id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0508059
|
Arindam Mitra
|
Arindam Mitra
|
Honesty can be the best policy within quantum mechanics
|
One of the referees (Phys. Rev. Lett.) observed that manuscript "
deserves to be widely read and analyzed". Acknowledgement is due
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Honesty has never been scientifically proved to be the best policy in any
case. It is pointed out that only honest person can prevent his dishonest
partner to bias the outcome of quantum coin tossing.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2005 15:59:46 GMT"
},
{
"version": "v10",
"created": "Wed, 19 Jul 2006 15:34:40 GMT"
},
{
"version": "v11",
"created": "Tue, 17 Oct 2006 15:34:35 GMT"
},
{
"version": "v12",
"created": "Thu, 16 Nov 2006 15:33:52 GMT"
},
{
"version": "v13",
"created": "Wed, 22 Nov 2006 16:01:02 GMT"
},
{
"version": "v14",
"created": "Fri, 24 Nov 2006 15:31:57 GMT"
},
{
"version": "v15",
"created": "Wed, 31 Jan 2007 12:52:40 GMT"
},
{
"version": "v16",
"created": "Tue, 1 May 2007 14:44:21 GMT"
},
{
"version": "v17",
"created": "Tue, 20 Nov 2007 15:26:03 GMT"
},
{
"version": "v18",
"created": "Tue, 19 Feb 2008 13:09:47 GMT"
},
{
"version": "v19",
"created": "Sat, 2 Aug 2008 14:21:31 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Aug 2005 15:21:39 GMT"
},
{
"version": "v20",
"created": "Sat, 27 Dec 2008 15:50:18 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Sep 2005 15:47:40 GMT"
},
{
"version": "v4",
"created": "Thu, 22 Sep 2005 15:02:24 GMT"
},
{
"version": "v5",
"created": "Thu, 9 Feb 2006 22:22:50 GMT"
},
{
"version": "v6",
"created": "Thu, 16 Mar 2006 15:05:21 GMT"
},
{
"version": "v7",
"created": "Thu, 30 Mar 2006 16:02:04 GMT"
},
{
"version": "v8",
"created": "Fri, 5 May 2006 15:39:38 GMT"
},
{
"version": "v9",
"created": "Fri, 14 Jul 2006 15:52:17 GMT"
}
] | 2008-12-27T00:00:00 |
[
[
"Mitra",
"Arindam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0508060
|
Styrmir Sigurjonsson
|
George Gemelos, Styrmir Sigurjonsson, Tsachy Weissman
|
Algorithms for Discrete Denoising Under Channel Uncertainty
|
To appear in IEEE Trans. on Signal Processing
| null |
10.1109/TSP.2006.874295
| null |
cs.IT math.IT
| null |
The goal of a denoising algorithm is to reconstruct a signal from its
noise-corrupted observations. Perfect reconstruction is seldom possible and
performance is measured under a given fidelity criterion. In a recent work, the
authors addressed the problem of denoising unknown discrete signals corrupted
by a discrete memoryless channel when the channel, rather than being completely
known, is only known to lie in some uncertainty set of possible channels. A
sequence of denoisers was derived for this case and shown to be asymptotically
optimal with respect to a worst-case criterion argued most relevant to this
setting. In the present work we address the implementation and complexity of
this denoiser for channels parametrized by a scalar, establishing its
practicality. We show that for symmetric channels, the problem can be mapped
into a convex optimization problem, which can be solved efficiently. We also
present empirical results suggesting the potential of these schemes to do well
in practice. A key component of our schemes is an estimator of the subset of
channels in the uncertainty set that are feasible in the sense of being able to
give rise to the noise-corrupted signal statistics for some channel input
distribution. We establish the efficiency of this estimator, both
algorithmically and experimentally. We also present a modification of the
recently developed discrete universal denoiser (DUDE) that assumes a channel
based on the said estimator, and show that, in practice, the resulting scheme
performs well. For concreteness, we focus on the binary alphabet case and
binary symmetric channels, but also discuss the extensions of the algorithms to
general finite alphabets and to general channels parameterized by a scalar.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2005 22:17:56 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Gemelos",
"George",
""
],
[
"Sigurjonsson",
"Styrmir",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508061
|
L.T. Handoko
|
L.T. Handoko
|
SciBlog : A Tool for Scientific Collaboration
|
4 figures, invited talk at the Workshop on Knowledge Management (6-9
December 2004)
|
Proceeding of the WKM 2004
| null |
FISIKALIPI-04013
|
cs.CY
| null |
I describe a newly developed online scientific web-log (SciBlog). The online
facility consists of several moduls needed in a common and conventional
research activity. I show that this enables scientists around the world to
perform an online collaboration over the net.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2005 22:29:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Handoko",
"L. T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0508062
|
Vitaly Skachek
|
Alexei Ashikhmin, Vitaly Skachek
|
Decoding of Expander Codes at Rates Close to Capacity
|
Appears in IEEE Transactions on Information Theory, December 2006.
The short version of this paper appears in the proceedings of the 2005 IEEE
International Symposium on Information Theory, Adelaide, Australia, September
4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
The decoding error probability of codes is studied as a function of their
block length. It is shown that the existence of codes with a polynomially small
decoding error probability implies the existence of codes with an exponentially
small decoding error probability. Specifically, it is assumed that there exists
a family of codes of length N and rate R=(1-\epsilon)C (C is a capacity of a
binary symmetric channel), whose decoding probability decreases polynomially in
1/N. It is shown that if the decoding probability decreases sufficiently fast,
but still only polynomially fast in 1/N, then there exists another such family
of codes whose decoding error probability decreases exponentially fast in N.
Moreover, if the decoding time complexity of the assumed family of codes is
polynomial in N and 1/\epsilon, then the decoding time complexity of the
presented family is linear in N and polynomial in 1/\epsilon. These codes are
compared to the recently presented codes of Barg and Zemor, ``Error Exponents
of Expander Codes,'' IEEE Trans. Inform. Theory, 2002, and ``Concatenated
Codes: Serial and Parallel,'' IEEE Trans. Inform. Theory, 2005. It is shown
that the latter families can not be tuned to have exponentially decaying (in N)
error probability, and at the same time to have decoding time complexity linear
in N and polynomial in 1/\epsilon.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2005 09:36:50 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jan 2007 20:17:56 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ashikhmin",
"Alexei",
""
],
[
"Skachek",
"Vitaly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508063
|
Michel Dagenais
|
Michel R. Dagenais (Dept. of Computer Engineering, Ecole
Polytechnique, Montreal, Canada)
|
Disks, Partitions, Volumes and RAID Performance with the Linux Operating
System
| null | null | null | null |
cs.PF cs.OS
| null |
Block devices in computer operating systems typically correspond to disks or
disk partitions, and are used to store files in a filesystem. Disks are not the
only real or virtual device which adhere to the block accessible stream of
bytes block device model. Files, remote devices, or even RAM may be used as a
virtual disks. This article examines several common combinations of block
device layers used as virtual disks in the Linux operating system: disk
partitions, loopback files, software RAID, Logical Volume Manager, and Network
Block Devices. It measures their relative performance using different
filesystems: Ext2, Ext3, ReiserFS, JFS, XFS,NFS.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2005 16:13:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dagenais",
"Michel R.",
"",
"Dept. of Computer Engineering, Ecole\n Polytechnique, Montreal, Canada"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0508064
|
Massimiliano Siti Mr.
|
Massimiliano Siti, Michael P. Fitz
|
Layered Orthogonal Lattice Detector for Two Transmit Antenna
Communications
|
To appear in Proc. of "Forty-Third Annual Allerton Conference on
Communication, Control, and Computing" (Sept. 28th-30th 2005). 13 pages 2
figures (4 plots)
| null | null | null |
cs.IT math.IT
| null |
A novel detector for multiple-input multiple-output (MIMO) communications is
presented. The algorithm belongs to the class of the lattice detectors, i.e. it
finds a reduced complexity solution to the problem of finding the closest
vector to the received observations. The algorithm achieves optimal
maximum-likelihood (ML) performance in case of two transmit antennas, at the
same time keeping a complexity much lower than the exhaustive search-based ML
detection technique. Also, differently from the state-of-art lattice detector
(namely sphere decoder), the proposed algorithm is suitable for a highly
parallel hardware architecture and for a reliable bit soft-output information
generation, thus making it a promising option for real-time high-data rate
transmission.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2005 19:35:11 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Aug 2005 02:20:59 GMT"
},
{
"version": "v3",
"created": "Sat, 22 Oct 2005 01:58:29 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Siti",
"Massimiliano",
""
],
[
"Fitz",
"Michael P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508065
|
Herbert van de Sompel
|
Jeroen Bekaert, Herbert Van de Sompel
|
Representing Digital Assets using MPEG-21 Digital Item Declaration
|
27 pages, accepted submission to the special edition on complex
objects of the International Journal on Digital Libraries
| null | null | null |
cs.DL cs.AR
| null |
Various XML-based approaches aimed at representing compound digital assets
have emerged over the last several years. Approaches that are of specific
relevance to the digital library community include the Metadata Encoding and
Transmission Standard (METS), the IMS Content Packaging XML Binding, and the
XML Formatted Data Units (XFDU) developed by CCSDS Panel 2. The MPEG-21 Digital
Item Declaration (MPEG-21 DID) is another standard specifying the
representation of digital assets in XML that, so far, has received little
attention in the digital library community. This article gives a brief insight
into the MPEG-21 standardization effort, highlights the major characteristics
of the MPEG-21 DID Abstract Model, and describes the MPEG-21 Digital Item
Declaration Language (MPEG-21 DIDL), an XML syntax for the representation of
digital assets based on the MPEG-21 DID Abstract Model. Also, it briefly
demonstrates the potential relevance of MPEG-21 DID to the digital library
community by describing its use in the aDORe repository environment at the
Research Library of the Los Alamos National Laboratory (LANL) for the
representation of digital assets.
|
[
{
"version": "v1",
"created": "Sat, 13 Aug 2005 03:09:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bekaert",
"Jeroen",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0508066
|
Jonathan Bowen
|
Silvia Filippini-Fantoni and Jonathan P. Bowen
|
Can Small Museums Develop Compelling, Educational and Accessible Web
Resources? The Case of Accademia Carrara
|
14 pages, 6 figures
|
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005
London Conference Proceedings, University College London, UK, 25-29 July
2005, pages 18.1-18.14. ISBN: 0-9543146-6-2
| null | null |
cs.MM cs.CY cs.DL cs.IR
| null |
Due to the lack of budget, competence, personnel and time, small museums are
often unable to develop compelling, educational and accessible web resources
for their permanent collections or temporary exhibitions. In an attempt to
prove that investing in these types of resources can be very fruitful even for
small institutions, we will illustrate the case of Accademia Carrara, a museum
in Bergamo, northern Italy, which, for a current temporary exhibition on
Cezanne and Renoir's masterpieces from the Paul Guillaume collection, developed
a series of multimedia applications, including an accessible website, rich in
content and educational material [www.cezannerenoir.it].
|
[
{
"version": "v1",
"created": "Sat, 13 Aug 2005 14:46:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Filippini-Fantoni",
"Silvia",
""
],
[
"Bowen",
"Jonathan P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0508067
|
Jonathan Bowen
|
Teresa Numerico and Jonathan P. Bowen
|
Copyright and Promotion: Oxymoron or Opportunity?
|
10 pages, 0 figures
|
In James Hemsley, Vito Cappellini and Gerd Stanke (eds.), EVA 2005
London Conference Proceedings, University College London, UK, 25-29 July
2005, pages 25.1-25.10. ISBN: 0-9543146-6-2
| null | null |
cs.CY cs.DL
| null |
Copyright in the cultural sphere can act as a barrier to the dissemination of
high-quality information. On the other hand it protects works of art that might
not be made available otherwise. This dichotomy makes the area of copyright
difficult, especially when it applies to the digital arena of the web where
copying is so easy and natural. Here we present a snapshot of the issues for
online copyright, with particular emphasis on the relevance to cultural
institutions. We concentrate on Europe and the US; as an example we include a
special section dedicated to the situation in Italy.
|
[
{
"version": "v1",
"created": "Sat, 13 Aug 2005 14:58:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Numerico",
"Teresa",
""
],
[
"Bowen",
"Jonathan P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0508068
|
Martin Wainwright
|
Martin J. Wainwright and Elitza Maneva
|
Lossy source encoding via message-passing and decimation over
generalized codewords of LDGM codes
|
To appear in the Proceedings of the International Symposium on
Information Theory, Adelaide, Australia; September, 2005
| null | null | null |
cs.IT cs.AI math.IT
| null |
We describe message-passing and decimation approaches for lossy source coding
using low-density generator matrix (LDGM) codes. In particular, this paper
addresses the problem of encoding a Bernoulli(0.5) source: for randomly
generated LDGM codes with suitably irregular degree distributions, our methods
yield performance very close to the rate distortion limit over a range of
rates. Our approach is inspired by the survey propagation (SP) algorithm,
originally developed by Mezard et al. for solving random satisfiability
problems. Previous work by Maneva et al. shows how SP can be understood as
belief propagation (BP) for an alternative representation of satisfiability
problems. In analogy to this connection, our approach is to define a family of
Markov random fields over generalized codewords, from which local
message-passing rules can be derived in the standard way. The overall source
encoding method is based on message-passing, setting a subset of bits to their
preferred values (decimation), and reducing the code.
|
[
{
"version": "v1",
"created": "Mon, 15 Aug 2005 02:00:55 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wainwright",
"Martin J.",
""
],
[
"Maneva",
"Elitza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508069
|
Martin Ziegler
|
Martin Ziegler
|
Real Hypercomputation and Continuity
|
previous version (extended abstract) has appeared in pp.562-571 of
"Proc. 1st Conference on Computability in Europe" (CiE'05), Springer LNCS
vol.3526
|
pp.177-206 in Theory of Computing Systems vol.41 (2007)
|
10.1007/s00224-006-1343-6
| null |
cs.LO cs.CC
| null |
By the sometimes so-called 'Main Theorem' of Recursive Analysis, every
computable real function is necessarily continuous. We wonder whether and which
kinds of HYPERcomputation allow for the effective evaluation of also
discontinuous f:R->R. More precisely the present work considers the following
three super-Turing notions of real function computability:
* relativized computation; specifically given oracle access to the Halting
Problem 0' or its jump 0'';
* encoding real input x and/or output y=f(x) in weaker ways also related to
the Arithmetic Hierarchy;
* non-deterministic computation.
