id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0510027
Alexandre d'Aspremont
Alexandre d'Aspremont
A Market Test for the Positivity of Arrow-Debreu Prices
New version, fixes a few minor errors and typos
null
null
null
cs.CE
null
We derive tractable necessary and sufficient conditions for the absence of buy-and-hold arbitrage opportunities in a perfectly liquid, one period market. We formulate the positivity of Arrow-Debreu prices as a generalized moment problem to show that this no arbitrage condition is equivalent to the positive semidefiniteness of matrices formed by the market price of tradeable securities and their products. We apply this result to a market with multiple assets and basket call options.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 13:40:17 GMT" }, { "version": "v2", "created": "Thu, 15 Jun 2006 17:05:08 GMT" } ]
2007-05-23T00:00:00
[ [ "d'Aspremont", "Alexandre", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0510028
Victor Grishchenko
Victor S. Grishchenko
Geo-aggregation permits low stretch and routing tables of logarithmical size
6 pages
null
null
null
cs.NI
null
This article first addresses applicability of Euclidean models to the domain of Internet routing. Those models are found (limitedly) applicable. Then a simplistic model of routing is constructed for Euclidean plane densely covered with points-routers. The model guarantees low stretch and logarithmical size of routing tables at any node. The paper concludes with a discussion on applicability of the model to real-world Internet routing.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 16:20:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Grishchenko", "Victor S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0510029
Konstantin Makarychev
Konstantin Makarychev and Yury Makarychev
Conditionally independent random variables
8 pages
null
null
null
cs.IT math.IT
null
In this paper we investigate the notion of conditional independence and prove several information inequalities for conditionally independent random variables.
[ { "version": "v1", "created": "Tue, 11 Oct 2005 21:20:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Makarychev", "Konstantin", "" ], [ "Makarychev", "Yury", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510030
Amin Mobasher
Amin Mobasher, Mahmoud Taherzadeh, Renata Sotirov, and Amir K. Khandani
A Near Maximum Likelihood Decoding Algorithm for MIMO Systems Based on Semi-Definite Programming
Submitted to IEEE Trans. on Info. Theory, Revised
null
null
UW-E&CE#2005-12
cs.IT math.IT
null
In Multi-Input Multi-Output (MIMO) systems, Maximum-Likelihood (ML) decoding is equivalent to finding the closest lattice point in an N-dimensional complex space. In general, this problem is known to be NP hard. In this paper, we propose a quasi-maximum likelihood algorithm based on Semi-Definite Programming (SDP). We introduce several SDP relaxation models for MIMO systems, with increasing complexity. We use interior-point methods for solving the models and obtain a near-ML performance with polynomial computational complexity. Lattice basis reduction is applied to further reduce the computational complexity of solving these models. The proposed relaxation models are also used for soft output decoding in MIMO systems.
[ { "version": "v1", "created": "Wed, 12 Oct 2005 00:35:23 GMT" }, { "version": "v2", "created": "Thu, 31 May 2007 15:03:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Mobasher", "Amin", "" ], [ "Taherzadeh", "Mahmoud", "" ], [ "Sotirov", "Renata", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510031
Constantinos Daskalakis
Constantinos Daskalakis
Computing Pure Nash Equilibria via Markov Random Fields
null
null
null
null
cs.GT
null
In this paper we present a novel generic mapping between Graphical Games and Markov Random Fields so that pure Nash equilibria in the former can be found by statistical inference on the latter. Thus, the problem of deciding whether a graphical game has a pure Nash equilibrium, a well-known intractable problem, can be attacked by well-established algorithms such as Belief Propagation, Junction Trees, Markov Chain Monte Carlo and Simulated Annealing. Large classes of graphical games become thus tractable, including all classes already known, but also new classes such as the games with O(log n) treewidth.
[ { "version": "v1", "created": "Thu, 13 Oct 2005 04:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Daskalakis", "Constantinos", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0510032
Mark Plumbley
Mark D. Plumbley
Polar Polytopes and Recovery of Sparse Representations
null
On Polar Polytopes and the Recovery of Sparse Representations. IEEE Trans. Inf. Theory 53(9), 3188-3195, 2007
10.1109/TIT.2007.903129
null
cs.IT math.IT
null
Suppose we have a signal y which we wish to represent using a linear combination of a number of basis atoms a_i, y=sum_i x_i a_i = Ax. The problem of finding the minimum L0 norm representation for y is a hard problem. The Basis Pursuit (BP) approach proposes to find the minimum L1 norm representation instead, which corresponds to a linear program (LP) that can be solved using modern LP techniques, and several recent authors have given conditions for the BP (minimum L1 norm) and sparse (minimum L0 solutions) representations to be identical. In this paper, we explore this sparse representation problem} using the geometry of convex polytopes, as recently introduced into the field by Donoho. By considering the dual LP we find that the so-called polar polytope P of the centrally-symmetric polytope P whose vertices are the atom pairs +-a_i is particularly helpful in providing us with geometrical insight into optimality conditions given by Fuchs and Tropp for non-unit-norm atom sets. In exploring this geometry we are able to tighten some of these earlier results, showing for example that the Fuchs condition is both necessary and sufficient for L1-unique-optimality, and that there are situations where Orthogonal Matching Pursuit (OMP) can eventually find all L1-unique-optimal solutions with m nonzeros even if ERC fails for m, if allowed to run for more than m steps.
[ { "version": "v1", "created": "Thu, 13 Oct 2005 14:41:15 GMT" } ]
2016-08-04T00:00:00
[ [ "Plumbley", "Mark D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510033
Navin Kashyap
Navin Kashyap, Paul H. Siegel and Alexander Vardy
Coding for the Optical Channel: the Ghost-Pulse Constraint
13 pages, 6 figures; accepted for publication in IEEE Transactions on Information Theory
null
10.1109/TIT.2005.860409
null
cs.IT cs.DM math.IT
null
We consider a number of constrained coding techniques that can be used to mitigate a nonlinear effect in the optical fiber channel that causes the formation of spurious pulses, called ``ghost pulses.'' Specifically, if $b_1 b_2 ... b_{n}$ is a sequence of bits sent across an optical channel, such that $b_k=b_l=b_m=1$ for some $k,l,m$ (not necessarily all distinct) but $b_{k+l-m} = 0$, then the ghost-pulse effect causes $b_{k+l-m}$ to change to 1, thereby creating an error. We design and analyze several coding schemes using binary and ternary sequences constrained so as to avoid patterns that give rise to ghost pulses. We also discuss the design of encoders and decoders for these coding schemes.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 01:38:35 GMT" } ]
2016-11-18T00:00:00
[ [ "Kashyap", "Navin", "" ], [ "Siegel", "Paul H.", "" ], [ "Vardy", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510034
Zsolt I. L\'az\'ar
Zsolt I. L\'az\'ar, Andreea Fanea, Drago\c{s} Petra\c{s}cu, Vladiela Ciobotariu-Boer and Bazil P\^arv
COMODI: On the Graphical User Interface
5 pages, 5 figures, to be published as proceedings of SYNASC 2005
null
null
null
cs.HC cs.CE cs.MS
null
We propose a series of features for the graphical user interface (GUI) of the COmputational MOdule Integrator (COMODI) \cite{Synasc05a}\cite{COMODI}. In view of the special requirements that a COMODI type of framework for scientific computing imposes and inspiring from existing solutions that provide advanced graphical visual programming environments, we identify those elements and associated behaviors that will have to find their way into the first release of COMODI.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 01:03:55 GMT" } ]
2016-08-16T00:00:00
[ [ "Lázár", "Zsolt I.", "" ], [ "Fanea", "Andreea", "" ], [ "Petraşcu", "Dragoş", "" ], [ "Ciobotariu-Boer", "Vladiela", "" ], [ "Pârv", "Bazil", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0510035
Alexandre Graell i Amat
Alexandre Graell i Amat, Guido Montorsi, Francesca Vatta
Design and Performance Analysis of a New Class of Rate Compatible Serial Concatenated Convolutional Codes
Submitted to IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
In this paper, we provide a performance analysis of a new class of serial concatenated convolutional codes (SCCC) where the inner encoder can be punctured beyond the unitary rate. The puncturing of the inner encoder is not limited to inner coded bits, but extended to systematic bits. Moreover, it is split into two different puncturings, in correspondence with inner code systematic bits and parity bits. We derive the analytical upper bounds to the error probability of this particular code structure and address suitable design guidelines for the inner code puncturing patterns. We show that the percentile of systematic and parity bits to be deleted strongly depends on the SNR region of interest. In particular, to lower the error floor it is advantageous to put more puncturing on inner systematic bits. Furthermore, we show that puncturing of inner systematic bits should be interleaver dependent. Based on these considerations, we derive design guidelines to obtain well-performing rate-compatible SCCC families. Throughout the paper, the performance of the proposed codes are compared with analytical bounds, and with the performance of PCCC and SCCC proposed in the literature.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 08:03:49 GMT" } ]
2007-07-13T00:00:00
[ [ "Amat", "Alexandre Graell i", "" ], [ "Montorsi", "Guido", "" ], [ "Vatta", "Francesca", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510036
Jan Chomicki
Jan Chomicki
Semantic Optimization Techniques for Preference Queries
null
null
null
null
cs.DB cs.AI cs.LO
null
Preference queries are relational algebra or SQL queries that contain occurrences of the winnow operator ("find the most preferred tuples in a given relation"). Such queries are parameterized by specific preference relations. Semantic optimization techniques make use of integrity constraints holding in the database. In the context of semantic optimization of preference queries, we identify two fundamental properties: containment of preference relations relative to integrity constraints and satisfaction of order axioms relative to integrity constraints. We show numerous applications of those notions to preference query evaluation and optimization. As integrity constraints, we consider constraint-generating dependencies, a class generalizing functional dependencies. We demonstrate that the problems of containment and satisfaction of order axioms can be captured as specific instances of constraint-generating dependency entailment. This makes it possible to formulate necessary and sufficient conditions for the applicability of our techniques as constraint validity problems. We characterize the computational complexity of such problems.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 13:25:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0510037
Rokia Bendaoud
Rokia Bendaoud (INRIA Lorraine - LORIA), Yannick Toussaint (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA)
Hi\'{e}rarchisation des r\`{e}gles d'association en fouille de textes
null
null
null
null
cs.IR cs.AI
null
Extraction of association rules is widely used as a data mining method. However, one of the limit of this approach comes from the large number of extracted rules and the difficulty for a human expert to deal with the totality of these rules. We propose to solve this problem by structuring the set of rules into hierarchy. The expert can then therefore explore the rules, access from one rule to another one more general when we raise up in the hierarchy, and in other hand, or a more specific rules. Rules are structured at two levels. The global level aims at building a hierarchy from the set of rules extracted. Thus we define a first type of rule-subsomption relying on Galois lattices. The second level consists in a local and more detailed analysis of each rule. It generate for a given rule a set of generalization rules structured into a local hierarchy. This leads to the definition of a second type of subsomption. This subsomption comes from inductive logic programming and integrates a terminological model.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 14:24:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Bendaoud", "Rokia", "", "INRIA Lorraine - LORIA" ], [ "Toussaint", "Yannick", "", "INRIA\n Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510038
Alp Atici
Alp Atici and Rocco A. Servedio
Learning Unions of $\omega(1)$-Dimensional Rectangles
25 pages. Some corrections. Recipient of E. M. Gold award ALT 2006. To appear in Journal of Theoretical Computer Science
Theoretical Computer Science, Vol. 405, No. 3, 209--222 (2008)
10.1016/j.tcs.2008.06.036
null
cs.LG
null
We consider the problem of learning unions of rectangles over the domain $[b]^n$, in the uniform distribution membership query learning setting, where both b and n are "large". We obtain poly$(n, \log b)$-time algorithms for the following classes: - poly$(n \log b)$-way Majority of $O(\frac{\log(n \log b)} {\log \log(n \log b)})$-dimensional rectangles. - Union of poly$(\log(n \log b))$ many $O(\frac{\log^2 (n \log b)} {(\log \log(n \log b) \log \log \log (n \log b))^2})$-dimensional rectangles. - poly$(n \log b)$-way Majority of poly$(n \log b)$-Or of disjoint $O(\frac{\log(n \log b)} {\log \log(n \log b)})$-dimensional rectangles. Our main algorithmic tool is an extension of Jackson's boosting- and Fourier-based Harmonic Sieve algorithm [Jackson 1997] to the domain $[b]^n$, building on work of [Akavia, Goldwasser, Safra 2003]. Other ingredients used to obtain the results stated above are techniques from exact learning [Beimel, Kushilevitz 1998] and ideas from recent work on learning augmented $AC^{0}$ circuits [Jackson, Klivans, Servedio 2002] and on representing Boolean functions as thresholds of parities [Klivans, Servedio 2001].
