
|
10.2168/LMCS-1(2:6)2005
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a formula in quantifier-free Presburger arithmetic, if it has a
satisfying solution, there is one whose size, measured in bits, is polynomially
bounded in the size of the formula. In this paper, we consider a special class
of quantifier-free Presburger formulas in which most linear constraints are
difference (separation) constraints, and the non-difference constraints are
sparse. This class has been observed to commonly occur in software
verification. We derive a new solution bound in terms of parameters
characterizing the sparseness of linear constraints and the number of
non-difference constraints, in addition to traditional measures of formula
size. In particular, we show that the number of bits needed per integer
variable is linear in the number of non-difference constraints and logarithmic
in the number and size of non-zero coefficients in them, but is otherwise
independent of the total number of linear constraints in the formula. The
derived bound can be used in a decision procedure based on instantiating
integer variables over a finite domain and translating the input
quantifier-free Presburger formula to an equi-satisfiable Boolean formula,
which is then checked using a Boolean satisfiability solver. In addition to our
main theoretical result, we discuss several optimizations for deriving tighter
bounds in practice. Empirical evidence indicates that our decision procedure
can greatly outperform other decision procedures.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2005 11:09:32 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Dec 2005 14:22:52 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Jul 2006 15:27:32 GMT"
},
{
"version": "v4",
"created": "Thu, 27 Jul 2006 12:18:32 GMT"
},
{
"version": "v5",
"created": "Tue, 7 Oct 2008 12:14:26 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Seshia",
"Sanjit A.",
""
],
[
"Bryant",
"Randal E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0508045
|
Ion Mandoiu
|
Christoph Albrecht, Andrew B. Kahng, Ion I. Mandoiu, and Alexander
Zelikovsky
|
Multicommodity Flow Algorithms for Buffered Global Routing
| null | null | null | null |
cs.DS
| null |
In this paper we describe a new algorithm for buffered global routing
according to a prescribed buffer site map. Specifically, we describe a provably
good multi-commodity flow based algorithm that finds a global routing
minimizing buffer and wire congestion subject to given constraints on routing
area (wirelength and number of buffers) and sink delays. Our algorithm allows
computing the tradeoff curve between routing area and wire/buffer congestion
under any combination of delay and capacity constraints, and simultaneously
performs buffer/wire sizing, as well as layer and pin assignment. Experimental
results show that near-optimal results are obtained with a practical runtime.
|
[
{
"version": "v1",
"created": "Sat, 6 Aug 2005 12:44:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Albrecht",
"Christoph",
""
],
[
"Kahng",
"Andrew B.",
""
],
[
"Mandoiu",
"Ion I.",
""
],
[
"Zelikovsky",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0508046
|
Panu Chaichanavong
|
Panu Chaichanavong, Paul H. Siegel
|
Relaxation Bounds on the Minimum Pseudo-Weight of Linear Block Codes
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523448
| null |
cs.IT math.IT
| null |
Just as the Hamming weight spectrum of a linear block code sheds light on the
performance of a maximum likelihood decoder, the pseudo-weight spectrum
provides insight into the performance of a linear programming decoder. Using
properties of polyhedral cones, we find the pseudo-weight spectrum of some
short codes. We also present two general lower bounds on the minimum
pseudo-weight. The first bound is based on the column weight of the
parity-check matrix. The second bound is computed by solving an optimization
problem. In some cases, this bound is more tractable to compute than previously
known bounds and thus can be applied to longer codes.