It turns out that any f:R->R computable in the first or second sense is still
necessarily continuous whereas the third type of hypercomputation does provide
the required power to evaluate for instance the discontinuous sign function.
|
[
{
"version": "v1",
"created": "Mon, 15 Aug 2005 14:18:36 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Feb 2006 11:52:09 GMT"
}
] | 2010-05-10T00:00:00 |
[
[
"Ziegler",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0508070
|
Martin Wainwright
|
Martin J. Wainwright and Tommi S. Jaakkola and Alan S. Willsky
|
MAP estimation via agreement on (hyper)trees: Message-passing and linear
programming
|
Presented in part at the Allerton Conference on Communication,
Computing and Control in October 2002. Full journal version appear in the
IEEE Transactions on Information Theory, November 2005
| null | null | null |
cs.IT cs.AI math.IT
| null |
We develop and analyze methods for computing provably optimal {\em maximum a
posteriori} (MAP) configurations for a subclass of Markov random fields defined
on graphs with cycles. By decomposing the original distribution into a convex
combination of tree-structured distributions, we obtain an upper bound on the
optimal value of the original problem (i.e., the log probability of the MAP
assignment) in terms of the combined optimal values of the tree problems. We
prove that this upper bound is tight if and only if all the tree distributions
share an optimal configuration in common. An important implication is that any
such shared configuration must also be a MAP configuration for the original
distribution. Next we develop two approaches to attempting to obtain tight
upper bounds: (a) a {\em tree-relaxed linear program} (LP), which is derived
from the Lagrangian dual of the upper bounds; and (b) a {\em tree-reweighted
max-product message-passing algorithm} that is related to but distinct from the
max-product algorithm. In this way, we establish a connection between a certain
LP relaxation of the mode-finding problem, and a reweighted form of the
max-product (min-sum) message-passing algorithm.
|
[
{
"version": "v1",
"created": "Mon, 15 Aug 2005 14:32:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wainwright",
"Martin J.",
""
],
[
"Jaakkola",
"Tommi S.",
""
],
[
"Willsky",
"Alan S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508071
|
Oded Schramm
|
Ryan O'Donnell, Michael Saks, Oded Schramm, Rocco A. Servedio
|
Every decision tree has an influential variable
|
This paper is posted by permission from the IEEE Computer Society. To
appear in FOCS 2005
| null | null | null |
cs.CC cs.DM math.PR
| null |
We prove that for any decision tree calculating a boolean function
$f:\{-1,1\}^n\to\{-1,1\}$, \[ \Var[f] \le \sum_{i=1}^n \delta_i \Inf_i(f), \]
where $\delta_i$ is the probability that the $i$th input variable is read and
$\Inf_i(f)$ is the influence of the $i$th variable on $f$. The variance,
influence and probability are taken with respect to an arbitrary product
measure on $\{-1,1\}^n$. It follows that the minimum depth of a decision tree
calculating a given balanced function is at least the reciprocal of the largest
influence of any input variable. Likewise, any balanced boolean function with a
decision tree of depth $d$ has a variable with influence at least
$\frac{1}{d}$. The only previous nontrivial lower bound known was $\Omega(d
2^{-d})$. Our inequality has many generalizations, allowing us to prove
influence lower bounds for randomized decision trees, decision trees on
arbitrary product probability spaces, and decision trees with non-boolean
outputs. As an application of our results we give a very easy proof that the
randomized query complexity of nontrivial monotone graph properties is at least
$\Omega(v^{4/3}/p^{1/3})$, where $v$ is the number of vertices and $p \leq
\half$ is the critical threshold probability. This supersedes the milestone
$\Omega(v^{4/3})$ bound of Hajnal and is sometimes superior to the best known
lower bounds of Chakrabarti-Khot and Friedgut-Kahn-Wigderson.
|
[
{
"version": "v1",
"created": "Tue, 16 Aug 2005 01:00:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"O'Donnell",
"Ryan",
""
],
[
"Saks",
"Michael",
""
],
[
"Schramm",
"Oded",
""
],
[
"Servedio",
"Rocco A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0508072
|
Igal Sason
|
Igal Sason and Gil Wiechman
|
On Achievable Rates and Complexity of LDPC Codes for Parallel Channels
with Application to Puncturing
|
35 pages, 1 figure. Submitted to IEEE Trans. on Information Theory
| null | null | null |
cs.IT math.IT
| null |
This paper considers the achievable rates and decoding complexity of
low-density parity-check (LDPC) codes over statistically independent parallel
channels. The paper starts with the derivation of bounds on the conditional
entropy of the transmitted codeword given the received sequence at the output
of the parallel channels; the component channels are considered to be
memoryless, binary-input, and output-symmetric (MBIOS). These results serve for
the derivation of an upper bound on the achievable rates of ensembles of LDPC
codes under optimal maximum-likelihood (ML) decoding when their transmission
takes place over parallel MBIOS channels. The paper relies on the latter bound
for obtaining upper bounds on the achievable rates of ensembles of randomly and
intentionally punctured LDPC codes over MBIOS channels. The paper also provides
a lower bound on the decoding complexity (per iteration) of ensembles of LDPC
codes under message-passing iterative decoding over parallel MBIOS channels;
the bound is given in terms of the gap between the rate of these codes for
which reliable communication is achievable and the channel capacity. The paper
presents a diagram which shows interconnections between the theorems introduced
in this paper and some other previously reported results. The setting which
serves for the derivation of the bounds on the achievable rates and decoding
complexity is general, and the bounds can be applied to other scenarios which
can be treated as different forms of communication over parallel channels.
|
[
{
"version": "v1",
"created": "Tue, 16 Aug 2005 05:51:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sason",
"Igal",
""
],
[
"Wiechman",
"Gil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508073
|
Marcus Hutter
|
Jan Poland and Marcus Hutter
|
Universal Learning of Repeated Matrix Games
|
16 LaTeX pages, 8 eps figures
|
Proc. 15th Annual Machine Learning Conf. of Belgium and The
Netherlands (Benelearn 2006) pages 7-14
| null |
IDSIA-18-05
|
cs.LG cs.AI
| null |
We study and compare the learning dynamics of two universal learning
algorithms, one based on Bayesian learning and the other on prediction with
expert advice. Both approaches have strong asymptotic performance guarantees.
When confronted with the task of finding good long-term strategies in repeated
2x2 matrix games, they behave quite differently.
|
[
{
"version": "v1",
"created": "Tue, 16 Aug 2005 16:27:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0508074
|
James Mammen
|
James Mammen and Devavrat Shah
|
Throughput and Delay in Random Wireless Networks with Restricted
Mobility
|
14 pages, 4 figures, submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT cs.NI math.IT
| null |
Grossglauser and Tse (2001) introduced a mobile random network model where
each node moves independently on a unit disk according to a stationary uniform
distribution and showed that a throughput of $\Theta(1)$ is achievable. El
Gamal, Mammen, Prabhakar and Shah (2004) showed that the delay associated with
this throughput scales as $\Theta(n\log n)$, when each node moves according to
an independent random walk. In a later work, Diggavi, Grossglauser and Tse
(2002) considered a random network on a sphere with a restricted mobility
model, where each node moves along a randomly chosen great circle on the unit
sphere. They showed that even with this one-dimensional restriction on
mobility, constant throughput scaling is achievable. Thus, this particular
mobility restriction does not affect the throughput scaling. This raises the
question whether this mobility restriction affects the delay scaling.
This paper studies the delay scaling at $\Theta(1)$ throughput for a random
network with restricted mobility. First, a variant of the scheme presented by
Diggavi, Grossglauser and Tse (2002) is presented and it is shown to achieve
$\Theta(1)$ throughput using different (and perhaps simpler) techniques. The
exact order of delay scaling for this scheme is determined, somewhat
surprisingly, to be of $\Theta(n\log n)$, which is the same as that without the
mobility restriction. Thus, this particular mobility restriction \emph{does
not} affect either the maximal throughput scaling or the corresponding delay
scaling of the network. This happens because under this 1-D restriction, each
node is in the proximity of every other node in essentially the same manner as
without this restriction.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2005 00:07:45 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Mammen",
"James",
""
],
[
"Shah",
"Devavrat",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508075
|
Russell K. Standish
|
Russell K. Standish
|
Complexity of Networks
|
Accepted for Australian Conference on Artificial Life (ACAL05). To
appear in Advances in Natural Computation (World Scientific)
|
in Recent Advances in Artificial Life, Abbass et al. (eds) (World
Scientific: Singapore) p253 (2005).
| null | null |
cs.IT math.IT
| null |
Network or graph structures are ubiquitous in the study of complex systems.
Often, we are interested in complexity trends of these system as it evolves
under some dynamic. An example might be looking at the complexity of a food web
as species enter an ecosystem via migration or speciation, and leave via
extinction.
In this paper, a complexity measure of networks is proposed based on the {\em
complexity is information content} paradigm. To apply this paradigm to any
object, one must fix two things: a representation language, in which strings of
symbols from some alphabet describe, or stand for the objects being considered;
and a means of determining when two such descriptions refer to the same object.
With these two things set, the information content of an object can be computed
in principle from the number of equivalent descriptions describing a particular
object.
I propose a simple representation language for undirected graphs that can be
encoded as a bitstring, and equivalence is a topological equivalence. I also
present an algorithm for computing the complexity of an arbitrary undirected
network.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2005 00:51:41 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Standish",
"Russell K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508076
|
Lawrence Ong
|
Lawrence Ong and Mehul Motani
|
Myopic Coding in Multiple Relay Channels
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
|
Proceedings of the 2005 IEEE International Symposium on
Information Theory (ISIT 2005), Adelaide Convention Centre, Adelaide,
Australia, pp. 1091-1095, Sep. 4-9 2005.
|
10.1109/ISIT.2005.1523508
| null |
cs.IT math.IT
| null |
In this paper, we investigate achievable rates for data transmission from
sources to sinks through multiple relay networks. We consider myopic coding, a
constrained communication strategy in which each node has only a local view of
the network, meaning that nodes can only transmit to and decode from
neighboring nodes. We compare this with omniscient coding, in which every node
has a global view of the network and all nodes can cooperate. Using Gaussian
channels as examples, we find that when the nodes transmit at low power, the
rates achievable with two-hop myopic coding are as large as that under
omniscient coding in a five-node multiple relay channel and close to that under
omniscient coding in a six-node multiple relay channel. These results suggest
that we may do local coding and cooperation without compromising much on the
transmission rate. Practically, myopic coding schemes are more robust to
topology changes because encoding and decoding at a node are not affected when
there are changes at remote nodes. Furthermore, myopic coding mitigates the
high computational complexity and large buffer/memory requirements of
omniscient coding.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2005 03:55:26 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Ong",
"Lawrence",
""
],
[
"Motani",
"Mehul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508077
|
Fr\'ed\'erique Oggier
|
Frederique Oggier, Emmanuel Lequeu
|
Families of unitary matrices achieving full diversity
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523526
| null |
cs.IT math.IT
| null |
This paper presents an algebraic construction of families of unitary matrices
that achieve full diversity. They are obtained as subsets of cyclic division
algebras.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2005 09:40:35 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Oggier",
"Frederique",
""
],
[
"Lequeu",
"Emmanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508078
|
Serebrenik Alexander
|
Alexander Serebrenik, Susana Munoz-Hernandez
|
Proceedings of the 15th Workshop on Logic-based methods in Programming
Environments WLPE'05 -- October 5, 2005 -- Sitges (Barcelona), Spain
|
Seven accepted papers
| null | null | null |
cs.PL cs.LO cs.SE
| null |
This volume contains papers presented at WLPE 2005, 15th International
Workshop on Logic-based methods in Programming Environments.
The aim of the workshop is to provide an informal meeting for the researchers
working on logic-based tools for development and analysis of programs. This
year we emphasized two aspects: on one hand the presentation, pragmatics and
experiences of tools for logic programming environments; on the other one,
logic-based environmental tools for programming in general.
The workshop took place in Sitges (Barcelona), Spain as a satellite workshop
of the 21th International Conference on Logic Programming (ICLP 2005). This
workshop continues the series of successful international workshops on logic
programming environments held in Ohio, USA (1989), Eilat, Israel (1990), Paris,
France (1991), Washington, USA (1992), Vancouver, Canada (1993), Santa
Margherita Ligure, Italy (1994), Portland, USA (1995), Leuven, Belgium and Port
Jefferson, USA (1997), Las Cruces, USA (1999), Paphos, Cyprus (2001),
Copenhagen, Denmark (2002), Mumbai, India (2003) and Saint Malo, France (2004).
We have received eight submissions (2 from France, 2 Spain-US cooperations,
one Spain-Argentina cooperation, one from Japan, one from the United Kingdom
and one Sweden-France cooperation). Program committee has decided to accept
seven papers. This volume contains revised versions of the accepted papers.
We are grateful to the authors of the papers, the reviewers and the members
of the Program Committee for the help and fruitful discussions.
|
[
{
"version": "v1",
"created": "Wed, 17 Aug 2005 13:35:20 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Aug 2005 07:57:41 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Aug 2005 16:15:24 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Aug 2005 06:42:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Serebrenik",
"Alexander",
""
],
[
"Munoz-Hernandez",
"Susana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0508079
|
Nithin Nagaraj
|
Nithin Nagaraj and Vivek Vaidya and Prabhakar G Vaidya
|
Re-visiting the One-Time Pad
|
13 pages, 3 figures, submitted for publication to IndoCrypt 2005
conference
| null | null | null |
cs.CR
| null |
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic
system,also popularly known as the One-Time Pad (OTP). Since then, it has been
believed that the perfectly random and uncompressible OTP which is transmitted
needs to have a length equal to the message length for this result to be true.
In this paper, we prove that the length of the transmitted OTP which actually
contains useful information need not be compromised and could be less than the
message length without sacrificing perfect secrecy. We also provide a new
interpretation for the OTP encryption by treating the message bits as making
True/False statements about the pad, which we define as a private-object. We
introduce the paradigm of private-object cryptography where messages are
transmitted by verifying statements about a secret-object. We conclude by
suggesting the use of Formal Axiomatic Systems for investing N bits of secret.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2005 04:37:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Nagaraj",
"Nithin",
""
],
[
"Vaidya",
"Vivek",
""
],
[
"Vaidya",
"Prabhakar G",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0508080
|
Kirti Chawla
|
Kirti Chawla
|
A 3D RGB Axis-based Color-oriented Cryptography
|
16 Pages, 12 figures
| null | null | null |
cs.CR
| null |
In this document, a formal approach to encrypt, decrypt, transmit and receive
information using colors is explored. A piece of information consists of set of
symbols with a definite property imposed on the generating set. The symbols are
usually encoded using ascii scheme. A linear to 3d transformation is presented.