[ { "version": "v1", "created": "Fri, 14 Oct 2005 19:26:34 GMT" }, { "version": "v2", "created": "Fri, 14 Oct 2005 20:02:32 GMT" }, { "version": "v3", "created": "Fri, 12 May 2006 18:23:36 GMT" }, { "version": "v4", "created": "Tue, 26 Jun 2007 14:00:17 GMT" } ]
2008-09-12T00:00:00
[ [ "Atici", "Alp", "" ], [ "Servedio", "Rocco A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0510039
Sandor P. Fekete
Christophe Bobda, Ali Ahmadinia, Mateusz Majer, Juergen Teich, Sandor P. Fekete, Jan van der Veen
DyNoC: A Dynamic Infrastructure for Communication in Dynamically Reconfigurable Devices
9 pages, 7 figures, 1 table, Latex, to appear in 15th International Conference on Field-Programmable Logic and Application
null
null
null
cs.AR
null
A new paradigm to support the communication among modules dynamically placed on a reconfigurable device at run-time is presented. Based on the network on chip (NoC) infrastructure, we developed a dynamic communication infrastructure as well as routing methodologies capable to handle routing in a NoC with obstacles created by dynamically placed components. We prove the unrestricted reachability of components and pins, the deadlock-freeness and we finally show the feasibility of our approach by means on real life example applications.
[ { "version": "v1", "created": "Fri, 14 Oct 2005 22:03:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Bobda", "Christophe", "" ], [ "Ahmadinia", "Ali", "" ], [ "Majer", "Mateusz", "" ], [ "Teich", "Juergen", "" ], [ "Fekete", "Sandor P.", "" ], [ "van der Veen", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0510040
Ken Krechmer Mr.
Ken Krechmer
The "...system of constraints"
null
null
null
null
cs.IT math.IT
null
This paper proposes that the mathematical relationship between an entropy distribution and its limit offers some new insight into system performance. This relationship is used to quantify variation among the entities of a system, where variation is defined as tolerance, option, specification or implementation variation among the entities of a system. Variation has a significnt and increasing impact on communications system performance. This paper introduces means to identify, quantify and reduce such performance variations.
[ { "version": "v1", "created": "Sat, 15 Oct 2005 02:04:41 GMT" } ]
2007-07-16T00:00:00
[ [ "Krechmer", "Ken", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510041
Gerard Henry Edmond Duchamp
G\'erard Henry Edmond Duchamp (LIPN), Pawel Blasiak (LPTL), Andrzej Horzela (LPTL), Karol A. Penson (LPTL), Allan I. Solomon (LPTL)
Feynman graphs and related Hopf algebras
null
null
10.1088/1742-6596/30/1/014
null
cs.SC cs.DM math-ph math.CO math.MP quant-ph
null
In a recent series of communications we have shown that the reordering problem of bosons leads to certain combinatorial structures. These structures may be associated with a certain graphical description. In this paper, we show that there is a Hopf Algebra structure associated with this problem which is, in a certain sense, unique.
[ { "version": "v1", "created": "Sat, 15 Oct 2005 06:11:56 GMT" } ]
2016-08-16T00:00:00
[ [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ], [ "Blasiak", "Pawel", "", "LPTL" ], [ "Horzela", "Andrzej", "", "LPTL" ], [ "Penson", "Karol A.", "", "LPTL" ], [ "Solomon", "Allan I.", "", "LPTL" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0510042
David Naccache
David Naccache
Secure and {\sl Practical} Identity-Based Encryption
null
null
null
null
cs.CR
null
In this paper, we present a variant of Waters' Identity-Based Encryption scheme with a much smaller public-key size (only a few kilobytes). We show that this variant is semantically secure against passive adversaries in the standard model.\smallskip In essence, the new scheme divides Waters' public key size by a factor $\ell$ at the cost of (negligibly) reducing security by $\ell$ bits. Therefore, our construction settles an open question asked by Waters and constitutes the first fully secure {\sl practical} Identity-Based Encryption scheme
[ { "version": "v1", "created": "Sat, 15 Oct 2005 11:08:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Naccache", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0510043
Pascal Vontobel
Pascal O. Vontobel, Roxana Smarandache
On Minimal Pseudo-Codewords of Tanner Graphs from Projective Planes
This paper is a slightly reformulated version of the paper that appeared in the proceedings of the 43rd Allerton Conference on Communications, Control, and Computing, Allerton House, Monticello, Illinois, USA, Sept. 28-30, 2005
Proc. 43rd Allerton Conference on Communications, Control, and Computing, Allerton House, Monticello, Illinois, USA, Sept. 28-30, 2005
null
null
cs.IT cs.DM math.IT
null
We would like to better understand the fundamental cone of Tanner graphs derived from finite projective planes. Towards this goal, we discuss bounds on the AWGNC and BSC pseudo-weight of minimal pseudo-codewords of such Tanner graphs, on one hand, and study the structure of minimal pseudo-codewords, on the other.
[ { "version": "v1", "created": "Sat, 15 Oct 2005 23:51:52 GMT" } ]
2007-07-16T00:00:00
[ [ "Vontobel", "Pascal O.", "" ], [ "Smarandache", "Roxana", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510044
Andrea Montanari
Andrea Montanari, Balaji Prabhakar, David Tse
Belief Propagation Based Multi--User Detection
9 pages, 4 eps figures. Forty-third Allerton Conference on Communications, Control and Computing, invited paper
null
null
null
cs.IT math.IT
null
We apply belief propagation (BP) to multi--user detection in a spread spectrum system, under the assumption of Gaussian symbols. We prove that BP is both convergent and allows to estimate the correct conditional expectation of the input symbols. It is therefore an optimal --minimum mean square error-- detection algorithm. This suggests the possibility of designing BP detection algorithms for more general systems. As a byproduct we rederive the Tse-Hanly formula for minimum mean square error without any recourse to random matrix theory.
[ { "version": "v1", "created": "Sun, 16 Oct 2005 16:05:31 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 10:56:18 GMT" } ]
2007-07-13T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Prabhakar", "Balaji", "" ], [ "Tse", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510045
Andrea Montanari
Cyril Measson, Andrea Montanari, Rudiger Urbanke
Why We Can Not Surpass Capacity: The Matching Condition
10 pages, 27 ps figures. Forty-third Allerton Conference on Communication, Control and Computing, invited paper
null
null
null
cs.IT math.IT
null
We show that iterative coding systems can not surpass capacity using only quantities which naturally appear in density evolution. Although the result in itself is trivial, the method which we apply shows that in order to achieve capacity the various components in an iterative coding system have to be perfectly matched. This generalizes the perfect matching condition which was previously known for the case of transmission over the binary erasure channel to the general class of binary-input memoryless output-symmetric channels. Potential applications of this perfect matching condition are the construction of capacity-achieving degree distributions and the determination of the number required iterations as a function of the multiplicative gap to capacity.
[ { "version": "v1", "created": "Sun, 16 Oct 2005 16:32:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Measson", "Cyril", "" ], [ "Montanari", "Andrea", "" ], [ "Urbanke", "Rudiger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510046
Dmitry Mogilevsky
Dmitry Mogilevsky, Adam Lee, William Yurcik
Defining a Comprehensive Threat Model for High Performance Computational Clusters
null
null
null
null
cs.CR cs.DC
null
Over the past decade, high performance computational (HPC) clusters have become mainstream in academic and industrial settings as accessible means of computation. Throughout their proliferation, HPC security has been a secondary concern to performance. It is evident, however, that ensuring HPC security presents different challenges than the ones faced when dealing with traditional networks. To design suitable security measures for high performance computing, it is necessary to first realize the threats faced by such an environment. This task can be accomplished by the means of constructing a comprehensive threat model. To our knowledge, no such threat model exists with regards to Cluster Computing. In this paper, we explore the unique challenges of securing HPCs and propose a threat model based on the classical Confidentiality, Integrity and Availability security principles.
[ { "version": "v1", "created": "Sun, 16 Oct 2005 23:32:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Mogilevsky", "Dmitry", "" ], [ "Lee", "Adam", "" ], [ "Yurcik", "William", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0510047
Oliver Henkel
Oliver Henkel
Geometrical relations between space time block code designs and complexity reduction
final version, 11 pages, two-column
IEEE Trans. Inform. Theory, vol. 52, no. 12 (Dec 2006), 5324-5335
10.1109/TIT.2006.885457
null
cs.IT math.IT
null
In this work, the geometric relation between space time block code design for the coherent channel and its non-coherent counterpart is exploited to get an analogue of the information theoretic inequality $I(X;S)\le I((X,H);S)$ in terms of diversity. It provides a lower bound on the performance of non-coherent codes when used in coherent scenarios. This leads in turn to a code design decomposition result splitting coherent code design into two complexity reduced sub tasks. Moreover a geometrical criterion for high performance space time code design is derived.
[ { "version": "v1", "created": "Mon, 17 Oct 2005 08:41:51 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2006 10:23:21 GMT" } ]
2007-07-16T00:00:00
[ [ "Henkel", "Oliver", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510048
Sandor P. Fekete
Alexander Kroeller and Sandor P. Fekete and Dennis Pfisterer and Stefan Fischer
Deterministic boundary recognition and topology extraction for large sensor networks
10 pages, 9 figures, Latex, to appear in Symposium on Discrete Algorithms (SODA 2006)
null
null
null
cs.DC cs.CG
null
We present a new framework for the crucial challenge of self-organization of a large sensor network. The basic scenario can be described as follows: Given a large swarm of immobile sensor nodes that have been scattered in a polygonal region, such as a street network. Nodes have no knowledge of size or shape of the environment or the position of other nodes. Moreover, they have no way of measuring coordinates, geometric distances to other nodes, or their direction. Their only way of interacting with other nodes is to send or to receive messages from any node that is within communication range. The objective is to develop algorithms and protocols that allow self-organization of the swarm into large-scale structures that reflect the structure of the street network, setting the stage for global routing, tracking and guiding algorithms.
[ { "version": "v1", "created": "Mon, 17 Oct 2005 12:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Kroeller", "Alexander", "" ], [ "Fekete", "Sandor P.", "" ], [ "Pfisterer", "Dennis", "" ], [ "Fischer", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0510049
Roxana Smarandache
Roxana Smarandache and Marcel Wauer
Bounds on the Pseudo-Weight of Minimal Pseudo-Codewords of Projective Geometry Codes
12 pages 1 figure, submitted
null
null
null
cs.IT cs.DM math.IT
null
In this paper we focus our attention on a family of finite geometry codes, called type-I projective geometry low-density parity-check (PG-LDPC) codes, that are constructed based on the projective planes PG{2,q). In particular, we study their minimal codewords and pseudo-codewords, as it is known that these vectors characterize completely the code performance under maximum-likelihood decoding and linear programming decoding, respectively. The main results of this paper consist of upper and lower bounds on the pseudo-weight of the minimal pseudo-codewords of type-I PG-LDPC codes.
[ { "version": "v1", "created": "Mon, 17 Oct 2005 15:46:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Smarandache", "Roxana", "" ], [ "Wauer", "Marcel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510050
Gilles Kassel
Gilles Kassel (LaRIA)
Integration of the DOLCE top-level ontology into the OntoSpec methodology
null
null
null
LRR-2005-08
cs.AI
null
This report describes a new version of the OntoSpec methodology for ontology building. Defined by the LaRIA Knowledge Engineering Team (University of Picardie Jules Verne, Amiens, France), OntoSpec aims at helping builders to model ontological knowledge (upstream of formal representation). The methodology relies on a set of rigorously-defined modelling primitives and principles. Its application leads to the elaboration of a semi-informal ontology, which is independent of knowledge representation languages. We recently enriched the OntoSpec methodology by endowing it with a new resource, the DOLCE top-level ontology defined at the LOA (IST-CNR, Trento, Italy). The goal of this integration is to provide modellers with additional help in structuring application ontologies, while maintaining independence vis-\`{a}-vis formal representation languages. In this report, we first provide an overview of the OntoSpec methodology's general principles and then describe the DOLCE re-engineering process. A complete version of DOLCE-OS (i.e. a specification of DOLCE in the semi-informal OntoSpec language) is presented in an appendix.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 08:32:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Kassel", "Gilles", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510051
Gianluca Argentini
Gianluca Argentini
Numerical resolution of some BVP using Bernstein polynomials
7 pages, 3 figures
Posted since 2005-11-29 at Applied Mathematics E-Notes, http://www.math.nthu.edu.tw/~amen/
null
null
cs.NA cs.MS math.CA physics.comp-ph
null
In this work we present a method, based on the use of Bernstein polynomials, for the numerical resolution of some boundary values problems. The computations have not need of particular approximations of derivatives, such as finite differences, or particular techniques, such as finite elements. Also, the method doesn't require the use of matrices, as in resolution of linear algebraic systems, nor the use of like-Newton algorithms, as in resolution of non linear sets of equations. An initial equation is resolved only once, then the method is based on iterated evaluations of appropriate polynomials.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 09:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
cs/0510052
Victor Grishchenko
Victor S. Grishchenko
Remarks on "Toward Compact Interdomain Routing"
null
null
null
null
cs.NI
null
This paper critically examines some propositions and arguments of cs.NI/0508021 regarding applicability of hierarchical routing and perspectives of compact routing. Arguments against the former are found to be inaccurate while the latter is found to be equivalent to well-known deployed solutions. Also, multiple (stacked) application of compact-routing solutions is found to be equivalent to hierarchical routing.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 13:01:08 GMT" }, { "version": "v2", "created": "Thu, 20 Oct 2005 15:18:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Grishchenko", "Victor S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0510053
Martin Kutz
Martin Kutz
A pair of trees without a simultaneous geometric embedding in the plane
This paper has been withdrawn by the author because it had turned out that the result was already known before
null
null
null
cs.CG
null
Any planar graph has a crossing-free straight-line drawing in the plane. A simultaneous geometric embedding of two n-vertex graphs is a straight-line drawing of both graphs on a common set of n points, such that the edges withing each individual graph do not cross. We consider simultaneous embeddings of two labeled trees, with predescribed vertex correspondences, and present an instance of such a pair that cannot be embedded. Further we provide an example of a planar graph that cannot be embedded together with a path when vertex correspondences are given.