|
[
{
"version": "v1",
"created": "Sun, 7 Aug 2005 19:32:27 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Chaichanavong",
"Panu",
""
],
[
"Siegel",
"Paul H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508047
|
Desmond Lun
|
Desmond S. Lun, Muriel Medard, Ralf Koetter, Michelle Effros
|
Further Results on Coding for Reliable Communication over Packet
Networks
|
5 pages; to appear in Proc. 2005 IEEE International Symposium on
Information Theory (ISIT 2005)
|
Proc. 2005 IEEE International Symposium on Information Theory
(ISIT 2005), pages 1848-1852, September 2005
|
10.1109/ISIT.2005.1523665
| null |
cs.IT cs.NI math.IT
| null |
In "On Coding for Reliable Communication over Packet Networks" (Lun, Medard,
and Effros, Proc. 42nd Annu. Allerton Conf. Communication, Control, and
Computing, 2004), a capacity-achieving coding scheme for unicast or multicast
over lossy wireline or wireless packet networks is presented. We extend that
paper's results in two ways: First, we extend the network model to allow
packets received on a link to arrive according to any process with an average
rate, as opposed to the assumption of Poisson traffic with i.i.d. losses that
was previously made. Second, in the case of Poisson traffic with i.i.d. losses,
we derive error exponents that quantify the rate at which the probability of
error decays with coding delay.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2005 02:09:13 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Lun",
"Desmond S.",
""
],
[
"Medard",
"Muriel",
""
],
[
"Koetter",
"Ralf",
""
],
[
"Effros",
"Michelle",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508048
|
Olivier Danvy
|
Malgorzata Biernacka and Dariusz Biernacki and Olivier Danvy
|
An Operational Foundation for Delimited Continuations in the CPS
Hierarchy
|
39 pages
|
Logical Methods in Computer Science, Volume 1, Issue 2 (November
8, 2005) lmcs:2269
|
10.2168/LMCS-1(2:5)2005
| null |
cs.LO cs.PL
| null |
We present an abstract machine and a reduction semantics for the
lambda-calculus extended with control operators that give access to delimited
continuations in the CPS hierarchy. The abstract machine is derived from an
evaluator in continuation-passing style (CPS); the reduction semantics (i.e., a
small-step operational semantics with an explicit representation of evaluation
contexts) is constructed from the abstract machine; and the control operators
are the shift and reset family. We also present new applications of delimited
continuations in the CPS hierarchy: finding list prefixes and normalization by
evaluation for a hierarchical language of units and products.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2005 13:57:34 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Nov 2005 13:47:20 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Nov 2005 13:03:30 GMT"
},
{
"version": "v4",
"created": "Thu, 8 Dec 2005 13:40:54 GMT"
}
] | 2023-06-27T00:00:00 |
[
[
"Biernacka",
"Malgorzata",
""
],
[
"Biernacki",
"Dariusz",
""
],
[
"Danvy",
"Olivier",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0508049
|
Pascal Vontobel
|
Ralf Koetter, Wen-Ching W. Li, Pascal O. Vontobel, Judy L. Walker
|
Characterizations of Pseudo-Codewords of LDPC Codes
|
Submitted, August 2005
| null | null | null |
cs.IT cs.DM math.IT
| null |
An important property of high-performance, low complexity codes is the
existence of highly efficient algorithms for their decoding. Many of the most
efficient, recent graph-based algorithms, e.g. message passing algorithms and
decoding based on linear programming, crucially depend on the efficient
representation of a code in a graphical model. In order to understand the
performance of these algorithms, we argue for the characterization of codes in
terms of a so called fundamental cone in Euclidean space which is a function of
a given parity check matrix of a code, rather than of the code itself. We give
a number of properties of this fundamental cone derived from its connection to
unramified covers of the graphical models on which the decoding algorithms
operate. For the class of cycle codes, these developments naturally lead to a
characterization of the fundamental polytope as the Newton polytope of the
Hashimoto edge zeta function of the underlying graph.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2005 00:10:03 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Aug 2005 12:41:05 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Aug 2005 22:53:55 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Koetter",
"Ralf",
""
],
[
"Li",
"Wen-Ching W.",
""
],
[
"Vontobel",
"Pascal O.",
""
],
[
"Walker",
"Judy L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508050
|
Chee Tan
|
T. M. Cover and M. Chiang
|
Duality between channel capacity and rate distortion with two-sided
state information
| null | null | null | null |
cs.IT math.IT
| null |
We show that the duality between channel capacity and data compression is
retained when state information is available to the sender, to the receiver, to
both, or to neither. We present a unified theory for eight special cases of
channel capacity and rate distortion with state information, which also extends
existing results to arbitrary pairs of independent and identically distributed
(i.i.d.) correlated state information available at the sender and at the
receiver, respectively. In particular, the resulting general formula for
channel capacity assumes the same form as the generalized Wyner Ziv rate
distortion function.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2005 03:01:18 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Cover",
"T. M.",
""
],
[
"Chiang",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508051
|
Jan Mietzner
|
Jan Mietzner, Sabah Badri-Hoeher, Ingmar Land, and Peter A. Hoeher
|
Trellis-Based Equalization for Sparse ISI Channels Revisited
|
To be presented at the 2005 IEEE Int. Symp. Inform. Theory (ISIT
2005), September 4-9, 2005, Adelaide, Australia
| null |
10.1109/ISIT.2005.1523328
| null |
cs.IT math.IT
| null |
Sparse intersymbol-interference (ISI) channels are encountered in a variety
of high-data-rate communication systems. Such channels have a large channel
memory length, but only a small number of significant channel coefficients. In
this paper, trellis-based equalization of sparse ISI channels is revisited. Due
to the large channel memory length, the complexity of maximum-likelihood
detection, e.g., by means of the Viterbi algorithm (VA), is normally
prohibitive. In the first part of the paper, a unified framework based on
factor graphs is presented for complexity reduction without loss of optimality.