The change of axis from traditional xyz to rgb is highlighted and its effect
are studied. A point in this new axis is then represented as a unique color and
a vector or matrix is associated with it, making it amenable to standard vector
or matrix operations. A formal notion on hybrid cryptography is introduced as
the algorithm lies on the boundary of symmetric and asymmetric cryptography. No
discussion is complete, without mentioning reference to communication aspects
of secure information in a channel. Transmission scheme pertaining to light as
carrier is introduced and studied. Key-exchanges do not come under the scope of
current frame of document.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2005 07:07:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chawla",
"Kirti",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0508081
|
Kirti Chawla
|
Kirti Chawla
|
ZEUS - A Domain-Oriented Fact Comparison Based Authentication Protocol
|
5 Pages
| null | null | null |
cs.CR
| null |
In this paper, facts existing in different domains are explored, which are
comparable by their end result. Properties of various domains and the facts
that are part of such a unit are also presented, examples of comparison and
methods of usage as means of zero-knowledge protocols are given, finally a
zero-knowledge protocol based on afore-mentioned concept is given.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2005 07:17:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chawla",
"Kirti",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0508082
|
Bernardo Huberman
|
Scott Golder, Bernardo A. Huberman
|
The Structure of Collaborative Tagging Systems
| null | null | null | null |
cs.DL cs.CY
| null |
Collaborative tagging describes the process by which many users add metadata
in the form of keywords to shared content. Recently, collaborative tagging has
grown in popularity on the web, on sites that allow users to tag bookmarks,
photographs and other content. In this paper we analyze the structure of
collaborative tagging systems as well as their dynamical aspects. Specifically,
we discovered regularities in user activity, tag frequencies, kinds of tags
used, bursts of popularity in bookmarking and a remarkable stability in the
relative proportions of tags within a given url. We also present a dynamical
model of collaborative tagging that predicts these stable patterns and relates
them to imitation and shared knowledge.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2005 18:34:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Golder",
"Scott",
""
],
[
"Huberman",
"Bernardo A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0508083
|
Michael Baer
|
Michael B. Baer
|
A General Framework for Codes Involving Redundancy Minimization
|
7 pages, 5 figures, submitted to IEEE Trans. Inform. Theory
|
IEEE Transactions on Information Theory (2006)
|
10.1109/TIT.2005.860469
| null |
cs.IT cs.DS math.IT
| null |
A framework with two scalar parameters is introduced for various problems of
finding a prefix code minimizing a coding penalty function. The framework
encompasses problems previously proposed by Huffman, Campbell, Nath, and Drmota
and Szpankowski, shedding light on the relationships among these problems. In
particular, Nath's range of problems can be seen as bridging the minimum
average redundancy problem of Huffman with the minimum maximum pointwise
redundancy problem of Drmota and Szpankowski. Using this framework, two
linear-time Huffman-like algorithms are devised for the minimum maximum
pointwise redundancy problem, the only one in the framework not previously
solved with a Huffman-like algorithm. Both algorithms provide solutions common
to this problem and a subrange of Nath's problems, the second algorithm being
distinguished by its ability to find the minimum variance solution among all
solutions common to the minimum maximum pointwise redundancy and Nath problems.
Simple redundancy bounds are also presented.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2005 20:22:45 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Nov 2005 06:39:52 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508084
|
Michael Baer
|
Michael B. Baer
|
Source Coding for Quasiarithmetic Penalties
|
22 pages, 3 figures, submitted to IEEE Trans. Inform. Theory, revised
per suggestions of readers
|
IEEE Transactions on Information Theory (2006)
|
10.1109/TIT.2006.881728
| null |
cs.IT cs.DS math.IT
| null |
Huffman coding finds a prefix code that minimizes mean codeword length for a
given probability distribution over a finite number of items. Campbell
generalized the Huffman problem to a family of problems in which the goal is to
minimize not mean codeword length but rather a generalized mean known as a
quasiarithmetic or quasilinear mean. Such generalized means have a number of
diverse applications, including applications in queueing. Several
quasiarithmetic-mean problems have novel simple redundancy bounds in terms of a
generalized entropy. A related property involves the existence of optimal
codes: For ``well-behaved'' cost functions, optimal codes always exist for
(possibly infinite-alphabet) sources having finite generalized entropy. Solving
finite instances of such problems is done by generalizing an algorithm for
finding length-limited binary codes to a new algorithm for finding optimal
binary codes for any quasiarithmetic mean with a convex cost function. This
algorithm can be performed using quadratic time and linear space, and can be
extended to other penalty functions, some of which are solvable with similar
space and time complexity, and others of which are solvable with slightly
greater complexity. This reduces the computational complexity of a problem
involving minimum delay in a queue, allows combinations of previously
considered problems to be optimized, and greatly expands the space of problems
solvable in quadratic time and linear space. The algorithm can be extended for
purposes such as breaking ties among possibly different optimal codes, as with
bottom-merge Huffman coding.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2005 20:29:04 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Nov 2005 06:46:48 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Feb 2006 00:36:34 GMT"
},
{
"version": "v4",
"created": "Sat, 11 Mar 2006 22:14:33 GMT"
},
{
"version": "v5",
"created": "Mon, 22 May 2006 20:28:12 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508085
|
Moshe Schwartz
|
Moshe Schwartz, Paul H. Siegel, Alexander Vardy
|
On the Asymptotic Performance of Iterative Decoders for Product Codes
|
To appear in The International Symposium on Information Theory 2005
(ISIT2005)
| null | null | null |
cs.IT cs.DM math.IT
| null |
We consider hard-decision iterative decoders for product codes over the
erasure channel, which employ repeated rounds of decoding rows and columns
alternatingly. We derive the exact asymptotic probability of decoding failure
as a function of the error-correction capabilities of the row and column codes,
the number of decoding rounds, and the channel erasure probability. We examine
both the case of codes capable of correcting a constant amount of errors, and
the case of codes capable of correcting a constant fraction of their length.
|
[
{
"version": "v1",
"created": "Sat, 20 Aug 2005 09:30:13 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Schwartz",
"Moshe",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Vardy",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508086
|
Dragos Trinca
|
Dragos Trinca
|
High-performance BWT-based Encoders
|
12 pages
| null | null | null |
cs.DS
| null |
In 1994, Burrows and Wheeler developed a data compression algorithm which
performs significantly better than Lempel-Ziv based algorithms. Since then, a
lot of work has been done in order to improve their algorithm, which is based
on a reversible transformation of the input string, called BWT (the
Burrows-Wheeler transformation). In this paper, we propose a compression scheme
based on BWT, MTF (move-to-front coding), and a version of the algorithms
presented in [Dragos Trinca, ITCC-2004].
|
[
{
"version": "v1",
"created": "Sun, 21 Aug 2005 05:47:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Trinca",
"Dragos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0508087
|
Dragos Trinca
|
Dragos Trinca
|
Modelling the Eulerian Path Problem using a String Matching Framework
|
10 pages
| null | null | null |
cs.DS
| null |
The well-known Eulerian path problem can be solved in polynomial time (more
exactly, there exists a linear time algorithm for this problem). In this paper,
we model the problem using a string matching framework, and then initiate an
algorithmic study on a variant of this problem, called the (2,1)-STRING-MATCH
problem (which is actually a generalization of the Eulerian path problem).
Then, we present a polynomial-time algorithm for the (2,1)-STRING-MATCH
problem, which is the most important result of this paper. Specifically, we get
a lower bound of Omega(n), and an upper bound of O(n^{2}).
|
[
{
"version": "v1",
"created": "Sun, 21 Aug 2005 06:08:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Trinca",
"Dragos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0508088
|
Dragos Trinca
|
Dragos Trinca
|
Special Cases of Encodings by Generalized Adaptive Codes
|
17 pages
| null | null | null |
cs.IT math.IT
| null |
Adaptive (variable-length) codes associate variable-length codewords to
symbols being encoded depending on the previous symbols in the input data
string. This class of codes has been presented in [Dragos Trinca,
cs.DS/0505007] as a new class of non-standard variable-length codes.
Generalized adaptive codes (GA codes, for short) have been also presented in
[Dragos Trinca, cs.DS/0505007] not only as a new class of non-standard
variable-length codes, but also as a natural generalization of adaptive codes
of any order. This paper is intended to continue developing the theory of
variable-length codes by establishing several interesting connections between
adaptive codes and other classes of codes. The connections are discussed not
only from a theoretical point of view (by proving new results), but also from
an applicative one (by proposing several applications). First, we prove that
adaptive Huffman encodings and Lempel-Ziv encodings are particular cases of
encodings by GA codes. Second, we show that any (n,1,m) convolutional code
satisfying certain conditions can be modelled as an adaptive code of order m.
Third, we describe a cryptographic scheme based on the connection between
adaptive codes and convolutional codes, and present an insightful analysis of
this scheme. Finally, we conclude by generalizing adaptive codes to
(p,q)-adaptive codes, and discussing connections between adaptive codes and
time-varying codes.
|
[
{
"version": "v1",
"created": "Sun, 21 Aug 2005 08:22:49 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Trinca",
"Dragos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508089
|
Dragos Trinca
|
Dragos Trinca
|
Modelling the EAH Data Compression Algorithm using Graph Theory
|
10 pages
| null | null | null |
cs.DS
| null |
Adaptive codes associate variable-length codewords to symbols being encoded
depending on the previous symbols in the input data string. This class of codes
has been introduced in [Dragos Trinca, cs.DS/0505007] as a new class of
non-standard variable-length codes. New algorithms for data compression, based
on adaptive codes of order one, have been presented in [Dragos Trinca,
ITCC-2004], where we have behaviorally shown that for a large class of input
data strings, these algorithms substantially outperform the Lempel-Ziv
universal data compression algorithm. EAH has been introduced in [Dragos
Trinca, cs.DS/0505061], as an improved generalization of these algorithms. In
this paper, we present a translation of the EAH algorithm into the graph
theory.
|
[
{
"version": "v1",
"created": "Sun, 21 Aug 2005 19:32:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Trinca",
"Dragos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0508090
|
Dragos Trinca
|
Dragos Trinca
|
Translating the EAH Data Compression Algorithm into Automata Theory
|
9 pages
| null | null | null |
cs.DS
| null |
Adaptive codes have been introduced in [Dragos Trinca, cs.DS/0505007] as a
new class of non-standard variable-length codes. These codes associate
variable-length codewords to symbols being encoded depending on the previous
symbols in the input data string. A new data compression algorithm, called EAH,
has been introduced in [Dragos Trinca, cs.DS/0505061], where we have
behaviorally shown that for a large class of input data strings, this algorithm
substantially outperforms the well-known Lempel-Ziv universal data compression
algorithm. In this paper, we translate the EAH encoder into automata theory.
|
[
{
"version": "v1",
"created": "Sun, 21 Aug 2005 19:56:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Trinca",
"Dragos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0508091
|
Serebrenik Alexander
|
Susana Munoz-Hernandez and Claudio Vaucheret
|
Extending Prolog with Incomplete Fuzzy Information
| null | null | null | null |
cs.PL cs.SE
| null |
Incomplete information is a problem in many aspects of actual environments.
Furthermore, in many sceneries the knowledge is not represented in a crisp way.
It is common to find fuzzy concepts or problems with some level of uncertainty.
There are not many practical systems which handle fuzziness and uncertainty and
the few examples that we can find are used by a minority. To extend a popular
system (which many programmers are using) with the ability of combining crisp
and fuzzy knowledge representations seems to be an interesting issue.
Our first work (Fuzzy Prolog) was a language that models
$\mathcal{B}([0,1])$-valued Fuzzy Logic. In the Borel algebra,
$\mathcal{B}([0,1])$, truth value is represented using unions of intervals of
real numbers. This work was more general in truth value representation and
propagation than previous works.
An interpreter for this language using Constraint Logic Programming over Real
numbers (CLP(${\cal R}$)) was implemented and is available in the Ciao system.
Now, we enhance our former approach by using default knowledge to represent
incomplete information in Logic Programming. We also provide the implementation
of this new framework. This new release of Fuzzy Prolog handles incomplete
information, it has a complete semantics (the previous one was incomplete as
Prolog) and moreover it is able to combine crisp and fuzzy logic in Prolog
programs. Therefore, new Fuzzy Prolog is more expressive to represent real
world.
Fuzzy Prolog inherited from Prolog its incompleteness. The incorporation of
default reasoning to Fuzzy Prolog removes this problem and requires a richer
semantics which we discuss.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2005 07:41:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Munoz-Hernandez",
"Susana",
""
],
[
"Vaucheret",
"Claudio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0508092
|
Stergos Afantenos
|
Stergos D. Afantenos, Vangelis Karkaletsis and Panagiotis
Stamatopoulos
|
Summarizing Reports on Evolving Events; Part I: Linear Evolution
|
7 pages. Published on the Conference Recent Advances in Natural
Language Processing (RANLP, 2005)
|
Edited by Galia Angelova, Kalina Bontcheva, Ruslan Mitkov, Nicolas
Nicolov, and Nikolai Nikolov, Recent Advances in Natural Language Processing
(RANLP 2005). Borovets, Bulgaria: INCOMA, 18-24.
| null | null |
cs.CL cs.IR
| null |
We present an approach for summarization from multiple documents which report
on events that evolve through time, taking into account the different document
sources. We distinguish the evolution of an event into linear and non-linear.
According to our approach, each document is represented by a collection of
messages which are then used in order to instantiate the cross-document
relations that determine the summary content. The paper presents the
summarization system that implements this approach through a case study on
linear evolution.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2005 12:56:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Afantenos",
"Stergos D.",
""
],
[
"Karkaletsis",
"Vangelis",
""
],
[
"Stamatopoulos",
"Panagiotis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0508093
|
Dana Porrat
|
Dana Porrat and Urbashi Mitra
|
Performance of PPM Multipath Synchronization in the Limit of Large
Bandwidth
|
11 pages, submitted to 2005 Allerton conference on communication,
control, and computing
| null | null | null |
cs.IT math.IT
| null |
The acquisition, or synchronization, of the multipath profile for an
ultrawideband pulse position modulation (PPM) communication systems is
considered. Synchronization is critical for the proper operation of PPM based
For the multipath channel, it is assumed that channel gains are known, but path
delays are unknown. In the limit of large bandwidth, W, it is assumed that the
number of paths, L, grows. The delay spread of the channel, M, is proportional
to the bandwidth. The rate of growth of L versus M determines whether
synchronization can occur. It is shown that if L/sqrt(M) --> 0, then the
maximum likelihood synchronizer cannot acquire any of the paths and
alternatively if L/M --> 0, the maximum likelihood synchronizer is guaranteed
to miss at least one path.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2005 13:46:54 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Porrat",
"Dana",
""
],
[
"Mitra",
"Urbashi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508094
|
Kai Chen
|
Kai Chen and Hoi-Kwong Lo
|
Conference Key Agreement and Quantum Sharing of Classical Secrets with
Noisy GHZ States
|
5 pages, to appear in Proc. 2005 IEEE International Symposium on
Information Theory (ISIT 2005, Adelaide, Australia)
|
Information Theory, 2005. ISIT 2005. Proceedings. International
Symposium on 4-9 Sept. 2005 Page(s):1607 - 1611
|
10.1109/ISIT.2005.1523616
|
CQIQC-ISIT 2005-CL1
|
cs.IT cs.CR math.IT
| null |
We propose a wide class of distillation schemes for multi-partite entangled
states that are CSS-states. Our proposal provides not only superior efficiency,
but also new insights on the connection between CSS-states and bipartite graph
states. We then consider the applications of our distillation schemes for two
cryptographic tasks--namely, (a) conference key agreement and (b) quantum
sharing of classical secrets. In particular, we construct
``prepare-and-measure'' protocols. Also we study the yield of those protocols
and the threshold value of the fidelity above which the protocols can function
securely. Surprisingly, our protocols will function securely even when the
initial state does not violate the standard Bell-inequalities for GHZ states.