[ { "version": "v1", "created": "Tue, 18 Oct 2005 18:26:00 GMT" }, { "version": "v2", "created": "Tue, 1 Nov 2005 13:14:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0510054
Le Zhao Mr.
Le Zhao, Min Zhang, Shaoping Ma
The Nature of Novelty Detection
This paper pointed out the future direction for novelty detection research. 37 pages, double spaced version
null
null
null
cs.IR cs.CL
null
Sentence level novelty detection aims at reducing redundant sentences from a sentence list. In the task, sentences appearing later in the list with no new meanings are eliminated. Aiming at a better accuracy for detecting redundancy, this paper reveals the nature of the novelty detection task currently overlooked by the Novelty community $-$ Novelty as a combination of the partial overlap (PO, two sentences sharing common facts) and complete overlap (CO, the first sentence covers all the facts of the second sentence) relations. By formalizing novelty detection as a combination of the two relations between sentences, new viewpoints toward techniques dealing with Novelty are proposed. Among the methods discussed, the similarity, overlap, pool and language modeling approaches are commonly used. Furthermore, a novel approach, selected pool method is provided, which is immediate following the nature of the task. Experimental results obtained on all the three currently available novelty datasets showed that selected pool is significantly better or no worse than the current methods. Knowledge about the nature of the task also affects the evaluation methodologies. We propose new evaluation measures for Novelty according to the nature of the task, as well as possible directions for future study.
[ { "version": "v1", "created": "Wed, 19 Oct 2005 14:56:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhao", "Le", "" ], [ "Zhang", "Min", "" ], [ "Ma", "Shaoping", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0510055
Syed Jafar
Syed A. Jafar, Maralle J. Fakhereddin
Degrees of Freedom in Multiuser MIMO
6 pages
null
null
null
cs.IT math.IT
null
We explore the available degrees of freedom for various multiuser MIMO communication scenarios such as the multiple access, broadcast, interference, relay, X and Z channels. For the two user MIMO interference channel, we find a general inner bound and a genie-aided outer bound that give us the exact number of degrees of freedom in many cases. We also study a share-and-transmit scheme for transmitter cooperation. For the share-and-transmit scheme, we show how the gains of transmitter cooperation are entirely offset by the cost of enabling that cooperation so that the available degrees of freedom are not increased.
[ { "version": "v1", "created": "Wed, 19 Oct 2005 18:24:51 GMT" } ]
2009-09-29T00:00:00
[ [ "Jafar", "Syed A.", "" ], [ "Fakhereddin", "Maralle J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510056
Jackie (Jianhong) Shen
Yoon-Mo Jung and Jianhong Shen
First-Order Modeling and Stability Analysis of Illusory Contours
21 pages
null
null
null
cs.CV cs.AI
null
In visual cognition, illusions help elucidate certain intriguing latent perceptual functions of the human vision system, and their proper mathematical modeling and computational simulation are therefore deeply beneficial to both biological and computer vision. Inspired by existent prior works, the current paper proposes a first-order energy-based model for analyzing and simulating illusory contours. The lower complexity of the proposed model facilitates rigorous mathematical analysis on the detailed geometric structures of illusory contours. After being asymptotically approximated by classical active contours, the proposed model is then robustly computed using the celebrated level-set method of Osher and Sethian (J. Comput. Phys., 79:12-49, 1988) with a natural supervising scheme. Potential cognitive implications of the mathematical results are addressed, and generic computational examples are demonstrated and discussed.
[ { "version": "v1", "created": "Wed, 19 Oct 2005 20:44:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Jung", "Yoon-Mo", "" ], [ "Shen", "Jianhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510057
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LMC - IMAG), Dominique Duval (LMC - IMAG)
Towards a diagrammatic modeling of the LinBox C++ linear algebra library
Published in Langages et Mod\`eles \`a Objets, N\^imes : France (2006)
null
null
null
cs.SC
null
We propose a new diagrammatic modeling language, DML. The paradigm used is that of the category theory and in particular of the pushout tool. We show that most of the object-oriented structures can be described with this tool and have many examples in C++, ranging from virtual inheritance and polymorphism to template genericity. With this powerful tool, we propose a quite simple description of the C++ LinBox library. This library has been designed for efficiency and genericity and therefore makes heavy usage of complex template and polymorphic mecanism. Be reverse engineering, we are able to describe in a simple manner the complex structure of archetypes in LinBox.
[ { "version": "v1", "created": "Thu, 20 Oct 2005 15:07:18 GMT" } ]
2008-09-04T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LMC - IMAG" ], [ "Duval", "Dominique", "", "LMC - IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0510058
Peter Jung
Peter Jung
Precoding for 2x2 Doubly-Dispersive WSSUS Channels
6 pages, 6th International ITG-Conference on Source and Channel Coding (SCC 2006), Apr., 2006, Munich, typos corrected
null
null
null
cs.IT math.IT
null
Optimal link adaption to the scattering function of wide sense stationary uncorrelated scattering (WSSUS) mobile communication channels is still an unsolved problem despite its importance for next-generation system design. In multicarrier transmission such link adaption is performed by pulse shaping which in turn is equivalent to precoding with respect to the second order channel statistics. In the present framework a translation of the precoder optimization problem into an optimization problem over trace class operators is used. This problem which is also well-known in the context of quantum information theory is unsolved in general due to its non-convex nature. However in very low dimension the problem formulation reveals an additional analytic structure which again admits the solution to the optimal precoder and multiplexing scheme. Hence, in this contribution the analytic solution of the problem for the 2x2 doubly--dispersive WSSUS channel is presented.
[ { "version": "v1", "created": "Thu, 20 Oct 2005 14:57:12 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 09:06:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Jung", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510059
Arnaud De La Fortelle
Michel Parent (INRIA Rocquencourt), Arnaud De La Fortelle (INRIA Rocquencourt)
Cybercars : Past, Present and Future of the Technology
null
Dans ITS World Congress 2005
null
null
cs.RO
null
Automobile has become the dominant transport mode in the world in the last century. In order to meet a continuously growing demand for transport, one solution is to change the control approach for vehicle to full driving automation, which removes the driver from the control loop to improve efficiency and reduce accidents. Recent work shows that there are several realistic paths towards this deployment : driving assistance on passenger cars, automated commercial vehicles on dedicated infrastructures, and new forms of urban transport (car-sharing and cybercars). Cybercars have already been put into operation in Europe, and it seems that this approach could lead the way towards full automation on most urban, and later interurban infrastructures. The European project CyberCars has brought many improvements in the technology needed to operate cybercars over the last three years. A new, larger European project is now being prepared to carry this work further in order to meet more ambitious objectives in terms of safety and efficiency. This paper will present past and present technologies and will focus on the future developments.
[ { "version": "v1", "created": "Thu, 20 Oct 2005 15:03:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Parent", "Michel", "", "INRIA Rocquencourt" ], [ "De La Fortelle", "Arnaud", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0510060
Alex Grant
Leif W Hanlen and Alex J Grant
Optimal Transmit Covariance for Ergodic MIMO Channels
22 pages, 14 figures, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper we consider the computation of channel capacity for ergodic multiple-input multiple-output channels with additive white Gaussian noise. Two scenarios are considered. Firstly, a time-varying channel is considered in which both the transmitter and the receiver have knowledge of the channel realization. The optimal transmission strategy is water-filling over space and time. It is shown that this may be achieved in a causal, indeed instantaneous fashion. In the second scenario, only the receiver has perfect knowledge of the channel realization, while the transmitter has knowledge of the channel gain probability law. In this case we determine an optimality condition on the input covariance for ergodic Gaussian vector channels with arbitrary channel distribution under the condition that the channel gains are independent of the transmit signal. Using this optimality condition, we find an iterative algorithm for numerical computation of optimal input covariance matrices. Applications to correlated Rayleigh and Ricean channels are given.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 02:12:57 GMT" } ]
2007-07-13T00:00:00
[ [ "Hanlen", "Leif W", "" ], [ "Grant", "Alex J", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510061
Marcin Czenko
M. Czenko, H. Tran, J. Doumen, S. Etalle, P. Hartel, J. den Hartog
Nonmonotonic Trust Management for P2P Applications
This paper appears in the proceedings of the 1st International Workshop on Security and Trust Management (STM 2005). To appear in ENTCS
null
null
TR-CTIT-05-22
cs.LO
null
Community decisions about access control in virtual communities are non-monotonic in nature. This means that they cannot be expressed in current, monotonic trust management languages such as the family of Role Based Trust Management languages (RT). To solve this problem we propose RT-, which adds a restricted form of negation to the standard RT language, thus admitting a controlled form of non-monotonicity. The semantics of RT- is discussed and presented in terms of the well-founded semantics for Logic Programs. Finally we discuss how chain discovery can be accomplished for RT-.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 11:46:56 GMT" } ]
2009-09-29T00:00:00
[ [ "Czenko", "M.", "" ], [ "Tran", "H.", "" ], [ "Doumen", "J.", "" ], [ "Etalle", "S.", "" ], [ "Hartel", "P.", "" ], [ "Hartog", "J. den", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0510062
Jamal Saboune
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Using Interval Particle Filtering for Marker less 3D Human Motion Capture
null
null
null
null
cs.AI
null
In this paper we present a new approach for marker less human motion capture from conventional camera feeds. The aim of our study is to recover 3D positions of key points of the body that can serve for gait analysis. Our approach is based on foreground segmentation, an articulated body model and particle filters. In order to be generic and simple no restrictive dynamic modelling was used. A new modified particle filtering algorithm was introduced. It is used efficiently to search the model configuration space. This new algorithm which we call Interval Particle Filtering reorganizes the configurations search space in an optimal deterministic way and proved to be efficient in tracking natural human movement. Results for human motion capture from a single camera are presented and compared to results obtained from a marker based system. The system proved to be able to track motion successfully even in partial occlusions.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 13:45:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Saboune", "Jamal", "", "INRIA Lorraine - LORIA" ], [ "Charpillet", "François", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510063
Jamal Saboune
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA Lorraine - LORIA)
Markerless Human Motion Capture for Gait Analysis
null
null
null
null
cs.AI
null
The aim of our study is to detect balance disorders and a tendency towards the falls in the elderly, knowing gait parameters. In this paper we present a new tool for gait analysis based on markerless human motion capture, from camera feeds. The system introduced here, recovers the 3D positions of several key points of the human body while walking. Foreground segmentation, an articulated body model and particle filtering are basic elements of our approach. No dynamic model is used thus this system can be described as generic and simple to implement. A modified particle filtering algorithm, which we call Interval Particle Filtering, is used to reorganise and search through the model's configurations search space in a deterministic optimal way. This algorithm was able to perform human movement tracking with success. Results from the treatment of a single cam feeds are shown and compared to results obtained using a marker based human motion capture system.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 13:45:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Saboune", "Jamal", "", "INRIA Lorraine - LORIA" ], [ "Charpillet", "François", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510064
Valmir Barbosa
Rosa M. V. Figueiredo, Valmir C. Barbosa, Nelson Maculan, Cid C. Souza
Acyclic orientations with path constraints
null
RAIRO Operations Research 42 (2008), 455-467
10.1051/ro:2008028
null
cs.DM
null
Many well-known combinatorial optimization problems can be stated over the set of acyclic orientations of an undirected graph. For example, acyclic orientations with certain diameter constraints are closely related to the optimal solutions of the vertex coloring and frequency assignment problems. In this paper we introduce a linear programming formulation of acyclic orientations with path constraints, and discuss its use in the solution of the vertex coloring problem and some versions of the frequency assignment problem. A study of the polytope associated with the formulation is presented, including proofs of which constraints of the formulation are facet-defining and the introduction of new classes of valid inequalities.
[ { "version": "v1", "created": "Fri, 21 Oct 2005 18:29:44 GMT" } ]
2008-10-15T00:00:00
[ [ "Figueiredo", "Rosa M. V.", "" ], [ "Barbosa", "Valmir C.", "" ], [ "Maculan", "Nelson", "" ], [ "Souza", "Cid C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0510065
Aneta Zwierko
Adam Wierzbicki, Aneta Zwierko and Zbigniew Kotulski
A new authentication protocol for revocable anonymity in ad-hoc networks
8 pages, 8 figures, this an extended version of paper accepted for IASTED conference CNIS'2005
null
null
null
cs.CR cs.DC cs.NI
null
This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity. At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article analyzes existing authentication methods based on the Public Key Infrastructure, and finds that they have several drawbacks in ad-hoc networks. Therefore, a new authentication protocol, basing on established cryptographic primitives (Merkle's puzzles and zero-knowledge proofs) is proposed. The protocol is studied for a model ad-hoc chat application that provides private conversations.
[ { "version": "v1", "created": "Sat, 22 Oct 2005 11:51:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Wierzbicki", "Adam", "" ], [ "Zwierko", "Aneta", "" ], [ "Kotulski", "Zbigniew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0510066
Bruno Courcelle
Bruno Courcelle
The monadic second-order logic of graphs XVI : Canonical graph<br> decompositions
null
Logical Methods in Computer Science, Volume 2, Issue 2 (March 23, 2006) lmcs:2250
10.2168/LMCS-2(2:2)2006
null
cs.LO
null
This article establishes that the split decomposition of graphs introduced by Cunnigham, is definable in Monadic Second-Order Logic.This result is actually an instance of a more general result covering canonical graph decompositions like the modular decomposition and the Tutte decomposition of 2-connected graphs into 3-connected components. As an application, we prove that the set of graphs having the same cycle matroid as a given 2-connected graph can be defined from this graph by Monadic Second-Order formulas.
