id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0509026
|
Mikkel Thorup
|
Nick Duffield, Carsten Lund, Mikkel Thorup
|
Sampling to estimate arbitrary subset sums
| null | null | null | null |
cs.DS
| null |
Starting with a set of weighted items, we want to create a generic sample of
a certain size that we can later use to estimate the total weight of arbitrary
subsets. For this purpose, we propose priority sampling which tested on
Internet data performed better than previous methods by orders of magnitude.
Priority sampling is simple to define and implement: we consider a steam of
items i=0,...,n-1 with weights w_i. For each item i, we generate a random
number r_i in (0,1) and create a priority q_i=w_i/r_i. The sample S consists of
the k highest priority items. Let t be the (k+1)th highest priority. Each
sampled item i in S gets a weight estimate W_i=max{w_i,t}, while non-sampled
items get weight estimate W_i=0.
Magically, it turns out that the weight estimates are unbiased, that is,
E[W_i]=w_i, and by linearity of expectation, we get unbiased estimators over
any subset sum simply by adding the sampled weight estimates from the subset.
Also, we can estimate the variance of the estimates, and surpricingly, there is
no co-variance between different weight estimates W_i and W_j.
We conjecture an extremely strong near-optimality; namely that for any weight
sequence, there exists no specialized scheme for sampling k items with unbiased
estimators that gets smaller total variance than priority sampling with k+1
items. Very recently Mario Szegedy has settled this conjecture.
|
[
{
"version": "v1",
"created": "Fri, 9 Sep 2005 21:47:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Duffield",
"Nick",
""
],
[
"Lund",
"Carsten",
""
],
[
"Thorup",
"Mikkel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0509027
|
Laemmel
|
Oleg Kiselyov and Ralf Laemmel
|
Haskell's overlooked object system
|
79 pages; software available at
http://homepages.cwi.nl/~ralf/OOHaskell/
| null | null | null |
cs.PL
| null |
Haskell provides type-class-bounded and parametric polymorphism as opposed to
subtype polymorphism of object-oriented languages such as Java and OCaml. It is
a contentious question whether Haskell 98 without extensions, or with common
extensions, or with new extensions can fully support conventional
object-oriented programming with encapsulation, mutable state, inheritance,
overriding, statically checked implicit and explicit subtyping, and so on. We
systematically substantiate that Haskell 98, with some common extensions,
supports all the conventional OO features plus more advanced ones, including
first-class lexically scoped classes, implicitly polymorphic classes, flexible
multiple inheritance, safe downcasts and safe co-variant arguments. Haskell
indeed can support width and depth, structural and nominal subtyping. We
address the particular challenge to preserve Haskell's type inference even for
objects and object-operating functions. The OO features are introduced in
Haskell as the OOHaskell library. OOHaskell lends itself as a sandbox for typed
OO language design.
|
[
{
"version": "v1",
"created": "Sat, 10 Sep 2005 12:35:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kiselyov",
"Oleg",
""
],
[
"Laemmel",
"Ralf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0509028
|
Erhan Bayraktar
|
Erhan Bayraktar, Li Chen, H. Vincent Poor
|
Projecting the Forward Rate Flow onto a Finite Dimensional Manifold
|
To appear in the International Journal of Theoretical and Applied
Finance
| null | null | null |
cs.CE cs.IT math.IT
| null |
Given a Heath-Jarrow-Morton (HJM) interest rate model $\mathcal{M}$ and a
parametrized family of finite dimensional forward rate curves $\mathcal{G}$,
this paper provides a technique for projecting the infinite dimensional forward
rate curve $r_{t}$ given by $\mathcal{M}$ onto the finite dimensional manifold
$\mathcal{G}$.The Stratonovich dynamics of the projected finite dimensional
forward curve are derived and it is shown that, under the regularity
conditions, the given Stratonovich differential equation has a unique strong
solution. Moreover, this projection leads to an efficient algorithm for
implicit parametric estimation of the infinite dimensional HJM model. The
feasibility of this method is demonstrated by applying the generalized method
of moments.
|
[
{
"version": "v1",
"created": "Sat, 10 Sep 2005 14:01:02 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Bayraktar",
"Erhan",
""
],
[
"Chen",
"Li",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509029
|
Erhan Bayraktar
|
Erhan Bayraktar, H. Vincent Poor
|
Quickest detection of a minimum of disorder times
|
To appear in the SIAM Journal on Control and Optimization
| null | null | null |
cs.CE cs.IT math.IT
| null |
A multi-source quickest detection problem is considered. Assume there are two
independent Poisson processes $X^{1}$ and $X^{2}$ with disorder times
$\theta_{1}$ and $\theta_{2}$, respectively; that is, the intensities of $X^1$
and $X^2$ change at random unobservable times $\theta_1$ and $\theta_2$,
respectively. $\theta_1$ and $\theta_2$ are independent of each other and are
exponentially distributed. Define $\theta \triangleq \theta_1 \wedge
\theta_2=\min\{\theta_{1},\theta_{2}\}$ . For any stopping time $\tau$ that is
measurable with respect to the filtration generated by the observations define
a penalty function of the form \[ R_{\tau}=\mathbb{P}(\tau<\theta)+c
\mathbb{E}[(\tau-\theta)^{+}], \] where $c>0$ and $(\tau-\theta)^{+}$ is the
positive part of $\tau-\theta$. It is of interest to find a stopping time
$\tau$ that minimizes the above performance index. Since both observations
$X^{1}$ and $X^{2}$ reveal information about the disorder time $\theta$, even
this simple problem is more involved than solving the disorder problems for
$X^{1}$ and $X^{2}$ separately. This problem is formulated in terms of a three
dimensional sufficient statistic, and the corresponding optimal stopping
problem is examined. A two dimensional optimal stopping problem whose optimal
stopping time turns out to coincide with the optimal stopping time of the
original problem for some range of parameters is also solved. The value
function of this problem serves as a tight upper bound for the original
problem's value function. The two solutions are characterized by iterating
suitable functional operators.
|
[
{
"version": "v1",
"created": "Sat, 10 Sep 2005 14:24:44 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Sep 2005 04:22:00 GMT"
},
{
"version": "v3",
"created": "Sun, 29 Oct 2006 21:54:12 GMT"
},
{
"version": "v4",
"created": "Wed, 25 Apr 2007 13:37:08 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bayraktar",
"Erhan",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509030
|
Liu Jun-Bao Dr.
|
Liu Jun-Bao, Xiao Guo-Zhen
|
Multi-Proxy Multi-Signcryption Scheme from Pairings
|
4 pages
| null | null | null |
cs.CR
| null |
A first multi-proxy multi-signcryption scheme from pairings, which
efficiently combines a multi-proxy multi-signature scheme with a signcryption,
is proposed. Its security is analyzed in detail. In our scheme, a proxy
signcrypter group could be authorized as a proxy agent by the cooperation of
all members in the original signcrypter group. Then the proxy signcryptions can
be generated by the cooperation of all the signcrypters in the authorized proxy
signcrypter group on behalf of the original signcrypter group. The correctness
and the security of this scheme are proved.
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2005 12:51:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jun-Bao",
"Liu",
""
],
[
"Guo-Zhen",
"Xiao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0509031
|
David S. Johnson
|
Janos Csirik, David S. Johnson, and Claire Kenyon
|
On the Worst-case Performance of the Sum-of-Squares Algorithm for Bin
Packing
| null | null | null | null |
cs.DS
| null |
The Sum of Squares algorithm for bin packing was defined in [2] and studied
in great detail in [1], where it was proved that its worst case performance
ratio is at most 3. In this note, we improve the asymptotic worst case bound to
2.7777...
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2005 14:49:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Csirik",
"Janos",
""
],
[
"Johnson",
"David S.",
""
],
[
"Kenyon",
"Claire",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0509032
|
Ke Xu
|
Ke Xu, Frederic Boussemart, Fred Hemery and Christophe Lecoutre
|
A Simple Model to Generate Hard Satisfiable Instances
|
Proc. of 19th IJCAI, pp.337-342, Edinburgh, Scotland, 2005. For more
information, please click
http://www.nlsde.buaa.edu.cn/~kexu/papers/ijcai05-abstract.htm
| null | null | null |
cs.AI cond-mat.stat-mech cs.CC
| null |
In this paper, we try to further demonstrate that the models of random CSP
instances proposed by [Xu and Li, 2000; 2003] are of theoretical and practical
interest. Indeed, these models, called RB and RD, present several nice
features. First, it is quite easy to generate random instances of any arity
since no particular structure has to be integrated, or property enforced, in
such instances. Then, the existence of an asymptotic phase transition can be
guaranteed while applying a limited restriction on domain size and on
constraint tightness. In that case, a threshold point can be precisely located
and all instances have the guarantee to be hard at the threshold, i.e., to have
an exponential tree-resolution complexity. Next, a formal analysis shows that
it is possible to generate forced satisfiable instances whose hardness is
similar to unforced satisfiable ones. This analysis is supported by some
representative results taken from an intensive experimentation that we have
carried out, using complete and incomplete search methods.
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2005 13:30:16 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Xu",
"Ke",
""
],
[
"Boussemart",
"Frederic",
""
],
[
"Hemery",
"Fred",
""
],
[
"Lecoutre",
"Christophe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0509033
|
Zengyou He
|
Zengyou He, Xiaofei Xu, Shengchun Deng, Bin Dong
|
K-Histograms: An Efficient Clustering Algorithm for Categorical Dataset
|
11 pages
| null | null |
Tr-2003-08
|
cs.AI
| null |
Clustering categorical data is an integral part of data mining and has
attracted much attention recently. In this paper, we present k-histogram, a new
efficient algorithm for clustering categorical data. The k-histogram algorithm
extends the k-means algorithm to categorical domain by replacing the means of
clusters with histograms, and dynamically updates histograms in the clustering
process. Experimental results on real datasets show that k-histogram algorithm
can produce better clustering results than k-modes algorithm, the one related
with our work most closely.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2005 06:33:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
],
[
"Dong",
"Bin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0509034
|
Maurice Pouzet
|
Maurice Pouzet (ICJ), Nejib Zaguia (SITE)
|
N-free extensions of posets.Note on a theorem of P.A.Grillet
|
7 pages, 4 pictures
| null | null | null |
cs.DM
| null |
Let $S\_{N}(P)$ be the poset obtained by adding a dummy vertex on each
diagonal edge of the $N$'s of a finite poset $P$. We show that
$S\_{N}(S\_{N}(P))$ is $N$-free. It follows that this poset is the smallest
$N$-free barycentric subdivision of the diagram of $P$, poset whose existence
was proved by P.A. Grillet. This is also the poset obtained by the algorithm
starting with $P\_0:=P$ and consisting at step $m$ of adding a dummy vertex on
a diagonal edge of some $N$ in $P\_m$, proving that the result of this
algorithm does not depend upon the particular choice of the diagonal edge
choosen at each step. These results are linked to drawing of posets.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2005 08:29:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pouzet",
"Maurice",
"",
"ICJ"
],
[
"Zaguia",
"Nejib",
"",
"SITE"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0509035
|
Shujun Li Dr.
|
Shujun Li, Guanrong Chen, Albert Cheung and Kwok-Tung Lo
|
Cryptanalysis of an MPEG-Video Encryption Scheme Based on Secret Huffman
Tables
|
8 pages, 4 figures
|
Advances in Image and Video Technology - Third Pacific Rim
Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings,
Lecture Notes in Computer Science, vol. 5414, pp. 898-909, 2009
|
10.1007/978-3-540-92957-4_78
| null |
cs.MM cs.CR
| null |
This paper studies the security of a recently-proposed MPEG-video encryption
scheme based on secret Huffman tables. Our cryptanalysis shows that: 1) the key
space of the encryption scheme is not sufficiently large against
divide-and-conquer (DAC) attack and known-plaintext attack; 2) it is possible
to decrypt a cipher-video with a partially-known key, thus dramatically
reducing the complexity of the DAC brute-force attack in some cases; 3) its
security against the chosen-plaintext attack is very weak. Some experimental
results are included to support the cryptanalytic results with a brief discuss
on how to improve this MPEG-video encryption scheme.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2005 10:44:31 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Oct 2007 15:45:10 GMT"
}
] | 2010-06-23T00:00:00 |
[
[
"Li",
"Shujun",
""
],
[
"Chen",
"Guanrong",
""
],
[
"Cheung",
"Albert",
""
],
[
"Lo",
"Kwok-Tung",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0509036
|
Shujun Li Dr.
|
Shujun Li and Kwok-Tung Lo
|
Security Problems with Improper Implementations of Improved FEA-M
|
8 pages, elsart.cls
|
Journal of Systems and Software, vol. 80, no. 5, pp. 791-794, 2007
|
10.1016/j.jss.2006.05.002
| null |
cs.CR cs.MM
| null |
This paper reports security problems with improper implementations of an
improved version of FEA-M (fast encryption algorithm for multimedia). It is
found that an implementation-dependent differential chosen-plaintext attack or
its chosen-ciphertext counterpart can reveal the secret key of the
cryptosystem, if the involved (pseudo-)random process can be tampered (for
example, through a public time service). The implementation-dependent
differential attack is very efficient in complexity and needs only $O(n^2)$
chosen plaintext or ciphertext bits. In addition, this paper also points out a
minor security problem with the selection of the session key. In real
implementations of the cryptosystem, these security problems should be
carefully avoided, or the cryptosystem has to be further enhanced to work under
such weak implementations.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2005 10:35:52 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Jun 2006 12:20:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Li",
"Shujun",
""
],
[
"Lo",
"Kwok-Tung",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0509037
|
David Hales
|
David Hales, Stefano Arteconi
|
Friends for Free: Self-Organizing Artificial Social Networks for Trust
and Cooperation
| null | null | null | null |
cs.MA
| null |
By harvesting friendship networks from e-mail contacts or instant message
"buddy lists" Peer-to-Peer (P2P) applications can improve performance in low
trust environments such as the Internet. However, natural social networks are
not always suitable, reliable or available. We propose an algorithm (SLACER)
that allows peer nodes to create and manage their own friendship networks.
We evaluate performance using a canonical test application, requiring
cooperation between peers for socially optimal outcomes. The Artificial Social
Networks (ASN) produced are connected, cooperative and robust - possessing many
of the disable properties of human friendship networks such as trust between
friends (directly linked peers) and short paths linking everyone via a chain of
friends.