In this new context, two known reduced-complexity algorithms for sparse ISI
channels are recapitulated: The multi-trellis VA (M-VA) and the
parallel-trellis VA (P-VA). It is shown that the M-VA, although claimed, does
not lead to a reduced computational complexity. The P-VA, on the other hand,
leads to a significant complexity reduction, but can only be applied for a
certain class of sparse channels. In the second part of the paper, a unified
approach is investigated to tackle general sparse channels: It is shown that
the use of a linear filter at the receiver renders the application of standard
reduced-state trellis-based equalizer algorithms feasible, without significant
loss of optimality. Numerical results verify the efficiency of the proposed
receiver structure.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2005 09:37:52 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Mietzner",
"Jan",
""
],
[
"Badri-Hoeher",
"Sabah",
""
],
[
"Land",
"Ingmar",
""
],
[
"Hoeher",
"Peter A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508052
|
Olivier Powell
|
Pierre Leone, Olivier Powell and Jose Rolim
|
Energy Optimal Data Propagation in Wireless Sensor Networks
|
19 pages
|
Journal of Parallel and Distributed Computing Volume 67, Issue 3 ,
March 2007, Pages 302-317
|
10.1016/j.jpdc.2006.10.007
| null |
cs.DC
| null |
We propose an algorithm which produces a randomized strategy reaching optimal
data propagation in wireless sensor networks (WSN).In [6] and [8], an energy
balanced solution is sought using an approximation algorithm. Our algorithm
improves by (a) when an energy-balanced solution does not exist, it still finds
an optimal solution (whereas previous algorithms did not consider this case and
provide no useful solution) (b) instead of being an approximation algorithm, it
finds the exact solution in one pass. We also provide a rigorous proof of the
optimality of our solution.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2005 15:54:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Leone",
"Pierre",
""
],
[
"Powell",
"Olivier",
""
],
[
"Rolim",
"Jose",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0508053
|
Peter Turney
|
Peter D. Turney (National Research Council of Canada)
|
Measuring Semantic Similarity by Latent Relational Analysis
|
6 pages, related work available at http://purl.org/peter.turney/
|
Proceedings of the Nineteenth International Joint Conference on
Artificial Intelligence (IJCAI-05), (2005), Edinburgh, Scotland, 1136-1141
| null |
NRC-48255
|
cs.LG cs.CL cs.IR
| null |
This paper introduces Latent Relational Analysis (LRA), a method for
measuring semantic similarity. LRA measures similarity in the semantic
relations between two pairs of words. When two pairs have a high degree of
relational similarity, they are analogous. For example, the pair cat:meow is
analogous to the pair dog:bark. There is evidence from cognitive science that
relational similarity is fundamental to many cognitive and linguistic tasks
(e.g., analogical reasoning). In the Vector Space Model (VSM) approach to
measuring relational similarity, the similarity between two pairs is calculated
by the cosine of the angle between the vectors that represent the two pairs.
The elements in the vectors are based on the frequencies of manually
constructed patterns in a large corpus. LRA extends the VSM approach in three
ways: (1) patterns are derived automatically from the corpus, (2) Singular
Value Decomposition is used to smooth the frequency data, and (3) synonyms are
used to reformulate word pairs. This paper describes the LRA algorithm and
experimentally compares LRA to VSM on two tasks, answering college-level
multiple-choice word analogy questions and classifying semantic relations in
noun-modifier expressions. LRA achieves state-of-the-art results, reaching
human-level performance on the analogy questions and significantly exceeding
VSM performance on both tasks.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2005 19:35:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0508054
|
Yaron Rachlin
|
Yaron Rachlin, Rohit Negi, and Pradeep Khosla
|
Sensing Capacity for Markov Random Fields
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523308
| null |
cs.IT math.IT
| null |
This paper computes the sensing capacity of a sensor network, with sensors of
limited range, sensing a two-dimensional Markov random field, by modeling the
sensing operation as an encoder. Sensor observations are dependent across
sensors, and the sensor network output across different states of the
environment is neither identically nor independently distributed. Using a
random coding argument, based on the theory of types, we prove a lower bound on
the sensing capacity of the network, which characterizes the ability of the
sensor network to distinguish among environments with Markov structure, to
within a desired accuracy.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2005 20:13:49 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Rachlin",
"Yaron",
""
],
[
"Negi",
"Rohit",
""
],
[
"Khosla",
"Pradeep",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508055
|
Navin Kashyap
|
Olgica Milenkovic, Navin Kashyap
|
DNA Codes that Avoid Secondary Structures
|
to appear in Proc. 2005 IEEE International Symposium on Information
Theory, Adelaide, Australia, Sept. 4-9, 2005; 5 pages
| null |
10.1109/ISIT.2005.1523340
| null |
cs.DM cs.IT math.IT
| null |
In this paper, we consider the problem of designing DNA sequences (codewords)
for DNA storage systems and DNA computing that are unlikely to fold back onto
themselves to form undesirable secondary structures. The paper addresses both
the issue of enumerating the sequences with such properties and the problem of
practical code construction.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2005 21:41:38 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Milenkovic",
"Olgica",
""
],
[
"Kashyap",
"Navin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508056
|
Michael Stay
|
Michael Stay
|
Very Simple Chaitin Machines for Concrete AIT
| null |
Fundamenta Informaticae 68 (3) 2005. pp. 231--247
| null |
CDMTCS Report 265
|
cs.IT math.IT
| null |
In 1975, Chaitin introduced his celebrated Omega number, the halting
probability of a universal Chaitin machine, a universal Turing machine with a
prefix-free domain. The Omega number's bits are {\em algorithmically
random}--there is no reason the bits should be the way they are, if we define
``reason'' to be a computable explanation smaller than the data itself. Since
that time, only {\em two} explicit universal Chaitin machines have been
proposed, both by Chaitin himself.