[ { "version": "v1", "created": "Sat, 22 Oct 2005 13:09:38 GMT" }, { "version": "v2", "created": "Thu, 3 Nov 2005 09:20:09 GMT" }, { "version": "v3", "created": "Thu, 23 Mar 2006 13:04:11 GMT" } ]
2017-01-11T00:00:00
[ [ "Courcelle", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0510067
Arya Mazumdar
Arya Mazumdar, Adrish Banerjee and A K Chaturvedi
On the Spread of Random Interleaver
5 pages, published in Proceedings of IEEE International Symposium on Information Theory 2005, Adelaide, Australia
IEEE International Symposium on Information Theory 2005
10.1109/ISIT.2005.1523372
null
cs.IT math.IT
null
For a given blocklength we determine the number of interleavers which have spread equal to two. Using this, we find out the probability that a randomly chosen interleaver has spread two. We show that as blocklength increases, this probability increases but very quickly converges to the value $1-e^{-2} \approx 0.8647$. Subsequently, we determine a lower bound on the probability of an interleaver having spread at least $s$. We show that this lower bound converges to the value $e^{-2(s-2)^{2}}$, as the blocklength increases.
[ { "version": "v1", "created": "Sun, 23 Oct 2005 14:20:50 GMT" } ]
2007-07-16T00:00:00
[ [ "Mazumdar", "Arya", "" ], [ "Banerjee", "Adrish", "" ], [ "Chaturvedi", "A K", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510068
Sinan Gezici
Sinan Gezici, Zafer Sahinoglu, Hisashi Kobayashi, and H. Vincent Poor
Ultra Wideband Impulse Radio Systems with Multiple Pulse Types
To appear in the IEEE Journal on Selected Areas in Communications - Special Issue on Ultrawideband Wireless Communications: Theory and Applications
null
10.1109/JSAC.2005.863880
null
cs.IT math.IT
null
In an ultra wideband (UWB) impulse radio (IR) system, a number of pulses, each transmitted in an interval called a "frame", is employed to represent one information symbol. Conventionally, a single type of UWB pulse is used in all frames of all users. In this paper, IR systems with multiple types of UWB pulses are considered, where different types of pulses can be used in different frames by different users. Both stored-reference (SR) and transmitted-reference (TR) systems are considered. First, the spectral properties of a multi-pulse IR system with polarity randomization is investigated. It is shown that the average power spectral density is the average of the spectral contents of different pulse shapes. Then, approximate closed-form expressions for the bit error probability of a multi-pulse SR-IR system are derived for RAKE receivers in asynchronous multiuser environments. The effects of both inter-frame interference (IFI) and multiple-access interference (MAI) are analyzed. The theoretical and simulation results indicate that SR-IR systems that are more robust against IFI and MAI than a "conventional" SR-IR system can be designed with multiple types of ultra-wideband pulses. Finally, extensions to multi-pulse TR-IR systems are briefly described.
[ { "version": "v1", "created": "Sun, 23 Oct 2005 16:35:05 GMT" } ]
2016-11-18T00:00:00
[ [ "Gezici", "Sinan", "" ], [ "Sahinoglu", "Zafer", "" ], [ "Kobayashi", "Hisashi", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510069
Udi Boker
Udi Boker and Nachum Dershowitz
Comparing Computational Power
To appear in Logic Journal of the IGPL in 2006
Logic Journal of the IGPL, vol. 14, no. 5, pp. 633-648, 2006
null
null
cs.LO
null
It is common practice to compare the computational power of different models of computation. For example, the recursive functions are strictly more powerful than the primitive recursive functions, because the latter are a proper subset of the former (which includes Ackermann's function). Side-by-side with this "containment" method of measuring power, it is standard to use an approach based on "simulation". For example, one says that the (untyped) lambda calculus is as powerful--computationally speaking--as the partial recursive functions, because the lambda calculus can simulate all partial recursive functions by encoding the natural numbers as Church numerals. The problem is that unbridled use of these two ways of comparing power allows one to show that some computational models are strictly stronger than themselves! We argue that a better definition is that model A is strictly stronger than B if A can simulate B via some encoding, whereas B cannot simulate A under any encoding. We then show that the recursive functions are strictly stronger in this sense than the primitive recursive. We also prove that the recursive functions, partial recursive functions, and Turing machines are "complete", in the sense that no injective encoding can make them equivalent to any "hypercomputational" model.
[ { "version": "v1", "created": "Sun, 23 Oct 2005 16:51:02 GMT" } ]
2020-06-11T00:00:00
[ [ "Boker", "Udi", "" ], [ "Dershowitz", "Nachum", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0510070
Desmond Lun
Desmond S. Lun, Muriel Medard, Ralf Koetter, Michelle Effros
On Coding for Reliable Communication over Packet Networks
33 pages, 6 figures; revised appendix
Physical Communication, vol. 1, no. 1, pp. 3-20, March 2008.
10.1016/j.phycom.2008.01.006
null
cs.IT cs.NI math.IT
null
We present a capacity-achieving coding scheme for unicast or multicast over lossy packet networks. In the scheme, intermediate nodes perform additional coding yet do not decode nor even wait for a block of packets before sending out coded packets. Rather, whenever they have a transmission opportunity, they send out coded packets formed from random linear combinations of previously received packets. All coding and decoding operations have polynomial complexity. We show that the scheme is capacity-achieving as long as packets received on a link arrive according to a process that has an average rate. Thus, packet losses on a link may exhibit correlation in time or with losses on other links. In the special case of Poisson traffic with i.i.d. losses, we give error exponents that quantify the rate of decay of the probability of error with coding delay. Our analysis of the scheme shows that it is not only capacity-achieving, but that the propagation of packets carrying "innovative" information follows the propagation of jobs through a queueing network, and therefore fluid flow models yield good approximations. We consider networks with both lossy point-to-point and broadcast links, allowing us to model both wireline and wireless packet networks.
[ { "version": "v1", "created": "Sun, 23 Oct 2005 22:42:43 GMT" }, { "version": "v2", "created": "Tue, 2 May 2006 14:27:13 GMT" }, { "version": "v3", "created": "Tue, 2 Jan 2007 22:20:04 GMT" } ]
2008-04-11T00:00:00
[ [ "Lun", "Desmond S.", "" ], [ "Medard", "Muriel", "" ], [ "Koetter", "Ralf", "" ], [ "Effros", "Michelle", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510071
Ashish Khisti
Aggelos Bletsas, Ashish Khisti, David P. Reed, Andrew Lippman
A Simple Cooperative Diversity Method Based on Network Path Selection
To appear, IEEE JSAC, special issue on 4G
null
10.1109/JSAC.2005.862417
null
cs.IT math.IT
null
Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However most of the proposed solutions require distributed space-time coding algorithms, the careful design of which is left for future investigation if there is more than one cooperative relay. We propose a novel scheme, that alleviates these problems and provides diversity gains on the order of the number of relays in the network. Our scheme first selects the best relay from a set of M available relays and then uses this best relay for cooperation between the source and the destination. We develop and analyze a distributed method to select the best relay that requires no topology information and is based on local measurements of the instantaneous channel conditions. This method also requires no explicit communication among the relays. The success (or failure) to select the best available path depends on the statistics of the wireless channel, and a methodology to evaluate performance for any kind of wireless channel statistics, is provided. Information theoretic analysis of outage probability shows that our scheme achieves the same diversity-multiplexing tradeoff as achieved by more complex protocols, where coordination and distributed space-time coding for M nodes is required, such as those proposed in [7]. The simplicity of the technique, allows for immediate implementation in existing radio hardware and its adoption could provide for improved flexibility, reliability and efficiency in future 4G wireless systems.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 01:18:23 GMT" } ]
2016-11-18T00:00:00
[ [ "Bletsas", "Aggelos", "" ], [ "Khisti", "Ashish", "" ], [ "Reed", "David P.", "" ], [ "Lippman", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510072
Dumitru Mihai Ionescu Dr.
Dumitru Mihai Ionescu, Dung N. Doan, Steven D. Gray
On Interleaving Techniques for MIMO Channels and Limitations of Bit Interleaved Coded Modulation
20 pages, 11 figures, uses IEEEtran.cls
null
null
null
cs.IT math.IT
null
It is shown that while the mutual information curves for coded modulation (CM) and bit interleaved coded modulation (BICM) overlap in the case of a single input single output channel, the same is not true in multiple input multiple output (MIMO) channels. A method for mitigating fading in the presence of multiple transmit antennas, named coordinate interleaving (CI), is presented as a generalization of component interleaving for a single transmit antenna. The extent of any advantages of CI over BICM, relative to CM, is analyzed from a mutual information perspective; the analysis is based on an equivalent parallel channel model for CI. Several expressions for mutual information in the presence of CI and multiple transmit and receive antennas are derived. Results show that CI gives higher mutual information compared to that of BICM if proper signal mappings are used. Effects like constellation rotation in the presence of CI are also considered and illustrated; it is shown that constellation rotation can increase the constrained capacity.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 02:09:18 GMT" } ]
2007-07-16T00:00:00
[ [ "Ionescu", "Dumitru Mihai", "" ], [ "Doan", "Dung N.", "" ], [ "Gray", "Steven D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510073
Christian Attiogb
Christian Attiogbe
Semantic Embedding of Petri Nets into Event-B
16 pages, 3 figures
null
null
null
cs.LO
null
We present an embedding of Petri nets into B abstract systems. The embedding is achieved by translating both the static structure (modelling aspect) and the evolution semantics of Petri nets. The static structure of a Petri-net is captured within a B abstract system through a graph structure. This abstract system is then included in another abstract system which captures the evolution semantics of Petri-nets. The evolution semantics results in some B events depending on the chosen policies: basic nets or high level Petri nets. The current embedding enables one to use conjointly Petri nets and Event-B in the same system development, but at different steps and for various analysis.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 09:17:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Attiogbe", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0510074
Riccardo Pucella
Matthew Fluet, Riccardo Pucella
Practical Datatype Specializations with Phantom Types and Recursion Schemes
25 pages. Appeared in the Proc. of the 2005 ACM SIGPLAN Workshop on ML
null
null
null
cs.PL
null
Datatype specialization is a form of subtyping that captures program invariants on data structures that are expressed using the convenient and intuitive datatype notation. Of particular interest are structural invariants such as well-formedness. We investigate the use of phantom types for describing datatype specializations. We show that it is possible to express statically-checked specializations within the type system of Standard ML. We also show that this can be done in a way that does not lose useful programming facilities such as pattern matching in case expressions.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 16:27:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Fluet", "Matthew", "" ], [ "Pucella", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0510075
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy, Sergio Verdu, H. Vincent Poor
On-Off Frequency-Shift-Keying for Wideband Fading Channels
To appear in the EURASIP Journal on Wireless Communications and Networking
null
null
null
cs.IT math.IT
null
M-ary On-Off Frequency-Shift-Keying (OOFSK) is a digital modulation format in which M-ary FSK signaling is overlaid on On/Off keying. This paper investigates the potential of this modulation format in the context of wideband fading channels. First it is assumed that the receiver uses energy detection for the reception of OOFSK signals. Capacity expressions are obtained for the cases in which the receiver has perfect and imperfect fading side information. Power efficiency is investigated when the transmitter is subject to a peak-to-average power ratio (PAR) limitation or a peak power limitation. It is shown that under a PAR limitation, it is extremely power inefficient to operate in the very low SNR regime. On the other hand, if there is only a peak power limitation, it is demonstrated that power efficiency improves as one operates with smaller SNR and vanishing duty factor. Also studied are the capacity improvements that accrue when the receiver can track phase shifts in the channel or if the received signal has a specular component. To take advantage of those features, the phase of the modulation is also allowed to carry information.