In addition to new application possibilities, SLACER could supply ASN to P2P
applications that currently depend on human social networks thus transforming
them into fully autonomous, self-managing systems.
|
[
{
"version": "v1",
"created": "Wed, 14 Sep 2005 07:30:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hales",
"David",
""
],
[
"Arteconi",
"Stefano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0509038
|
Vilhelm Dahll\"of
|
Vilhelm Dahllof
|
Algorithms for Max Hamming Exact Satisfiability
| null | null | null | null |
cs.DS
| null |
We here study Max Hamming XSAT, ie, the problem of finding two XSAT models at
maximum Hamming distance. By using a recent XSAT solver as an auxiliary
function, an O(1.911^n) time algorithm can be constructed, where n is the
number of variables. This upper time bound can be further improved to
O(1.8348^n) by introducing a new kind of branching, more directly suited for
finding models at maximum Hamming distance. The techniques presented here are
likely to be of practical use as well as of theoretical value, proving that
there are non-trivial algorithms for maximum Hamming distance problems.
|
[
{
"version": "v1",
"created": "Wed, 14 Sep 2005 09:04:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dahllof",
"Vilhelm",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0509039
|
Neri Merhav
|
Neri Merhav and Tsachy Weissman
|
Coding for the feedback Gel'fand-Pinsker channel and the feedforward
Wyner-Ziv source
| null | null | null | null |
cs.IT math.IT
| null |
We consider both channel coding and source coding, with perfect past
feedback/feedforward, in the presence of side information. It is first observed
that feedback does not increase the capacity of the Gel'fand-Pinsker channel,
nor does feedforward improve the achievable rate-distortion performance in the
Wyner-Ziv problem. We then focus on the Gaussian case showing that, as in the
absence of side information, feedback/feedforward allows to efficiently attain
the respective performance limits. In particular, we derive schemes via
variations on that of Schalkwijk and Kailath. These variants, which are as
simple as their origins and require no binning, are shown to achieve,
respectively, the capacity of Costa's channel, and the Wyner-Ziv rate
distortion function. Finally, we consider the finite-alphabet setting and
derive schemes for both the channel and the source coding problems that attain
the fundamental limits, using variations on schemes of Ahlswede and Ooi and
Wornell, and of Martinian and Wornell, respectively.
|
[
{
"version": "v1",
"created": "Wed, 14 Sep 2005 09:37:49 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Merhav",
"Neri",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509040
|
Christian Betz
|
Christian Betz, Alexander Hoernlein and Frank Puppe
|
Authoring case based training by document data extraction
|
11 pages, 10th ChEM Workshop, 2005; technical article
| null | null | null |
cs.AI cs.IR
| null |
In this paper, we propose an scalable approach to modeling based upon word
processing documents, and we describe the tool Phoenix providing the technical
infrastructure.
For our training environment d3web.Train, we developed a tool to extract case
knowledge from existing documents, usually dismissal records, extending Phoenix
to d3web.CaseImporter. Independent authors used this tool to develop training
systems, observing a significant decrease of time for setteling-in and a
decrease of time necessary for developing a case.
|
[
{
"version": "v1",
"created": "Wed, 14 Sep 2005 13:20:21 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Betz",
"Christian",
""
],
[
"Hoernlein",
"Alexander",
""
],
[
"Puppe",
"Frank",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0509041
|
Matthieu Bloch
|
Matthieu Bloch, Andrew Thangaraj and Steven W. McLaughlin
|
Efficient Reconciliation of Correlated Continuous Random Variables using
LDPC Codes
|
9 pages, 9 figures
| null | null | null |
cs.IT math.IT
| null |
This paper investigates an efficient and practical information reconciliation
method in the case where two parties have access to correlated continuous
random variables. We show that reconciliation is a special case of channel
coding and that existing coded modulation techniques can be adapted for
reconciliation. We describe an explicit reconciliation method based on LDPC
codes in the case of correlated Gaussian variables. We believe that the
proposed method can improve the efficiency of quantum key distribution
protocols based on continuous-spectrum quantum states.
|
[
{
"version": "v1",
"created": "Wed, 14 Sep 2005 13:45:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bloch",
"Matthieu",
""
],
[
"Thangaraj",
"Andrew",
""
],
[
"McLaughlin",
"Steven W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509042
|
Mark Braverman
|
Mark Braverman, Stephen Cook
|
Computing over the Reals: Foundations for Scientific Computing
| null | null | null | null |
cs.CC cs.LO
| null |
We give a detailed treatment of the ``bit-model'' of computability and
complexity of real functions and subsets of R^n, and argue that this is a good
way to formalize many problems of scientific computation. In the introduction
we also discuss the alternative Blum-Shub-Smale model. In the final section we
discuss the issue of whether physical systems could defeat the Church-Turing
Thesis.
|
[
{
"version": "v1",
"created": "Wed, 14 Sep 2005 17:58:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Braverman",
"Mark",
""
],
[
"Cook",
"Stephen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0509043
|
Anke Feiten
|
Anke Feiten and Rudolf Mathar
|
Optimal Power Control for Multiuser CDMA Channels
|
To appear in the proceedings of the 2005 IEEE International Symposium
on Information Theory, Adelaide, Australia, September 4-9, 2005
| null | null | null |
cs.IT math.IT
| null |
In this paper, we define the power region as the set of power allocations for
K users such that everybody meets a minimum signal-to-interference ratio (SIR).
The SIR is modeled in a multiuser CDMA system with fixed linear receiver and
signature sequences. We show that the power region is convex in linear and
logarithmic scale. It furthermore has a componentwise minimal element. Power
constraints are included by the intersection with the set of all viable power
adjustments.
In this framework, we aim at minimizing the total expended power by
minimizing a componentwise monotone functional. If the feasible power region is
nonempty, the minimum is attained. Otherwise, as a solution to balance
conflicting interests, we suggest the projection of the minimum point in the
power region onto the set of viable power settings. Finally, with an
appropriate utility function, the problem of minimizing the total expended
power can be seen as finding the Nash bargaining solution, which sheds light on
power assignment from a game theoretic point of view. Convexity and
componentwise monotonicity are essential prerequisites for this result.
|
[
{
"version": "v1",
"created": "Thu, 15 Sep 2005 03:53:22 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Feiten",
"Anke",
""
],
[
"Mathar",
"Rudolf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509044
|
Igal Sason
|
Henry D. Pfister and Igal Sason
|
Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the
Binary Erasure Channel Capacity with Bounded Complexity
|
15 pages, 3 figures (please ignore the 16th page in the PDF file,
which appears as a result of a temporary problem in the compilation of the
PDF; however, the PS file is indeed 15 pages). The paper will be presented in
the Forty-Third Annual Allerton Conference on Communication, Control and
Computing, Monticello, IL, USA, Sept. 28-30, 2005
| null | null | null |
cs.IT math.IT
| null |
The paper introduces ensembles of accumulate-repeat-accumulate (ARA) codes
which asymptotically achieve capacity on the binary erasure channel (BEC) with
{\em bounded complexity} per information bit. It also introduces symmetry
properties which play a central role in the construction of capacity-achieving
ensembles for the BEC. The results here improve on the tradeoff between
performance and complexity provided by the first capacity-achieving ensembles
of irregular repeat-accumulate (IRA) codes with bounded complexity per
information bit; these IRA ensembles were previously constructed by Pfister,
Sason and Urbanke. The superiority of ARA codes with moderate to large block
length is exemplified by computer simulations which compare their performance
with those of previously reported capacity-achieving ensembles of LDPC and IRA
codes. The ARA codes also have the advantage of being systematic.
|
[
{
"version": "v1",
"created": "Thu, 15 Sep 2005 16:15:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Pfister",
"Henry D.",
""
],
[
"Sason",
"Igal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509045
|
Gadiel Seroussi
|
Hendrik W. Lenstra and Gadiel Seroussi
|
On Hats and other Covers
|
IEEE International Symposium on Information Theory, Lausanne,
Switzerland, July 2002
| null | null | null |
cs.IT math.IT
| null |
We study a game puzzle that has enjoyed recent popularity among
mathematicians, computer scientist, coding theorists and even the mass press.
In the game, $n$ players are fitted with randomly assigned colored hats.
Individual players can see their teammates' hat colors, but not their own.
Based on this information, and without any further communication, each player
must attempt to guess his hat color, or pass. The team wins if there is at
least one correct guess, and no incorrect ones. The goal is to devise guessing
strategies that maximize the team winning probability. We show that for the
case of two hat colors, and for any value of $n$, playing strategies are
equivalent to binary covering codes of radius one. This link, in particular
with Hamming codes, had been observed for values of $n$ of the form $2^m-1$. We
extend the analysis to games with hats of $q$ colors, $q\geq 2$, where
1-coverings are not sufficient to characterize the best strategies. Instead, we
introduce the more appropriate notion of a {\em strong covering}, and show
efficient constructions of these coverings, which achieve winning probabilities
approaching unity. Finally, we briefly discuss results on variants of the
problem, including arbitrary input distributions, randomized playing
strategies, and symmetric strategies.
|
[
{
"version": "v1",
"created": "Thu, 15 Sep 2005 18:30:35 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Lenstra",
"Hendrik W.",
""
],
[
"Seroussi",
"Gadiel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509046
|
Gadiel Seroussi
|
Gadiel Seroussi
|
On the number of t-ary trees with a given path length
|
July 2007: added journal reference and DOI, updated references, minor
typographical corrections
|
Algorithmica, Vol. 46, No. 3, pp. 557--565, 2006
|
10.1007/s00453-006-0122-8
| null |
cs.DM cs.IT math.IT
| null |
We show that the number of $t$-ary trees with path length equal to $p$ is
$\exp(h(t^{-1})t\log t \frac{p}{\log p}(1+o(1)))$, where
$\entropy(x){=}{-}x\log x {-}(1{-}x)\log (1{-}x)$ is the binary entropy
function. Besides its intrinsic combinatorial interest, the question recently
arose in the context of information theory, where the number of $t$-ary trees
with path length $p$ estimates the number of universal types, or, equivalently,
the number of different possible Lempel-Ziv'78 dictionaries for sequences of
length $p$ over an alphabet of size $t$.
|
[
{
"version": "v1",
"created": "Thu, 15 Sep 2005 23:47:21 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jul 2007 18:25:43 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Seroussi",
"Gadiel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509047
|
Hirosuke Yamamoto
|
Daisuke Kobayashi, Hirosuke Yamamoto, Tomohiro Ogawa
|
Secure multiplex coding to attain the channel capacity in wiretap
channels
|
15 pages, submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.CR math.IT
| null |
It is known that a message can be transmitted safely against any wiretapper
via a noisy channel without a secret key if the coding rate is less than the
so-called secrecy capacity $C_S$, which is usually smaller than the channel
capacity $C$. In order to remove the loss $C - C_S$, we propose a multiplex
coding scheme with plural independent messages. In this paper, it is shown that
the proposed multiplex coding scheme can attain the channel capacity as the
total rate of the plural messages and the perfect secrecy for each message. The
coding theorem is proved by extending Hayashi's proof, in which the coding of
the channel resolvability is applied to wiretap channels.
|
[
{
"version": "v1",
"created": "Fri, 16 Sep 2005 04:15:13 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Kobayashi",
"Daisuke",
""
],
[
"Yamamoto",
"Hirosuke",
""
],
[
"Ogawa",
"Tomohiro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509048
|
Ori Shental
|
Ori Shental, Ido Kanter and Anthony J. Weiss
|
Capacity of Complexity-Constrained Noise-Free CDMA
|
To appear in IEEE Communications Letters
| null |
10.1109/LCOMM.2006.1576553
| null |
cs.IT math.IT
| null |
An interference-limited noise-free CDMA downlink channel operating under a
complexity constraint on the receiver is introduced. According to this
paradigm, detected bits, obtained by performing hard decisions directly on the
channel's matched filter output, must be the same as the transmitted binary
inputs. This channel setting, allowing the use of the simplest receiver scheme,
seems to be worthless, making reliable communication at any rate impossible. We
prove, by adopting statistical mechanics notion, that in the large-system limit
such a complexity-constrained CDMA channel gives rise to a non-trivial
Shannon-theoretic capacity, rigorously analyzed and corroborated using
finite-size channel simulations.
|
[
{
"version": "v1",
"created": "Fri, 16 Sep 2005 14:05:17 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Shental",
"Ori",
""
],
[
"Kanter",
"Ido",
""
],
[
"Weiss",
"Anthony J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509049
|
Ori Shental
|
Ori Shental, Ido Kanter and Anthony J. Weiss
|
On the Achievable Information Rates of CDMA Downlink with Trivial
Receivers
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
A noisy CDMA downlink channel operating under a strict complexity constraint
on the receiver is introduced. According to this constraint, detected bits,
obtained by performing hard decisions directly on the channel's matched filter
output, must be the same as the transmitted binary inputs. This channel
setting, allowing the use of the simplest receiver scheme, seems to be
worthless, making reliable communication at any rate impossible. However,
recently this communication paradigm was shown to yield valuable information
rates in the case of a noiseless channel. This finding calls for the
investigation of this attractive complexity-constrained transmission scheme for
the more practical noisy channel case. By adopting the statistical mechanics
notion of metastable states of the renowned Hopfield model, it is proved that
under a bounded noise assumption such complexity-constrained CDMA channel gives
rise to a non-trivial Shannon-theoretic capacity, rigorously analyzed and
corroborated using finite-size channel simulations. For unbounded noise the
channel's outage capacity is addressed and specifically described for the
popular additive white Gaussian noise.
|
[
{
"version": "v1",
"created": "Fri, 16 Sep 2005 14:23:16 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shental",
"Ori",
""
],
[
"Kanter",
"Ido",
""
],
[
"Weiss",
"Anthony J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509050
|
Martyn Amos
|
Martyn Amos and Andrew Wood
|
Effect of door delay on aircraft evacuation time
|
8 pages, 2 figures
| null | null | null |
cs.MA
| null |
The recent commercial launch of twin-deck Very Large Transport Aircraft
(VLTA) such as the Airbus A380 has raised questions concerning the speed at
which they may be evacuated. The abnormal height of emergency exits on the
upper deck has led to speculation that emotional factors such as fear may lead
to door delay, and thus play a significant role in increasing overall
evacuation time. Full-scale evacuation tests are financially expensive and
potentially hazardous, and systematic studies of the evacuation of VLTA are
rare. Here we present a computationally cheap agent-based framework for the
general simulation of aircraft evacuation, and apply it to the particular case
of the Airbus A380. In particular, we investigate the effect of door delay, and
conclude that even a moderate average delay can lead to evacuation times that
exceed the maximum for safety certification. The model suggests practical ways
to minimise evacuation time, as well as providing a general framework for the
simulation of evacuation.
|
[
{
"version": "v1",
"created": "Fri, 16 Sep 2005 17:15:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Amos",
"Martyn",
""
],
[
"Wood",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0509052
|
Wing-kai Lin
|
W.-Y. Ng, D.M. Chiu, W.K. Lin
|
Club Formation by Rational Sharing : Content, Viability and Community
Structure
|
accepted in WINE2005, Hong Kong, December 15-17, 2005
| null | null | null |
cs.NI cond-mat.stat-mech physics.soc-ph
| null |
A sharing community prospers when participation and contribution are both
high. We suggest the two, while being related decisions every peer makes,
should be given separate rational bases. Considered as such, a basic issue is
the viability of club formation, which necessitates the modelling of two major
sources of heterogeneity, namely, peers and shared content. This viability
perspective clearly explains why rational peers contribute (or free-ride when
they don't) and how their collective action determines viability as well as the
size of the club formed. It also exposes another fundamental source of
limitation to club formation apart from free-riding, in the community structure
in terms of the relation between peers' interest (demand) and sharing (supply).
|
[
{
"version": "v1",
"created": "Sun, 18 Sep 2005 15:43:55 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Ng",
"W. -Y.",
""
],
[
"Chiu",
"D. M.",
""
],
[
"Lin",
"W. K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0509053
|
Joshua Brandon Holden
|
Joshua Holden, Richard Layton, Laurence Merkle, and Tina Hudson
|
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
|
11 pages, 3 figures, uses amsrefs.sty v2.0 and cryptologiabib.sty
(included); to appear in Cryptologia
|
Cryptologia, 30:69--77, 2006
| null | null |
cs.CR cs.CE
| null |
For a recent student conference, the authors developed a day-long design
problem and competition suitable for engineering, mathematics and science
undergraduates. The competition included a cryptography problem, for which a
workshop was run during the conference. This paper describes the competition,
focusing on the cryptography problem and the workshop. Notes from the workshop
and code for the computer programs are made available via the Internet. The
results of a personal self-evaluation (PSE) are described.
|
[
{
"version": "v1",
"created": "Sun, 18 Sep 2005 22:11:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Holden",
"Joshua",
""
],
[
"Layton",
"Richard",
""
],
[
"Merkle",
"Laurence",
""
],
[
"Hudson",
"Tina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0509054
|
Joseph O'Rourke
|
Mirela Damian, Robin Flatland, Joseph O'Rourke
|
Grid Vertex-Unfolding Orthogonal Polyhedra
|
Original: 12 pages, 8 figures, 11 references. Revised: 22 pages, 16
figures, 12 references. New version is a substantial revision superceding the
preliminary extended abstract that appeared in Lecture Notes in Computer
Science, Volume 3884, Springer, Berlin/Heidelberg, Feb. 2006, pp. 264-276
| null | null | null |
cs.CG cs.DM
| null |
An edge-unfolding of a polyhedron is produced by cutting along edges and
flattening the faces to a *net*, a connected planar piece with no overlaps. A
*grid unfolding* allows additional cuts along grid edges induced by coordinate
planes passing through every vertex. A vertex-unfolding permits faces in the
net to be connected at single vertices, not necessarily along edges. We show
that any orthogonal polyhedron of genus zero has a grid vertex-unfolding.
