id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0510027
|
Alexandre d'Aspremont
|
Alexandre d'Aspremont
|
A Market Test for the Positivity of Arrow-Debreu Prices
|
New version, fixes a few minor errors and typos
| null | null | null |
cs.CE
| null |
We derive tractable necessary and sufficient conditions for the absence of
buy-and-hold arbitrage opportunities in a perfectly liquid, one period market.
We formulate the positivity of Arrow-Debreu prices as a generalized moment
problem to show that this no arbitrage condition is equivalent to the positive
semidefiniteness of matrices formed by the market price of tradeable securities
and their products. We apply this result to a market with multiple assets and
basket call options.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2005 13:40:17 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jun 2006 17:05:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"d'Aspremont",
"Alexandre",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0510028
|
Victor Grishchenko
|
Victor S. Grishchenko
|
Geo-aggregation permits low stretch and routing tables of logarithmical
size
|
6 pages
| null | null | null |
cs.NI
| null |
This article first addresses applicability of Euclidean models to the domain
of Internet routing. Those models are found (limitedly) applicable. Then a
simplistic model of routing is constructed for Euclidean plane densely covered
with points-routers. The model guarantees low stretch and logarithmical size of
routing tables at any node. The paper concludes with a discussion on
applicability of the model to real-world Internet routing.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2005 16:20:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grishchenko",
"Victor S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0510029
|
Konstantin Makarychev
|
Konstantin Makarychev and Yury Makarychev
|
Conditionally independent random variables
|
8 pages
| null | null | null |
cs.IT math.IT
| null |
In this paper we investigate the notion of conditional independence and prove
several information inequalities for conditionally independent random
variables.
|
[
{
"version": "v1",
"created": "Tue, 11 Oct 2005 21:20:03 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Makarychev",
"Konstantin",
""
],
[
"Makarychev",
"Yury",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510030
|
Amin Mobasher
|
Amin Mobasher, Mahmoud Taherzadeh, Renata Sotirov, and Amir K.
Khandani
|
A Near Maximum Likelihood Decoding Algorithm for MIMO Systems Based on
Semi-Definite Programming
|
Submitted to IEEE Trans. on Info. Theory, Revised
| null | null |
UW-E&CE#2005-12
|
cs.IT math.IT
| null |
In Multi-Input Multi-Output (MIMO) systems, Maximum-Likelihood (ML) decoding
is equivalent to finding the closest lattice point in an N-dimensional complex
space. In general, this problem is known to be NP hard. In this paper, we
propose a quasi-maximum likelihood algorithm based on Semi-Definite Programming
(SDP). We introduce several SDP relaxation models for MIMO systems, with
increasing complexity. We use interior-point methods for solving the models and
obtain a near-ML performance with polynomial computational complexity. Lattice
basis reduction is applied to further reduce the computational complexity of
solving these models. The proposed relaxation models are also used for soft
output decoding in MIMO systems.
|
[
{
"version": "v1",
"created": "Wed, 12 Oct 2005 00:35:23 GMT"
},
{
"version": "v2",
"created": "Thu, 31 May 2007 15:03:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mobasher",
"Amin",
""
],
[
"Taherzadeh",
"Mahmoud",
""
],
[
"Sotirov",
"Renata",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510031
|
Constantinos Daskalakis
|
Constantinos Daskalakis
|
Computing Pure Nash Equilibria via Markov Random Fields
| null | null | null | null |
cs.GT
| null |
In this paper we present a novel generic mapping between Graphical Games and
Markov Random Fields so that pure Nash equilibria in the former can be found by
statistical inference on the latter. Thus, the problem of deciding whether a
graphical game has a pure Nash equilibrium, a well-known intractable problem,
can be attacked by well-established algorithms such as Belief Propagation,
Junction Trees, Markov Chain Monte Carlo and Simulated Annealing. Large classes
of graphical games become thus tractable, including all classes already known,
but also new classes such as the games with O(log n) treewidth.
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2005 04:42:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Daskalakis",
"Constantinos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0510032
|
Mark Plumbley
|
Mark D. Plumbley
|
Polar Polytopes and Recovery of Sparse Representations
| null |
On Polar Polytopes and the Recovery of Sparse Representations.