[ { "version": "v1", "created": "Mon, 24 Oct 2005 19:50:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ], [ "Verdu", "Sergio", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510076
Olivier Pauplin
Olivier Pauplin (INRIA Rocquencourt), Jean Louchet (INRIA Rocquencourt), Evelyne Lutton (INRIA Rocquencourt), Michel Parent (INRIA Rocquencourt)
Applying Evolutionary Optimisation to Robot Obstacle Avoidance
null
Dans ISCIIA 2004
null
null
cs.AI cs.RO
null
This paper presents an artificial evolutionbased method for stereo image analysis and its application to real-time obstacle detection and avoidance for a mobile robot. It uses the Parisian approach, which consists here in splitting the representation of the robot's environment into a large number of simple primitives, the "flies", which are evolved following a biologically inspired scheme and give a fast, low-cost solution to the obstacle detection problem in mobile robotics.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 07:07:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Pauplin", "Olivier", "", "INRIA Rocquencourt" ], [ "Louchet", "Jean", "", "INRIA\n Rocquencourt" ], [ "Lutton", "Evelyne", "", "INRIA Rocquencourt" ], [ "Parent", "Michel", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0510077
Oskari Ajanki
Oskari Ajanki, Antti Knowles
Connection state overhead in a dynamic linear network
8 pages, 3 figures, uses IEEEtran.cls
null
null
null
cs.IT cs.NI math.IT
null
We consider a dynamical linear network where nearest neighbours communicate via links whose states form binary (open/closed) valued independent and identically distributed Markov processes. Our main result is the tight information-theoretic lower bound on the network traffic required by the connection state overhead, or the information required for all nodes to know their connected neighbourhood. These results, and especially their possible generalisations to more realistic network models, could give us valuable understanding of the unavoidable protocol overheads in rapidly changing Ad hoc and sensor networks.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 12:00:06 GMT" } ]
2007-07-16T00:00:00
[ [ "Ajanki", "Oskari", "" ], [ "Knowles", "Antti", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510078
Hua Wang
H. Wang and P. Viswanath
Vector Gaussian Multiple Description with Individual and Central Receivers
null
null
null
null
cs.IT math.IT
null
L multiple descriptions of a vector Gaussian source for individual and central receivers are investigated. The sum rate of the descriptions with covariance distortion measure constraints, in a positive semidefinite ordering, is exactly characterized. For two descriptions, the entire rate region is characterized. Jointly Gaussian descriptions are optimal in achieving the limiting rates. The key component of the solution is a novel information-theoretic inequality that is used to lower bound the achievable multiple description rates.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 16:48:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "H.", "" ], [ "Viswanath", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510079
Riccardo Pucella
Joseph Y. Halpern, Riccardo Pucella
Evidence with Uncertain Likelihoods
21 pages. A preliminary version appeared in the Proceedings of UAI'05
null
null
null
cs.AI
null
An agent often has a number of hypotheses, and must choose among them based on observations, or outcomes of experiments. Each of these observations can be viewed as providing evidence for or against various hypotheses. All the attempts to formalize this intuition up to now have assumed that associated with each hypothesis h there is a likelihood function \mu_h, which is a probability measure that intuitively describes how likely each observation is, conditional on h being the correct hypothesis. We consider an extension of this framework where there is uncertainty as to which of a number of likelihood functions is appropriate, and discuss how one formal approach to defining evidence, which views evidence as a function from priors to posteriors, can be generalized to accommodate this uncertainty.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 21:15:31 GMT" }, { "version": "v2", "created": "Thu, 3 Aug 2006 17:34:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pucella", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510080
Joseph Y. Halpern
Peter D. Grunwald and Joseph Y. Halpern
When Ignorance is Bliss
In Proceedings of the Twentieth Conference on Uncertainty in AI, 2004, pp. 226-234
null
null
null
cs.AI cs.LG
null
It is commonly-accepted wisdom that more information is better, and that information should never be ignored. Here we argue, using both a Bayesian and a non-Bayesian analysis, that in some situations you are better off ignoring information if your uncertainty is represented by a set of probability measures. These include situations in which the information is relevant for the prediction task at hand. In the non-Bayesian analysis, we show how ignoring information avoids dilation, the phenomenon that additional pieces of information sometimes lead to an increase in uncertainty. In the Bayesian analysis, we show that for small sample sizes and certain prediction tasks, the Bayesian posterior based on a noninformative prior yields worse predictions than simply ignoring the given information.
[ { "version": "v1", "created": "Tue, 25 Oct 2005 22:14:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Grunwald", "Peter D.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0510081
Toan Nguyen
Toan Nguyen (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Lizhe Wang (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Vittorio Selmin (ALENIA Aeronautica)
Virtual Environments for multiphysics code validation on Computing Grids
null
null
null
null
cs.DC
null
We advocate in this paper the use of grid-based infrastructures that are designed for seamless approaches to the numerical expert users, i.e., the multiphysics applications designers. It relies on sophisticated computing environments based on computing grids, connecting heterogeneous computing resources: mainframes, PC-clusters and workstations running multiphysics codes and utility software, e.g., visualization tools. The approach is based on concepts defined by the HEAVEN* consortium. HEAVEN is a European scientific consortium including industrial partners from the aerospace, telecommunication and software industries, as well as academic research institutes. Currently, the HEAVEN consortium works on a project that aims to create advanced services platforms. It is intended to enable "virtual private grids" supporting various environments for users manipulating a suitable high-level interface. This will become the basis for future generalized services allowing the integration of various services without the need to deploy specific grid infrastructures.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 12:26:57 GMT" } ]
2016-08-16T00:00:00
[ [ "Nguyen", "Toan", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Wang", "Lizhe", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Selmin", "Vittorio", "", "ALENIA\n Aeronautica" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0510082
Jose Ignacio Alvarez-Hamelin
Jos\'e Ignacio Alvarez-Hamelin (LPT, FIUBA), Aline Carneiro Viana (IRISA / INRIA Rennes), Marcelo Dias De Amorim (LIP6)
Architectural Considerations for a Self-Configuring Routing Scheme for Spontaneous Networks
null
null
null
null
cs.NI
null
Decoupling the permanent identifier of a node from the node's topology-dependent address is a promising approach toward completely scalable self-organizing networks. A group of proposals that have adopted such an approach use the same structure to: address nodes, perform routing, and implement location service. In this way, the consistency of the routing protocol relies on the coherent sharing of the addressing space among all nodes in the network. Such proposals use a logical tree-like structure where routes in this space correspond to routes in the physical level. The advantage of tree-like spaces is that it allows for simple address assignment and management. Nevertheless, it has low route selection flexibility, which results in low routing performance and poor resilience to failures. In this paper, we propose to increase the number of paths using incomplete hypercubes. The design of more complex structures, like multi-dimensional Cartesian spaces, improves the resilience and routing performance due to the flexibility in route selection. We present a framework for using hypercubes to implement indirect routing. This framework allows to give a solution adapted to the dynamics of the network, providing a proactive and reactive routing protocols, our major contributions. We show that, contrary to traditional approaches, our proposal supports more dynamic networks and is more robust to node failures.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 14:42:59 GMT" } ]
2016-08-16T00:00:00
[ [ "Alvarez-Hamelin", "José Ignacio", "", "LPT, FIUBA" ], [ "Viana", "Aline Carneiro", "", "IRISA / INRIA Rennes" ], [ "De Amorim", "Marcelo Dias", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0510083
Nizar Kerkeni
Nizar Kerkeni (TIM), Frederic Alexandre (CORTEX), Mohamed Hedi Bedoui (TIM), Laurent Bougrain (CORTEX), Mohamed Dogui (SAHLOUL)
Neuronal Spectral Analysis of EEG and Expert Knowledge Integration for Automatic Classification of Sleep Stages
null
null
null
null
cs.AI
null
Being able to analyze and interpret signal coming from electroencephalogram (EEG) recording can be of high interest for many applications including medical diagnosis and Brain-Computer Interfaces. Indeed, human experts are today able to extract from this signal many hints related to physiological as well as cognitive states of the recorded subject and it would be very interesting to perform such task automatically but today no completely automatic system exists. In previous studies, we have compared human expertise and automatic processing tools, including artificial neural networks (ANN), to better understand the competences of each and determine which are the difficult aspects to integrate in a fully automatic system. In this paper, we bring more elements to that study in reporting the main results of a practical experiment which was carried out in an hospital for sleep pathology study. An EEG recording was studied and labeled by a human expert and an ANN. We describe here the characteristics of the experiment, both human and neuronal procedure of analysis, compare their performances and point out the main limitations which arise from this study.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 14:47:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kerkeni", "Nizar", "", "TIM" ], [ "Alexandre", "Frederic", "", "CORTEX" ], [ "Bedoui", "Mohamed Hedi", "", "TIM" ], [ "Bougrain", "Laurent", "", "CORTEX" ], [ "Dogui", "Mohamed", "", "SAHLOUL" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510084
Michel Fliess
Michel Fliess
R\'{e}flexions sur la question fr\'{e}quentielle en traitement du signal
null
null
null
null
cs.CE cs.IR math-ph math.MP math.SP
null
New definitions are suggested for frequencies which may be instantaneous or not. The Heisenberg-Gabor inequality and the Shannon sampling theorem are briefly discussed.
[ { "version": "v1", "created": "Wed, 26 Oct 2005 14:49:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Fliess", "Michel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.SP", "description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices", "span": "(Spectral Theory)" } ]
cs/0510085
Scott Rickard
Scott T. Rickard, Radu V. Balan, H. Vincent Poor, Sergio Verdu
Canonical time-frequency, time-scale, and frequency-scale representations of time-varying channels
To appear in Communications in Information and Systems - special issue in honor of Thomas Kailath's seventieth birthday
null
null
null
cs.IT math.IT
null
Mobile communication channels are often modeled as linear time-varying filters or, equivalently, as time-frequency integral operators with finite support in time and frequency. Such a characterization inherently assumes the signals are narrowband and may not be appropriate for wideband signals. In this paper time-scale characterizations are examined that are useful in wideband time-varying channels, for which a time-scale integral operator is physically justifiable. A review of these time-frequency and time-scale characterizations is presented. Both the time-frequency and time-scale integral operators have a two-dimensional discrete characterization which motivates the design of time-frequency or time-scale rake receivers. These receivers have taps for both time and frequency (or time and scale) shifts of the transmitted signal. A general theory of these characterizations which generates, as specific cases, the discrete time-frequency and time-scale models is presented here. The interpretation of these models, namely, that they can be seen to arise from processing assumptions on the transmit and receive waveforms is discussed. Out of this discussion a third model arises: a frequency-scale continuous channel model with an associated discrete frequency-scale characterization.
[ { "version": "v1", "created": "Thu, 27 Oct 2005 00:47:47 GMT" } ]
2007-07-16T00:00:00
[ [ "Rickard", "Scott T.", "" ], [ "Balan", "Radu V.", "" ], [ "Poor", "H. Vincent", "" ], [ "Verdu", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0510086
Krishnaram Kenthapadi
K. Kenthapadi and R. Panigrahy
Balanced Allocation on Graphs
null
null
null
null
cs.DS
null
In this paper, we study the two choice balls and bins process when balls are not allowed to choose any two random bins, but only bins that are connected by an edge in an underlying graph. We show that for $n$ balls and $n$ bins, if the graph is almost regular with degree $n^\epsilon$, where $\epsilon$ is not too small, the previous bounds on the maximum load continue to hold. Precisely, the maximum load is $\log \log n + O(1/\epsilon) + O(1)$. For general $\Delta$-regular graphs, we show that the maximum load is $\log\log n + O(\frac{\log n}{\log (\Delta/\log^4 n)}) + O(1)$ and also provide an almost matching lower bound of $\log \log n + \frac{\log n}{\log (\Delta \log n)}$. V{\"o}cking [Voc99] showed that the maximum bin size with $d$ choice load balancing can be further improved to $O(\log\log n /d)$ by breaking ties to the left. This requires $d$ random bin choices. We show that such bounds can be achieved by making only two random accesses and querying $d/2$ contiguous bins in each access. By grouping a sequence of $n$ bins into $2n/d$ groups, each of $d/2$ consecutive bins, if each ball chooses two groups at random and inserts the new ball into the least-loaded bin in the lesser loaded group, then the maximum load is $O(\log\log n/d)$ with high probability.
[ { "version": "v1", "created": "Thu, 27 Oct 2005 21:59:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Kenthapadi", "K.", "" ], [ "Panigrahy", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0510087
Johannes Gro{\ss}e
J. Grosse
MathPSfrag: Creating Publication-Quality Labels in Mathematica Plots
7 pages, 8 figures, for associated Mathematica package, see http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/MathPSfrag-1.0.tar.gz
null
null
LMU-ASC 70/05; MPP-2005-126
cs.GR
null
This article introduces a Mathematica package providing a graphics export function that automatically replaces Mathematica expressions in a graphic by the corresponding LaTeX constructs and positions them correctly. It thus facilitates the creation of publication-quality Enscapulated PostScript (EPS) graphics.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 09:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Grosse", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0510088
Assaf Naor
Rajeev Motwani and Assaf Naor and Rina Panigrahy
Lower bounds on Locality Sensitive Hashing
null
null
null
null
cs.CG
null
Given a metric space $(X,d_X)$, $c\ge 1$, $r>0$, and $p,q\in [0,1]$, a distribution over mappings $\h:X\to \mathbb N$ is called a $(r,cr,p,q)$-sensitive hash family if any two points in $X$ at distance at most $r$ are mapped by $\h$ to the same value with probability at least $p$, and any two points at distance greater than $cr$ are mapped by $\h$ to the same value with probability at most $q$. This notion was introduced by Indyk and Motwani in 1998 as the basis for an efficient approximate nearest neighbor search algorithm, and has since been used extensively for this purpose. The performance of these algorithms is governed by the parameter $\rho=\frac{\log(1/p)}{\log(1/q)}$, and constructing hash families with small $\rho$ automatically yields improved nearest neighbor algorithms. Here we show that for $X=\ell_1$ it is impossible to achieve $\rho\le \frac{1}{2c}$. This almost matches the construction of Indyk and Motwani which achieves $\rho\le \frac{1}{c}$.
[ { "version": "v1", "created": "Sat, 29 Oct 2005 15:05:52 GMT" }, { "version": "v2", "created": "Sat, 26 Nov 2005 20:32:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Motwani", "Rajeev", "" ], [ "Naor", "Assaf", "" ], [ "Panigrahy", "Rina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0510089
Cyrille Bertelle
Rawan Ghnemat (IT), Khalaf Khatatneh (IT), Saleh Oqeili (IT), Cyrille Bertelle (LIH), G\'erard Henry Edmond Duchamp (LIPN)
Automata-based adaptive behavior for economic modeling using game theory
null
Dans EPNADS'05 within ECCS'05 - Emergent Properties in Natural and Artificial Dynamical Systems, Paris : France (2005)
null
null
cs.MA cs.DM
null
In this paper, we deal with some specific domains of applications to game theory. This is one of the major class of models in the new approaches of modelling in the economic domain. For that, we use genetic automata which allow to buid adaptive strategies for the players. We explain how the automata-based formalism proposed - matrix representation of automata with multiplicities - allows to define a semi-distance between the strategy behaviors. With that tools, we are able to generate an automatic processus to compute emergent systems of entities whose behaviors are represented by these genetic automata.