(There are orthogonal polyhedra that cannot be vertex-unfolded, so some type of
"gridding" of the faces is necessary.) For any orthogonal polyhedron P with n
vertices, we describe an algorithm that vertex-unfolds P in O(n^2) time.
Enroute to explaining this algorithm, we present a simpler vertex-unfolding
algorithm that requires a 3 x 1 refinement of the vertex grid.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 00:22:03 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2006 18:21:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0509055
|
Vikas Hamine
|
Vikas Hamine and Paul Helman
|
Learning Optimal Augmented Bayes Networks
|
4 pages, 1 figure
| null | null |
TR-CS-2004-11
|
cs.LG
| null |
Naive Bayes is a simple Bayesian classifier with strong independence
assumptions among the attributes. This classifier, desipte its strong
independence assumptions, often performs well in practice. It is believed that
relaxing the independence assumptions of a naive Bayes classifier may improve
the classification accuracy of the resulting structure. While finding an
optimal unconstrained Bayesian Network (for most any reasonable scoring
measure) is an NP-hard problem, it is possible to learn in polynomial time
optimal networks obeying various structural restrictions. Several authors have
examined the possibilities of adding augmenting arcs between attributes of a
Naive Bayes classifier. Friedman, Geiger and Goldszmidt define the TAN
structure in which the augmenting arcs form a tree on the attributes, and
present a polynomial time algorithm that learns an optimal TAN with respect to
MDL score. Keogh and Pazzani define Augmented Bayes Networks in which the
augmenting arcs form a forest on the attributes (a collection of trees, hence a
relaxation of the stuctural restriction of TAN), and present heuristic search
methods for learning good, though not optimal, augmenting arc sets. The
authors, however, evaluate the learned structure only in terms of observed
misclassification error and not against a scoring metric, such as MDL. In this
paper, we present a simple, polynomial time greedy algorithm for learning an
optimal Augmented Bayes Network with respect to MDL score.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 04:57:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hamine",
"Vikas",
""
],
[
"Helman",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0509056
|
David Freeman
|
David Freeman
|
Pairing-based identification schemes
| null | null | null | null |
cs.CR
| null |
We propose four different identification schemes that make use of bilinear
pairings, and prove their security under certain computational assumptions.
Each of the schemes is more efficient and/or more secure than any known
pairing-based identification scheme.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 07:52:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Freeman",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0509057
|
Todd Veldhuizen
|
Todd L. Veldhuizen
|
Language embeddings that preserve staging and safety
| null | null | null | null |
cs.PL
| null |
We study embeddings of programming languages into one another that preserve
what reductions take place at compile-time, i.e., staging. A certain condition
-- what we call a `Turing complete kernel' -- is sufficient for a language to
be stage-universal in the sense that any language may be embedded in it while
preserving staging. A similar line of reasoning yields the notion of
safety-preserving embeddings, and a useful characterization of
safety-universality. Languages universal with respect to staging and safety are
good candidates for realizing domain-specific embedded languages (DSELs) and
`active libraries' that provide domain-specific optimizations and safety
checks.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 15:30:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Veldhuizen",
"Todd L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0509058
|
Leandro R\^ego
|
Joseph Y. Halpern, Leandro C. Rego
|
Interactive Unawareness Revisited
|
26 pages
| null | null | null |
cs.AI cs.LO
| null |
We analyze a model of interactive unawareness introduced by Heifetz, Meier
and Schipper (HMS). We consider two axiomatizations for their model, which
capture different notions of validity. These axiomatizations allow us to
compare the HMS approach to both the standard (S5) epistemic logic and two
other approaches to unawareness: that of Fagin and Halpern and that of Modica
and Rustichini. We show that the differences between the HMS approach and the
others are mainly due to the notion of validity used and the fact that the HMS
is based on a 3-valued propositional logic.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 17:07:37 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0509059
|
Boaz Tsaban
|
Boaz Tsaban
|
On an authentication scheme based on the Root Problem in the braid group
|
This paper has been withdrawn by the author. One of the claims is
incorrect as written. We are working on correcting and generalizing it. This
will be published in another paper
| null | null | null |
cs.CR
| null |
Lal and Chaturvedi proposed two authentication schemes based on the
difficulty of the Root Problem in the braid group. We point out that the first
scheme is not really as secure as the Root Problem, and describe an efficient
way to crack it. The attack works for any group.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 19:43:14 GMT"
},
{
"version": "v2",
"created": "Thu, 24 May 2007 16:03:49 GMT"
},
{
"version": "v3",
"created": "Sun, 31 Oct 2010 20:29:39 GMT"
}
] | 2010-11-02T00:00:00 |
[
[
"Tsaban",
"Boaz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0509060
|
Lane A. Hemaspaandra
|
Lane A. Hemaspaandra, Christopher M. Homan, Sven Kosub
|
Cluster Computing and the Power of Edge Recognition
| null | null | null |
URCS-TR-2005-878
|
cs.CC cs.DM
| null |
We study the robustness--the invariance under definition changes--of the
cluster class CL#P [HHKW05]. This class contains each #P function that is
computed by a balanced Turing machine whose accepting paths always form a
cluster with respect to some length-respecting total order with efficient
adjacency checks. The definition of CL#P is heavily influenced by the defining
paper's focus on (global) orders. In contrast, we define a cluster class,
CLU#P, to capture what seems to us a more natural model of cluster computing.
We prove that the naturalness is costless: CL#P = CLU#P. Then we exploit the
more natural, flexible features of CLU#P to prove new robustness results for
CL#P and to expand what is known about the closure properties of CL#P.
The complexity of recognizing edges--of an ordered collection of computation
paths or of a cluster of accepting computation paths--is central to this study.
Most particularly, our proofs exploit the power of unique discovery of
edges--the ability of nondeterministic functions to, in certain settings,
discover on exactly one (in some cases, on at most one) computation path a
critical piece of information regarding edges of orderings or clusters.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 21:25:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Homan",
"Christopher M.",
""
],
[
"Kosub",
"Sven",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0509061
|
Lane A. Hemaspaandra
|
Christopher M. Homan and Lane A. Hemaspaandra
|
Guarantees for the Success Frequency of an Algorithm for Finding
Dodgson-Election Winners
| null | null | null |
URCS-TR-2005-881
|
cs.DS cs.MA
| null |
In the year 1876 the mathematician Charles Dodgson, who wrote fiction under
the now more famous name of Lewis Carroll, devised a beautiful voting system
that has long fascinated political scientists. However, determining the winner
of a Dodgson election is known to be complete for the \Theta_2^p level of the
polynomial hierarchy. This implies that unless P=NP no polynomial-time solution
to this problem exists, and unless the polynomial hierarchy collapses to NP the
problem is not even in NP. Nonetheless, we prove that when the number of voters
is much greater than the number of candidates--although the number of voters
may still be polynomial in the number of candidates--a simple greedy algorithm
very frequently finds the Dodgson winners in such a way that it ``knows'' that
it has found them, and furthermore the algorithm never incorrectly declares a
nonwinner to be a winner.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 21:59:24 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jun 2006 18:36:12 GMT"
},
{
"version": "v3",
"created": "Sat, 23 Jun 2007 13:25:26 GMT"
}
] | 2007-06-25T00:00:00 |
[
[
"Homan",
"Christopher M.",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0509062
|
Chun-Hao Hsu
|
Chun-Hao Hsu and Achilleas Anastasopoulos
|
Capacity-Achieving Codes with Bounded Graphical Complexity on Noisy
Channels
|
17 pages, 2 figures. This paper is to be presented in the 43rd Annual
Allerton Conference on Communication, Control and Computing, Monticello, IL,
USA, Sept. 28-30, 2005
| null | null | null |
cs.IT math.IT
| null |
We introduce a new family of concatenated codes with an outer low-density
parity-check (LDPC) code and an inner low-density generator matrix (LDGM) code,
and prove that these codes can achieve capacity under any memoryless
binary-input output-symmetric (MBIOS) channel using maximum-likelihood (ML)
decoding with bounded graphical complexity, i.e., the number of edges per
information bit in their graphical representation is bounded. In particular, we
also show that these codes can achieve capacity on the binary erasure channel
(BEC) under belief propagation (BP) decoding with bounded decoding complexity
per information bit per iteration for all erasure probabilities in (0, 1). By
deriving and analyzing the average weight distribution (AWD) and the
corresponding asymptotic growth rate of these codes with a rate-1 inner LDGM
code, we also show that these codes achieve the Gilbert-Varshamov bound with
asymptotically high probability. This result can be attributed to the presence
of the inner rate-1 LDGM code, which is demonstrated to help eliminate high
weight codewords in the LDPC code while maintaining a vanishingly small amount
of low weight codewords.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2005 23:22:34 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Sep 2005 05:26:35 GMT"
},
{
"version": "v3",
"created": "Sat, 24 Sep 2005 18:58:56 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Hsu",
"Chun-Hao",
""
],
[
"Anastasopoulos",
"Achilleas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509063
|
Krzysztof R. Apt
|
Krzysztof R. Apt
|
Order Independence and Rationalizability
|
Appeared in: Proc. of the 10th conference on Theoretical Aspects of
Rationality and Knowledge (TARK X), pp. 22-38 (2005)
| null | null | null |
cs.GT
| null |
Two natural strategy elimination procedures have been studied for strategic
games. The first one involves the notion of (strict, weak, etc) dominance and
the second the notion of rationalizability. In the case of dominance the
criterion of order independence allowed us to clarify which notions and under
what circumstances are robust. In the case of rationalizability this criterion
has not been considered. In this paper we investigate the problem of order
independence for rationalizability by focusing on three naturally entailed
reduction relations on games. These reduction relations are distinguished by
the adopted reference point for the notion of a better response. Additionally,
they are parametrized by the adopted system of beliefs. We show that for one
reduction relation the outcome of its (possibly transfinite) iterations does
not depend on the order of elimination of the strategies. This result does not
hold for the other two reduction relations. However, under a natural assumption
the iterations of all three reduction relations yield the same outcome. The
obtained order independence results apply to the frameworks considered in
Bernheim 84 and Pearce 84. For finite games the iterations of all three
reduction relations coincide and the order independence holds for three natural
systems of beliefs considered in the literature.
|
[
{
"version": "v1",
"created": "Tue, 20 Sep 2005 08:27:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0509064
|
Neri Merhav
|
Neri Merhav
|
On joint coding for watermarking and encryption
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.CR math.IT
| null |
In continuation to earlier works where the problem of joint information
embedding and lossless compression (of the composite signal) was studied in the
absence \cite{MM03} and in the presence \cite{MM04} of attacks, here we
consider the additional ingredient of protecting the secrecy of the watermark
against an unauthorized party, which has no access to a secret key shared by
the legitimate parties. In other words, we study the problem of joint coding
for three objectives: information embedding, compression, and encryption.Our
main result is a coding theorem that provides a single--letter characterization
of the best achievable tradeoffs among the following parameters: the distortion
between the composite signal and the covertext, the distortion in
reconstructing the watermark by the legitimate receiver, the compressibility of
the composite signal (with and without the key), and the equivocation of the
watermark, as well as its reconstructed version, given the composite signal. In
the attack--free case, if the key is independent of the covertext, this coding
theorem gives rise to a {\it threefold} separation principle that tells that
asymptotically, for long block codes, no optimality is lost by first applying a
rate--distortion code to the watermark source, then encrypting the compressed
codeword, and finally, embedding it into the covertext using the embedding
scheme of \cite{MM03}. In the more general case, however, this separation
principle is no longer valid, as the key plays an additional role of side
information used by the embedding unit.
|
[
{
"version": "v1",
"created": "Wed, 21 Sep 2005 00:44:22 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Merhav",
"Neri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509065
|
Cheng Qi
|
Qi Cheng and Elizabeth Murray
|
On Deciding Deep Holes of Reed-Solomon Codes
| null | null | null | null |
cs.IT math.IT
| null |
For generalized Reed-Solomon codes, it has been proved \cite{GuruswamiVa05}
that the problem of determining if a received word is a deep hole is
co-NP-complete. The reduction relies on the fact that the evaluation set of the
code can be exponential in the length of the code -- a property that practical
codes do not usually possess. In this paper, we first presented a much simpler
proof of the same result. We then consider the problem for standard
Reed-Solomon codes, i.e. the evaluation set consists of all the nonzero
elements in the field. We reduce the problem of identifying deep holes to
deciding whether an absolutely irreducible hypersurface over a finite field
contains a rational point whose coordinates are pairwise distinct and nonzero.