Experimental realization involving only bi-partite entanglement is also
suggested.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2005 14:07:14 GMT"
}
] | 2008-04-05T00:00:00 |
[
[
"Chen",
"Kai",
""
],
[
"Lo",
"Hoi-Kwong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508095
|
Arjunan Rajeswaran
|
Rohit Negi and Arjunan Rajeswaran
|
Capacity of Ultra Wide Band Wireless Ad Hoc Networks
|
12 pages,2 figures
| null | null | null |
cs.IT cs.NI math.IT
| null |
Throughput capacity is a critical parameter for the design and evaluation of
ad-hoc wireless networks. Consider n identical randomly located nodes, on a
unit area, forming an ad-hoc wireless network. Assuming a fixed per node
transmission capability of T bits per second at a fixed range, it has been
shown that the uniform throughput capacity per node r(n) is Theta((T)/(sqrt{n
log n})), a decreasing function of node density n.
However an alternate communication model may also be considered, with each
node constrained to a maximum transmit power P_0 and capable of utilizing W Hz
of bandwidth. Under the limiting case W rightarrow infinity, such as in Ultra
Wide Band (UWB) networks, the uniform throughput per node is O ((n log
n)^{(alpha-1}/2}) (upper bound) and Omega((n^{(alpha-1)/2})/((log n)^{(alpha
+1)/2})) (achievable lower bound).
These bounds demonstrate that throughput increases with node density $n$, in
contrast to previously published results. This is the result of the large
bandwidth, and the assumed power and rate adaptation, which alleviate
interference. Thus, the effect of physical layer properties on the capacity of
ad hoc wireless networks is demonstrated. Further, the promise of UWB as a
physical layer technology for ad-hoc networks is justified.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2005 19:27:34 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Negi",
"Rohit",
""
],
[
"Rajeswaran",
"Arjunan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508096
|
Styrmir Sigurjonsson
|
Styrmir Sigurjonsson and Young-Han Kim
|
On Multiple User Channels with Causal State Information at the
Transmitters
| null | null | null | null |
cs.IT math.IT
| null |
We extend Shannon's result on the capacity of channels with state information
to multiple user channels. More specifically, we characterize the capacity
(region) of degraded broadcast channels and physically degraded relay channels
where the channel state information is causally available at the transmitters.
We also obtain inner and outer bounds on the capacity region for multiple
access channels with causal state information at the transmitters.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2005 21:36:02 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Sigurjonsson",
"Styrmir",
""
],
[
"Kim",
"Young-Han",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508097
|
Devavrat Shah
|
Sujay Sanghavi and Devavrat Shah
|
Tightness of LP via Max-product Belief Propagation
| null | null | null | null |
cs.DS cs.DM
| null |
We investigate the question of tightness of linear programming (LP)
relaxation for finding a maximum weight independent set (MWIS) in sparse random
weighted graphs. We show that an edge-based LP relaxation is asymptotically
tight for Erdos-Renyi graph $G(n,c/n)$ for $c \leq 2e$ and random regular graph
$G(n,r)$ for $r\leq 4$ when node weights are i.i.d. with exponential
distribution of mean 1. We establish these results, through a precise relation
between the tightness of LP relaxation and convergence of the max-product
belief propagation algorithm. We believe that this novel method of
understanding structural properties of combinatorial problems through
properties of iterative procedure such as the max-product should be of interest
in its own right.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2005 01:08:06 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Apr 2008 01:19:15 GMT"
}
] | 2008-04-14T00:00:00 |
[
[
"Sanghavi",
"Sujay",
""
],
[
"Shah",
"Devavrat",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0508098
|
Pascal Vontobel
|
Pascal O. Vontobel, Ashwin Ganesan
|
An Explicit Construction of Universally Decodable Matrices
| null | null | null | null |
cs.IT cs.DM math.IT
| null |
Universally decodable matrices can be used for coding purposes when
transmitting over slow fading channels. These matrices are parameterized by
positive integers $L$ and $n$ and a prime power $q$. Based on Pascal's triangle
we give an explicit construction of universally decodable matrices for any
non-zero integers $L$ and $n$ and any prime power $q$ where $L \leq q+1$. This
is the largest set of possible parameter values since for any list of
universally decodable matrices the value $L$ is upper bounded by $q+1$, except
for the trivial case $n = 1$. For the proof of our construction we use
properties of Hasse derivatives, and it turns out that our construction has
connections to Reed-Solomon codes, Reed-Muller codes, and so-called
repeated-root cyclic codes. Additionally, we show how universally decodable
matrices can be modified so that they remain universally decodable matrices.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2005 02:13:48 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Vontobel",
"Pascal O.",
""
],
[
"Ganesan",
"Ashwin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508099
|
Cedomir Stefanovic
|
Dragana Bajic, Cedomir Stefanovic, Dejan Vukobratovic
|
Search Process and Probabilistic Bifix Approach
|
4 pages, 2 figures, to appear in Proceedings of the 2005 IEEE
International Symposium on Information Theory, Adelaide, Australia, September
4-9, 2005
| null |
10.1109/ISIT.2005.1523284
| null |
cs.IT cs.CV math.IT
| null |
An analytical approach to a search process is a mathematical prerequisite for
digital synchronization acquisition analysis and optimization. A search is
performed for an arbitrary set of sequences within random but not equiprobable
L-ary data. This paper derives in detail an expression for probability
distribution function, from which other statistical parameters - expected value
and variance - can be obtained. The probabilistic nature of (cross-) bifix
indicators is shown and application examples are outlined, ranging beyond the
usual telecommunication field.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2005 08:51:45 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Bajic",
"Dragana",
""
],
[
"Stefanovic",
"Cedomir",
""
],
[
"Vukobratovic",
"Dejan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508100
|
Alessandro Provetti
|
Alessandro Provetti
|
A primer on Answer Set Programming
|
6 pages
| null | null | null |
cs.AI cs.LO
| null |
A introduction to the syntax and Semantics of Answer Set Programming intended
as an handout to [under]graduate students taking Artificial Intlligence or
Logic Programming classes.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2005 15:05:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Provetti",
"Alessandro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0508101
|
Mohsen Bayati
|
Mohsen Bayati, Devavrat Shah, Mayank Sharma
|
Maximum Weight Matching via Max-Product Belief Propagation
|
In the proceedings of the 2005 IEEE International Symposium on
Information Theory
|
IEEE Transactions on Information Theory, Vol 54 (3), 2008
|
10.1109/TIT.2007.915695
| null |
cs.IT cs.AI math.IT
| null |
Max-product "belief propagation" is an iterative, local, message-passing
algorithm for finding the maximum a posteriori (MAP) assignment of a discrete
probability distribution specified by a graphical model. Despite the
spectacular success of the algorithm in many application areas such as
iterative decoding, computer vision and combinatorial optimization which
involve graphs with many cycles, theoretical results about both correctness and
convergence of the algorithm are known in few cases (Weiss-Freeman Wainwright,
Yeddidia-Weiss-Freeman, Richardson-Urbanke}.
In this paper we consider the problem of finding the Maximum Weight Matching
(MWM) in a weighted complete bipartite graph. We define a probability
distribution on the bipartite graph whose MAP assignment corresponds to the
MWM. We use the max-product algorithm for finding the MAP of this distribution
or equivalently, the MWM on the bipartite graph. Even though the underlying
bipartite graph has many short cycles, we find that surprisingly, the
max-product algorithm always converges to the correct MAP assignment as long as
the MAP assignment is unique. We provide a bound on the number of iterations
required by the algorithm and evaluate the computational cost of the algorithm.
We find that for a graph of size $n$, the computational cost of the algorithm
scales as $O(n^3)$, which is the same as the computational cost of the best
known algorithm. Finally, we establish the precise relation between the
max-product algorithm and the celebrated {\em auction} algorithm proposed by
Bertsekas. This suggests possible connections between dual algorithm and
max-product algorithm for discrete optimization problems.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2005 18:37:50 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Apr 2007 01:50:23 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Bayati",
"Mohsen",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Sharma",
"Mayank",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508102
|
Emily Stone
|
Emily Stone, Suhail Ahmed, Abe Askari and Hong Tat
|
Investigations of Process Damping Forces in Metal Cutting
|
27 pages, 27 figures, submitted to Journal of Computational Methods
in Science and Engineering, Feb. 2005
| null | null | null |
cs.CE
| null |
Using finite element software developed for metal cutting by Third Wave
Systems we investigate the forces involved in chatter, a self-sustained
oscillation of the cutting tool. The phenomena is decomposed into a vibrating
tool cutting a flat surface work piece, and motionless tool cutting a work
piece with a wavy surface. While cutting the wavy surface, the shearplane was
seen to oscillate in advance of the oscillation of the depth of cut, as were
the cutting, thrust, and shear plane forces. The vibrating tool was used to
investigate process damping through the interaction of the relief face of the
tool and the workpiece. Crushing forces are isolated and compared to the
contact length between the tool and workpiece. We found that the wavelength
dependence of the forces depended on the relative size of the wavelength to the
length of the relief face of the tool. The results indicate that the damping
force from crushing will be proportional to the cutting speed for short tools,
and inversely proportional for long tools.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2005 19:52:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Stone",
"Emily",
""
],
[
"Ahmed",
"Suhail",
""
],
[
"Askari",
"Abe",
""
],
[
"Tat",
"Hong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0508103
|
Peter Turney
|
Peter D. Turney (National Research Council of Canada), Michael L.
Littman (Rutgers University)
|
Corpus-based Learning of Analogies and Semantic Relations
|
related work available at http://purl.org/peter.turney/ and
http://www.cs.rutgers.edu/~mlittman/
|
Machine Learning, (2005), 60(1-3), 251-278
| null |
NRC-48273
|
cs.LG cs.CL cs.IR
| null |
We present an algorithm for learning from unlabeled text, based on the Vector
Space Model (VSM) of information retrieval, that can solve verbal analogy
questions of the kind found in the SAT college entrance exam. A verbal analogy
has the form A:B::C:D, meaning "A is to B as C is to D"; for example,
mason:stone::carpenter:wood. SAT analogy questions provide a word pair, A:B,
and the problem is to select the most analogous word pair, C:D, from a set of
five choices. The VSM algorithm correctly answers 47% of a collection of 374
college-level analogy questions (random guessing would yield 20% correct; the
average college-bound senior high school student answers about 57% correctly).
We motivate this research by applying it to a difficult problem in natural
language processing, determining semantic relations in noun-modifier pairs. The
problem is to classify a noun-modifier pair, such as "laser printer", according
to the semantic relation between the noun (printer) and the modifier (laser).
We use a supervised nearest-neighbour algorithm that assigns a class to a given
noun-modifier pair by finding the most analogous noun-modifier pair in the
training data. With 30 classes of semantic relations, on a collection of 600
labeled noun-modifier pairs, the learning algorithm attains an F value of 26.5%
(random guessing: 3.3%). With 5 classes of semantic relations, the F value is
43.2% (random: 20%). The performance is state-of-the-art for both verbal
analogies and noun-modifier relations.
|
[
{
"version": "v1",
"created": "Tue, 23 Aug 2005 20:21:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
],
[
"Littman",
"Michael L.",
"",
"Rutgers University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0508104
|
Kathy Horadam
|
K. J. Horadam
|
A Generalised Hadamard Transform
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null |
10.1109/ISIT.2005.1523490
| null |
cs.IT cs.DM math.IT
| null |
A Generalised Hadamard Transform for multi-phase or multilevel signals is
introduced, which includes the Fourier, Generalised, Discrete Fourier,
Walsh-Hadamard and Reverse Jacket Transforms. The jacket construction is
formalised and shown to admit a tensor product decomposition. Primary matrices
under this decomposition are identified. New examples of primary jacket
matrices of orders 8 and 12 are presented.
|
[
{
"version": "v1",
"created": "Wed, 24 Aug 2005 01:03:34 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Horadam",
"K. J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508105
|
Ludovic Langevine
|
Ludovic Langevine and Mireille Ducasse
|
A Tracer Driver for Versatile Dynamic Analyses of Constraint Logic
Programs
|
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments, October
2005, Spain. Whole proceedings: cs.PL/0508078. 15 pages
| null | null | null |
cs.SE
| null |
Programs with constraints are hard to debug. In this paper, we describe a
general architecture to help develop new debugging tools for constraint
programming. The possible tools are fed by a single general-purpose tracer. A
tracer-driver is used to adapt the actual content of the trace, according to
the needs of the tool. This enables the tools and the tracer to communicate in
a client-server scheme. Each tool describes its needs of execution data thanks
to event patterns. The tracer driver scrutinizes the execution according to
these event patterns and sends only the data that are relevant to the connected
tools. Experimental measures show that this approach leads to good performance
in the context of constraint logic programming, where a large variety of tools
exists and the trace is potentially huge.
|
[
{
"version": "v1",
"created": "Wed, 24 Aug 2005 11:30:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Langevine",
"Ludovic",
""
],
[
"Ducasse",
"Mireille",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0508106
|
Fred Mesnard
|
Etienne Payet and Fred Mesnard
|
An Improved Non-Termination Criterion for Binary Constraint Logic
Programs
|
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078
| null | null | null |
cs.PL
| null |
On one hand, termination analysis of logic programs is now a fairly
established research topic within the logic programming community. On the other
hand, non-termination analysis seems to remain a much less attractive subject.