[ { "version": "v1", "created": "Sun, 30 Oct 2005 16:06:56 GMT" } ]
2007-12-17T00:00:00
[ [ "Ghnemat", "Rawan", "", "IT" ], [ "Khatatneh", "Khalaf", "", "IT" ], [ "Oqeili", "Saleh", "", "IT" ], [ "Bertelle", "Cyrille", "", "LIH" ], [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0510090
Sheng-Gwo Chen
Jyh-Yang Wu, Sheng-Gwo Chen and Mei-Hsiu Chi
A simple effective method for curvatures estimation on triangular meshes
null
null
null
null
cs.CG
null
To definite and compute differential invariants, like curvatures, for triangular meshes (or polyhedral surfaces) is a key problem in CAGD and the computer vision. The Gaussian curvature and the mean curvature are determined by the differential of the Gauss map of the underlying surface. The Gauss map assigns to each point in the surface the unit normal vector of the tangent plane to the surface at this point. We follow the ideas developed in Chen and Wu \cite{Chen2}(2004) and Wu, Chen and Chi\cite{Wu}(2005) to describe a new and simple approach to estimate the differential of the Gauss map and curvatures from the viewpoint of the gradient and the centroid weights. This will give us a much better estimation of curvatures than Taubin's algorithm \cite{Taubin} (1995).
[ { "version": "v1", "created": "Mon, 31 Oct 2005 02:41:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Wu", "Jyh-Yang", "" ], [ "Chen", "Sheng-Gwo", "" ], [ "Chi", "Mei-Hsiu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0510091
Marc Schoenauer
Marc Schoenauer (INRIA Futurs), Yann Semet (INRIA Futurs)
An efficient memetic, permutation-based evolutionary algorithm for real-world train timetabling
null
null
null
null
cs.AI
null
Train timetabling is a difficult and very tightly constrained combinatorial problem that deals with the construction of train schedules. We focus on the particular problem of local reconstruction of the schedule following a small perturbation, seeking minimisation of the total accumulated delay by adapting times of departure and arrival for each train and allocation of resources (tracks, routing nodes, etc.). We describe a permutation-based evolutionary algorithm that relies on a semi-greedy heuristic to gradually reconstruct the schedule by inserting trains one after the other following the permutation. This algorithm can be hybridised with ILOG commercial MIP programming tool CPLEX in a coarse-grained manner: the evolutionary part is used to quickly obtain a good but suboptimal solution and this intermediate solution is refined using CPLEX. Experimental results are presented on a large real-world case involving more than one million variables and 2 million constraints. Results are surprisingly good as the evolutionary algorithm, alone or hybridised, produces excellent solutions much faster than CPLEX alone.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 06:06:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Schoenauer", "Marc", "", "INRIA Futurs" ], [ "Semet", "Yann", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0510092
Ugo Dal Lago
Ugo Dal Lago
Context Semantics, Linear Logic and Computational Complexity
22 pages
null
null
null
cs.LO cs.CC
null
We show that context semantics can be fruitfully applied to the quantitative analysis of proof normalization in linear logic. In particular, context semantics lets us define the weight of a proof-net as a measure of its inherent complexity: it is both an upper bound to normalization time (modulo a polynomial overhead, independently on the reduction strategy) and a lower bound to the number of steps to normal form (for certain reduction strategies). Weights are then exploited in proving strong soundness theorems for various subsystems of linear logic, namely elementary linear logic, soft linear logic and light linear logic.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 11:05:41 GMT" }, { "version": "v2", "created": "Sat, 11 Feb 2006 10:36:20 GMT" }, { "version": "v3", "created": "Wed, 4 Oct 2006 11:38:54 GMT" } ]
2009-09-29T00:00:00
[ [ "Lago", "Ugo Dal", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0510093
Tentyukov Mikhail
M.Tentyukov, J.A.M.Vermaseren and H.M.Staudenmaier
ParFORM: recent development
5 pages, 6 Encapsulated postscript figures, LaTeX2e, uses espcrc2.sty (included). Talk given at ACAT05
null
10.1016/j.nima.2005.11.142
null
cs.SC
null
We report on the status of our project of parallelization of the symbolic manipulation program FORM. We have now parallel versions of FORM running on Cluster- or SMP-architectures. These versions can be used to run arbitrary FORM programs in parallel.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 14:19:41 GMT" } ]
2009-11-11T00:00:00
[ [ "Tentyukov", "M.", "" ], [ "Vermaseren", "J. A. M.", "" ], [ "Staudenmaier", "H. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0510094
Angel de Vicente
Angel de Vicente, Nayra Rodriguez
Big Science with a Small Budget: Non-Embarrassingly Parallel Applications in a Non-Dedicated Network of Workstations
4 pages; to appear in Proceedings of ADASS XV (http://www.adass.org:8080/Conferences/2005/Venue/)
null
null
null
cs.DC astro-ph
null
Many astronomers and astrophysicists require large computing resources for their research, which are usually obtained via dedicated (and expensive) parallel machines. Depending on the type of the problem to be solved, an alternative solution can be provided by creating dynamically a computer cluster out of non-dedicated workstations using the Condor High Throughput Computing System and the Master-Worker (MW) framework. As an example of this we show in this paper how a radiative transfer application previously coded with MPI is solved using this solution without the need for dedicated machines.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 14:55:57 GMT" } ]
2007-05-23T00:00:00
[ [ "de Vicente", "Angel", "" ], [ "Rodriguez", "Nayra", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, null ]
cs/0510095
Aaron Wagner
Aaron B. Wagner, Saurabha Tavildar, and Pramod Viswanath
Rate Region of the Quadratic Gaussian Two-Encoder Source-Coding Problem
Contains additional results. To appear in IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
null
We determine the rate region of the quadratic Gaussian two-encoder source-coding problem. This rate region is achieved by a simple architecture that separates the analog and digital aspects of the compression. Furthermore, this architecture requires higher rates to send a Gaussian source than it does to send any other source with the same covariance. Our techniques can also be used to determine the sum rate of some generalizations of this classical problem. Our approach involves coupling the problem to a quadratic Gaussian ``CEO problem.''
[ { "version": "v1", "created": "Mon, 31 Oct 2005 18:36:29 GMT" }, { "version": "v2", "created": "Tue, 21 Feb 2006 22:01:32 GMT" }, { "version": "v3", "created": "Sat, 9 Feb 2008 01:33:21 GMT" } ]
2008-02-09T00:00:00
[ [ "Wagner", "Aaron B.", "" ], [ "Tavildar", "Saurabha", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511001
Syed Jafar
Syed A. Jafar
Capacity with Causal and Non-Causal Side Information - A Unified View
This work was presented in part at the IEEE Communication Theory Workshop, June 12-15, 2005 and at the Forty-third Annual Allerton Conference on Communication, Control, and Computing, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
We identify the common underlying form of the capacity expression that is applicable to both cases where causal or non-causal side information is made available to the transmitter. Using this common form we find that for the single user channel, the multiple access channel, the degraded broadcast channel, and the degraded relay channel, the sum capacity with causal and non-causal side information are identical when all the transmitter side information is also made available to all the receivers. A genie-aided outerbound is developed that states that when a genie provides $n$ bits of side information to a receiver the resulting capacity improvement can not be more than $n$ bits. Combining these two results we are able to bound the relative capacity advantage of non-causal side information over causal side information for both single user as well as various multiple user communication scenarios. Applications of these capacity bounds are demonstrated through examples of random access channels. Interestingly, the capacity results indicate that the excessive MAC layer overheads common in present wireless systems may be avoided through coding across multiple access blocks. It is also shown that even one bit of side information at the transmitter can result in unbounded capacity improvement. As a side, we obtain the sum capacity for a multiple access channel when the side information available to the transmitter is causal and possibly correlated to the side information available to the receiver.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 22:30:54 GMT" }, { "version": "v2", "created": "Thu, 22 Jun 2006 03:13:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511002
Alberto Accomazzi
Alberto Accomazzi, Michael J. Kurtz, Guenther Eichhorn, Edwin Henneken, Carolyn S. Grant, Markus Demleitner, Stephen S. Murray
Bibliographic Classification using the ADS Databases
Latex, 4 pages, 1 Figure. To be published in the Proceedings of the Conference "Astronomical Data Analysis Software & Systems XV" held October 2-5, 2005, in San Lorenzo de El Escorial, Spain
null
null
null
cs.IR cs.DL
null
We discuss two techniques used to characterize bibliographic records based on their similarity to and relationship with the contents of the NASA Astrophysics Data System (ADS) databases. The first method has been used to classify input text as being relevant to one or more subject areas based on an analysis of the frequency distribution of its individual words. The second method has been used to classify existing records as being relevant to one or more databases based on the distribution of the papers citing them. Both techniques have proven to be valuable tools in assigning new and existing bibliographic records to different disciplines within the ADS databases.
[ { "version": "v1", "created": "Mon, 31 Oct 2005 22:34:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Accomazzi", "Alberto", "" ], [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Henneken", "Edwin", "" ], [ "Grant", "Carolyn S.", "" ], [ "Demleitner", "Markus", "" ], [ "Murray", "Stephen S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0511003
Michael Baer
Michael B. Baer
Optimal Prefix Codes for Infinite Alphabets with Nonlinear Costs
14 pages, 6 figures, accepted to IEEE Trans. Inform. Theory
null
10.1109/TIT.2007.915696
null
cs.IT cs.DS math.IT
null
Let $P = \{p(i)\}$ be a measure of strictly positive probabilities on the set of nonnegative integers. Although the countable number of inputs prevents usage of the Huffman algorithm, there are nontrivial $P$ for which known methods find a source code that is optimal in the sense of minimizing expected codeword length. For some applications, however, a source code should instead minimize one of a family of nonlinear objective functions, $\beta$-exponential means, those of the form $\log_a \sum_i p(i) a^{n(i)}$, where $n(i)$ is the length of the $i$th codeword and $a$ is a positive constant. Applications of such minimizations include a novel problem of maximizing the chance of message receipt in single-shot communications ($a<1$) and a previously known problem of minimizing the chance of buffer overflow in a queueing system ($a>1$). This paper introduces methods for finding codes optimal for such exponential means. One method applies to geometric distributions, while another applies to distributions with lighter tails. The latter algorithm is applied to Poisson distributions and both are extended to alphabetic codes, as well as to minimizing maximum pointwise redundancy. The aforementioned application of minimizing the chance of buffer overflow is also considered.
[ { "version": "v1", "created": "Tue, 1 Nov 2005 07:00:11 GMT" }, { "version": "v2", "created": "Wed, 13 Dec 2006 02:20:18 GMT" }, { "version": "v3", "created": "Mon, 26 Nov 2007 04:21:19 GMT" } ]
2016-11-17T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511004
Marc Schoenauer
Aguston E. Eiben (VU), Marc Schoenauer (FRACTALES)
Evolutionary Computing
null
null
null
null
cs.AI
null
Evolutionary computing (EC) is an exciting development in Computer Science. It amounts to building, applying and studying algorithms based on the Darwinian principles of natural selection. In this paper we briefly introduce the main concepts behind evolutionary computing. We present the main components all evolutionary algorithms (EA), sketch the differences between different types of EAs and survey application areas ranging from optimization, modeling and simulation to entertainment.
[ { "version": "v1", "created": "Tue, 1 Nov 2005 19:46:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Eiben", "Aguston E.", "", "VU" ], [ "Schoenauer", "Marc", "", "FRACTALES" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0511005
Santo Fortunato Dr
Santo Fortunato, Alessandro Flammini, Filippo Menczer, Alessandro Vespignani
The egalitarian effect of search engines
9 pages, 8 figures, 2 appendices. The final version of this e-print has been published on the Proc. Natl. Acad. Sci. USA 103(34), 12684-12689 (2006), http://www.pnas.org/cgi/content/abstract/103/34/12684
null
10.1073/pnas.0605525103
null
cs.CY cs.IR physics.soc-ph
null
Search engines have become key media for our scientific, economic, and social activities by enabling people to access information on the Web in spite of its size and complexity. On the down side, search engines bias the traffic of users according to their page-ranking strategies, and some have argued that they create a vicious cycle that amplifies the dominance of established and already popular sites. We show that, contrary to these prior claims and our own intuition, the use of search engines actually has an egalitarian effect. We reconcile theoretical arguments with empirical evidence showing that the combination of retrieval by search engines and search behavior by users mitigates the attraction of popular pages, directing more traffic toward less popular sites, even in comparison to what would be expected from users randomly surfing the Web.