By applying Schmidt and Cafure-Matera estimation of rational points on
algebraic varieties, we prove that the received vector $(f(\alpha))_{\alpha \in
\F_q}$ for Reed-Solomon $[q,k]_q$, $k < q^{1/7 - \epsilon}$, cannot be a deep
hole, whenever $f(x)$ is a polynomial of degree $k+d$ for $1\leq d < q^{3/13
-\epsilon}$.
|
[
{
"version": "v1",
"created": "Wed, 21 Sep 2005 15:52:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Cheng",
"Qi",
""
],
[
"Murray",
"Elizabeth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509066
|
Richard McClatchey
|
David Manset, Richard McClatchey, Flavio Oquendo, Herve Verjus
|
A Model-driven Approach for Grid Services Engineering
|
7 pages, 3 figures. Proc of the 18th international conference on
Software and Systems Engineering and Applications. Paris November 2005
| null | null | null |
cs.SE cs.DC
| null |
As a consequence to the hype of Grid computing, such systems have seldom been
designed using formal techniques. The complexity and rapidly growing demand
around Grid technologies has favour the use of classical development
techniques, resulting in no guidelines or rules and unstructured engineering
processes. This paper advocates a formal approach to Grid applications
development in an effort to contribute to the rigorous development of Grids
software architectures. This approach addresses cross-platform interoperability
and quality of service; the model-driven paradigm is applied to a formal
architecture-centric engineering method in order to benefit from the formal
semantic description power in addition to model-based transformations. The
result of such a novel combined concept promotes the re-use of design models
and eases developments in Grid computing by providing an adapted development
process and ensuring correctness at each design step.
|
[
{
"version": "v1",
"created": "Wed, 21 Sep 2005 17:39:19 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2005 15:36:03 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Manset",
"David",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Oquendo",
"Flavio",
""
],
[
"Verjus",
"Herve",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0509067
|
Anton Leykin
|
Anton Leykin and Jan Verschelde
|
Decomposing Solution Sets of Polynomial Systems: A New Parallel
Monodromy Breakup Algorithm
|
15 pages
| null | null | null |
cs.DC cs.NA math.AG
| null |
We consider the numerical irreducible decomposition of a positive dimensional
solution set of a polynomial system into irreducible factors. Path tracking
techniques computing loops around singularities connect points on the same
irreducible components. The computation of a linear trace for each factor
certifies the decomposition. This factorization method exhibits a good
practical performance on solution sets of relative high degrees.
Using the same concepts of monodromy and linear trace, we present a new
monodromy breakup algorithm. It shows a better performance than the old method
which requires construction of permutations of witness points in order to break
up the solution set. In contrast, the new algorithm assumes a finer approach
allowing us to avoid tracking unnecessary homotopy paths.
As we designed the serial algorithm keeping in mind distributed computing, an
additional advantage is that its parallel version can be easily built.
Synchronization issues resulted in a performance loss of the straightforward
parallel version of the old algorithm. Our parallel implementation of the new
approach bypasses these issues, therefore, exhibiting a better performance,
especially on solution sets of larger degree.
|
[
{
"version": "v1",
"created": "Wed, 21 Sep 2005 20:55:09 GMT"
}
] | 2009-11-16T00:00:00 |
[
[
"Leykin",
"Anton",
""
],
[
"Verschelde",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
cs/0509068
|
Dana Porrat
|
Dana Porrat, David N. C. Tse and Serban Nacu
|
Channel Uncertainty in Ultra Wideband Communication Systems
| null | null | null | null |
cs.IT math.IT
| null |
Wide band systems operating over multipath channels may spread their power
over bandwidth if they use duty cycle. Channel uncertainty limits the
achievable data rates of power constrained wide band systems; Duty cycle
transmission reduces the channel uncertainty because the receiver has to
estimate the channel only when transmission takes place. The optimal choice of
the fraction of time used for transmission depends on the spectral efficiency
of the signal modulation. The general principle is demonstrated by comparing
the channel conditions that allow different modulations to achieve the capacity
in the limit. Direct sequence spread spectrum and pulse position modulation
systems with duty cycle achieve the channel capacity, if the increase of the
number of channel paths with the bandwidth is not too rapid. The higher
spectral efficiency of the spread spectrum modulation lets it achieve the
channel capacity in the limit, in environments where pulse position modulation
with non-vanishing symbol time cannot be used because of the large number of
channel paths.
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2005 12:02:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Porrat",
"Dana",
""
],
[
"Tse",
"David N. C.",
""
],
[
"Nacu",
"Serban",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509069
|
Philip Bille
|
Philip Bille and Martin Farach-Colton
|
Fast and Compact Regular Expression Matching
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study 4 problems in string matching, namely, regular expression matching,
approximate regular expression matching, string edit distance, and subsequence
indexing, on a standard word RAM model of computation that allows
logarithmic-sized words to be manipulated in constant time. We show how to
improve the space and/or remove a dependency on the alphabet size for each
problem using either an improved tabulation technique of an existing algorithm
or by combining known algorithms in a new way.
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2005 13:30:20 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Dec 2005 10:07:46 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Sep 2008 08:27:28 GMT"
}
] | 2008-09-22T00:00:00 |
[
[
"Bille",
"Philip",
""
],
[
"Farach-Colton",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0509070
|
Vladimir P. Gerdt
|
Vladimir P. Gerdt and Daniel Robertz
|
A Maple Package for Computing Groebner Bases for Linear Recurrence
Relations
|
5 pages, presented at ACAT-2005
|
Nucl.Instrum.Meth. A559 (2006) 215-219
|
10.1016/j.nima.2005.11.171
| null |
cs.SC cs.MS
| null |
A Maple package for computing Groebner bases of linear difference ideals is
described. The underlying algorithm is based on Janet and Janet-like monomial
divisions associated with finite difference operators. The package can be used,
for example, for automatic generation of difference schemes for linear partial
differential equations and for reduction of multiloop Feynman integrals. These
two possible applications are illustrated by simple examples of the Laplace
equation and a one-loop scalar integral of propagator type
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2005 15:45:35 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Nov 2005 13:19:44 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Gerdt",
"Vladimir P.",
""
],
[
"Robertz",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0509071
|
Krzysztof R. Apt
|
Krzysztof R. Apt, Francesca Rossi and K. Brent Venable
|
CP-nets and Nash equilibria
|
6 pages. in: roc. of the Third International Conference on
Computational Intelligence, Robotics and Autonomous Systems (CIRAS '05). To
appear
| null | null | null |
cs.GT cs.AI
| null |
We relate here two formalisms that are used for different purposes in
reasoning about multi-agent systems. One of them are strategic games that are
used to capture the idea that agents interact with each other while pursuing
their own interest. The other are CP-nets that were introduced to express
qualitative and conditional preferences of the users and which aim at
facilitating the process of preference elicitation. To relate these two
formalisms we introduce a natural, qualitative, extension of the notion of a
strategic game. We show then that the optimal outcomes of a CP-net are exactly
the Nash equilibria of an appropriately defined strategic game in the above
sense. This allows us to use the techniques of game theory to search for
optimal outcomes of CP-nets and vice-versa, to use techniques developed for
CP-nets to search for Nash equilibria of the considered games.
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2005 16:07:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"K. Brent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0509072
|
Kaikai Shen
|
Kaikai Shen, Lide Wu
|
Folksonomy as a Complex Network
| null | null | null | null |
cs.IR cs.DL physics.soc-ph
| null |
Folksonomy is an emerging technology that works to classify the information
over WWW through tagging the bookmarks, photos or other web-based contents. It
is understood to be organized by every user while not limited to the authors of
the contents and the professional editors. This study surveyed the folksonomy
as a complex network. The result indicates that the network, which is composed
of the tags from the folksonomy, displays both properties of small world and
scale-free. However, the statistics only shows a local and static slice of the
vast body of folksonomy which is still evolving.
|
[
{
"version": "v1",
"created": "Fri, 23 Sep 2005 13:27:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shen",
"Kaikai",
""
],
[
"Wu",
"Lide",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0509073
|
Kwankyu Lee
|
Kwankyu Lee
|
Distance-Increasing Maps of All Length by Simple Mapping Algorithms
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.DM math.IT
| null |
Distance-increasing maps from binary vectors to permutations, namely DIMs,
are useful for the construction of permutation arrays. While a simple mapping
algorithm defining DIMs of even length is known, existing DIMs of odd length
are either recursively constructed by merging shorter DIMs or defined by much
complicated mapping algorithms. In this paper, DIMs of all length defined by
simple mapping algorithms are presented.
|
[
{
"version": "v1",
"created": "Fri, 23 Sep 2005 18:01:33 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lee",
"Kwankyu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509074
|
Assaf Naor
|
Assaf Naor and Gideon Schechtman
|
Planar Earthmover is not in $L_1$
| null | null | null | null |
cs.CG math.FA
| null |
We show that any $L_1$ embedding of the transportation cost (a.k.a.
Earthmover) metric on probability measures supported on the grid
$\{0,1,...,n\}^2\subseteq \R^2$ incurs distortion $\Omega(\sqrt{\log n})$. We
also use Fourier analytic techniques to construct a simple $L_1$ embedding of
this space which has distortion $O(\log n)$.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2005 16:26:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Naor",
"Assaf",
""
],
[
"Schechtman",
"Gideon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
cs/0509075
|
Hyundong Shin
|
Hyundong Shin, Moe Z. Win, Jae Hong Lee, Marco Chiani
|
On the Capacity of Doubly Correlated MIMO Channels
|
To appear in the IEEE Transactions on Wireless Communications
| null |
10.1109/TWC.2006.1687741
| null |
cs.IT math.IT
| null |
In this paper, we analyze the capacity of multiple-input multiple-output
(MIMO) Rayleigh-fading channels in the presence of spatial fading correlation
at both the transmitter and the receiver, assuming that the channel is unknown
at the transmitter and perfectly known at the receiver. We first derive the
determinant representation for the exact characteristic function of the
capacity, which is then used to determine the trace representations for the
mean, variance, skewness, kurtosis, and other higher-order statistics (HOS).
These results allow us to exactly evaluate two relevant information-theoretic
capacity measures--ergodic capacity and outage capacity--and the HOS of the
capacity for such a MIMO channel. The analytical framework presented in the
paper is valid for arbitrary numbers of antennas and generalizes the previously
known results for independent and identically distributed or one-sided
correlated MIMO channels to the case when fading correlation exists on both
sides. We verify our analytical results by comparing them with Monte Carlo
simulations for a correlation model based on realistic channel measurements as
well as a classical exponential correlation model.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2005 19:02:02 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2005 01:21:59 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Shin",
"Hyundong",
""
],
[
"Win",
"Moe Z.",
""
],
[
"Lee",
"Jae Hong",
""
],
[
"Chiani",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509076
|
Anil Bazaz
|
Anil Bazaz and James D. Arthur
|
On Vulnerabilities, Constraints and Assumptions
| null | null | null | null |
cs.CR
| null |
This report presents a taxonomy of vulnerabilities created as a part of an
effort to develop a framework for deriving verification and validation
strategies to assess software security. This taxonomy is grounded in a
theoretical model of computing, which establishes the relationship between
vulnerabilities, software applications and the computer system resources. This
relationship illustrates that a software application is exploited by violating
constraints imposed by computer system resources and assumptions made about
their usage. In other words, a vulnerability exists in the software application
if it allows violation of these constraints and assumptions. The taxonomy
classifies these constraints and assumptions. The model also serves as a basis
for the classification scheme the taxonomy uses, in which the computer system
resources such as, memory, input/output, and cryptographic resources serve as
categories and subcategories. Vulnerabilities, which are expressed in the form
of constraints and assumptions, are classified according to these categories
and subcategories. This taxonomy is both novel and distinctively different from
other taxonomies found in the literature.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2005 21:20:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bazaz",
"Anil",
""
],
[
"Arthur",
"James D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0509077
|
Syed Jafar
|
Syed A. Jafar, Sudhir Srinivasa
|
Capacity Limits of Cognitive Radio with Distributed and Dynamic Spectral
Activity
|
6 pages
|
IEEE Journal on Selected Areas in Communications Special Issue on
Adaptive, Spectrum Agile and Cognitive Wireless Networks, Volume 25, No. 3,
April 2007, Pages: 529-537
| null | null |
cs.IT math.IT
| null |
We investigate the capacity of opportunistic communication in the presence of
dynamic and distributed spectral activity, i.e. when the time varying spectral
holes sensed by the cognitive transmitter are correlated but not identical to
those sensed by the cognitive receiver. Using the information theoretic
framework of communication with causal and non-causal side information at the
transmitter and/or the receiver, we obtain analytical capacity expressions and
the corresponding numerical results. We find that cognitive radio communication
is robust to dynamic spectral environments even when the communication occurs
in bursts of only 3-5 symbols. The value of handshake overhead is investigated
for both lightly loaded and heavily loaded systems. We find that the capacity
benefits of overhead information flow from the transmitter to the receiver is
negligible while feedback information overhead in the opposite direction
significantly improves capacity.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2005 21:37:26 GMT"
}
] | 2010-04-27T00:00:00 |
[
[
"Jafar",
"Syed A.",
""
],
[
"Srinivasa",
"Sudhir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509078
|
Young-Han Kim
|
Young-Han Kim
|
On the Feedback Capacity of Stationary Gaussian Channels
|
11 pages, v2: corrected a few typos, 43rd Annual Allerton Conference
on Communication, Control and Computing, Monticello, IL, USA, Sept. 28-30,
2005
| null | null | null |
cs.IT math.IT
| null |
The capacity of stationary additive Gaussian noise channels with feedback is
characterized as the solution to a variational problem. Toward this end, it is
proved that the optimal feedback coding scheme is stationary. When specialized
to the first-order autoregressive moving-average noise spectrum, this
variational characterization yields a closed-form expression for the feedback
capacity. In particular, this result shows that the celebrated
Schalkwijk--Kailath coding scheme achieves the feedback capacity for the
first-order autoregressive moving-average Gaussian channel, resolving a
long-standing open problem studied by Butman, Schalkwijk--Tiernan, Wolfowitz,
Ozarow, Ordentlich, Yang--Kavcic--Tatikonda, and others.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 00:01:52 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Nov 2005 21:40:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kim",
"Young-Han",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509079
|
Peter Jung
|
Peter Jung, Gerhard Wunder
|
The WSSUS Pulse Design Problem in Multicarrier Transmission
|
24 pages (onecolumn,draft), 4 figures, accepted for publication in
the IEEE Transactions on Communications
|
IEEE Trans. on Comm., 2007, 55(10), 1918-1928
|
10.1109/TCOMM.2007.906427
| null |
cs.IT math.IT
| null |
Optimal link adaption to the scattering function of wide sense stationary
uncorrelated mobile communication channels is still an unsolved problem despite
its importance for next-generation system design. In multicarrier transmission
such link adaption is performed by pulse shaping, i.e. by properly adjusting
the transmit and receive filters. For example pulse shaped Offset--QAM systems
have been recently shown to have superior performance over standard cyclic
prefix OFDM (while operating at higher spectral efficiency).In this paper we
establish a general mathematical framework for joint transmitter and receiver
pulse shape optimization for so-called Weyl--Heisenberg or Gabor signaling with
respect to the scattering function of the WSSUS channel. In our framework the
pulse shape optimization problem is translated to an optimization problem over
trace class operators which in turn is related to fidelity optimization in
quantum information processing. By convexity relaxation the problem is shown to
be equivalent to a \emph{convex constraint quasi-convex maximization problem}
thereby revealing the non-convex nature of the overall WSSUS pulse design
problem. We present several iterative algorithms for optimization providing
applicable results even for large--scale problem constellations. We show that
with transmitter-side knowledge of the channel statistics a gain of $3 - 6$dB
in $\SINR$ can be expected.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 08:05:30 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jan 2007 11:46:28 GMT"
}
] | 2007-10-23T00:00:00 |
[
[
"Jung",
"Peter",
""
],
[
"Wunder",
"Gerhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509080
|
Aris L. Moustakas
|
Steven H. Simon, Aris L. Moustakas and Luca Marinelli
|
Capacity and Character Expansions: Moment generating function and other
exact results for MIMO correlated channels
|
submitted to IEEE Trans. Information Theory, March 2004 (under
review); 23 pages, 2 figures; IEEEtran document class
|
IEEETrans.Info.Theor.52:5336-5351,2006
|
10.1109/TIT.2006.885519
| null |
cs.IT cond-mat.mes-hall cond-mat.stat-mech hep-lat math-ph math.IT math.MP
| null |
We apply a promising new method from the field of representations of Lie
groups to calculate integrals over unitary groups, which are important for
multi-antenna communications. To demonstrate the power and simplicity of this
technique, we first re-derive a number of results that have been used recently
in the community of wireless information theory, using only a few simple steps.