If we divide this line of research into two kinds of approaches: dynamic versus
static analysis, this paper belongs to the latter. It proposes a criterion for
detecting non-terminating atomic queries with respect to binary CLP clauses,
which strictly generalizes our previous works on this subject. We give a
generic operational definition and a logical form of this criterion. Then we
show that the logical form is correct and complete with respect to the
operational definition.
|
[
{
"version": "v1",
"created": "Wed, 24 Aug 2005 12:18:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Payet",
"Etienne",
""
],
[
"Mesnard",
"Fred",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0508107
|
Beniamin Mounits Mr
|
Beniamin Mounits (1), Tuvi Etzion (1) and Simon Litsyn (2) ((1)
Technion - Israel Institute of Technology, (2) Tel Aviv University)
|
New Upper Bounds on A(n,d)
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.IT cs.DM math.IT
| null |
Upper bounds on the maximum number of codewords in a binary code of a given
length and minimum Hamming distance are considered. New bounds are derived by a
combination of linear programming and counting arguments. Some of these bounds
improve on the best known analytic bounds. Several new record bounds are
obtained for codes with small lengths.
|
[
{
"version": "v1",
"created": "Wed, 24 Aug 2005 12:27:00 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mounits",
"Beniamin",
""
],
[
"Etzion",
"Tuvi",
""
],
[
"Litsyn",
"Simon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508108
|
Tristan Denmat
|
Tristan Denmat, Arnaud Gotlieb and Mireille Ducasse
|
Proving or Disproving likely Invariants with Constraint Reasoning
|
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078
| null | null | null |
cs.SE cs.PL
| null |
A program invariant is a property that holds for every execution of the
program. Recent work suggest to infer likely-only invariants, via dynamic
analysis. A likely invariant is a property that holds for some executions but
is not guaranteed to hold for all executions. In this paper, we present work in
progress addressing the challenging problem of automatically verifying that
likely invariants are actual invariants. We propose a constraint-based
reasoning approach that is able, unlike other approaches, to both prove or
disprove likely invariants. In the latter case, our approach provides
counter-examples. We illustrate the approach on a motivating example where
automatically generated likely invariants are verified.
|
[
{
"version": "v1",
"created": "Wed, 24 Aug 2005 13:30:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Denmat",
"Tristan",
""
],
[
"Gotlieb",
"Arnaud",
""
],
[
"Ducasse",
"Mireille",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0508109
|
William Heaven
|
William Heaven and Alessandra Russo
|
Enhancing the Alloy Analyzer with Patterns of Analysis
|
17 pages, 15th Workshop on Logic Programming Environments (WLPE05),
Sitges (Barcelona), Spain, 2005
|
15th Workshop on Logic Programming Environments (WLPE05), Sitges
(Barcelona), Spain, 2005
| null | null |
cs.SE cs.LO
| null |
Formal techniques have been shown to be useful in the development of correct
software. But the level of expertise required of practitioners of these
techniques prohibits their widespread adoption. Formal techniques need to be
tailored to the commercial software developer. Alloy is a lightweight
specification language supported by the Alloy Analyzer (AA), a tool based on
off-the-shelf SAT technology. The tool allows a user to check interactively
whether given properties are consistent or valid with respect to a high-level
specification, providing an environment in which the correctness of such a
specification may be established. However, Alloy is not particularly suited to
expressing program specifications and the feedback provided by AA can be
misleading where the specification under analysis or the property being checked
contains inconsistencies. In this paper, we address these two shortcomings.
Firstly, we present a lightweight language called "Loy", tailored to the
specification of object-oriented programs. An encoding of Loy into Alloy is
provided so that AA can be used for automated analysis of Loy program
specifications. Secondly, we present some "patterns of analysis" that guide a
developer through the analysis of a Loy specification in order to establish its
correctness before implementation.
|
[
{
"version": "v1",
"created": "Wed, 24 Aug 2005 15:35:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Heaven",
"William",
""
],
[
"Russo",
"Alessandra",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0508110
|
Ali Bagherzandi
|
Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri and Mahmoud
Salmasizadeh
|
Relations between semantic security and indistinguishability against
cpa, non-adaptive cca and adaptive cca in comparison based framework
|
8 pages, 1 figure
| null | null | null |
cs.CR
| null |
In this paper we try to unify the frameworks of definitions of semantic
security, indistinguishability and non-malleability by defining semantic
security in comparison based framework. This facilitates the study of relations
among these goals against different attack models and makes the proof of the
equivalence of semantic security and indistinguishability easier and more
understandable. Besides, our proof of the equivalence of semantic security and
indistinguishability does not need any intermediate goals such as non
devidability to change the definition framework.
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2005 04:58:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bagherzandi",
"Ali",
""
],
[
"Azimian",
"Kooshiar",
""
],
[
"Mohajeri",
"Javad",
""
],
[
"Salmasizadeh",
"Mahmoud",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0508111
|
Elvira Albert
|
German Puebla, Elvira Albert, Manuel Hermenegildo
|
A Generic Framework for the Analysis and Specialization of Logic
Programs
|
In A. Serebrenik and S. Munoz-Hernandez (editors), Proceedings of the
15th Workshop on Logic-based methods in Programming Environments October
2005, Sitges. cs.PL/0508078
| null | null | null |
cs.PL cs.SE
| null |
The relationship between abstract interpretation and partial deduction has
received considerable attention and (partial) integrations have been proposed
starting from both the partial deduction and abstract interpretation
perspectives. In this work we present what we argue is the first fully
described generic algorithm for efficient and precise integration of abstract
interpretation and partial deduction. Taking as starting point state-of-the-art
algorithms for context-sensitive, polyvariant abstract interpretation and
(abstract) partial deduction, we present an algorithm which combines the best
of both worlds. Key ingredients include the accurate success propagation
inherent to abstract interpretation and the powerful program transformations
achievable by partial deduction. In our algorithm, the calls which appear in
the analysis graph are not analyzed w.r.t. the original definition of the
procedure but w.r.t. specialized definitions of these procedures. Such
specialized definitions are obtained by applying both unfolding and abstract
executability. Our framework is parametric w.r.t. different control strategies
and abstract domains. Different combinations of such parameters correspond to
existing algorithms for program analysis and specialization. Simultaneously,
our approach opens the door to the efficient computation of strictly more
precise results than those achievable by each of the individual techniques. The
algorithm is now one of the key components of the CiaoPP analysis and
specialization system.
|
[
{
"version": "v1",
"created": "Wed, 24 Aug 2005 21:50:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Puebla",
"German",
""
],
[
"Albert",
"Elvira",
""
],
[
"Hermenegildo",
"Manuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0508112
|
Jorge Navas
|
Jorge Navas, Francisco Bueno, Manuel Hermenegildo
|
A study of set-sharing analysis via cliques
|
15 pages, 0 figures
| null | null | null |
cs.LO
| null |
We study the problem of efficient, scalable set-sharing analysis of logic
programs. We use the idea of representing sharing information as a pair of
abstract substitutions, one of which is a worst-case sharing representation
called a clique set, which was previously proposed for the case of inferring
pair-sharing. We use the clique-set representation for (1) inferring actual
set-sharing information, and (2) analysis within a top-down framework. In
particular, we define the abstract functions required by standard top-down
analyses, both for sharing alone and also for the case of including freeness in
addition to sharing. Our experimental evaluation supports the conclusion that,
for inferring set-sharing, as it was the case for inferring pair-sharing,
precision losses are limited, while useful efficiency gains are obtained. At
the limit, the clique-set representation allowed analyzing some programs that
exceeded memory capacity using classical sharing representations.
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2005 04:10:56 GMT"
}
] | 2008-07-10T00:00:00 |
[
[
"Navas",
"Jorge",
""
],
[
"Bueno",
"Francisco",
""
],
[
"Hermenegildo",
"Manuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0508113
|
Gilles Villard
|
Claude-Pierre Jeannerod (LIP), Gilles Villard (LIP)
|
Asymptotically fast polynomial matrix algorithms for multivariable
systems
| null | null | null |
JeVi05
|
cs.SC cs.CC
| null |
We present the asymptotically fastest known algorithms for some basic
problems on univariate polynomial matrices: rank, nullspace, determinant,
generic inverse, reduced form. We show that they essentially can be reduced to
two computer algebra techniques, minimal basis computations and matrix fraction
expansion/reconstruction, and to polynomial matrix multiplication. Such
reductions eventually imply that all these problems can be solved in about the
same amount of time as polynomial matrix multiplication.
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2005 13:52:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jeannerod",
"Claude-Pierre",
"",
"LIP"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0508114
|
Xiangyong Zeng
|
Xiangyong Zeng, Lei Hu, Qingchong Liu
|
A Family of Binary Sequences with Optimal Correlation Property and Large
Linear Span
|
21 pages
| null |
10.1093/ietfec/e89-a.7.2029
| null |
cs.CR cs.IT math.IT
| null |
A family of binary sequences is presented and proved to have optimal
correlation property and large linear span. It includes the small set of Kasami
sequences, No sequence set and TN sequence set as special cases. An explicit
lower bound expression on the linear span of sequences in the family is given.
With suitable choices of parameters, it is proved that the family has
exponentially larger linear spans than both No sequences and TN sequences. A
class of ideal autocorrelation sequences is also constructed and proved to have
large linear span.
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2005 14:16:36 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Sep 2005 14:40:51 GMT"
}
] | 2016-09-07T00:00:00 |
[
[
"Zeng",
"Xiangyong",
""
],
[
"Hu",
"Lei",
""
],
[
"Liu",
"Qingchong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508115
|
Xiangyong Zeng
|
Xiangyong Zeng, Lei Hu, Qingchong Liu
|
New Sequence Sets with Zero-Correlation Zone
|
28 pages, submitted to IEEE-IT on May 18, 2005
| null | null | null |
cs.IT math.IT
| null |
A method for constructing sets of sequences with zero-correlation zone (ZCZ
sequences) and sequence sets with low cross correlation is proposed. The method
is to use families of short sequences and complete orthogonal sequence sets to
derive families of long sequences with desired correlation properties. It is a
unification of works of Matsufuji and Torii \emph{et al.}, and there are more
choices of parameters of sets for our method. In particular, ZCZ sequence sets
generated by the method can achieve a related ZCZ bound. Furthermore, the
proposed method can be utilized to derive new ZCZ sets with both longer ZCZ and
larger set size from known ZCZ sets. These sequence sets are applicable in
broadband satellite IP networks.
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2005 14:44:36 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zeng",
"Xiangyong",
""
],
[
"Hu",
"Lei",
""
],
[
"Liu",
"Qingchong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508116
|
Robert Burger PhD
|
John Robert Burger
|
Quantum Algorithm Processors to Reveal Hamiltonian Cycles
|
10 pages
| null | null | null |
cs.AR cs.CG
| null |
Quantum computer versus quantum algorithm processor in CMOS are compared to
find (in parallel) all Hamiltonian cycles in a graph with m edges and n
vertices, each represented by k bits. A quantum computer uses quantum states
analogous to CMOS registers. With efficient initialization, number of CMOS
registers is proportional to (n-1)! Number of qubits in a quantum computer is
approximately proportional to kn+2mn in the approach below. Using CMOS, the
bits per register is about proportional to kn, which is less since bits can be
irreversibly reset. In either concept, number of gates, or operations to
identify Hamiltonian cycles is proportional to kmn. However, a quantum computer
needs an additional exponentially large number of operations to accomplish a
probabilistic readout. In contrast, CMOS is deterministic and readout is
comparable to ordinary memory.
|
[
{
"version": "v1",
"created": "Thu, 25 Aug 2005 19:04:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Burger",
"John Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0508117
|
Xi Shen
|
Xi Shen (1), Philippe De Wilde (2) ((1) Imperial College London,
United Kingdom, (2) Heriot-Watt University, United Kingdom)
|
Long-term neuronal behavior caused by two synaptic modification
mechanisms
|
11 pages, 5 figures
| null | null | null |
cs.NE cs.CE
| null |
We report the first results of simulating the coupling of neuronal,
astrocyte, and cerebrovascular activity. It is suggested that the dynamics of
the system is different from systems that only include neurons. In the
neuron-vascular coupling, distribution of synapse strengths affects neuronal
behavior and thus balance of the blood flow; oscillations are induced in the
neuron-to-astrocyte coupling.
|
[
{
"version": "v1",
"created": "Fri, 26 Aug 2005 10:38:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shen",
"Xi",
""
],
[
"De Wilde",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0508118
|
Soumya Jana
|
Soumya Jana
|
Unified Theory of Source Coding: Part I -- Two Terminal Problems
|
38 pages, submitted to IEEE-T-Inform. Theory Corrections: Typos in
proofs of lemmas 3.2 and 3.5 are fixed
| null | null | null |
cs.IT math.IT
| null |
Since the publication of Shannon's theory of one terminal source coding, a
number of interesting extensions have been derived by researchers such as
Slepian-Wolf, Wyner, Ahlswede-K\"{o}rner, Wyner-Ziv and Berger-Yeung.
Specifically, the achievable rate or rate-distortion region has been described
by a first order information-theoretic functional of the source statistics in
each of the above cases. At the same time several problems have also remained
unsolved. Notable two terminal examples include the joint distortion problem,
where both sources are reconstructed under a combined distortion criterion, as
well as the partial side information problem, where one source is reconstructed
under a distortion criterion using information about the other (side
information) available at a certain rate (partially). In this paper we solve
both of these open problems. Specifically, we give an infinite order
description of the achievable rate-distortion region in each case. In our
analysis we set the above problems in a general framework and formulate a
unified methodology that solves not only the problems at hand but any two
terminal problem with noncooperative encoding. The key to such unification is
held by a fundamental source coding principle which we derive by extending the
typicality arguments of Shannon and Wyner-Ziv. Finally, we demonstrate the
expansive scope of our technique by re-deriving known coding theorems. We shall
observe that our infinite order descriptions simplify to the expected first
order in the known special cases.
|
[
{
"version": "v1",
"created": "Fri, 26 Aug 2005 16:11:41 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Oct 2005 14:43:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jana",
"Soumya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508119
|
Soumya Jana
|
Soumya Jana
|
Unified Theory of Source Coding: Part II -- Multiterminal Problems
|
35 pages, submitted to IEEE-T-Inform. Theory
| null | null | null |
cs.IT math.IT
| null |
In the first paper of this two part communication, we solved in a unified
framework a variety of two terminal source coding problems with noncooperative
encoders, thereby consolidating works of Shannon, Slepian-Wolf, Wyner,
Ahlswede-K\"{o}rner, Wyner-Ziv, Berger {\em et al.} and Berger-Yeung. To
achieve such unification we made use of a fundamental principle that
dissociates bulk of the analysis from the distortion criterion at hand (if any)
and extends the typicality arguments of Shannon and Wyner-Ziv. In this second
paper, we generalize the fundamental principle for any number of sources and on
its basis exhaustively solve all multiterminal source coding problems with
noncooperative encoders and one decoder. The distortion criteria, when
applicable, are required to apply to single letters and be bounded. Our
analysis includes cases where side information is, respectively, partially
available, completely available and altogether unavailable at the decoder. As
seen in our first paper, the achievable regions permit infinite order
information-theoretic descriptions. We also show that the entropy-constrained
multiterminal estimation problem can be solved as a special case of our theory.