Concrete algorithmic information theory involves the study of particular
universal Turing machines, about which one can state theorems with specific
numerical bounds, rather than include terms like O(1). We present several new
tiny Chaitin machines (those with a prefix-free domain) suitable for the study
of concrete algorithmic information theory. One of the machines, which we call
Keraia, is a binary encoding of lambda calculus based on a curried lambda
operator. Source code is included in the appendices.
We also give an algorithm for restricting the domain of blank-endmarker
machines to a prefix-free domain over an alphabet that does not include the
endmarker; this allows one to take many universal Turing machines and construct
universal Chaitin machines from them.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2005 06:57:48 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Stay",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508057
|
Miguel Rodrigues PhD
|
M. R. D. Rodrigues, I. Chatzigeorgiou, I. J. Wassell and R. Carrasco
|
On the Performance of Turbo Codes in Quasi-Static Fading Channels
|
To appear in the Proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523410
| null |
cs.IT math.IT
| null |
In this paper, we investigate in detail the performance of turbo codes in
quasi-static fading channels both with and without antenna diversity. First, we
develop a simple and accurate analytic technique to evaluate the performance of
turbo codes in quasi-static fading channels. The proposed analytic technique
relates the frame error rate of a turbo code to the iterative decoder
convergence threshold, rather than to the turbo code distance spectrum.
Subsequently, we compare the performance of various turbo codes in quasi-static
fading channels. We show that, in contrast to the situation in the AWGN
channel, turbo codes with different interleaver sizes or turbo codes based on
RSC codes with different constraint lengths and generator polynomials exhibit
identical performance. Moreover, we also compare the performance of turbo codes
and convolutional codes in quasi-static fading channels under the condition of
identical decoding complexity. In particular, we show that turbo codes do not
outperform convolutional codes in quasi-static fading channels with no antenna
diversity; and that turbo codes only outperform convolutional codes in
quasi-static fading channels with antenna diversity.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2005 10:14:52 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Rodrigues",
"M. R. D.",
""
],
[
"Chatzigeorgiou",
"I.",
""
],
[
"Wassell",
"I. J.",
""
],
[
"Carrasco",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508058
|
Herve Jegou
|
Herve Jegou and Christine Guillemot
|
Entropy coding with Variable Length Re-writing Systems
|
6 pages, To appear in the proceedings of the 2005 IEEE International
Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
This paper describes a new set of block source codes well suited for data
compression. These codes are defined by sets of productions rules of the form
a.l->b, where a in A represents a value from the source alphabet A and l, b are
-small- sequences of bits. These codes naturally encompass other Variable
Length Codes (VLCs) such as Huffman codes. It is shown that these codes may
have a similar or even a shorter mean description length than Huffman codes for
the same encoding and decoding complexity. A first code design method allowing
to preserve the lexicographic order in the bit domain is described. The
corresponding codes have the same mean description length (mdl) as Huffman
codes from which they are constructed. Therefore, they outperform from a
compression point of view the Hu-Tucker codes designed to offer the
lexicographic property in the bit domain. A second construction method allows
to obtain codes such that the marginal bit probability converges to 0.5 as the
sequence length increases and this is achieved even if the probability
distribution function is not known by the encoder.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2005 15:41:19 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jegou",
"Herve",
""
],
[
"Guillemot",
"Christine",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.