In particular, we derive the joint probability distribution of eigenvalues of
the matrix GG*, with G a semicorrelated Gaussian random matrix or a Gaussian
random matrix with a non-zero mean (and G* its hermitian conjugate) . These
joint probability distribution functions can then be used to calculate the
moment generating function of the mutual information for Gaussian channels with
multiple antennas on both ends with this probability distribution of their
channel matrices G. We then turn to the previously unsolved problem of
calculating the moment generating function of the mutual information of MIMO
(multiple input-multiple output) channels, which are correlated at both the
receiver and the transmitter. From this moment generating function we obtain
the ergodic average of the mutual information and study the outage probability.
These methods can be applied to a number of other problems. As a particular
example, we examine unitary encoded space-time transmission of MIMO systems and
we derive the received signal distribution when the channel matrix is
correlated at the transmitter end.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 12:59:19 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Simon",
"Steven H.",
""
],
[
"Moustakas",
"Aris L.",
""
],
[
"Marinelli",
"Luca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.mes-hall",
"description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures",
"span": "(Mesoscale and Nanoscale Physics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "hep-lat",
"description": "Lattice field theory. Phenomenology from lattice field theory. Algorithms for lattice field theory. Hardware for lattice field theory.",
"span": "(High Energy Physics - Lattice)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
cs/0509081
|
Yossi Zana
|
Yossi Zana, Roberto M. Cesar-Jr and Regis de A. Barbosa
|
Automatic Face Recognition System Based on Local Fourier-Bessel Features
|
2005, Brazilian Symposium on Computer Graphics and Image Processing,
18 (SIBGRAPI)
| null | null | null |
cs.CV
| null |
We present an automatic face verification system inspired by known properties
of biological systems. In the proposed algorithm the whole image is converted
from the spatial to polar frequency domain by a Fourier-Bessel Transform (FBT).
Using the whole image is compared to the case where only face image regions
(local analysis) are considered. The resulting representations are embedded in
a dissimilarity space, where each image is represented by its distance to all
the other images, and a Pseudo-Fisher discriminator is built. Verification test
results on the FERET database showed that the local-based algorithm outperforms
the global-FBT version. The local-FBT algorithm performed as state-of-the-art
methods under different testing conditions, indicating that the proposed system
is highly robust for expression, age, and illumination variations. We also
evaluated the performance of the proposed system under strong occlusion
conditions and found that it is highly robust for up to 50% of face occlusion.
Finally, we automated completely the verification system by implementing face
and eye detection algorithms. Under this condition, the local approach was only
slightly superior to the global approach.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 15:25:36 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Zana",
"Yossi",
""
],
[
"Cesar-Jr",
"Roberto M.",
""
],
[
"Barbosa",
"Regis de A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0509082
|
Yossi Zana
|
Yossi Zana, Roberto M. Cesar-JR
|
Face Recognition Based on Polar Frequency Features
|
ACM Transactions on Applied Perception
| null | null | null |
cs.CV
| null |
A novel biologically motivated face recognition algorithm based on polar
frequency is presented. Polar frequency descriptors are extracted from face
images by Fourier-Bessel transform (FBT). Next, the Euclidean distance between
all images is computed and each image is now represented by its dissimilarity
to the other images. A Pseudo-Fisher Linear Discriminant was built on this
dissimilarity space. The performance of Discrete Fourier transform (DFT)
descriptors, and a combination of both feature types was also evaluated. The
algorithms were tested on a 40- and 1196-subjects face database (ORL and FERET,
respectively). With 5 images per subject in the training and test datasets,
error rate on the ORL database was 3.8, 1.25 and 0.2% for the FBT, DFT, and the
combined classifier, respectively, as compared to 2.6% achieved by the best
previous algorithm. The most informative polar frequency features were
concentrated at low-to-medium angular frequencies coupled to low radial
frequencies. On the FERET database, where an affine normalization
pre-processing was applied, the FBT algorithm outperformed only the PCA in a
rank recognition test. However, it achieved performance comparable to
state-of-the-art methods when evaluated by verification tests. These results
indicate the high informative value of the polar frequency content of face
images in relation to recognition and verification tasks, and that the
Cartesian frequency content can complement information about the subjects'
identity, but possibly only when the images are not pre-normalized. Possible
implications for human face recognition are discussed.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 15:50:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zana",
"Yossi",
""
],
[
"Cesar-JR",
"Roberto M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0509083
|
Yossi Zana
|
Yossi Zana, Roberto M. Cesar-Jr, Rogerio S. Feris, Matthew Turk
|
Face Verification in Polar Frequency Domain: a Biologically Motivated
Approach
|
2005, International Symposium on Visual Computing (ISVC)
| null | null | null |
cs.CV
| null |
We present a novel local-based face verification system whose components are
analogous to those of biological systems. In the proposed system, after global
registration and normalization, three eye regions are converted from the
spatial to polar frequency domain by a Fourier-Bessel Transform. The resulting
representations are embedded in a dissimilarity space, where each image is
represented by its distance to all the other images. In this dissimilarity
space a Pseudo-Fisher discriminator is built. ROC and equal error rate
verification test results on the FERET database showed that the system
performed at least as state-of-the-art methods and better than a system based
on polar Fourier features. The local-based system is especially robust to
facial expression and age variations, but sensitive to registration errors.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 16:06:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zana",
"Yossi",
""
],
[
"Cesar-Jr",
"Roberto M.",
""
],
[
"Feris",
"Rogerio S.",
""
],
[
"Turk",
"Matthew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0509084
|
Herbert van de Sompel
|
Jeroen Bekaert, Xiaoming Liu, Herbert Van de Sompel
|
Representing Digital Assets for Long-Term Preservation using MPEG-21 DID
|
Accepted paper for PV 2005 "Ensuring Long-term Preservation and
Adding Value to Scientific and Technical data"
(http://www.ukoln.ac.uk/events/pv-2005/)
| null | null | null |
cs.DL
| null |
Various efforts aimed at representing digital assets have emerged from
several communities over the last years, including the Metadata Encoding and
Transmission Standard (METS), the IMS Content Packaging (IMS-CP) XML Binding
and the XML Formatted Data Units (XFDU). The MPEG-21 Digital Item Declaration
(MPEG-21 DID) is another approach that can be used for the representation of
digital assets in XML. This paper will explore the potential of the MPEG-21 DID
in a Digital Preservation context, by looking at the core building blocks of
the OAIS Information Model and the way in which they map to the MPEG-21 DID
abstract model and the MPEG-21 DIDL XML syntax.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 19:05:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bekaert",
"Jeroen",
""
],
[
"Liu",
"Xiaoming",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0509085
|
Sanquan Song
|
Sanquan Song, Dennis L. Goeckel, Don Towsley
|
An Improved Lower Bound to the Number of Neighbors Required for the
Asymptotic Connectivity of Ad Hoc Networks
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.NI cs.IT math.IT
| null |
Xue and Kumar have established that the number of neighbors required for
connectivity of wireless networks with N uniformly distributed nodes must grow
as log(N), and they also established that the actual number required lies
between 0.074log(N) and 5.1774log(N). In this short paper, by recognizing that
connectivity results for networks where the nodes are distributed according to
a Poisson point process can often be applied to the problem for a network with
N nodes, we are able to improve the lower bound. In particular, we show that a
network with nodes distributed in a unit square according to a 2D Poisson point
process of parameter N will be asymptotically disconnected with probability one
if the number of neighbors is less than 0.129log(N). Moreover, similar number
of neighbors is not enough for an asymptotically connected network with N nodes
uniformly in a unit square, hence improving the lower bound.
|
[
{
"version": "v1",
"created": "Tue, 27 Sep 2005 13:19:40 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Song",
"Sanquan",
""
],
[
"Goeckel",
"Dennis L.",
""
],
[
"Towsley",
"Don",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509086
|
Tadaaki Hosaka
|
Tadaaki Hosaka, Yoshiyuki Kabashima
|
Statistical Mechanical Approach to Lossy Data Compression:Theory and
Practice
|
10 pages, 2 figures, REVTEX preprint
| null |
10.1016/j.physa.2006.01.013
| null |
cs.IT math.IT
| null |
The encoder and decoder for lossy data compression of binary memoryless
sources are developed on the basis of a specific-type nonmonotonic perceptron.
Statistical mechanical analysis indicates that the potential ability of the
perceptron-based code saturates the theoretically achievable limit in most
cases although exactly performing the compression is computationally difficult.
To resolve this difficulty, we provide a computationally tractable
approximation algorithm using belief propagation (BP), which is a current
standard algorithm of probabilistic inference. Introducing several
approximations and heuristics, the BP-based algorithm exhibits performance that
is close to the achievable limit in a practical time scale in optimal cases.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 07:18:34 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Hosaka",
"Tadaaki",
""
],
[
"Kabashima",
"Yoshiyuki",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509087
|
Peter Jung
|
Peter Jung, Gerhard Wunder
|
On Time-Variant Distortions in Multicarrier Transmission with
Application to Frequency Offsets and Phase Noise
|
10 pages (twocolumn), 5 figures
|
IEEE Transactions on Communications Vol. 53 (9), Sep. 2005, pp.
1561-1570
|
10.1109/TCOMM.2005.855010
| null |
cs.IT math.IT
| null |
Phase noise and frequency offsets are due to their time-variant behavior one
of the most limiting disturbances in practical OFDM designs and therefore
intensively studied by many authors. In this paper we present a generalized
framework for the prediction of uncoded system performance in the presence of
time-variant distortions including the transmitter and receiver pulse shapes as
well as the channel. Therefore, unlike existing studies, our approach can be
employed for more general multicarrier schemes. To show the usefulness of our
approach, we apply the results to OFDM in the context of frequency offset and
Wiener phase noise, yielding improved bounds on the uncoded performance. In
particular, we obtain exact formulas for the averaged performance in AWGN and
time-invariant multipath channels.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 07:38:36 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Jung",
"Peter",
""
],
[
"Wunder",
"Gerhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509088
|
Babajide Afolabi
|
Babajide Afolabi (LORIA), Odile Thiery (LORIA)
|
Business intelligence systems and user's parameters: an application to a
documents' database
| null |
Dans Modelling Others for Observation A workshop of IJCAI 2005
| null | null |
cs.DB
| null |
This article presents earlier results of our research works in the area of
modeling Business Intelligence Systems. The basic idea of this research area is
presented first. We then show the necessity of including certain users'
parameters in Information systems that are used in Business Intelligence
systems in order to integrate a better response from such systems. We
identified two main types of attributes that can be missing from a base and we
showed why they needed to be included. A user model that is based on a
cognitive user evolution is presented. This model when used together with a
good definition of the information needs of the user (decision maker) will
accelerate his decision making process.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 08:38:15 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Afolabi",
"Babajide",
"",
"LORIA"
],
[
"Thiery",
"Odile",
"",
"LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0509089
|
Valdis Vitolins
|
Valdis Vitolins, Audris Kalnins
|
Semantics of UML 2.0 Activity Diagram for Business Modeling by Means of
Virtual Machine
|
12 pages, 7 figures, Proceedings of the conference "EDOC 2005", 19-23
September 2005
|
Valdis Vitolins, Audris Kalnins, Proceedings Ninth IEEE
International EDOC Enterprise Computing Conference, IEEE, 2005, pp. 181.-192
|
10.1109/EDOC.2005.29
| null |
cs.CE cs.PL
| null |
The paper proposes a more formalized definition of UML 2.0 Activity Diagram
semantics. A subset of activity diagram constructs relevant for business
process modeling is considered. The semantics definition is based on the
original token flow methodology, but a more constructive approach is used. The
Activity Diagram Virtual machine is defined by means of a metamodel, with
operations defined by a mix of pseudocode and OCL pre- and postconditions. A
formal procedure is described which builds the virtual machine for any activity
diagram. The relatively complicated original token movement rules in control
nodes and edges are combined into paths from an action to action. A new
approach is the use of different (push and pull) engines, which move tokens
along the paths. Pull engines are used for paths containing join nodes, where
the movement of several tokens must be coordinated. The proposed virtual
machine approach makes the activity semantics definition more transparent where
the token movement can be easily traced. However, the main benefit of the
approach is the possibility to use the defined virtual machine as a basis for
UML activity diagram based workflow or simulation engine.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 12:24:42 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Vitolins",
"Valdis",
""
],
[
"Kalnins",
"Audris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0509090
|
Herbert van de Sompel
|
Jeroen Bekaert, Herbert Van de Sompel
|
Access Interfaces for Open Archival Information Systems based on the
OAI-PMH and the OpenURL Framework for Context-Sensitive Services
|
Accepted paper for PV 2005 "Ensuring Long-term Preservation and
Adding Value to Scientific and Technical data"
(http://www.ukoln.ac.uk/events/pv-2005/)
| null | null | null |
cs.DL
| null |
In recent years, a variety of digital repository and archival systems have
been developed and adopted. All of these systems aim at hosting a variety of
compound digital assets and at providing tools for storing, managing and
accessing those assets. This paper will focus on the definition of common and
standardized access interfaces that could be deployed across such diverse
digital respository and archival systems. The proposed interfaces are based on
the two formal specifications that have recently emerged from the Digital
Library community: The Open Archive Initiative Protocol for Metadata Harvesting
(OAI-PMH) and the NISO OpenURL Framework for Context-Sensitive Services
(OpenURL Standard). As will be described, the former allows for the retrieval
of batches of XML-based representations of digital assets, while the latter
facilitates the retrieval of disseminations of a specific digital asset or of
one or more of its constituents. The core properties of the proposed interfaces
are explained in terms of the Reference Model for an Open Archival Information
System (OAIS).
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 14:57:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bekaert",
"Jeroen",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0509091
|
Gregory Gutin
|
G. Gutin, A. Rafiey, A. Yeo
|
Minimum Cost Homomorphisms to Semicomplete Multipartite Digraphs
| null | null | null | null |
cs.DM
| null |
For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a {\em homomorphism
of $D$ to $H$} if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ For a fixed directed
or undirected graph $H$ and an input graph $D$, the problem of verifying
whether there exists a homomorphism of $D$ to $H$ has been studied in a large
number of papers. We study an optimization version of this decision problem.
Our optimization problem is motivated by a real-world problem in defence
logistics and was introduced very recently by the authors and M. Tso.