[ { "version": "v1", "created": "Tue, 1 Nov 2005 22:33:48 GMT" }, { "version": "v2", "created": "Wed, 23 Aug 2006 21:23:55 GMT" } ]
2009-02-19T00:00:00
[ [ "Fortunato", "Santo", "" ], [ "Flammini", "Alessandro", "" ], [ "Menczer", "Filippo", "" ], [ "Vespignani", "Alessandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0511006
David Nowak
Jean Goubault-Larrecq, Slawomir Lasota and David Nowak
Logical Relations for Monadic Types
83 pages
Mathematical Structures in Computer Science, 18(6):1169-1217, December 2008
10.1017/S0960129508007172
null
cs.LO
null
Logical relations and their generalizations are a fundamental tool in proving properties of lambda-calculi, e.g., yielding sound principles for observational equivalence. We propose a natural notion of logical relations able to deal with the monadic types of Moggi's computational lambda-calculus. The treatment is categorical, and is based on notions of subsconing, mono factorization systems, and monad morphisms. Our approach has a number of interesting applications, including cases for lambda-calculi with non-determinism (where being in logical relation means being bisimilar), dynamic name creation, and probabilistic systems.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 01:45:56 GMT" }, { "version": "v2", "created": "Tue, 4 Mar 2008 06:15:56 GMT" } ]
2009-09-29T00:00:00
[ [ "Goubault-Larrecq", "Jean", "" ], [ "Lasota", "Slawomir", "" ], [ "Nowak", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511007
Alain Barrat
Jos\'e Ignacio Alvarez-Hamelin (LPT), Luca Dall'Asta (LPT), Alain Barrat (LPT), Alessandro Vespignani
K-core decomposition of Internet graphs: hierarchies, self-similarity and measurement biases
null
Networks and Heterogeneous Media 3 (2008) 371
null
null
cs.NI cond-mat.stat-mech
null
We consider the $k$-core decomposition of network models and Internet graphs at the autonomous system (AS) level. The $k$-core analysis allows to characterize networks beyond the degree distribution and uncover structural properties and hierarchies due to the specific architecture of the system. We compare the $k$-core structure obtained for AS graphs with those of several network models and discuss the differences and similarities with the real Internet architecture. The presence of biases and the incompleteness of the real maps are discussed and their effect on the $k$-core analysis is assessed with numerical experiments simulating biased exploration on a wide range of network models. We find that the $k$-core analysis provides an interesting characterization of the fluctuations and incompleteness of maps as well as information helping to discriminate the original underlying structure.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 08:06:51 GMT" }, { "version": "v2", "created": "Thu, 3 Nov 2005 09:18:47 GMT" }, { "version": "v3", "created": "Mon, 14 Apr 2008 06:30:36 GMT" }, { "version": "v4", "created": "Wed, 16 Apr 2008 06:10:41 GMT" } ]
2008-04-16T00:00:00
[ [ "Alvarez-Hamelin", "José Ignacio", "", "LPT" ], [ "Dall'Asta", "Luca", "", "LPT" ], [ "Barrat", "Alain", "", "LPT" ], [ "Vespignani", "Alessandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
cs/0511008
Yuming Jiang
Yuming Jiang
Analysis of Stochastic Service Guarantees in Communication Networks: A Basic Calculus
null
null
null
null
cs.PF cs.IT cs.NI math.IT
null
A basic calculus is presented for stochastic service guarantee analysis in communication networks. Central to the calculus are two definitions, maximum-(virtual)-backlog-centric (m.b.c) stochastic arrival curve and stochastic service curve, which respectively generalize arrival curve and service curve in the deterministic network calculus framework. With m.b.c stochastic arrival curve and stochastic service curve, various basic results are derived under the (min, +) algebra for the general case analysis, which are crucial to the development of stochastic network calculus. These results include (i) superposition of flows, (ii) concatenation of servers, (iii) output characterization, (iv) per-flow service under aggregation, and (v) stochastic backlog and delay guarantees. In addition, to perform independent case analysis, stochastic strict server is defined, which uses an ideal service process and an impairment process to characterize a server. The concept of stochastic strict server not only allows us to improve the basic results (i) -- (v) under the independent case, but also provides a convenient way to find the stochastic service curve of a serve. Moreover, an approach is introduced to find the m.b.c stochastic arrival curve of a flow and the stochastic service curve of a server.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 14:23:48 GMT" } ]
2007-07-16T00:00:00
[ [ "Jiang", "Yuming", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511009
Ioannis Kontoyiannis
Ioannis Kontoyiannis (Athens U of Econ & Business) and Rami Zamir (Tel-Aviv University)
Mismatched codebooks and the role of entropy-coding in lossy data compression
35 pages, 37 references, no figures. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT math.PR
null
We introduce a universal quantization scheme based on random coding, and we analyze its performance. This scheme consists of a source-independent random codebook (typically_mismatched_ to the source distribution), followed by optimal entropy-coding that is_matched_ to the quantized codeword distribution. A single-letter formula is derived for the rate achieved by this scheme at a given distortion, in the limit of large codebook dimension. The rate reduction due to entropy-coding is quantified, and it is shown that it can be arbitrarily large. In the special case of "almost uniform" codebooks (e.g., an i.i.d. Gaussian codebook with large variance) and difference distortion measures, a novel connection is drawn between the compression achieved by the present scheme and the performance of "universal" entropy-coded dithered lattice quantizers. This connection generalizes the "half-a-bit" bound on the redundancy of dithered lattice quantizers. Moreover, it demonstrates a strong notion of universality where a single "almost uniform" codebook is near-optimal for_any_ source and_any_ difference distortion measure.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 14:12:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Kontoyiannis", "Ioannis", "", "Athens U of Econ & Business" ], [ "Zamir", "Rami", "", "Tel-Aviv University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0511010
Nadir Kiyanclar
Nadir Kiyanclar
A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing
null
null
null
null
cs.OS
null
Virtualization, a technique once used to multiplex the resources of high-priced mainframe hardware, is seeing a resurgence in applicability with the increasing computing power of commodity computers. By inserting a layer of software between the machine and traditional operating systems, this technology allows access to a shared computing medium in a manner that is secure, resource-controlled, and efficient. These properties are attractive in the field of on-demand computing, where the fine-grained subdivision of resources provided by virtualized systems allows potentially higher utilization of computing resources. It this work, we survey a number of virtual machine systems with the goal of finding an appropriate candidate to serve as the basis for the On-Demand Secure Cluster Computing project at the National Center for Supercomputing Applications. Contenders are reviewed on a number of desirable properties including portability and security. We conclude with a comparison and justification of our choice.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 19:52:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kiyanclar", "Nadir", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
cs/0511011
Hamilton Link
Hamilton Link and Jared Saia and Terran Lane and Randall A. LaViolette
The Impact of Social Networks on Multi-Agent Recommender Systems
12 pages, 4 figures. Published in the Proceedings of the Workshop on Cooperative Multi-Agent Learning (ECML/PKDD '05). Resubmitted to fix citations and metadata
null
null
null
cs.LG cs.CC cs.MA
null
Awerbuch et al.'s approach to distributed recommender systems (DRSs) is to have agents sample products at random while randomly querying one another for the best item they have found; we improve upon this by adding a communication network. Agents can only communicate with their immediate neighbors in the network, but neighboring agents may or may not represent users with common interests. We define two network structures: in the ``mailing-list model,'' agents representing similar users form cliques, while in the ``word-of-mouth model'' the agents are distributed randomly in a scale-free network (SFN). In both models, agents tell their neighbors about satisfactory products as they are found. In the word-of-mouth model, knowledge of items propagates only through interested agents, and the SFN parameters affect the system's performance. We include a summary of our new results on the character and parameters of random subgraphs of SFNs, in particular SFNs with power-law degree distributions down to minimum degree 1. These networks are not as resilient as Cohen et al. originally suggested. In the case of the widely-cited ``Internet resilience'' result, high failure rates actually lead to the orphaning of half of the surviving nodes after 60% of the network has failed and the complete disintegration of the network at 90%. We show that given an appropriate network, the communication network reduces the number of sampled items, the number of messages sent, and the amount of ``spam.'' We conclude that in many cases DRSs will be useful for sharing information in a multi-agent learning system.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 23:44:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Link", "Hamilton", "" ], [ "Saia", "Jared", "" ], [ "Lane", "Terran", "" ], [ "LaViolette", "Randall A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0511012
Hamilton Link
Hamilton Link and Randall A. LaViolette and Jared Saia and Terran Lane
Parameters Affecting the Resilience of Scale-Free Networks to Random Failures
12 pages, 7 figures. Submitting to Phys. Rev. Lett
null
null
null
cs.NI cs.AR cs.MA
null
It is commonly believed that scale-free networks are robust to massive numbers of random node deletions. For example, Cohen et al. study scale-free networks including some which approximate the measured degree distribution of the Internet. Their results suggest that if each node in this network failed independently with probability 0.99, the remaining network would continue to have a giant component. In this paper, we show that a large and important subclass of scale-free networks are not robust to massive numbers of random node deletions for practical purposes. In particular, we study finite scale-free networks which have minimum node degree of 1 and a power-law degree distribution beginning with nodes of degree 1 (power-law networks). We show that, in a power-law network approximating the Internet's reported distribution, when the probability of deletion of each node is 0.5 only about 25% of the surviving nodes in the network remain connected in a giant component, and the giant component does not persist beyond a critical failure rate of 0.9. The new result is partially due to improved analytical accommodation of the large number of degree-0 nodes that result after node deletions. Our results apply to finite power-law networks with a wide range of power-law exponents, including Internet-like networks. We give both analytical and empirical evidence that such networks are not generally robust to massive random node deletions.
[ { "version": "v1", "created": "Wed, 2 Nov 2005 22:22:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Link", "Hamilton", "" ], [ "LaViolette", "Randall A.", "" ], [ "Saia", "Jared", "" ], [ "Lane", "Terran", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0511013
Zengyou He
Zengyou He, Xiaofei Xu, Shengchun Deng
K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical Data
18 pages
null
null
Tr-2004-03
cs.AI cs.DB
null
Clustering categorical data is an integral part of data mining and has attracted much attention recently. In this paper, we present k-ANMI, a new efficient algorithm for clustering categorical data. The k-ANMI algorithm works in a way that is similar to the popular k-means algorithm, and the goodness of clustering in each step is evaluated using a mutual information based criterion (namely, Average Normalized Mutual Information-ANMI) borrowed from cluster ensemble. Experimental results on real datasets show that k-ANMI algorithm is competitive with those state-of-art categorical data clustering algorithms with respect to clustering accuracy.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 01:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ], [ "Xu", "Xiaofei", "" ], [ "Deng", "Shengchun", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0511014
Kumar Neeraj Verma
Helmut Seidl, Kumar Neeraj Verma
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic Protocols with Single Blind Copying
Long version of paper presented at LPAR 2004
null
null
null
cs.LO cs.CR
null
Cryptographic protocols with single blind copying were defined and modeled by Comon and Cortier using the new class $\mathcal C$ of first order clauses. They showed its satisfiability problem to be in 3-DEXPTIME. We improve this result by showing that satisfiability for this class is NEXPTIME-complete, using new resolution techniques. We show satisfiability to be DEXPTIME-complete if clauses are Horn, which is what is required for modeling cryptographic protocols. While translation to Horn clauses only gives a DEXPTIME upper bound for the secrecy problem for these protocols, we further show that this secrecy problem is actually DEXPTIME-complete.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 13:40:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Seidl", "Helmut", "" ], [ "Verma", "Kumar Neeraj", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0511015
Prashant Singh
Prashant
Towards a Hierarchical Model of Consciousness, Intelligence, Mind and Body
12 pages, 2 figures
null
null
null
cs.AI
null
This article is taken out.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 16:28:05 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 00:00:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0511016
Santo Fortunato Dr
Santo Fortunato, Marian Boguna, Alessandro Flammini, Filippo Menczer
How to make the top ten: Approximating PageRank from in-degree
8 pages, 7 figures, 2 tables
null
null
null
cs.IR physics.soc-ph
null
PageRank has become a key element in the success of search engines, allowing to rank the most important hits in the top screen of results. One key aspect that distinguishes PageRank from other prestige measures such as in-degree is its global nature. From the information provider perspective, this makes it difficult or impossible to predict how their pages will be ranked. Consequently a market has emerged for the optimization of search engine results. Here we study the accuracy with which PageRank can be approximated by in-degree, a local measure made freely available by search engines. Theoretical and empirical analyses lead to conclude that given the weak degree correlations in the Web link graph, the approximation can be relatively accurate, giving service and information providers an effective new marketing tool.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:01:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Fortunato", "Santo", "" ], [ "Boguna", "Marian", "" ], [ "Flammini", "Alessandro", "" ], [ "Menczer", "Filippo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0511017
Gus Gutoski
Gus Gutoski
Short Quantum Games
MSc thesis, 79 pages single-spaced
null
null
null
cs.CC quant-ph
null
In this thesis we introduce quantum refereed games, which are quantum interactive proof systems with two competing provers. We focus on a restriction of this model that we call "short quantum games" and we prove an upper bound and a lower bound on the expressive power of these games. For the lower bound, we prove that every language having an ordinary quantum interactive proof system also has a short quantum game. An important part of this proof is the establishment of a quantum measurement that reliably distinguishes between quantum states chosen from disjoint convex sets. For the upper bound, we show that certain types of quantum refereed games, including short quantum games, are decidable in deterministic exponential time by supplying a separation oracle for use with the ellipsoid method for convex feasibility.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:00:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0511018
Prashant Singh
Prashant
From General Systems to Soft Systems to Soft Computing: Applications for Large and Complex Real World Systems
9 pages
null
null
null
cs.SE
null
This is article is taken out.