IEEE Trans. Inf. Theory 53(9), 3188-3195, 2007
|
10.1109/TIT.2007.903129
| null |
cs.IT math.IT
| null |
Suppose we have a signal y which we wish to represent using a linear
combination of a number of basis atoms a_i, y=sum_i x_i a_i = Ax. The problem
of finding the minimum L0 norm representation for y is a hard problem. The
Basis Pursuit (BP) approach proposes to find the minimum L1 norm representation
instead, which corresponds to a linear program (LP) that can be solved using
modern LP techniques, and several recent authors have given conditions for the
BP (minimum L1 norm) and sparse (minimum L0 solutions) representations to be
identical. In this paper, we explore this sparse representation problem} using
the geometry of convex polytopes, as recently introduced into the field by
Donoho. By considering the dual LP we find that the so-called polar polytope P
of the centrally-symmetric polytope P whose vertices are the atom pairs +-a_i
is particularly helpful in providing us with geometrical insight into
optimality conditions given by Fuchs and Tropp for non-unit-norm atom sets. In
exploring this geometry we are able to tighten some of these earlier results,
showing for example that the Fuchs condition is both necessary and sufficient
for L1-unique-optimality, and that there are situations where Orthogonal
Matching Pursuit (OMP) can eventually find all L1-unique-optimal solutions with
m nonzeros even if ERC fails for m, if allowed to run for more than m steps.
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2005 14:41:15 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Plumbley",
"Mark D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510033
|
Navin Kashyap
|
Navin Kashyap, Paul H. Siegel and Alexander Vardy
|
Coding for the Optical Channel: the Ghost-Pulse Constraint
|
13 pages, 6 figures; accepted for publication in IEEE Transactions on
Information Theory
| null |
10.1109/TIT.2005.860409
| null |
cs.IT cs.DM math.IT
| null |
We consider a number of constrained coding techniques that can be used to
mitigate a nonlinear effect in the optical fiber channel that causes the
formation of spurious pulses, called ``ghost pulses.'' Specifically, if $b_1
b_2 ... b_{n}$ is a sequence of bits sent across an optical channel, such that
$b_k=b_l=b_m=1$ for some $k,l,m$ (not necessarily all distinct) but $b_{k+l-m}
= 0$, then the ghost-pulse effect causes $b_{k+l-m}$ to change to 1, thereby
creating an error. We design and analyze several coding schemes using binary
and ternary sequences constrained so as to avoid patterns that give rise to
ghost pulses. We also discuss the design of encoders and decoders for these
coding schemes.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2005 01:38:35 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Kashyap",
"Navin",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Vardy",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510034
|
Zsolt I. L\'az\'ar
|
Zsolt I. L\'az\'ar, Andreea Fanea, Drago\c{s} Petra\c{s}cu, Vladiela
Ciobotariu-Boer and Bazil P\^arv
|
COMODI: On the Graphical User Interface
|
5 pages, 5 figures, to be published as proceedings of SYNASC 2005
| null | null | null |
cs.HC cs.CE cs.MS
| null |
We propose a series of features for the graphical user interface (GUI) of the
COmputational MOdule Integrator (COMODI) \cite{Synasc05a}\cite{COMODI}. In view
of the special requirements that a COMODI type of framework for scientific
computing imposes and inspiring from existing solutions that provide advanced
graphical visual programming environments, we identify those elements and
associated behaviors that will have to find their way into the first release of
COMODI.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2005 01:03:55 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Lázár",
"Zsolt I.",
""
],
[
"Fanea",
"Andreea",
""
],
[
"Petraşcu",
"Dragoş",
""
],
[
"Ciobotariu-Boer",
"Vladiela",
""
],
[
"Pârv",
"Bazil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0510035
|
Alexandre Graell i Amat
|
Alexandre Graell i Amat, Guido Montorsi, Francesca Vatta
|
Design and Performance Analysis of a New Class of Rate Compatible Serial
Concatenated Convolutional Codes
|
Submitted to IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
| null |
In this paper, we provide a performance analysis of a new class of serial
concatenated convolutional codes (SCCC) where the inner encoder can be
punctured beyond the unitary rate. The puncturing of the inner encoder is not
limited to inner coded bits, but extended to systematic bits. Moreover, it is
split into two different puncturings, in correspondence with inner code
systematic bits and parity bits. We derive the analytical upper bounds to the
error probability of this particular code structure and address suitable design
guidelines for the inner code puncturing patterns. We show that the percentile
of systematic and parity bits to be deleted strongly depends on the SNR region
of interest. In particular, to lower the error floor it is advantageous to put
more puncturing on inner systematic bits. Furthermore, we show that puncturing
of inner systematic bits should be interleaver dependent. Based on these
considerations, we derive design guidelines to obtain well-performing
rate-compatible SCCC families. Throughout the paper, the performance of the
proposed codes are compared with analytical bounds, and with the performance of
PCCC and SCCC proposed in the literature.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2005 08:03:49 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Amat",
"Alexandre Graell i",
""
],
[
"Montorsi",
"Guido",
""
],
[
"Vatta",
"Francesca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510036
|
Jan Chomicki
|
Jan Chomicki
|
Semantic Optimization Techniques for Preference Queries
| null | null | null | null |
cs.DB cs.AI cs.LO
| null |
Preference queries are relational algebra or SQL queries that contain
occurrences of the winnow operator ("find the most preferred tuples in a given
relation"). Such queries are parameterized by specific preference relations.