Suppose we are given a pair of digraphs $D,H$ and a positive integral cost
$c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$. The cost of a homomorphism $f$
of $D$ to $H$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. Let $H$ be a fixed digraph. The
minimum cost homomorphism problem for $H$, MinHOMP($H$), is stated as follows:
For input digraph $D$ and costs $c_i(u)$ for each $u\in V(D)$ and $i\in V(H)$,
verify whether there is a homomorphism of $D$ to $H$ and, if it does exist,
find such a homomorphism of minimum cost. In our previous paper we obtained a
dichotomy classification of the time complexity of \MiP for $H$ being a
semicomplete digraph. In this paper we extend the classification to
semicomplete $k$-partite digraphs, $k\ge 3$, and obtain such a classification
for bipartite tournaments.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 15:40:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0509092
|
Thierry Poibeau
|
Thierry Poibeau (LIPN)
|
Automatic extraction of paraphrastic phrases from medium size corpora
| null |
Actes de la conf\'{e}rence Computational Linguisitcs (COLING 2004)
(2004) 638-644
| null | null |
cs.CL cs.AI
| null |
This paper presents a versatile system intended to acquire paraphrastic
phrases from a representative corpus. In order to decrease the time spent on
the elaboration of resources for NLP system (for example Information
Extraction, IE hereafter), we suggest to use a machine learning system that
helps defining new templates and associated resources. This knowledge is
automatically derived from the text collection, in interaction with a large
semantic network.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 16:15:27 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0509093
|
Aris L. Moustakas
|
Aris L. Moustakas and Steven H. Simon
|
On the Outage Capacity of Correlated Multiple-Path MIMO Channels
|
submitted for publication IEEE Trans. Information Theory; IEEEtran
documentstyle
| null | null | null |
cs.IT math.IT
| null |
The use of multi-antenna arrays in both transmission and reception has been
shown to dramatically increase the throughput of wireless communication
systems. As a result there has been considerable interest in characterizing the
ergodic average of the mutual information for realistic correlated channels.
Here, an approach is presented that provides analytic expressions not only for
the average, but also the higher cumulant moments of the distribution of the
mutual information for zero-mean Gaussian (multiple-input multiple-output) MIMO
channels with the most general multipath covariance matrices when the channel
is known at the receiver. These channels include multi-tap delay paths, as well
as general channels with covariance matrices that cannot be written as a
Kronecker product, such as dual-polarized antenna arrays with general
correlations at both transmitter and receiver ends. The mathematical methods
are formally valid for large antenna numbers, in which limit it is shown that
all higher cumulant moments of the distribution, other than the first two scale
to zero. Thus, it is confirmed that the distribution of the mutual information
tends to a Gaussian, which enables one to calculate the outage capacity. These
results are quite accurate even in the case of a few antennas, which makes this
approach applicable to realistic situations.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 16:16:06 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Moustakas",
"Aris L.",
""
],
[
"Simon",
"Steven H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509094
|
Carol Minton Morris Ms
|
Carol Minton Morris
|
Telling Great Stories: An NSDL Content and Communications System for
Aggregation, Display, and Distribution of News and Features
|
3 pages, 2 figures
| null | null | null |
cs.DL cs.SE
| null |
Education digital libraries contain cataloged resources as well as contextual
information about innovations in the use of educational technology, exemplar
stories about community activities, and news from various user communities that
include teachers, students, scholars, and developers. Long-standing library
traditions of service, preservation, democratization of knowledge, rich
discourse, equal access, and fair use are evident in library communications
models that both pull in and push out contextual information from multiple
sources integrated with editorial production processes. This paper argues that
a dynamic narrative flow [1] is enabled by effective management of complex
content and communications in a decentralized web-based education digital
library making publishing objects such as aggregations of resources, or
selected parts of objects [4] accessible through a Content and Communications
System. Providing services that encourage patrons to reuse, reflect out, and
contribute resources back [5] to the Library increases the reach and impact of
the National Science Digital Library (NSDL). This system is a model for
distributed content development and effective communications for education
digital libraries in general.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 16:28:19 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Oct 2005 21:20:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Morris",
"Carol Minton",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0509095
|
Zahid Anwar
|
Zahid Anwar (1) William Yurcik (2) Vivek Pandey (1) Asim Shankar (1)
Indranil Gupta (1) Roy H. Campbell (1) ((1) Department of Computer Science
University of Illinois at Urbana-Champaign, (2)(National Center for
Supercomputing Applications University of Illinois at Urbana-Champaign USA))
|
Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay
Performance: Results from Orkut
|
9 pages 8 figures
| null | null | null |
cs.NI cs.CY
| null |
Application-level peer-to-peer (P2P) network overlays are an emerging
paradigm that facilitates decentralization and flexibility in the scalable
deployment of applications such as group communication, content delivery, and
data sharing. However the construction of the overlay graph topology optimized
for low latency, low link and node stress and lookup performance is still an
open problem. We present a design of an overlay constructed on top of a social
network and show that it gives a sizable improvement in lookups, average
round-trip delay and scalability as opposed to other overlay topologies. We
build our overlay on top of the topology of a popular real-world social network
namely Orkut. We show Orkuts suitability for our purposes by evaluating the
clustering behavior of its graph structure and the socializing pattern of its
members.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 21:09:07 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Anwar",
"Zahid",
""
],
[
"Yurcik",
"William",
""
],
[
"Pandey",
"Vivek",
""
],
[
"Shankar",
"Asim",
""
],
[
"Gupta",
"Indranil",
""
],
[
"Campbell",
"Roy H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0509096
|
Chris Snow
|
C. Snow, L. Lampe, R. Schober
|
Performance Analysis and Enhancement of Multiband OFDM for UWB
Communications
|
32 pages, 10 figures, 1 table. Submitted to the IEEE Transactions on
Wireless Communications (Sep. 28, 2005). Minor revisions based on reviewers'
comments (June 23, 2006)
| null |
10.1109/TWC.2007.05770
| null |
cs.IT math.IT
| null |
In this paper, we analyze the frequency-hopping orthogonal frequency-division
multiplexing (OFDM) system known as Multiband OFDM for high-rate wireless
personal area networks (WPANs) based on ultra-wideband (UWB) transmission.
Besides considering the standard, we also propose and study system performance
enhancements through the application of Turbo and Repeat-Accumulate (RA) codes,
as well as OFDM bit-loading. Our methodology consists of (a) a study of the
channel model developed under IEEE 802.15 for UWB from a frequency-domain
perspective suited for OFDM transmission, (b) development and quantification of
appropriate information-theoretic performance measures, (c) comparison of these
measures with simulation results for the Multiband OFDM standard proposal as
well as our proposed extensions, and (d) the consideration of the influence of
practical, imperfect channel estimation on the performance. We find that the
current Multiband OFDM standard sufficiently exploits the frequency selectivity
of the UWB channel, and that the system performs in the vicinity of the channel
cutoff rate. Turbo codes and a reduced-complexity clustered bit-loading
algorithm improve the system power efficiency by over 6 dB at a data rate of
480 Mbps.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2005 21:45:18 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 21:51:16 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Snow",
"C.",
""
],
[
"Lampe",
"L.",
""
],
[
"Schober",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509097
|
Mostafa El-Khamy
|
Mostafa El-Khamy and Robert J. McEliece
|
Iterative Algebraic Soft-Decision List Decoding of Reed-Solomon Codes
|
Submitted to IEEE for publication in Jan 2005
|
IEEE Journal on Selected Areas in Communications, Volume 24, Issue
3, March 2006 Page(s):481 - 490
|
10.1109/JSAC.2005.862399
| null |
cs.IT math.IT
| null |
In this paper, we present an iterative soft-decision decoding algorithm for
Reed-Solomon codes offering both complexity and performance advantages over
previously known decoding algorithms. Our algorithm is a list decoding
algorithm which combines two powerful soft decision decoding techniques which
were previously regarded in the literature as competitive, namely, the
Koetter-Vardy algebraic soft-decision decoding algorithm and belief-propagation
based on adaptive parity check matrices, recently proposed by Jiang and
Narayanan. Building on the Jiang-Narayanan algorithm, we present a
belief-propagation based algorithm with a significant reduction in
computational complexity. We introduce the concept of using a
belief-propagation based decoder to enhance the soft-input information prior to
decoding with an algebraic soft-decision decoder. Our algorithm can also be
viewed as an interpolation multiplicity assignment scheme for algebraic
soft-decision decoding of Reed-Solomon codes.
|
[
{
"version": "v1",
"created": "Thu, 29 Sep 2005 07:22:10 GMT"
}
] | 2014-11-17T00:00:00 |
[
[
"El-Khamy",
"Mostafa",
""
],
[
"McEliece",
"Robert J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509098
|
Nicolas Macris
|
Nicolas Macris
|
Applications of correlation inequalities to low density graphical codes
|
11 pages, 3 figures
| null |
10.1140/epjb/e2006-00129-6
| null |
cs.IT cond-mat.stat-mech math.IT
| null |
This contribution is based on the contents of a talk delivered at the
Next-SigmaPhi conference held in Crete in August 2005. It is adressed to an
audience of physicists with diverse horizons and does not assume any background
in communications theory. Capacity approaching error correcting codes for
channel communication known as Low Density Parity Check (LDPC) codes have
attracted considerable attention from coding theorists in the last decade.
Surprisingly strong connections with the theory of diluted spin glasses have
been discovered. In this work we elucidate one new connection, namely that a
class of correlation inequalities valid for gaussian spin glasses can be
applied to the theoretical analysis of LDPC codes. This allows for a rigorous
comparison between the so called (optimal) maximum a posteriori and the
computationaly efficient belief propagation decoders. The main ideas of the
proofs are explained and we refer to recent works for the more lengthy
technical details.
|
[
{
"version": "v1",
"created": "Fri, 30 Sep 2005 10:02:10 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Macris",
"Nicolas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0509099
|
Yongzhi Cao
|
Yongzhi Cao, Mingsheng Ying, and Guoqing Chen
|
State-Based Control of Fuzzy Discrete Event Systems
|
14 double column pages; 4 figures; to be published in the IEEE
Transactions on Systems, Man, and Cybernetics--Part B: Cybernetics
|
IEEE Transactions on Systems, Man, and Cybernetics--Part B:
Cybernetics, vol. 37, no. 2, pp. 410-424, April 2007.
|
10.1109/TSMCB.2006.883429
| null |
cs.DM cs.DC
| null |
To effectively represent possibility arising from states and dynamics of a
system, fuzzy discrete event systems as a generalization of conventional
discrete event systems have been introduced recently. Supervisory control
theory based on event feedback has been well established for such systems.
Noting that the system state description, from the viewpoint of specification,
seems more convenient, we investigate the state-based control of fuzzy discrete
event systems in this paper. We first present an approach to finding all fuzzy
states that are reachable by controlling the system. After introducing the
notion of controllability for fuzzy states, we then provide a necessary and
sufficient condition for a set of fuzzy states to be controllable. We also find
that event-based control and state-based control are not equivalent and further
discuss the relationship between them. Finally, we examine the possibility of
driving a fuzzy discrete event system under control from a given initial state
to a prescribed set of fuzzy states and then keeping it there indefinitely.
|
[
{
"version": "v1",
"created": "Fri, 30 Sep 2005 12:24:31 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Mar 2006 07:52:12 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Nov 2006 02:11:38 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Cao",
"Yongzhi",
""
],
[
"Ying",
"Mingsheng",
""
],
[
"Chen",
"Guoqing",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0509100
|
Shripad Thite
|
Jeff Erickson (1), Shripad Thite (1), David P. Bunde (1) ((1)
Department of Computer Science, University of Illinois at Urbana-Champaign,
Urbana, IL, USA)
|
Distance-2 Edge Coloring is NP-Complete
|
3 pages, 1 figure in color
| null | null | null |
cs.DM cs.CC
| null |
We prove that it is NP-complete to determine whether there exists a
distance-2 edge coloring (strong edge coloring) with 5 colors of a bipartite
2-inductive graph with girth 6 and maximum degree 3.
|
[
{
"version": "v1",
"created": "Fri, 30 Sep 2005 13:15:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Erickson",
"Jeff",
""
],
[
"Thite",
"Shripad",
""
],
[
"Bunde",
"David P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0510001
|
Jo\~ao Vitor Baldini Soares
|
Jo\~ao V. B. Soares, Jorge J. G. Leandro, Roberto M. Cesar Jr.,
Herbert F. Jelinek, Michael J. Cree
|
Retinal Vessel Segmentation Using the 2-D Morlet Wavelet and Supervised
Classification
|
9 pages, 7 figures and 1 table. Accepted for publication in IEEE
Trans Med Imag; added copyright notice
|
IEEE Trans Med Imag, Vol. 25, no. 9, pp. 1214- 1222, Sep. 2006.
|
10.1109/TMI.2006.879967
| null |
cs.CV
| null |
We present a method for automated segmentation of the vasculature in retinal
images. The method produces segmentations by classifying each image pixel as
vessel or non-vessel, based on the pixel's feature vector. Feature vectors are
composed of the pixel's intensity and continuous two-dimensional Morlet wavelet
transform responses taken at multiple scales. The Morlet wavelet is capable of
tuning to specific frequencies, thus allowing noise filtering and vessel
enhancement in a single step. We use a Bayesian classifier with
class-conditional probability density functions (likelihoods) described as
Gaussian mixtures, yielding a fast classification, while being able to model
complex decision surfaces and compare its performance with the linear minimum
squared error classifier. The probability distributions are estimated based on
a training set of labeled pixels obtained from manual segmentations. The
method's performance is evaluated on publicly available DRIVE and STARE
databases of manually labeled non-mydriatic images. On the DRIVE database, it
achieves an area under the receiver operating characteristic (ROC) curve of
0.9598, being slightly superior than that presented by the method of Staal et
al.
|
[
{
"version": "v1",
"created": "Fri, 30 Sep 2005 22:27:45 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2006 17:09:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Soares",
"João V. B.",
""
],
[
"Leandro",
"Jorge J. G.",
""
],
[
"Cesar",
"Roberto M.",
"Jr."
],
[
"Jelinek",
"Herbert F.",
""
],
[
"Cree",
"Michael J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0510002
|
Syed Jafar
|
Krishna Srikanth Gomadam, Syed Ali Jafar
|
Optimal Relay Functionality for SNR Maximization in Memoryless Relay
Networks
|
full paper
| null | null | null |
cs.IT math.IT
| null |
We explore the SNR-optimal relay functionality in a \emph{memoryless} relay
network, i.e. a network where, during each channel use, the signal transmitted
by a relay depends only on the last received symbol at that relay. We develop a
generalized notion of SNR for the class of memoryless relay functions. The
solution to the generalized SNR optimization problem leads to the novel concept
of minimum mean square uncorrelated error estimation(MMSUEE). For the elemental
case of a single relay, we show that MMSUEE is the SNR-optimal memoryless relay
function regardless of the source and relay transmit power, and the modulation
scheme. This scheme, that we call estimate and forward (EF), is also shown to
be SNR-optimal with PSK modulation in a parallel relay network. We demonstrate
that EF performs better than the best of amplify and forward (AF) and
demodulate and forward (DF), in both parallel and serial relay networks. We
also determine that AF is near-optimal at low transmit power in a parallel
network, while DF is near-optimal at high transmit power in a serial network.