[ { "version": "v1", "created": "Thu, 3 Nov 2005 23:29:55 GMT" }, { "version": "v2", "created": "Sat, 13 Jan 2007 00:00:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0511019
Young-Han Kim
Young-Han Kim
A Counterexample to Cover's 2P Conjecture on Gaussian Feedback Capacity
2 pages, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2006.878167
null
cs.IT math.IT
null
We provide a counterexample to Cover's conjecture that the feedback capacity $C_\textrm{FB}$ of an additive Gaussian noise channel under power constraint $P$ be no greater than the nonfeedback capacity $C$ of the same channel under power constraint $2P$, i.e., $C_\textrm{FB}(P) \le C(2P)$.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 01:22:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Kim", "Young-Han", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511020
David P{\l}aneta S
David S. P{\l}aneta
Pbit and other list sorting algorithms
25 pages, 4 tables
Cornell University Computing and Information Science Technical Reports, 2006
null
TR2006-2013
cs.DS
null
Pbit, besides its simplicity, is definitely the fastest list sorting algorithm. It considerably surpasses all already known methods. Among many advantages, it is stable, linear and be made to run in place. I will compare Pbit with algorithm described by Donald E. Knuth in the third volume of ''The Art of Computer Programming'' and other (QuickerSort, MergeSort) list sorting algorithms.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 01:52:02 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 23:48:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Płaneta", "David S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0511021
Thorsten Theobald
Ravi Kannan and Thorsten Theobald
Games of fixed rank: A hierarchy of bimatrix games
13 pages
null
null
null
cs.GT math.CO
null
We propose a new hierarchical approach to understand the complexity of the open problem of computing a Nash equilibrium in a bimatrix game. Specifically, we investigate a hierarchy of bimatrix games $(A,B)$ which results from restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For every fixed $k$, this class strictly generalizes the class of zero-sum games, but is a very special case of general bimatrix games. We show that even for $k=1$ the set of Nash equilibria of these games can consist of an arbitrarily large number of connected components. While the question of exact polynomial time algorithms to find a Nash equilibrium remains open for games of fixed rank, we can provide polynomial time algorithms for finding an $\epsilon$-approximation.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 10:29:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kannan", "Ravi", "" ], [ "Theobald", "Thorsten", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
cs/0511022
Emanuel Diamant
Emanuel Diamant
Does a Plane Imitate a Bird? Does Computer Vision Have to Follow Biological Paradigms?
Proceedings of the 1st International Symposium on Brain, Vision, and Artificial Intelligence, 19-21 October 2005, Naples, Italy
LNCS, vol. 3704, pp. 108-115, 2005, Springer Verlag Berlin Heidelberg 2005
null
null
cs.NE
null
We posit a new paradigm for image information processing. For the last 25 years, this task was usually approached in the frame of Treisman's two-stage paradigm [1]. The latter supposes an unsupervised, bottom-up directed process of preliminary information pieces gathering at the lower processing stages and a supervised, top-down directed process of information pieces binding and grouping at the higher stages. It is acknowledged that these sub-processes interact and intervene between them in a tricky and a complicated manner. Notwithstanding the prevalence of this paradigm in biological and computer vision, we nevertheless propose to replace it with a new one, which we would like to designate as a two-part paradigm. In it, information contained in an image is initially extracted in an independent top-down manner by one part of the system, and then it is examined and interpreted by another, separate system part. We argue that the new paradigm seems to be more plausible than its forerunner. We provide evidence from human attention vision studies and insights of Kolmogorov's complexity theory to support our arguments. We also provide some reasons in favor of separate image interpretation issues.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 15:08:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0511023
Nathalie Bertrand
Christel Baier, Nathalie Bertrand and Philippe Schnoebelen
Verifying nondeterministic probabilistic channel systems against $\omega$-regular linear-time properties
39 pages
ACM Trans. Computational Logic 9(1), 2007
10.1145/1297658.1297663
null
cs.LO
null
Lossy channel systems (LCSs) are systems of finite state automata that communicate via unreliable unbounded fifo channels. In order to circumvent the undecidability of model checking for nondeterministic LCSs, probabilistic models have been introduced, where it can be decided whether a linear-time property holds almost surely. However, such fully probabilistic systems are not a faithful model of nondeterministic protocols. We study a hybrid model for LCSs where losses of messages are seen as faults occurring with some given probability, and where the internal behavior of the system remains nondeterministic. Thus the semantics is in terms of infinite-state Markov decision processes. The purpose of this article is to discuss the decidability of linear-time properties formalized by formulas of linear temporal logic (LTL). Our focus is on the qualitative setting where one asks, e.g., whether a LTL-formula holds almost surely or with zero probability (in case the formula describes the bad behaviors). Surprisingly, it turns out that -- in contrast to finite-state Markov decision processes -- the satisfaction relation for LTL formulas depends on the chosen type of schedulers that resolve the nondeterminism. While all variants of the qualitative LTL model checking problem for the full class of history-dependent schedulers are undecidable, the same questions for finite-memory scheduler can be solved algorithmically. However, the restriction to reachability properties and special kinds of recurrent reachability properties yields decidable verification problems for the full class of schedulers, which -- for this restricted class of properties -- are as powerful as finite-memory schedulers, or even a subclass of them.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 17:03:45 GMT" }, { "version": "v2", "created": "Sat, 5 Nov 2005 16:58:14 GMT" }, { "version": "v3", "created": "Tue, 11 Apr 2006 14:43:47 GMT" } ]
2012-03-19T00:00:00
[ [ "Baier", "Christel", "" ], [ "Bertrand", "Nathalie", "" ], [ "Schnoebelen", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511024
Bourgade Paul
Bourgade Paul, Croissant Olivier
Heat kernel expansion for a family of stochastic volatility models : delta-geometry
null
null
null
null
cs.CE
null
In this paper, we study a family of stochastic volatility processes; this family features a mean reversion term for the volatility and a double CEV-like exponent that generalizes SABR and Heston's models. We derive approximated closed form formulas for the digital prices, the local and implied volatilities. Our formulas are efficient for small maturities. Our method is based on differential geometry, especially small time diffusions on riemanian spaces. This geometrical point of view can be extended to other processes, and is very accurate to produce variate smiles for small maturities and small moneyness.
[ { "version": "v1", "created": "Fri, 4 Nov 2005 18:31:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Paul", "Bourgade", "" ], [ "Olivier", "Croissant", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0511025
Riccardo Pucella
James Cheney
Logic Column 14: Nominal Logic and Abstract Syntax
24 pages
SIGACT News 36 (4), pp. 47-69, 2005
null
null
cs.LO
null
Formalizing syntactic proofs of properties of logics, programming languages, security protocols, and other formal systems is a significant challenge, in large part because of the obligation to handle name-binding correctly. We present an approach called nominal abstract syntax that has attracted considerable interest since its introduction approximately six years ago. After an overview of other approaches, we describe nominal abstract syntax and nominal logic, a logic for reasoning about nominal abstract syntax. We also discuss applications of nominal techniques to programming, automated reasoning, and identify some future directions.
[ { "version": "v1", "created": "Sat, 5 Nov 2005 02:47:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Cheney", "James", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511026
Aditya Mahajan
Aditya Mahajan, Demosthenis Teneketzis
A Decision Theoretic Framework for Real-Time Communication
10 pages, 1 figure: Forty Third Allerton Conference of Control Communication and Computing
null
null
null
cs.IT math.IT
null
We consider a communication system in which the outputs of a Markov source are encoded and decoded in \emph{real-time} by a finite memory receiver, and the distortion measure does not tolerate delays. The objective is to choose designs, i.e. real-time encoding, decoding and memory update strategies that minimize a total expected distortion measure. This is a dynamic team problem with non-classical information structure [Witsenhausen:1971]. We use the structural results of [Teneketzis:2004] to develop a sequential decomposition for the finite and infinite horizon problems. Thus, we obtain a systematic methodology for the determination of jointly optimal encoding decoding and memory update strategies for real-time point-to-point communication systems.
[ { "version": "v1", "created": "Sun, 6 Nov 2005 02:34:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Mahajan", "Aditya", "" ], [ "Teneketzis", "Demosthenis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511027
Stephen Luttrell
Stephen Luttrell
Discrete Network Dynamics. Part 1: Operator Theory
39 pages, 5 figures
null
null
null
cs.NE
null
An operator algebra implementation of Markov chain Monte Carlo algorithms for simulating Markov random fields is proposed. It allows the dynamics of networks whose nodes have discrete state spaces to be specified by the action of an update operator that is composed of creation and annihilation operators. This formulation of discrete network dynamics has properties that are similar to those of a quantum field theory of bosons, which allows reuse of many conceptual and theoretical structures from QFT. The equilibrium behaviour of one of these generalised MRFs and of the adaptive cluster expansion network (ACEnet) are shown to be equivalent, which provides a way of unifying these two theories.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 19:09:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0511028
Hyundong Shin
Hyundong Shin and Moe Z. Win
MIMO Diversity in the Presence of Double Scattering
Revised for publication in the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The potential benefits of multiple-antenna systems may be limited by two types of channel degradations rank deficiency and spatial fading correlation of the channel. In this paper, we assess the effects of these degradations on the diversity performance of multiple-input multiple-output (MIMO) systems, with an emphasis on orthogonal space-time block codes, in terms of the symbol error probability, the effective fading figure (EFF), and the capacity at low signal-to-noise ratio (SNR). In particular, we consider a general family of MIMO channels known as double-scattering channels, which encompasses a variety of propagation environments from independent and identically distributed Rayleigh to degenerate keyhole or pinhole cases by embracing both rank-deficient and spatial correlation effects. It is shown that a MIMO system with $n_T$ transmit and $n_R$ receive antennas achieves the diversity of order $\frac{\n_T n_S n_R}{\max(n_T,n_S,n_R)}$ in a double-scattering channel with $n_S$ effective scatterers. We also quantify the combined effect of the spatial correlation and the lack of scattering richness on the EFF and the low-SNR capacity in terms of the correlation figures of transmit, receive, and scatterer correlation matrices. We further show the monotonicity properties of these performance measures with respect to the strength of spatial correlation, characterized by the eigenvalue majorization relations of the correlation matrices.
[ { "version": "v1", "created": "Sun, 6 Nov 2005 21:31:26 GMT" }, { "version": "v2", "created": "Wed, 23 Nov 2005 04:00:31 GMT" }, { "version": "v3", "created": "Thu, 31 Aug 2006 08:35:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Shin", "Hyundong", "" ], [ "Win", "Moe Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511029
Rasika Perera Mr
Rasika R Perera, Tony S Pollock, Thushara D Abhayapala
Non-coherent Rayleigh fading MIMO channels: Capacity Supremum
08 pages, 5 figures, IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper investigates the limits of information transfer over a fast Rayleigh fading MIMO channel, where neither the transmitter nor the receiver has the knowledge of the channel state information (CSI) except the fading statistics. We develop a scalar channel model due to absence of the phase information in non-coherent Rayleigh fading and derive a capacity supremum with the number of receive antennas at any signal to noise ratio (SNR) using Lagrange optimisation. Also, we conceptualise the discrete nature of the optimal input distribution by posing the optimisation on the channel mutual information for $N$ discrete inputs. Furthermore, we derive an expression for the asymptotic capacity when the input power is large, and compare with the existing capacity results when the receiver is equipped with a large number of antennas.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 03:42:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Perera", "Rasika R", "" ], [ "Pollock", "Tony S", "" ], [ "Abhayapala", "Thushara D", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511030
Gregory Gutin
G. Gutin, A. Rafiey, S. Szeider, A. Yeo
The Linear Arrangement Problem Parameterized Above Guaranteed Value
null
null
null
null
cs.DS cs.CC
null
A linear arrangement (LA) is an assignment of distinct integers to the vertices of a graph. The cost of an LA is the sum of lengths of the edges of the graph, where the length of an edge is defined as the absolute value of the difference of the integers assigned to its ends. For many application one hopes to find an LA with small cost. However, it is a classical NP-complete problem to decide whether a given graph $G$ admits an LA of cost bounded by a given integer. Since every edge of $G$ contributes at least one to the cost of any LA, the problem becomes trivially fixed-parameter tractable (FPT) if parameterized by the upper bound of the cost. Fernau asked whether the problem remains FPT if parameterized by the upper bound of the cost minus the number of edges of the given graph; thus whether the problem is FPT ``parameterized above guaranteed value.'' We answer this question positively by deriving an algorithm which decides in time $O(m+n+5.88^k)$ whether a given graph with $m$ edges and $n$ vertices admits an LA of cost at most $m+k$ (the algorithm computes such an LA if it exists). Our algorithm is based on a procedure which generates a problem kernel of linear size in linear time for a connected graph $G$. We also prove that more general parameterized LA problems stated by Serna and Thilikos are not FPT, unless P=NP.
[ { "version": "v1", "created": "Mon, 7 Nov 2005 17:47:55 GMT" }, { "version": "v2", "created": "Mon, 12 Dec 2005 18:26:42 GMT" }, { "version": "v3", "created": "Mon, 13 Mar 2006 10:00:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Szeider", "S.", "" ], [ "Yeo", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0511031
Prashant Singh
Prashant
Internet Protocol Black Holes: A E-Security Threat
null
null
null
null
cs.NI
null
The paper is taken out.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 00:14:06 GMT" }, { "version": "v2", "created": "Thu, 11 Jan 2007 17:05:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Prashant", "", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]