Semantic optimization techniques make use of integrity constraints holding in
the database. In the context of semantic optimization of preference queries, we
identify two fundamental properties: containment of preference relations
relative to integrity constraints and satisfaction of order axioms relative to
integrity constraints. We show numerous applications of those notions to
preference query evaluation and optimization. As integrity constraints, we
consider constraint-generating dependencies, a class generalizing functional
dependencies. We demonstrate that the problems of containment and satisfaction
of order axioms can be captured as specific instances of constraint-generating
dependency entailment. This makes it possible to formulate necessary and
sufficient conditions for the applicability of our techniques as constraint
validity problems. We characterize the computational complexity of such
problems.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2005 13:25:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chomicki",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0510037
|
Rokia Bendaoud
|
Rokia Bendaoud (INRIA Lorraine - LORIA), Yannick Toussaint (INRIA
Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA)
|
Hi\'{e}rarchisation des r\`{e}gles d'association en fouille de textes
| null | null | null | null |
cs.IR cs.AI
| null |
Extraction of association rules is widely used as a data mining method.
However, one of the limit of this approach comes from the large number of
extracted rules and the difficulty for a human expert to deal with the totality
of these rules. We propose to solve this problem by structuring the set of
rules into hierarchy. The expert can then therefore explore the rules, access
from one rule to another one more general when we raise up in the hierarchy,
and in other hand, or a more specific rules. Rules are structured at two
levels. The global level aims at building a hierarchy from the set of rules
extracted. Thus we define a first type of rule-subsomption relying on Galois
lattices. The second level consists in a local and more detailed analysis of
each rule. It generate for a given rule a set of generalization rules
structured into a local hierarchy. This leads to the definition of a second
type of subsomption. This subsomption comes from inductive logic programming
and integrates a terminological model.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2005 14:24:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bendaoud",
"Rokia",
"",
"INRIA Lorraine - LORIA"
],
[
"Toussaint",
"Yannick",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510038
|
Alp Atici
|
Alp Atici and Rocco A. Servedio
|
Learning Unions of $\omega(1)$-Dimensional Rectangles
|
25 pages. Some corrections. Recipient of E. M. Gold award ALT 2006.
To appear in Journal of Theoretical Computer Science
|
Theoretical Computer Science, Vol. 405, No. 3, 209--222 (2008)
|
10.1016/j.tcs.2008.06.036
| null |
cs.LG
| null |
We consider the problem of learning unions of rectangles over the domain
$[b]^n$, in the uniform distribution membership query learning setting, where
both b and n are "large". We obtain poly$(n, \log b)$-time algorithms for the
following classes:
- poly$(n \log b)$-way Majority of $O(\frac{\log(n \log b)} {\log \log(n \log
b)})$-dimensional rectangles.
- Union of poly$(\log(n \log b))$ many $O(\frac{\log^2 (n \log b)} {(\log
\log(n \log b) \log \log \log (n \log b))^2})$-dimensional rectangles.
- poly$(n \log b)$-way Majority of poly$(n \log b)$-Or of disjoint
$O(\frac{\log(n \log b)} {\log \log(n \log b)})$-dimensional rectangles.
Our main algorithmic tool is an extension of Jackson's boosting- and
Fourier-based Harmonic Sieve algorithm [Jackson 1997] to the domain $[b]^n$,
building on work of [Akavia, Goldwasser, Safra 2003]. Other ingredients used to
obtain the results stated above are techniques from exact learning [Beimel,
Kushilevitz 1998] and ideas from recent work on learning augmented $AC^{0}$
circuits [Jackson, Klivans, Servedio 2002] and on representing Boolean
functions as thresholds of parities [Klivans, Servedio 2001].
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2005 19:26:34 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Oct 2005 20:02:32 GMT"
},
{
"version": "v3",
"created": "Fri, 12 May 2006 18:23:36 GMT"
},
{
"version": "v4",
"created": "Tue, 26 Jun 2007 14:00:17 GMT"
}
] | 2008-09-12T00:00:00 |
[
[
"Atici",
"Alp",
""
],
[
"Servedio",
"Rocco A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0510039
|
Sandor P. Fekete
|
Christophe Bobda, Ali Ahmadinia, Mateusz Majer, Juergen Teich, Sandor
P. Fekete, Jan van der Veen
|
DyNoC: A Dynamic Infrastructure for Communication in Dynamically
Reconfigurable Devices
|
9 pages, 7 figures, 1 table, Latex, to appear in 15th International
Conference on Field-Programmable Logic and Application
| null | null | null |
cs.AR
| null |
A new paradigm to support the communication among modules dynamically placed
on a reconfigurable device at run-time is presented. Based on the network on
chip (NoC) infrastructure, we developed a dynamic communication infrastructure
as well as routing methodologies capable to handle routing in a NoC with
obstacles created by dynamically placed components. We prove the unrestricted
reachability of components and pins, the deadlock-freeness and we finally show
the feasibility of our approach by means on real life example applications.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2005 22:03:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bobda",
"Christophe",
""
],
[
"Ahmadinia",
"Ali",
""
],
[
"Majer",
"Mateusz",
""
],
[
"Teich",
"Juergen",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"van der Veen",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0510040
|
Ken Krechmer Mr.