For hybrid networks that contain both serial and parallel elements, and when
robust performance is desired, the advantage of EF over the best of AF and DF
is found to be significant. Error probabilities are provided to substantiate
the performance gain obtained through SNR optimality. We also show that, for
\emph{Gaussian} inputs, AF, DF and EF become identical.
|
[
{
"version": "v1",
"created": "Sat, 1 Oct 2005 01:22:03 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jul 2006 21:20:25 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gomadam",
"Krishna Srikanth",
""
],
[
"Jafar",
"Syed Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510003
|
Giuseppe Abreu
|
Giuseppe Thadeu Freitas de Abreu
|
Generalized ABBA Space-Time Block Codes
|
47 pages, 6 figures, Matlab codes included
| null | null | null |
cs.IT math.IT
| null |
Linear space-time block codes (STBCs) of unitary rate and full diversity,
systematically constructed over arbitrary constellations for any number of
transmit antennas are introduced. The codes are obtained by generalizing the
existing ABBA STBCs, a.k.a quasi-orthogonal STBCs (QO-STBCs). Furthermore, a
fully orthogonal (symbol-by-symbol) decoder for the new generalized ABBA
(GABBA) codes is provided. This remarkably low-complexity decoder relies on
partition orthogonality properties of the code structure to decompose the
received signal vector into lower-dimension tuples, each dependent only on
certain subsets of the transmitted symbols. Orthogonal decodability results
from the nested application of this technique, with no matrix inversion or
iterative signal processing required. The exact bit-error-rate probability of
GABBA codes over generalized fading channels with maximum likelihood (ML)
decoding is evaluated analytically and compared against simulation results
obtained with the proposed orthogonal decoder. The comparison reveals that the
proposed GABBA solution, despite its very low complexity, achieves nearly the
same performance of the bound corresponding to the ML-decoded system,
especially in systems with large numbers of antennas.
|
[
{
"version": "v1",
"created": "Sun, 2 Oct 2005 14:10:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"de Abreu",
"Giuseppe Thadeu Freitas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510004
|
Jeff M Phillips
|
Deepak Agarwal and Jeff M. Phillips and Suresh Venkatasubramanian
|
The Hunting of the Bump: On Maximizing Statistical Discrepancy
|
11 pages. A short version of this paper will appear in SODA06. This
full version contains an additional short appendix
| null | null | null |
cs.CG
| null |
Anomaly detection has important applications in biosurveilance and
environmental monitoring. When comparing measured data to data drawn from a
baseline distribution, merely, finding clusters in the measured data may not
actually represent true anomalies. These clusters may likely be the clusters of
the baseline distribution. Hence, a discrepancy function is often used to
examine how different measured data is to baseline data within a region. An
anomalous region is thus defined to be one with high discrepancy.
In this paper, we present algorithms for maximizing statistical discrepancy
functions over the space of axis-parallel rectangles. We give provable
approximation guarantees, both additive and relative, and our methods apply to
any convex discrepancy function. Our algorithms work by connecting statistical
discrepancy to combinatorial discrepancy; roughly speaking, we show that in
order to maximize a convex discrepancy function over a class of shapes, one
needs only maximize a linear discrepancy function over the same set of shapes.
We derive general discrepancy functions for data generated from a one-
parameter exponential family. This generalizes the widely-used Kulldorff scan
statistic for data from a Poisson distribution. We present an algorithm running
in $O(\smash[tb]{\frac{1}{\epsilon} n^2 \log^2 n})$ that computes the maximum
discrepancy rectangle to within additive error $\epsilon$, for the Kulldorff
scan statistic. Similar results hold for relative error and for discrepancy
functions for data coming from Gaussian, Bernoulli, and gamma distributions.
Prior to our work, the best known algorithms were exact and ran in time
$\smash[t]{O(n^4)}$.
|
[
{
"version": "v1",
"created": "Mon, 3 Oct 2005 02:09:14 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Agarwal",
"Deepak",
""
],
[
"Phillips",
"Jeff M.",
""
],
[
"Venkatasubramanian",
"Suresh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0510005
|
Or Zuk
|
Or Zuk, Eytan Domany, Ido Kanter and Michael Aizenman
|
Taylor series expansions for the entropy rate of Hidden Markov Processes
| null |
Proceedings 2006 IEEE International Conference on Communications
(ICC 2006).
|
10.1109/ICC.2006.255039
| null |
cs.IT cond-mat.stat-mech math.IT
| null |
Finding the entropy rate of Hidden Markov Processes is an active research
topic, of both theoretical and practical importance. A recently used approach
is studying the asymptotic behavior of the entropy rate in various regimes. In
this paper we generalize and prove a previous conjecture relating the entropy
rate to entropies of finite systems. Building on our new theorems, we establish
series expansions for the entropy rate in two different regimes. We also study
the radius of convergence of the two series expansions.
|
[
{
"version": "v1",
"created": "Mon, 3 Oct 2005 09:56:37 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Zuk",
"Or",
""
],
[
"Domany",
"Eytan",
""
],
[
"Kanter",
"Ido",
""
],
[
"Aizenman",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510006
|
Stefano Bregni
|
Stefano Bregni, Luca Primerano
|
Using the Modified Allan Variance for Accurate Estimation of the Hurst
Parameter of Long-Range Dependent Traffic
|
Ver. I - Submitted to IEEE Transactions on Information Theory, Feb.
2005
| null | null | null |
cs.NI
| null |
Internet traffic exhibits self-similarity and long-range dependence (LRD) on
various time scales. A well studied issue is the estimation of statistical
parameters characterizing traffic self-similarity and LRD, such as the Hurst
parameter H. In this paper, we propose to adapt the Modified Allan Variance
(MAVAR), a time-domain quantity originally conceived to discriminate fractional
noise in frequency stability measurement, to estimate the Hurst parameter of
LRD traffic traces and, more generally, to identify fractional noise components
in network traffic. This novel method is validated by comparison to one of the
best techniques for analyzing self-similar and LRD traffic: the logscale
diagram based on wavelet analysis. Both methods are applied to pseudo-random
LRD data series, generated with assigned values of H. The superior spectral
sensitivity of MAVAR achieves outstanding accuracy in estimating H, even better
than the logscale method. The behaviour of MAVAR with most common deterministic
signals that yield nonstationarity in data under analysis is also studied.
Finally, both techniques are applied to a real IP traffic trace, providing a
sound example of the usefulness of MAVAR also in traffic characterization, to
complement other established techniques as the logscale method.
|
[
{
"version": "v1",
"created": "Mon, 3 Oct 2005 15:51:41 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Bregni",
"Stefano",
""
],
[
"Primerano",
"Luca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0510007
|
Alain Barrat
|
Fabien Viger, Alain Barrat, Luca Dall'Asta, Cun-Hui Zhang, and Eric D.
Kolaczyk
|
Network Inference from TraceRoute Measurements: Internet Topology
`Species'
| null |
Phys. Rev. E 75 (2007) 056111
|
10.1103/PhysRevE.75.056111
| null |
cs.NI cond-mat.stat-mech math.ST physics.soc-ph stat.TH
| null |
Internet mapping projects generally consist in sampling the network from a
limited set of sources by using traceroute probes. This methodology, akin to
the merging of spanning trees from the different sources to a set of
destinations, leads necessarily to a partial, incomplete map of the Internet.
Accordingly, determination of Internet topology characteristics from such
sampled maps is in part a problem of statistical inference. Our contribution
begins with the observation that the inference of many of the most basic
topological quantities -- including network size and degree characteristics --
from traceroute measurements is in fact a version of the so-called `species
problem' in statistics. This observation has important implications, since
species problems are often quite challenging. We focus here on the most
fundamental example of a traceroute internet species: the number of nodes in a
network. Specifically, we characterize the difficulty of estimating this
quantity through a set of analytical arguments, we use statistical subsampling
principles to derive two proposed estimators, and we illustrate the performance
of these estimators on networks with various topological characteristics.
|
[
{
"version": "v1",
"created": "Mon, 3 Oct 2005 15:52:27 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Viger",
"Fabien",
""
],
[
"Barrat",
"Alain",
""
],
[
"Dall'Asta",
"Luca",
""
],
[
"Zhang",
"Cun-Hui",
""
],
[
"Kolaczyk",
"Eric D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0510008
|
Carlos Miravet
|
Carlos Miravet, Francisco B. Rodriguez
|
Accurate and robust image superresolution by neural processing of local
image representations
|
6 pages with 3 figures. ICANN 2005
|
Lect. Notes Comput. Sc. 3696 (2005) 499-506
| null | null |
cs.CV cs.NE
| null |
Image superresolution involves the processing of an image sequence to
generate a still image with higher resolution. Classical approaches, such as
bayesian MAP methods, require iterative minimization procedures, with high
computational costs. Recently, the authors proposed a method to tackle this
problem, based on the use of a hybrid MLP-PNN architecture. In this paper, we
present a novel superresolution method, based on an evolution of this concept,
to incorporate the use of local image models. A neural processing stage
receives as input the value of model coefficients on local windows. The data
dimensionality is firstly reduced by application of PCA. An MLP, trained on
synthetic sequences with various amounts of noise, estimates the
high-resolution image data. The effect of varying the dimension of the network
input space is examined, showing a complex, structured behavior. Quantitative
results are presented showing the accuracy and robustness of the proposed
method.
|
[
{
"version": "v1",
"created": "Mon, 3 Oct 2005 19:42:55 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Miravet",
"Carlos",
""
],
[
"Rodriguez",
"Francisco B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0510009
|
Deepak Sridhara
|
Christine Kelley, Deepak Sridhara, and Joachim Rosenthal
|
Tree-Based Construction of LDPC Codes Having Good Pseudocodeword Weights
|
Submitted to Transactions on Information Theory. Submitted: Oct. 1,
2005; Revised: May 1, 2006, Nov. 25, 2006
| null | null | null |
cs.IT math.IT
| null |
We present a tree-based construction of LDPC codes that have minimum
pseudocodeword weight equal to or almost equal to the minimum distance, and
perform well with iterative decoding. The construction involves enumerating a
$d$-regular tree for a fixed number of layers and employing a connection
algorithm based on permutations or mutually orthogonal Latin squares to close
the tree. Methods are presented for degrees $d=p^s$ and $d = p^s+1$, for $p$ a
prime. One class corresponds to the well-known finite-geometry and finite
generalized quadrangle LDPC codes; the other codes presented are new. We also
present some bounds on pseudocodeword weight for $p$-ary LDPC codes. Treating
these codes as $p$-ary LDPC codes rather than binary LDPC codes improves their
rates, minimum distances, and pseudocodeword weights, thereby giving a new
importance to the finite geometry LDPC codes where $p > 2$.
|
[
{
"version": "v1",
"created": "Mon, 3 Oct 2005 21:54:40 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 02:19:36 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kelley",
"Christine",
""
],
[
"Sridhara",
"Deepak",
""
],
[
"Rosenthal",
"Joachim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510010
|
Etienne Lozes
|
Daniel Hirschkoff (LIP-ENS LYON), Etienne Lozes (LSV), Davide
Sangiorgi (DSI BOLOGNA)
|
On the Expressiveness of the Ambient Logic
| null |
Logical Methods in Computer Science, Volume 2, Issue 2 (March 30,
2006) lmcs:2251
|
10.2168/LMCS-2(2:3)2006
| null |
cs.LO
| null |
The Ambient Logic (AL) has been proposed for expressing properties of process
mobility in the calculus of Mobile Ambients (MA), and as a basis for query
languages on semistructured data. In this paper, we study the expressiveness of
AL. We define formulas for capabilities and for communication in MA. We also
derive some formulas that capture finitess of a term, name occurrences and
persistence. We study extensions of the calculus involving more complex forms
of communications, and we define characteristic formulas for the equivalence
induced by the logic on a subcalculus of MA. This subcalculus is defined by
imposing an image-finiteness condition on the reducts of a MA process.
|
[
{
"version": "v1",
"created": "Tue, 4 Oct 2005 08:47:55 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Mar 2006 13:30:36 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Hirschkoff",
"Daniel",
"",
"LIP-ENS LYON"
],
[
"Lozes",
"Etienne",
"",
"LSV"
],
[
"Sangiorgi",
"Davide",
"",
"DSI BOLOGNA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0510011
|
David Delahaye
|
David Delahaye (CEDRIC), Micaela Mayero (LIPN)
|
Diophantus' 20th Problem and Fermat's Last Theorem for n=4:
Formalization of Fermat's Proofs in the Coq Proof Assistant
|
16 pages
| null | null | null |
cs.LO cs.SE math.NT
| null |
We present the proof of Diophantus' 20th problem (book VI of Diophantus'
Arithmetica), which consists in wondering if there exist right triangles whose
sides may be measured as integers and whose surface may be a square. This
problem was negatively solved by Fermat in the 17th century, who used the
"wonderful" method (ipse dixit Fermat) of infinite descent. This method, which
is, historically, the first use of induction, consists in producing smaller and
smaller non-negative integer solutions assuming that one exists; this naturally
leads to a reductio ad absurdum reasoning because we are bounded by zero. We
describe the formalization of this proof which has been carried out in the Coq
proof assistant. Moreover, as a direct and no less historical application, we
also provide the proof (by Fermat) of Fermat's last theorem for n=4, as well as
the corresponding formalization made in Coq.
|
[
{
"version": "v1",
"created": "Tue, 4 Oct 2005 08:53:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Delahaye",
"David",
"",
"CEDRIC"
],
[
"Mayero",
"Micaela",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
cs/0510012
|
Vassia Pavlaki
|
Foto Afrati, Theodore Andronikos, Vassia Pavlaki, Eugenie Foustoucos,
Irene Guessarian
|
On relating CTL to Datalog
|
34 pages, 1 figure (file .eps)
| null | null | null |
cs.LO
| null |
CTL is the dominant temporal specification language in practice mainly due to
the fact that it admits model checking in linear time. Logic programming and
the database query language Datalog are often used as an implementation
platform for logic languages. In this paper we present the exact relation
between CTL and Datalog and moreover we build on this relation and known
efficient algorithms for CTL to obtain efficient algorithms for fragments of
stratified Datalog. The contributions of this paper are: a) We embed CTL into
STD which is a proper fragment of stratified Datalog. Moreover we show that STD
expresses exactly CTL -- we prove that by embedding STD into CTL. Both
embeddings are linear. b) CTL can also be embedded to fragments of Datalog
without negation. We define a fragment of Datalog with the successor build-in
predicate that we call TDS and we embed CTL into TDS in linear time. We build
on the above relations to answer open problems of stratified Datalog. We prove
that query evaluation is linear and that containment and satisfiability
problems are both decidable. The results presented in this paper are the first
for fragments of stratified Datalog that are more general than those containing
only unary EDBs.
|
[
{
"version": "v1",
"created": "Tue, 4 Oct 2005 17:29:48 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Oct 2005 18:50:20 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Afrati",
"Foto",
""
],
[
"Andronikos",
"Theodore",
""
],
[
"Pavlaki",
"Vassia",
""
],
[
"Foustoucos",
"Eugenie",
""
],
[
"Guessarian",
"Irene",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0510013
|
Luc Bouganim
|
Luc Bouganim (INRIA Rocquencourt), Cosmin Cremarenco (INRIA
Rocquencourt), Fran\c{c}ois Dang Ngoc (INRIA Rocquencourt, PRISM - UVSQ),
Nicolas Dieu (INRIA Rocquencourt), Philippe Pucheral (INRIA Rocquencourt,
PRISM - UVSQ)
|
Safe Data Sharing and Data Dissemination on Smart Devices
| null | null | null | null |
cs.CR cs.DB
| null |
The erosion of trust put in traditional database servers, the growing
interest for different forms of data dissemination and the concern for
protecting children from suspicious Internet content are different factors that
lead to move the access control from servers to clients. Several encryption
schemes can be used to serve this purpose but all suffer from a static way of
sharing data. In a precedent paper, we devised smarter client-based access
control managers exploiting hardware security elements on client devices. The
goal pursued is being able to evaluate dynamic and personalized access control
rules on a ciphered XML input document, with the benefit of dissociating access
rights from encryption. In this demonstration, we validate our solution using a
real smart card platform and explain how we deal with the constraints usually
met on hardware security elements (small memory and low throughput). Finally,
we illustrate the generality of the approach and the easiness of its deployment
through two different applications: a collaborative application and a parental
control application on video streams.