|
[
{
"version": "v1",
"created": "Fri, 26 Aug 2005 16:51:54 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jana",
"Soumya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508120
|
Vyacheslav Gorshkov Mr
|
Gennady P. Berman, Vyacheslav N. Gorshkov, Edward P. MacKerrow
(Theoretical Division, Los Alamos National Laboratory), and Xidi Wang (Global
Consumer Bank, Citigroup)
|
Iterative Algorithm for Finding Frequent Patterns in Transactional
Databases
|
13 pages, 8 tables and figures
| null | null | null |
cs.DB
| null |
A high-performance algorithm for searching for frequent patterns (FPs) in
transactional databases is presented. The search for FPs is carried out by
using an iterative sieve algorithm by computing the set of enclosed cycles. In
each inner cycle of level FPs composed of elements are generated. The assigned
number of enclosed cycles (the parameter of the problem) defines the maximum
length of the desired FPs. The efficiency of the algorithm is produced by (i)
the extremely simple logical searching scheme, (ii) the avoidance of recursive
procedures, and (iii) the usage of only one-dimensional arrays of integers.
|
[
{
"version": "v1",
"created": "Fri, 26 Aug 2005 21:05:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Berman",
"Gennady P.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"Gorshkov",
"Vyacheslav N.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"MacKerrow",
"Edward P.",
"",
"Theoretical Division, Los Alamos National Laboratory"
],
[
"Wang",
"Xidi",
"",
"Global\n Consumer Bank, Citigroup"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0508121
|
Wenyi Zhang
|
Wenyi Zhang and J. Nicholas Laneman
|
How Good is Phase-Shift Keying for Peak-Limited Rayleigh Fading Channels
in the Low-SNR Regime?
|
22 pages, 7 figures, submitted to IEEE Trans. Inform. Theory
| null | null | null |
cs.IT math.IT
| null |
This paper investigates the achievable information rate of phase-shift keying
(PSK) over frequency non-selective Rayleigh fading channels without channel
state information (CSI). The fading process exhibits general temporal
correlation characterized by its spectral density function. We consider both
discrete-time and continuous-time channels, and find their asymptotics at low
signal-to-noise ratio (SNR). Compared to known capacity upper bounds under peak
constraints, these asymptotics usually lead to negligible rate loss in the
low-SNR regime for slowly time-varying fading channels. We further specialize
to case studies of Gauss-Markov and Clarke's fading models.
|
[
{
"version": "v1",
"created": "Sat, 27 Aug 2005 15:52:19 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zhang",
"Wenyi",
""
],
[
"Laneman",
"J. Nicholas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508122
|
Andrew McGregor
|
Sudipto Guha, Andrew McGregor and Suresh Venkatasubramanian
|
Streaming and Sublinear Approximation of Entropy and Information
Distances
|
18 pages
| null | null | null |
cs.DS cs.IT math.IT
| null |
In many problems in data mining and machine learning, data items that need to
be clustered or classified are not points in a high-dimensional space, but are
distributions (points on a high dimensional simplex). For distributions,
natural measures of distance are not the $\ell_p$ norms and variants, but
information-theoretic measures like the Kullback-Leibler distance, the
Hellinger distance, and others. Efficient estimation of these distances is a
key component in algorithms for manipulating distributions. Thus, sublinear
resource constraints, either in time (property testing) or space (streaming)
are crucial.
We start by resolving two open questions regarding property testing of
distributions. Firstly, we show a tight bound for estimating bounded, symmetric
f-divergences between distributions in a general property testing (sublinear
time) framework (the so-called combined oracle model). This yields optimal
algorithms for estimating such well known distances as the Jensen-Shannon
divergence and the Hellinger distance. Secondly, we close a $(\log n)/H$ gap
between upper and lower bounds for estimating entropy $H$ in this model. In a
stream setting (sublinear space), we give the first algorithm for estimating
the entropy of a distribution. Our algorithm runs in polylogarithmic space and
yields an asymptotic constant factor approximation scheme. We also provide
other results along the space/time/approximation tradeoff curve.
|
[
{
"version": "v1",
"created": "Sat, 27 Aug 2005 23:10:52 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Aug 2005 22:42:42 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Guha",
"Sudipto",
""
],
[
"McGregor",
"Andrew",
""
],
[
"Venkatasubramanian",
"Suresh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508123
|
Viktor Kuncak
|
Bruno Marnette, Viktor Kuncak, and Martin Rinard
|
On Algorithms and Complexity for Sets with Cardinality Constraints
|
20 pages. 12 figures
| null | null |
MIT CSAIL Technical Report MIT-LCS-TR-997
|
cs.PL cs.LO cs.SE
| null |
Typestate systems ensure many desirable properties of imperative programs,
including initialization of object fields and correct use of stateful library
interfaces. Abstract sets with cardinality constraints naturally generalize
typestate properties: relationships between the typestates of objects can be
expressed as subset and disjointness relations on sets, and elements of sets
can be represented as sets of cardinality one. Motivated by these applications,
this paper presents new algorithms and new complexity results for constraints
on sets and their cardinalities. We study several classes of constraints and
demonstrate a trade-off between their expressive power and their complexity.
Our first result concerns a quantifier-free fragment of Boolean Algebra with
Presburger Arithmetic. We give a nondeterministic polynomial-time algorithm for
reducing the satisfiability of sets with symbolic cardinalities to constraints
on constant cardinalities, and give a polynomial-space algorithm for the
resulting problem.
In a quest for more efficient fragments, we identify several subclasses of
sets with cardinality constraints whose satisfiability is NP-hard. Finally, we
identify a class of constraints that has polynomial-time satisfiability and
entailment problems and can serve as a foundation for efficient program
analysis.
|
[
{
"version": "v1",
"created": "Sun, 28 Aug 2005 22:25:22 GMT"
}
] | 2013-02-14T00:00:00 |
[
[
"Marnette",
"Bruno",
""
],
[
"Kuncak",
"Viktor",
""
],
[
"Rinard",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0508124
|
Payam Pakzad
|
Payam Pakzad, Christina Fragouli, Amin Shokrollahi
|
Coding Schemes for Line Networks
|
To appear in the proceedings of the 2005 IEEE international Symposium
on Information Theory, Adelaide, Australia, Sept. 4-9, 2005
| null |
10.1109/ISIT.2005.1523666
| null |
cs.IT cs.DC cs.NI math.IT
| null |
We consider a simple network, where a source and destination node are
connected with a line of erasure channels. It is well known that in order to
achieve the min-cut capacity, the intermediate nodes are required to process
the information. We propose coding schemes for this setting, and discuss each
scheme in terms of complexity, delay, achievable rate, memory requirement, and
adaptability to unknown channel parameters. We also briefly discuss how these
schemes can be extended to more general networks.
|
[
{
"version": "v1",
"created": "Mon, 29 Aug 2005 09:47:20 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Pakzad",
"Payam",
""
],
[
"Fragouli",
"Christina",
""
],
[
"Shokrollahi",
"Amin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508125
|
Sheng Bao
|
Sheng Bao, De-Shun Zheng
|
A Sorting Algorithm Based on Calculation
| null | null | null | null |
cs.DS
| null |
This article introduces an adaptive sorting algorithm that can relocate
elements accurately by substituting their values into a function which we name
it the guessing function. We focus on building this function which is the
mapping relationship between record values and their corresponding sorted
locations essentially. The time complexity of this algorithm O(n),when records
distributed uniformly. Additionally, similar approach can be used in the
searching algorithm.
|
[
{
"version": "v1",
"created": "Mon, 29 Aug 2005 14:22:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bao",
"Sheng",
""
],
[
"Zheng",
"De-Shun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0508126
|
Nicolas Le Josse
|
Christophe Laot and Nicolas Le Josse
|
A Closed-Form Solution for the Finite Length Constant Modulus Receiver
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.GT cs.IT math.IT
| null |
In this paper, a closed-form solution minimizing the Godard or Constant
Modulus (CM) cost function under the practical conditions of finite SNR and
finite equalizer length is derived. While previous work has been reported by
Zeng et al., IEEE Trans. Information Theory. 1998, to establish the link
between the constant modulus and Wiener receivers, we show that under the
Gaussian approximation of intersymbol interference at the output of the
equalizer, the CM finite-length receiver is equivalent to the nonblind MMSE
equalizer up to a complex gain factor. Some simulation results are provided to
support the Gaussian approximation assumption.
|
[
{
"version": "v1",
"created": "Mon, 29 Aug 2005 15:05:35 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Laot",
"Christophe",
""
],
[
"Josse",
"Nicolas Le",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508127
|
Neri Merhav
|
Jacob Ziv and Neri Merhav
|
On context-tree prediction of individual sequences
|
15 pages, submitted to the IEEE Transactions on Information Theory
| null | null |
CCIT Technical Report no. 545, Dept. of EE, Technion, July 2005
|
cs.IT math.IT
| null |
Motivated by the evident success of context-tree based methods in lossless
data compression, we explore, in this paper, methods of the same spirit in
universal prediction of individual sequences. By context-tree prediction, we
refer to a family of prediction schemes, where at each time instant $t$, after
having observed all outcomes of the data sequence $x_1,...,x_{t-1}$, but not
yet $x_t$, the prediction is based on a ``context'' (or a state) that consists
of the $k$ most recent past outcomes $x_{t-k},...,x_{t-1}$, where the choice of
$k$ may depend on the contents of a possibly longer, though limited, portion of
the observed past, $x_{t-k_{\max}},...x_{t-1}$. This is different from the
study reported in [1], where general finite-state predictors as well as
``Markov'' (finite-memory) predictors of fixed order, were studied in the
regime of individual sequences.
Another important difference between this study and [1] is the asymptotic
regime. While in [1], the resources of the predictor (i.e., the number of
states or the memory size) were kept fixed regardless of the length $N$ of the
data sequence, here we investigate situations where the number of contexts or
states is allowed to grow concurrently with $N$. We are primarily interested in
the following fundamental question: What is the critical growth rate of the
number of contexts, below which the performance of the best context-tree
predictor is still universally achievable, but above which it is not? We show
that this critical growth rate is linear in $N$. In particular, we propose a
universal context-tree algorithm that essentially achieves optimum performance
as long as the growth rate is sublinear, and show that, on the other hand, this
is impossible in the linear case.
|
[
{
"version": "v1",
"created": "Mon, 29 Aug 2005 23:18:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ziv",
"Jacob",
""
],
[
"Merhav",
"Neri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0508128
|
Dmitry Zinoviev
|
Dmitry Zinoviev
|
Mapping DEVS Models onto UML Models
|
6 pages, 4 figures Presented at Simulation Multiconference 2005
|
D. Zinoviev, "Mapping DEVS Models onto UML Models," Proc. of the
2005 DEVS Integrative M&S Symposium, San Diego, CA, April 2005, pp. 101-106
| null | null |
cs.OH
| null |
Discrete event simulation specification (DEVS) is a formalism designed to
describe both discrete state and continuous state systems. It is a powerful
abstract mathematical notation. However, until recently it lacked proper
graphical representation, which made computer simulation of DEVS models a
challenging issue. Unified modeling language (UML) is a multipurpose graphical
modeling language, a de-facto industrial modeling standard. There exist several
commercial and open-source UML editors and code generators. Most of them can
save UML models in XML-based XMI files ready for further automated processing.
In this paper, we propose a mapping of DEVS models onto UML state and component
diagrams. This mapping may lead to an eventual unification of the two modeling
formalisms, combining the abstractness of DEVS and expressive power and
``computer friendliness'' of the UML.
|
[
{
"version": "v1",
"created": "Tue, 30 Aug 2005 00:02:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zinoviev",
"Dmitry",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0508129
|
Esra Erdem
|
Esra Erdem, Vladimir Lifschitz, and Don Ringe
|
Temporal Phylogenetic Networks and Logic Programming
| null | null | null | null |
cs.LO cs.AI cs.PL
| null |
The concept of a temporal phylogenetic network is a mathematical model of
evolution of a family of natural languages. It takes into account the fact that
languages can trade their characteristics with each other when linguistic
communities are in contact, and also that a contact is only possible when the
languages are spoken at the same time. We show how computational methods of
answer set programming and constraint logic programming can be used to generate
plausible conjectures about contacts between prehistoric linguistic
communities, and illustrate our approach by applying it to the evolutionary
history of Indo-European languages.
To appear in Theory and Practice of Logic Programming (TPLP).
|
[
{
"version": "v1",
"created": "Tue, 30 Aug 2005 13:04:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Erdem",
"Esra",
""
],
[
"Lifschitz",
"Vladimir",
""
],
[
"Ringe",
"Don",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0508130
|
Mehul Shah
|
Mary Baker, Mehul Shah, David S. H. Rosenthal, Mema Roussopoulos,
Petros Maniatis, TJ Giuli, Prashanth Bungale
|
A Fresh Look at the Reliability of Long-term Digital Storage
| null | null | null | null |
cs.DL cs.DB cs.OS
| null |
Many emerging Web services, such as email, photo sharing, and web site
archives, need to preserve large amounts of quickly-accessible data
indefinitely into the future. In this paper, we make the case that these
applications' demands on large scale storage systems over long time horizons
require us to re-evaluate traditional storage system designs. We examine
threats to long-lived data from an end-to-end perspective, taking into account
not just hardware and software faults but also faults due to humans and
organizations. We present a simple model of long-term storage failures that
helps us reason about the various strategies for addressing these threats in a
cost-effective manner. Using this model we show that the most important
strategies for increasing the reliability of long-term storage are detecting
latent faults quickly, automating fault repair to make it faster and cheaper,
and increasing the independence of data replicas.
|
[
{
"version": "v1",
"created": "Wed, 31 Aug 2005 01:44:35 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Baker",
"Mary",
""
],
[
"Shah",
"Mehul",
""
],
[
"Rosenthal",
"David S. H.",
""
],
[
"Roussopoulos",
"Mema",
""
],
[
"Maniatis",
"Petros",
""
],
[
"Giuli",
"TJ",
""
],
[
"Bungale",
"Prashanth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0508131
|
Vygintas Gontis
|
V. Gontis, B. Kaulakys, J. Ruseckas
|
Point Process Models of 1/f Noise and Internet Traffic
|
6 pages, 2 figures, CNET2004 Proceedings AIP
|
AIP Conf. Proc. 776, 144 (2005) 144-149
|
10.1063/1.1985385
| null |
cs.NI
| null |
We present a simple model reproducing the long-range autocorrelations and the
power spectrum of the web traffic. The model assumes the traffic as Poisson
flow of files with size distributed according to the power-law. In this model
the long-range autocorrelations are independent of the network properties as
well as of inter-packet time distribution.
|
[
{
"version": "v1",
"created": "Wed, 31 Aug 2005 13:53:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gontis",
"V.",
""
],
[
"Kaulakys",
"B.",
""
],
[
"Ruseckas",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0508132
|
Tran Cao Son
|
Tran Cao Son and Enrico Pontelli
|
Planning with Preferences using Logic Programming
|
47 pages, to appear in TPLP
| null | null | null |
cs.AI
| null |
We present a declarative language, PP, for the high-level specification of
preferences between possible solutions (or trajectories) of a planning problem.