|
[
{
"version": "v1",
"created": "Wed, 5 Oct 2005 12:14:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bouganim",
"Luc",
"",
"INRIA Rocquencourt"
],
[
"Cremarenco",
"Cosmin",
"",
"INRIA\n Rocquencourt"
],
[
"Ngoc",
"François Dang",
"",
"INRIA Rocquencourt, PRISM - UVSQ"
],
[
"Dieu",
"Nicolas",
"",
"INRIA Rocquencourt"
],
[
"Pucheral",
"Philippe",
"",
"INRIA Rocquencourt,\n PRISM - UVSQ"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0510014
|
Clement Pernet
|
Cl\'ement Pernet (LMC - IMAG), Aude Rondepierre (LMC - IMAG), Gilles
Villard (LIP)
|
Computing the Kalman form
|
10 pages
| null | null | null |
cs.SC math.OC
| null |
We present two algorithms for the computation of the Kalman form of a linear
control system. The first one is based on the technique developed by
Keller-Gehrig for the computation of the characteristic polynomial. The cost is
a logarithmic number of matrix multiplications. To our knowledge, this improves
the best previously known algebraic complexity by an order of magnitude. Then
we also present a cubic algorithm proven to more efficient in practice.
|
[
{
"version": "v1",
"created": "Wed, 5 Oct 2005 14:16:15 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Oct 2005 12:00:43 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Oct 2005 13:57:58 GMT"
},
{
"version": "v4",
"created": "Tue, 7 Feb 2006 06:11:25 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Pernet",
"Clément",
"",
"LMC - IMAG"
],
[
"Rondepierre",
"Aude",
"",
"LMC - IMAG"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0510015
|
Laurent Audibert
|
Laurent Audibert (DELIC)
|
Word sense disambiguation criteria: a systematic study
| null |
20th International Conference on Computational Linguistics
(COLING-2004) (2004) pp. 910-916
| null | null |
cs.CL
| null |
This article describes the results of a systematic in-depth study of the
criteria used for word sense disambiguation. Our study is based on 60 target
words: 20 nouns, 20 adjectives and 20 verbs. Our results are not always in line
with some practices in the field. For example, we show that omitting
non-content words decreases performance and that bigrams yield better results
than unigrams.
|
[
{
"version": "v1",
"created": "Wed, 5 Oct 2005 14:23:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Audibert",
"Laurent",
"",
"DELIC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0510016
|
Or Zuk
|
Or Zuk, Eytan Domany, Ido Kanter and Michael Aizenman
|
From finite-system entropy to entropy rate for a Hidden Markov Process
| null |
IEEE Signal Processing Letters 13,517 (2006).
|
10.1109/LSP.2006.874466
| null |
cs.IT math-ph math.IT math.MP
| null |
A recent result presented the expansion for the entropy rate of a Hidden
Markov Process (HMP) as a power series in the noise variable $\eps$. The
coefficients of the expansion around the noiseless ($\eps = 0$) limit were
calculated up to 11th order, using a conjecture that relates the entropy rate
of a HMP to the entropy of a process of finite length (which is calculated
analytically). In this communication we generalize and prove the validity of
the conjecture, and discuss the theoretical and practical consequences of our
new theorem.
|
[
{
"version": "v1",
"created": "Thu, 6 Oct 2005 07:56:04 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Zuk",
"Or",
""
],
[
"Domany",
"Eytan",
""
],
[
"Kanter",
"Ido",
""
],
[
"Aizenman",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
cs/0510017
|
Svante Janson
|
Svante Janson and Wojciech Szpankowski
|
Partial fillup and search time in LC tries
|
13 pages
| null | null | null |
cs.DS math.PR
| null |
Andersson and Nilsson introduced in 1993 a level-compressed trie (in short:
LC trie) in which a full subtree of a node is compressed to a single node of
degree being the size of the subtree. Recent experimental results indicated a
'dramatic improvement' when full subtrees are replaced by partially filled
subtrees. In this paper, we provide a theoretical justification of these
experimental results showing, among others, a rather moderate improvement of
the search time over the original LC tries. For such an analysis, we assume
that n strings are generated independently by a binary memoryless source with p
denoting the probability of emitting a 1. We first prove that the so called
alpha-fillup level (i.e., the largest level in a trie with alpha fraction of
nodes present at this level) is concentrated on two values with high
probability. We give these values explicitly up to O(1), and observe that the
value of alpha (strictly between 0 and 1) does not affect the leading term.
This result directly yields the typical depth (search time) in the alpha-LC
tries with p not equal to 1/2, which turns out to be C loglog n for an
explicitly given constant C (depending on p but not on alpha). This should be
compared with recently found typical depth in the original LC tries which is C'
loglog n for a larger constant C'. The search time in alpha-LC tries is thus
smaller but of the same order as in the original LC tries.
|
[
{
"version": "v1",
"created": "Thu, 6 Oct 2005 10:04:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Janson",
"Svante",
""
],
[
"Szpankowski",
"Wojciech",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0510018
|
Danilo Gligoroski
|
Danilo Gligoroski
|
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup
String Transformations
|
Submitetd to conference
| null | null | null |
cs.CR cs.CC
| null |
In this paper we propose a definition and construction of a new family of
one-way candidate functions ${\cal R}_N:Q^N \to Q^N$, where $Q=\{0,1,...,s-1\}$
is an alphabet with $s$ elements. Special instances of these functions can have
the additional property to be permutations (i.e. one-way permutations). These
one-way functions have the property that for achieving the security level of
$2^n$ computations in order to invert them, only $n$ bits of input are needed.
The construction is based on quasigroup string transformations. Since
quasigroups in general do not have algebraic properties such as associativity,
commutativity, neutral elements, inverting these functions seems to require
exponentially many readings from the lookup table that defines them (a Latin
Square) in order to check the satisfiability for the initial conditions, thus
making them natural candidates for one-way functions.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2005 00:29:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gligoroski",
"Danilo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0510019
|
Panigrahy Rina
|
Rina Panigrahy
|
Entropy based Nearest Neighbor Search in High Dimensions
| null | null | null | null |
cs.DS
| null |
In this paper we study the problem of finding the approximate nearest
neighbor of a query point in the high dimensional space, focusing on the
Euclidean space. The earlier approaches use locality-preserving hash functions
(that tend to map nearby points to the same value) to construct several hash
tables to ensure that the query point hashes to the same bucket as its nearest
neighbor in at least one table. Our approach is different -- we use one (or a
few) hash table and hash several randomly chosen points in the neighborhood of
the query point showing that at least one of them will hash to the bucket
containing its nearest neighbor. We show that the number of randomly chosen
points in the neighborhood of the query point $q$ required depends on the
entropy of the hash value $h(p)$ of a random point $p$ at the same distance
from $q$ at its nearest neighbor, given $q$ and the locality preserving hash
function $h$ chosen randomly from the hash family. Precisely, we show that if
the entropy $I(h(p)|q,h) = M$ and $g$ is a bound on the probability that two
far-off points will hash to the same bucket, then we can find the approximate
nearest neighbor in $O(n^\rho)$ time and near linear $\tilde O(n)$ space where
$\rho = M/\log(1/g)$. Alternatively we can build a data structure of size
$\tilde O(n^{1/(1-\rho)})$ to answer queries in $\tilde O(d)$ time. By applying
this analysis to the locality preserving hash functions in and adjusting the
parameters we show that the $c$ nearest neighbor can be computed in time
$\tilde O(n^\rho)$ and near linear space where $\rho \approx 2.06/c$ as $c$
becomes large.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2005 00:55:06 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Nov 2005 16:55:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Panigrahy",
"Rina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0510020
|
Thierry Poibeau
|
Thierry Poibeau (LIPN)
|
Sur le statut r\'{e}f\'{e}rentiel des entit\'{e}s nomm\'{e}es
|
11 pages
|
Conf\'{e}rence Traitement Automatique des Langues 2005, France
(2005)
| null | null |
cs.AI cs.IR
| null |
We show in this paper that, on the one hand, named entities can be designated
using different denominations and that, on the second hand, names denoting
named entities are polysemous. The analysis cannot be limited to reference
resolution but should take into account naming strategies, which are mainly
based on two linguistic operations: synecdoche and metonymy. Lastly, we present
a model that explicitly represents the different denominations in discourse,
unifying the way to represent linguistic knowledge and world knowledge.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2005 17:39:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0510021
|
Farhad Meshkati
|
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz and Dongning Guo
|
A Unified Power Control Algorithm for Multiuser Detectors in Large
Systems: Convergence and Performance
|
Proceedings of the 43rd Annual Allerton Conference on Communication,
Control and Computing, Monticello, IL, September 2005
| null | null | null |
cs.IT math.IT
| null |
A unified approach to energy-efficient power control, applicable to a large
family of receivers including the matched filter, the decorrelator, the
(linear) minimum-mean-square-error detector (MMSE), and the individually and
jointly optimal multiuser detectors, has recently been proposed for
code-division-multiple-access (CDMA) networks. This unified power control (UPC)
algorithm exploits the linear relationship that has been shown to exist between
the transmit power and the output signal-to-interference-plus-noise ratio (SIR)
in large systems. Based on this principle and by computing the multiuser
efficiency, the UPC algorithm updates the users' transmit powers in an
iterative way to achieve the desired target SIR. In this paper, the convergence
of the UPC algorithm is proved for the matched filter, the decorrelator, and
the MMSE detector. In addition, the performance of the algorithm in finite-size
systems is studied and compared with that of existing power control schemes.
The UPC algorithm is particularly suitable for systems with randomly generated
long spreading sequences (i.e., sequences whose period is longer than one
symbol duration).
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2005 18:39:25 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Meshkati",
"Farhad",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Schwartz",
"Stuart C.",
""
],
[
"Guo",
"Dongning",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510022
|
Sam Bretheim
|
Sam Bretheim
|
Cryptographic Authentication of Navigation Protocols
|
12 pages
| null | null | null |
cs.CR
| null |
We examine the security of existing radio navigation protocols and attempt to
define secure, scalable replacements.
|
[
{
"version": "v1",
"created": "Sun, 9 Oct 2005 02:39:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bretheim",
"Sam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0510023
|
Cristina Comaniciu
|
Cristina Comaniciu and H. Vincent Poor
|
On the capacity of mobile ad hoc networks with delay constraints
|
to appear in the IEEE Transactions on Wireless Communications
| null | null | null |
cs.IT cs.NI math.IT
| null |
Previous work on ad hoc network capacity has focused primarily on
source-destination throughput requirements for different models and
transmission scenarios, with an emphasis on delay tolerant applications. In
such problems, network capacity enhancement is achieved as a tradeoff with
transmission delay. In this paper, the capacity of ad hoc networks supporting
delay sensitive traffic is studied. First, a general framework is proposed for
characterizing the interactions between the physical and the network layer in
an ad hoc network. Then, CDMA ad hoc networks, in which advanced signal
processing techniques such as multiuser detection are relied upon to enhance
the user capacity, are analyzed. The network capacity is characterized using a
combination of geometric arguments and large scale analysis, for several
network scenarios employing matched filters, decorrelators and
minimum-mean-square-error receivers. Insight into the network performance for
finite systems is also provided by means of simulations. Both analysis and
simulations show a significant network capacity gain for ad hoc networks
employing multiuser detectors, compared with those using matched filter
receivers, as well as very good performance even under tight delay and
transmission power requirements.
|
[
{
"version": "v1",
"created": "Mon, 10 Oct 2005 13:27:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Comaniciu",
"Cristina",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510024
|
David Eppstein
|
David Eppstein, Michael T. Goodrich, and Jeremy Yu Meng
|
Delta-confluent Drawings
|
14 pages, 8 figures. A preliminary version of this work was presented
at the 13th Int. Symp. Graph Drawing, Limerick, Ireland, September 2005
| null | null | null |
cs.CG
| null |
We generalize the tree-confluent graphs to a broader class of graphs called
Delta-confluent graphs. This class of graphs and distance-hereditary graphs, a
well-known class of graphs, coincide. Some results about the visualization of
Delta-confluent graphs are also given.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2005 00:47:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Meng",
"Jeremy Yu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0510025
|
Thierry Despeyroux
|
Thierry Despeyroux (INRIA Rocquencourt / INRIA Sophia Antipolis)
|
Practical Semantic Analysis of Web Sites and Documents
| null | null | null | null |
cs.IR
| null |
As Web sites are now ordinary products, it is necessary to explicit the
notion of quality of a Web site. The quality of a site may be linked to the
easiness of accessibility and also to other criteria such as the fact that the
site is up to date and coherent. This last quality is difficult to insure
because sites may be updated very frequently, may have many authors, may be
partially generated and in this context proof-reading is very difficult. The
same piece of information may be found in different occurrences, but also in
data or meta-data, leading to the need for consistency checking. In this paper
we make a parallel between programs and Web sites. We present some examples of
semantic constraints that one would like to specify (constraints between the
meaning of categories and sub-categories in a thematic directory, consistency
between the organization chart and the rest of the site in an academic site).
We present quickly the Natural Semantics, a way to specify the semantics of
programming languages that inspires our works. Then we propose a specification
language for semantic constraints in Web sites that, in conjunction with the
well known ``make'' program, permits to generate some site verification tools
by compiling the specification into Prolog code. We apply our method to a large
XML document which is the scientific part of our institute activity report,
tracking errors or inconsistencies and also constructing some indicators that
can be used by the management of the institute.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2005 08:40:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Despeyroux",
"Thierry",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0510026
|
Carlos Miravet
|
Alvaro Enriquez de Luna, Carlos Miravet, Deitze Otaduy, Carlos
Dorronsoro
|
A decision support system for ship identification based on the curvature
scale space representation
|
12 pages, 18 figures, 1 table, SPIE 5988 Electro-Optical Remote
Sensing 2005
| null |
10.1117/12.630532
| null |
cs.CV
| null |
In this paper, a decision support system for ship identification is
presented. The system receives as input a silhouette of the vessel to be
identified, previously extracted from a side view of the object. This view
could have been acquired with imaging sensors operating at different spectral
ranges (CCD, FLIR, image intensifier). The input silhouette is preprocessed and
compared to those stored in a database, retrieving a small number of potential
matches ranked by their similarity to the target silhouette. This set of
potential matches is presented to the system operator, who makes the final ship
identification. This system makes use of an evolved version of the Curvature
Scale Space (CSS) representation. In the proposed approach, it is curvature
extrema, instead of zero crossings, that are tracked during silhouette
evolution, hence improving robustness and enabling to cope successfully with
cases where the standard CCS representation is found to be unstable. Also, the
use of local curvature was replaced with the more robust concept of lobe
concavity, with significant additional gains in performance. Experimental
results on actual operational imagery prove the excellent performance and
robustness of the developed method.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2005 08:43:04 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"de Luna",
"Alvaro Enriquez",
""
],
[
"Miravet",
"Carlos",
""
],
[
"Otaduy",
"Deitze",
""
],
[
"Dorronsoro",
"Carlos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.