This novel language allows users to elegantly express non-trivial,
multi-dimensional preferences and priorities over such preferences. The
semantics of PP allows the identification of most preferred trajectories for a
given goal. We also provide an answer set programming implementation of
planning problems with PP preferences.
|
[
{
"version": "v1",
"created": "Wed, 31 Aug 2005 14:50:22 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Son",
"Tran Cao",
""
],
[
"Pontelli",
"Enrico",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0508133
|
Boaz Tsaban
|
Boaz Tsaban
|
Decompositions of graphs of functions and efficient iterations of lookup
tables
|
Small updates
|
Discrete Applied Mathematics 155 (2007), 386--393
|
10.1016/j.dam.2006.06.006
| null |
cs.CC cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that every function f implemented as a lookup table can be
implemented such that the computational complexity of evaluating f^m(x) is
small, independently of m and x. The implementation only increases the storage
space by a small_constant_ factor.
|
[
{
"version": "v1",
"created": "Wed, 31 Aug 2005 17:56:40 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Oct 2005 13:47:44 GMT"
},
{
"version": "v3",
"created": "Thu, 17 May 2007 20:32:00 GMT"
},
{
"version": "v4",
"created": "Sun, 31 Oct 2010 20:25:52 GMT"
}
] | 2010-11-02T00:00:00 |
[
[
"Tsaban",
"Boaz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0509001
|
Xinzhou Wu
|
X. Wu and R. Srikant
|
Asymptotic Behavior of Error Exponents in the Wideband Regime
|
59 pages, 6 figures
| null | null | null |
cs.IT math.IT
| null |
In this paper, we complement Verd\'{u}'s work on spectral efficiency in the
wideband regime by investigating the fundamental tradeoff between rate and
bandwidth when a constraint is imposed on the error exponent. Specifically, we
consider both AWGN and Rayleigh-fading channels. For the AWGN channel model,
the optimal values of $R_z(0)$ and $\dot{R_z}(0)$ are calculated, where
$R_z(1/B)$ is the maximum rate at which information can be transmitted over a
channel with bandwidth $B/2$ when the error-exponent is constrained to be
greater than or equal to $z.$ Based on this calculation, we say that a sequence
of input distributions is near optimal if both $R_z(0)$ and $\dot{R_z}(0)$ are
achieved. We show that QPSK, a widely-used signaling scheme, is near-optimal
within a large class of input distributions for the AWGN channel. Similar
results are also established for a fading channel where full CSI is available
at the receiver.
|
[
{
"version": "v1",
"created": "Wed, 31 Aug 2005 20:55:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wu",
"X.",
""
],
[
"Srikant",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509002
|
Zsolt I. L\'az\'ar
|
Zsolt I. L\'az\'ar, Jouke R. Heringa, Bazil P\^arv, Simon W. de Leeuw
|
Component Based Programming in Scientific Computing: The Viable Approach
| null | null | null | null |
cs.CE
| null |
Computational scientists are facing a new era where the old ways of
developing and reusing code have to be left behind and a few daring steps are
to be made towards new horizons. The present work analyzes the needs that drive
this change, the factors that contribute to the inertia of the community and
slow the transition, the status and perspective of present attempts, the
principle, practical and technical problems that are to be addressed in the
short and long run.
|
[
{
"version": "v1",
"created": "Wed, 31 Aug 2005 21:57:04 GMT"
}
] | 2021-08-23T00:00:00 |
[
[
"Lázár",
"Zsolt I.",
""
],
[
"Heringa",
"Jouke R.",
""
],
[
"Pârv",
"Bazil",
""
],
[
"de Leeuw",
"Simon W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0509003
|
Zsolt I. L\'az\'ar
|
Zsolt I. L\'az\'ar, Lehel Istv\'an Kov\'acs, Bazil P\^arv
|
COMODI: Architecture for a Component-Based Scientific Computing System
|
7 pages, 3 figures
| null | null | null |
cs.CE
| null |
The COmputational MODule Integrator (COMODI) is an initiative aiming at a
component based framework, component developer tool and component repository
for scientific computing. We identify the main ingredients to a solution that
would be sufficiently appealing to scientists and engineers to consider
alternatives to their deeply rooted programming traditions. The overall
structure of the complete solution is sketched with special emphasis on the
Component Developer Tool standing at the basis of COMODI.
|
[
{
"version": "v1",
"created": "Wed, 31 Aug 2005 22:48:40 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Lázár",
"Zsolt I.",
""
],
[
"Kovács",
"Lehel István",
""
],
[
"Pârv",
"Bazil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0509004
|
Benjamin Leveque
|
Vincent Jost (Leibniz - IMAG), Benjamin L\'ev\^eque (Leibniz - IMAG),
Fr\'ed\'eric Maffray (Leibniz - IMAG)
|
Precoloring co-Meyniel graphs
| null |
Graphs and Combinatorics 23, 3 (07/07/2007) 291-301
|
10.1007/s00373-007-0724-1
| null |
cs.DM
| null |
The pre-coloring extension problem consists, given a graph $G$ and a subset
of nodes to which some colors are already assigned, in finding a coloring of
$G$ with the minimum number of colors which respects the pre-coloring
assignment. This can be reduced to the usual coloring problem on a certain
contracted graph. We prove that pre-coloring extension is polynomial for
complements of Meyniel graphs. We answer a question of Hujter and Tuza by
showing that ``PrExt perfect'' graphs are exactly the co-Meyniel graphs, which
also generalizes results of Hujter and Tuza and of Hertz. Moreover we show
that, given a co-Meyniel graph, the corresponding contracted graph belongs to a
restricted class of perfect graphs (``co-Artemis'' graphs, which are
``co-perfectly contractile'' graphs), whose perfectness is easier to establish
than the strong perfect graph theorem. However, the polynomiality of our
algorithm still depends on the ellipsoid method for coloring perfect graphs.
|
[
{
"version": "v1",
"created": "Fri, 2 Sep 2005 08:06:22 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Jost",
"Vincent",
"",
"Leibniz - IMAG"
],
[
"Lévêque",
"Benjamin",
"",
"Leibniz - IMAG"
],
[
"Maffray",
"Frédéric",
"",
"Leibniz - IMAG"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0509005
|
Anne-Marie Vercoustre
|
Alistair McLean (CSIRO Ict Center), Mingfang Wu (CSIRO Ict Center),
Anne-Marie Vercoustre (CSIRO Ict Center)
|
Combining Structured Corporate Data and Document Content to Improve
Expertise Finding
|
long version of the ADCS'03 paper
| null | null | null |
cs.IR
| null |
In this paper, we present an algorithm for automatically building expertise
evidence for finding experts within an organization by combining structured
corporate information with different content. We also describe our test data
collection and our evaluation method. Evaluation of the algorithm shows that
using organizational structure leads to a significant improvement in the
precision of finding an expert. Furthermore we evaluate the impact of using
different data sources on the quality of the results and conclude that Expert
Finding is not a "one engine fits all" solution. It requires an analysis of the
information space into which a solution will be placed and the appropriate
selection and weighting scheme of the data sources.
|
[
{
"version": "v1",
"created": "Fri, 2 Sep 2005 08:24:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"McLean",
"Alistair",
"",
"CSIRO Ict Center"
],
[
"Wu",
"Mingfang",
"",
"CSIRO Ict Center"
],
[
"Vercoustre",
"Anne-Marie",
"",
"CSIRO Ict Center"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0509006
|
Jean-Claude Belfiore
|
Sheng Yang and Jean-Claude Belfiore
|
Optimal space-time codes for the MIMO amplify-and-forward cooperative
channel
|
submitted to IEEE Transactions on Information Theory, revised version
| null | null | null |
cs.IT math.IT
| null |
In this work, we extend the non-orthogonal amplify-and-forward (NAF)
cooperative diversity scheme to the MIMO channel. A family of space-time block
codes for a half-duplex MIMO NAF fading cooperative channel with N relays is
constructed. The code construction is based on the non-vanishing determinant
criterion (NVD) and is shown to achieve the optimal diversity-multiplexing
tradeoff (DMT) of the channel. We provide a general explicit algebraic
construction, followed by some examples. In particular, in the single relay
case, it is proved that the Golden code and the 4x4 Perfect code are optimal
for the single-antenna and two-antenna case, respectively. Simulation results
reveal that a significant gain (up to 10dB) can be obtained with the proposed
codes, especially in the single-antenna case.
|
[
{
"version": "v1",
"created": "Fri, 2 Sep 2005 17:38:59 GMT"
},
{
"version": "v2",
"created": "Thu, 4 May 2006 07:54:33 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Yang",
"Sheng",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509007
|
Lars Rasmussen
|
Fredrik Brannstrom and Lars K. Rasmussen
|
Non-Data-Aided Parameter Estimation in an Additive White Gaussian Noise
Channel
| null | null | null | null |
cs.IT math.IT
| null |
Non-data-aided (NDA) parameter estimation is considered for
binary-phase-shift-keying transmission in an additive white Gaussian noise
channel. Cramer-Rao lower bounds (CRLBs) for signal amplitude, noise variance,
channel reliability constant and bit-error rate are derived and it is shown how
these parameters relate to the signal-to-noise ratio (SNR). An alternative
derivation of the iterative maximum likelihood (ML) SNR estimator is presented
together with a novel, low complexity NDA SNR estimator. The performance of the
proposed estimator is compared to previously suggested estimators and the CRLB.
The results show that the proposed estimator performs close to the iterative ML
estimator at significantly lower computational complexity.
|
[
{
"version": "v1",
"created": "Sun, 4 Sep 2005 02:12:40 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Brannstrom",
"Fredrik",
""
],
[
"Rasmussen",
"Lars K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509008
|
Naveen Singla
|
N. Singla, J. A. O'Sullivan
|
Joint Equalization and Decoding for Nonlinear Two-Dimensional
Intersymbol Interference Channels with Application to Optical Storage
|
12 pages, 4 figures, submitted to IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
| null |
An algorithm that performs joint equalization and decoding for nonlinear
two-dimensional intersymbol interference channels is presented. The algorithm
performs sum-product message-passing on a factor graph that represents the
underlying system. The two-dimensional optical storage (TWODOS) technology is
an example of a system with nonlinear two-dimensional intersymbol interference.
Simulations for the nonlinear channel model of TWODOS show significant
improvement in performance over uncoded performance. Noise tolerance thresholds
for the algorithm for the TWODOS channel, computed using density evolution, are
also presented and accurately predict the limiting performance of the algorithm
as the codeword length increases.
|
[
{
"version": "v1",
"created": "Sun, 4 Sep 2005 23:56:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Singla",
"N.",
""
],
[
"O'Sullivan",
"J. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509009
|
Naveen Singla
|
N. Singla, J. A. O'Sullivan
|
Joint Equalization and Decoding for Nonlinear Two-Dimensional
Intersymbol Interference Channels
|
5 pages, 3 figures, 2005 International Symposium on Information
Theory
| null | null | null |
cs.IT math.IT
| null |
An algorithm that performs joint equalization and decoding for channels with
nonlinear two-dimensional intersymbol interference is presented. The algorithm
performs sum-product message-passing on a factor graph that represents the
underlying system. The two-dimensional optical storage (TwoDOS) technology is
an example of a system with nonlinear two-dimensional intersymbol interference.
Simulations for the nonlinear channel model of TwoDOS show significant
improvement in performance over uncoded performance. Noise tolerance thresholds
for the TwoDOS channel computed using density evolution are also presented.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2005 00:23:40 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Singla",
"N.",
""
],
[
"O'Sullivan",
"J. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509010
|
Naveen Singla
|
N. Singla, J. A. O'Sullivan
|
Minimum Mean-Square-Error Equalization using Priors for Two-Dimensional
Intersymbol Interference
|
12 pages, 4 figures, submitted to IEEE Transactions on Communications
| null |
10.1109/ISIT.2004.1365168
| null |
cs.IT math.IT
| null |
Joint equalization and decoding schemes are described for two-dimensional
intersymbol interference (ISI) channels. Equalization is performed using the
minimum mean-square-error (MMSE) criterion. Low-density parity-check codes are
used for error correction. The MMSE schemes are the extension of those proposed
by Tuechler et al. (2002) for one-dimensional ISI channels. Extrinsic
information transfer charts, density evolution, and bit-error rate versus
signal-to-noise ratio curves are used to study the performance of the schemes.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2005 00:33:26 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Singla",
"N.",
""
],
[
"O'Sullivan",
"J. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509011
|
Zengyou He
|
Zengyou He, Xiaofei Xu, Shengchun Deng
|
Clustering Mixed Numeric and Categorical Data: A Cluster Ensemble
Approach
|
14 pages
| null | null |
Tr-2002-10
|
cs.AI
| null |
Clustering is a widely used technique in data mining applications for
discovering patterns in underlying data. Most traditional clustering algorithms
are limited to handling datasets that contain either numeric or categorical
attributes. However, datasets with mixed types of attributes are common in real
life data mining applications. In this paper, we propose a novel
divide-and-conquer technique to solve this problem. First, the original mixed
dataset is divided into two sub-datasets: the pure categorical dataset and the
pure numeric dataset. Next, existing well established clustering algorithms
designed for different types of datasets are employed to produce corresponding
clusters. Last, the clustering results on the categorical and numeric dataset
are combined as a categorical dataset, on which the categorical data clustering
algorithm is used to get the final clusters. Our contribution in this paper is
to provide an algorithm framework for the mixed attributes clustering problem,
in which existing clustering algorithms can be easily integrated, the
capabilities of different kinds of clustering algorithms and characteristics of
different types of datasets could be fully exploited. Comparisons with other
clustering algorithms on real life datasets illustrate the superiority of our
approach.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2005 02:47:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0509012
|
Tomasz Suslo
|
T. Suslo
|
Kriging Scenario For Capital Markets
|
5 pages, 3 figures, attachments: source code and input files
| null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An introduction to numerical statistics.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2005 08:04:06 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 12:57:36 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Jun 2009 14:13:02 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Jul 2009 11:06:15 GMT"
},
{
"version": "v5",
"created": "Sat, 1 Aug 2009 11:05:51 GMT"
}
] | 2009-08-01T00:00:00 |
[
[
"Suslo",
"T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0509013
|
Renato Renner
|
Renato Renner
|
On the variational distance of independently repeated experiments
|
8 pages
| null | null | null |
cs.IT math.IT
| null |
Let P and Q be two probability distributions which differ only for values
with non-zero probability. We show that the variational distance between the
n-fold product distributions P^n and Q^n cannot grow faster than the square
root of n.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2005 11:38:42 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Renner",
"Renato",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509014
|
Chih-Chun Wang
|
C.-C. Wang (1), S. R. Kulkarni (1), H. V. Poor (1) ((1) Princeton
University)
|
Density Evolution for Asymmetric Memoryless Channels
|
To appear in the IEEE Transactions on Information Theory
| null |
10.1109/TIT.2005.858931
| null |
cs.IT math.IT
| null |
Density evolution is one of the most powerful analytical tools for
low-density parity-check (LDPC) codes and graph codes with message passing
decoding algorithms. With channel symmetry as one of its fundamental
assumptions, density evolution (DE) has been widely and successfully applied to
different channels, including binary erasure channels, binary symmetric
channels, binary additive white Gaussian noise channels, etc. This paper
generalizes density evolution for non-symmetric memoryless channels, which in
turn broadens the applications to general memoryless channels, e.g. z-channels,
composite white Gaussian noise channels, etc. The central theorem underpinning
this generalization is the convergence to perfect projection for any fixed size
supporting tree. A new iterative formula of the same complexity is then
presented and the necessary theorems for the performance concentration theorems
are developed. Several properties of the new density evolution method are
explored, including stability results for general asymmetric memoryless
channels. Simulations, code optimizations, and possible new applications
suggested by this new density evolution method are also provided. This result
is also used to prove the typicality of linear LDPC codes among the coset code
ensemble when the minimum check node degree is sufficiently large. It is shown
that the convergence to perfect projection is essential to the belief
propagation algorithm even when only symmetric channels are considered. Hence
the proof of the convergence to perfect projection serves also as a completion
of the theory of classical density evolution for symmetric memoryless channels.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2005 01:18:04 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Wang",
"C. -C.",
""
],
[
"Kulkarni",
"S. R.",
""
],
[
"Poor",
"H. V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509015
|
Amr Elmasry
|
Ahmed Belal and Amr Elmasry
|
Optimal Prefix Codes with Fewer Distinct Codeword Lengths are Faster to
Construct
|
23 pages, a preliminary version appeared in STACS 2006
| null | null | null |
cs.DS cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new method for constructing minimum-redundancy binary prefix codes is
described. Our method does not explicitly build a Huffman tree; instead it uses
a property of optimal prefix codes to compute the codeword lengths
corresponding to the input weights. Let $n$ be the number of weights and $k$ be
the number of distinct codeword lengths as produced by the algorithm for the
optimum codes. The running time of our algorithm is $O(k \cdot n)$. Following
our previous work in \cite{be}, no algorithm can possibly construct optimal
prefix codes in $o(k \cdot n)$ time. When the given weights are presorted our
algorithm performs $O(9^k \cdot \log^{2k}{n})$ comparisons.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2005 10:58:22 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 2010 12:05:25 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Dec 2010 14:22:41 GMT"
},
{
"version": "v4",
"created": "Thu, 29 Sep 2016 15:28:49 GMT"
}
] | 2016-09-30T00:00:00 |
[
[
"Belal",
"Ahmed",
""
],
[
"Elmasry",
"Amr",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509016
|
Artur Adib
|
A. B. Adib
|
NP-hardness of the cluster minimization problem revisited
|
8 pages, 2 figures, accepted to J. Phys. A: Math. and Gen
|
J. Phys. A: Math. Gen. 38, 8487 (2005)
|
10.1088/0305-4470/38/40/001
| null |
cs.CC cond-mat.stat-mech physics.chem-ph
| null |
The computational complexity of the "cluster minimization problem" is
revisited [L. T. Wille and J. Vennik, J. Phys. A 18, L419 (1985)]. It is argued
that the original NP-hardness proof does not apply to pairwise potentials of
physical interest, such as those that depend on the geometric distance between
the particles. A geometric analog of the original problem is formulated, and a
new proof for such potentials is provided by polynomial time transformation
from the independent set problem for unit disk graphs. Limitations of this
formulation are pointed out, and new subproblems that bear more direct
consequences to the numerical study of clusters are suggested.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2005 14:09:15 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Adib",
"A. B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.chem-ph",
"description": "Experimental, computational, and theoretical physics of atoms, molecules, and clusters - Classical and quantum description of states, processes, and dynamics; spectroscopy, electronic structure, conformations, reactions, interactions, and phases. Chemical thermodynamics. Disperse systems. High pressure chemistry. Solid state chemistry. Surface and interface chemistry.",
"span": "(Chemical Physics)"
}
] |
cs/0509017
|
Gilles Daniel
|
Gilles Daniel, Lev Muchnik, Sorin Solomon
|
Traders imprint themselves by adaptively updating their own avatar
|
12 pages, 4 figures, draft of a paper submitted to Artificial
Economics 2005, September 15-16, Lille, France
| null | null | null |
cs.MA cs.CE
| null |
Simulations of artificial stock markets were considered as early as 1964 and
multi-agent ones were introduced as early as 1989. Starting the early 90's,
collaborations of economists and physicists produced increasingly realistic
simulation platforms. Currently, the market stylized facts are easily
reproduced and one has now to address the realistic details of the Market
Microstructure and of the Traders Behaviour. This calls for new methods and
tools capable of bridging smoothly between simulations and experiments in
economics.
We propose here the following Avatar-Based Method (ABM). The subjects
implement and maintain their Avatars (programs encoding their personal decision
making procedures) on NatLab, a market simulation platform. Once these
procedures are fed in a computer edible format, they can be operationally used
as such without the need for belabouring, interpreting or conceptualising them.
Thus ABM short-circuits the usual behavioural economics experiments that search
for the psychological mechanisms underlying the subjects behaviour. Finally,
ABM maintains a level of objectivity close to the classical behaviourism while
extending its scope to subjects' decision making mechanisms.
We report on experiments where Avatars designed and maintained by humans from
different backgrounds (including real traders) compete in a continuous
double-auction market. We hope this unbiased way of capturing the adaptive
evolution of real subjects behaviour may lead to a new kind of behavioural
economics experiments with a high degree of reliability, analysability and
reproducibility.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2005 17:02:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Daniel",
"Gilles",
""
],
[
"Muchnik",
"Lev",
""
],
[
"Solomon",
"Sorin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0509018
|
David S. H. Rosenthal
|
David S. H. Rosenthal, Thomas S. Robertson, Tom Lipkis, Vicky Reich,
Seth Morabito
|
Requirements for Digital Preservation Systems: A Bottom-Up Approach
| null | null | null | null |
cs.DL
| null |
The field of digital preservation is being defined by a set of standards
developed top-down, starting with an abstract reference model (OAIS) and
gradually adding more specific detail. Systems claiming conformance to these
standards are entering production use. Work is underway to certify that systems
conform to requirements derived from OAIS.
We complement these requirements derived top-down by presenting an alternate,
bottom-up view of the field. The fundamental goal of these systems is to ensure
that the information they contain remains accessible for the long term. We
develop a parallel set of requirements based on observations of how existing
systems handle this task, and on an analysis of the threats to achieving the
goal. On this basis we suggest disclosures that systems should provide as to
how they satisfy their goals.
|
[
{
"version": "v1",
"created": "Tue, 6 Sep 2005 19:26:08 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Sep 2005 20:17:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rosenthal",
"David S. H.",
""
],
[
"Robertson",
"Thomas S.",
""
],
[
"Lipkis",
"Tom",
""
],
[
"Reich",
"Vicky",
""
],
[
"Morabito",
"Seth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0509019
|
Dag Normann
|
Dag Normann
|
Comparing hierarchies of total functionals
|
28 pages
|
Logical Methods in Computer Science, Volume 1, Issue 2 (October 5,
2005) lmcs:2268
|
10.2168/LMCS-1(2:4)2005
| null |
cs.LO
| null |
In this paper we consider two hierarchies of hereditarily total and
continuous functionals over the reals based on one extensional and one
intensional representation of real numbers, and we discuss under which
asumptions these hierarchies coincide. This coincidense problem is equivalent
to a statement about the topology of the Kleene-Kreisel continuous functionals.
As a tool of independent interest, we show that the Kleene-Kreisel functionals
may be embedded into both these hierarchies.
|
[
{
"version": "v1",
"created": "Wed, 7 Sep 2005 08:32:32 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2005 13:00:35 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Sep 2005 10:13:16 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Normann",
"Dag",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0509020
|
Johannes Stegmann Dr.
|
Johannes Stegmann, Guenter Grohmann (Charite, Berlin)
|
Transitive Text Mining for Information Extraction and Hypothesis
Generation
|
12 pages, 6 figures
| null | null | null |
cs.IR cs.AI
| null |
Transitive text mining - also named Swanson Linking (SL) after its primary
and principal researcher - tries to establish meaningful links between
literature sets which are virtually disjoint in the sense that each does not
mention the main concept of the other. If successful, SL may give rise to the
development of new hypotheses. In this communication we describe our approach
to transitive text mining which employs co-occurrence analysis of the medical
subject headings (MeSH), the descriptors assigned to papers indexed in PubMed.
In addition, we will outline the current state of our web-based information
system which will enable our users to perform literature-driven hypothesis
building on their own.
|
[
{
"version": "v1",
"created": "Wed, 7 Sep 2005 12:16:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Stegmann",
"Johannes",
"",
"Charite, Berlin"
],
[
"Grohmann",
"Guenter",
"",
"Charite, Berlin"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0509021
|
Kambiz Azarian
|
Kambiz Azarian and Hesham El Gamal
|
The Throughput-Reliability Tradeoff in MIMO Channels
|
30 pages, 15 figures, Submitted to IEEE transactions on Information
Theory
| null | null | null |
cs.IT math.IT
| null |
In this paper, an outage limited MIMO channel is considered. We build on
Zheng and Tse's elegant formulation of the diversity-multiplexing tradeoff to
develop a better understanding of the asymptotic relationship between the
probability of error, transmission rate, and signal-to-noise ratio. In
particular, we identify the limitation imposed by the multiplexing gain notion
and develop a new formulation for the throughput-reliability tradeoff that
avoids this limitation. The new characterization is then used to elucidate the
asymptotic trends exhibited by the outage probability curves of MIMO channels.
|
[
{
"version": "v1",
"created": "Wed, 7 Sep 2005 17:49:42 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Azarian",
"Kambiz",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509022
|
Brandon Westover
|
M. Brandon Westover, Joseph A. O'Sullivan
|
Achievable Rates for Pattern Recognition
| null | null | null | null |
cs.IT cs.CV math.IT
| null |
Biological and machine pattern recognition systems face a common challenge:
Given sensory data about an unknown object, classify the object by comparing
the sensory data with a library of internal representations stored in memory.
In many cases of interest, the number of patterns to be discriminated and the
richness of the raw data force recognition systems to internally represent
memory and sensory information in a compressed format. However, these
representations must preserve enough information to accommodate the variability
and complexity of the environment, or else recognition will be unreliable.
Thus, there is an intrinsic tradeoff between the amount of resources devoted to
data representation and the complexity of the environment in which a
recognition system may reliably operate.
In this paper we describe a general mathematical model for pattern
recognition systems subject to resource constraints, and show how the
aforementioned resource-complexity tradeoff can be characterized in terms of
three rates related to number of bits available for representing memory and
sensory data, and the number of patterns populating a given statistical
environment. We prove single-letter information theoretic bounds governing the
achievable rates, and illustrate the theory by analyzing the elementary cases
where the pattern data is either binary or Gaussian.
|
[
{
"version": "v1",
"created": "Thu, 8 Sep 2005 06:30:34 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Westover",
"M. Brandon",
""
],
[
"O'Sullivan",
"Joseph A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509023
|
Benjamin Leveque
|
Kathie Cameron (WLU), Jack Edmonds (EP INSTITUTE), Benjamin
L\'ev\^eque (LGS), Fr\'ed\'eric Maffray (LGS)
|
Coloring vertices of a graph or finding a Meyniel obstruction
| null | null | null | null |
cs.DM
| null |
A Meyniel obstruction is an odd cycle with at least five vertices and at most
one chord. A graph is Meyniel if and only if it has no Meyniel obstruction as
an induced subgraph. Here we give a O(n^2) algorithm that, for any graph, finds
either a clique and coloring of the same size or a Meyniel obstruction. We also
give a O(n^3) algorithm that, for any graph, finds either aneasily recognizable
strong stable set or a Meyniel obstruction.
|
[
{
"version": "v1",
"created": "Thu, 8 Sep 2005 15:26:02 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Oct 2005 07:26:32 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Nov 2007 14:35:47 GMT"
}
] | 2007-11-13T00:00:00 |
[
[
"Cameron",
"Kathie",
"",
"WLU"
],
[
"Edmonds",
"Jack",
"",
"EP INSTITUTE"
],
[
"Lévêque",
"Benjamin",
"",
"LGS"
],
[
"Maffray",
"Frédéric",
"",
"LGS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0509024
|
Nikolay Pelov
|
Nikolay Pelov, Marc Denecker, Maurice Bruynooghe
|
Well-founded and Stable Semantics of Logic Programs with Aggregates
|
54 pages; To appear in Theory and Practice of Logic Programming
(TPLP)
| null | null | null |
cs.LO
| null |
In this paper, we present a framework for the semantics and the computation
of aggregates in the context of logic programming. In our study, an aggregate
can be an arbitrary interpreted second order predicate or function. We define
extensions of the Kripke-Kleene, the well-founded and the stable semantics for
aggregate programs. The semantics is based on the concept of a three-valued
immediate consequence operator of an aggregate program. Such an operator
approximates the standard two-valued immediate consequence operator of the
program, and induces a unique Kripke-Kleene model, a unique well-founded model
and a collection of stable models. We study different ways of defining such
operators and thus obtain a framework of semantics, offering different
trade-offs between precision and tractability. In particular, we investigate
conditions on the operator that guarantee that the computation of the three
types of semantics remains on the same level as for logic programs without
aggregates. Other results show that, in practice, even efficient three-valued
immediate consequence operators which are very low in the precision hierarchy,
still provide optimal precision.
|
[
{
"version": "v1",
"created": "Thu, 8 Sep 2005 19:54:53 GMT"
},
{
"version": "v2",
"created": "Mon, 15 May 2006 18:41:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pelov",
"Nikolay",
""
],
[
"Denecker",
"Marc",
""
],
[
"Bruynooghe",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0509025
|
Jeremy Avigad
|
Jeremy Avigad, Kevin Donnelly, David Gray, and Paul Raff
|
A formally verified proof of the prime number theorem
|
23 pages
| null | null | null |
cs.AI cs.LO cs.SC
| null |
The prime number theorem, established by Hadamard and de la Vall'ee Poussin
independently in 1896, asserts that the density of primes in the positive
integers is asymptotic to 1 / ln x. Whereas their proofs made serious use of
the methods of complex analysis, elementary proofs were provided by Selberg and
Erd"os in 1948. We describe a formally verified version of Selberg's proof,
obtained using the Isabelle proof assistant.
|
[
{
"version": "v1",
"created": "Fri, 9 Sep 2005 15:47:35 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Jan 2006 21:18:33 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Apr 2006 20:27:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Avigad",
"Jeremy",
""
],
[
"Donnelly",
"Kevin",
""
],
[
"Gray",
"David",
""
],
[
"Raff",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.