|
Ken Krechmer
|
The "...system of constraints"
| null | null | null | null |
cs.IT math.IT
| null |
This paper proposes that the mathematical relationship between an entropy
distribution and its limit offers some new insight into system performance.
This relationship is used to quantify variation among the entities of a system,
where variation is defined as tolerance, option, specification or
implementation variation among the entities of a system. Variation has a
significnt and increasing impact on communications system performance. This
paper introduces means to identify, quantify and reduce such performance
variations.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2005 02:04:41 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Krechmer",
"Ken",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510041
|
Gerard Henry Edmond Duchamp
|
G\'erard Henry Edmond Duchamp (LIPN), Pawel Blasiak (LPTL), Andrzej
Horzela (LPTL), Karol A. Penson (LPTL), Allan I. Solomon (LPTL)
|
Feynman graphs and related Hopf algebras
| null | null |
10.1088/1742-6596/30/1/014
| null |
cs.SC cs.DM math-ph math.CO math.MP quant-ph
| null |
In a recent series of communications we have shown that the reordering
problem of bosons leads to certain combinatorial structures. These structures
may be associated with a certain graphical description. In this paper, we show
that there is a Hopf Algebra structure associated with this problem which is,
in a certain sense, unique.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2005 06:11:56 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
],
[
"Blasiak",
"Pawel",
"",
"LPTL"
],
[
"Horzela",
"Andrzej",
"",
"LPTL"
],
[
"Penson",
"Karol A.",
"",
"LPTL"
],
[
"Solomon",
"Allan I.",
"",
"LPTL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0510042
|
David Naccache
|
David Naccache
|
Secure and {\sl Practical} Identity-Based Encryption
| null | null | null | null |
cs.CR
| null |
In this paper, we present a variant of Waters' Identity-Based Encryption
scheme with a much smaller public-key size (only a few kilobytes). We show that
this variant is semantically secure against passive adversaries in the standard
model.\smallskip
In essence, the new scheme divides Waters' public key size by a factor $\ell$
at the cost of (negligibly) reducing security by $\ell$ bits. Therefore, our
construction settles an open question asked by Waters and constitutes the first
fully secure {\sl practical} Identity-Based Encryption scheme
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2005 11:08:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Naccache",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0510043
|
Pascal Vontobel
|
Pascal O. Vontobel, Roxana Smarandache
|
On Minimal Pseudo-Codewords of Tanner Graphs from Projective Planes
|
This paper is a slightly reformulated version of the paper that
appeared in the proceedings of the 43rd Allerton Conference on
Communications, Control, and Computing, Allerton House, Monticello, Illinois,
USA, Sept. 28-30, 2005
|
Proc. 43rd Allerton Conference on Communications, Control, and
Computing, Allerton House, Monticello, Illinois, USA, Sept. 28-30, 2005
| null | null |
cs.IT cs.DM math.IT
| null |
We would like to better understand the fundamental cone of Tanner graphs
derived from finite projective planes. Towards this goal, we discuss bounds on
the AWGNC and BSC pseudo-weight of minimal pseudo-codewords of such Tanner
graphs, on one hand, and study the structure of minimal pseudo-codewords, on
the other.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2005 23:51:52 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Vontobel",
"Pascal O.",
""
],
[
"Smarandache",
"Roxana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510044
|
Andrea Montanari
|
Andrea Montanari, Balaji Prabhakar, David Tse
|
Belief Propagation Based Multi--User Detection
|
9 pages, 4 eps figures. Forty-third Allerton Conference on
Communications, Control and Computing, invited paper
| null | null | null |
cs.IT math.IT
| null |
We apply belief propagation (BP) to multi--user detection in a spread
spectrum system, under the assumption of Gaussian symbols. We prove that BP is
both convergent and allows to estimate the correct conditional expectation of
the input symbols. It is therefore an optimal --minimum mean square error--
detection algorithm. This suggests the possibility of designing BP detection
algorithms for more general systems. As a byproduct we rederive the Tse-Hanly
formula for minimum mean square error without any recourse to random matrix
theory.
|
[
{
"version": "v1",
"created": "Sun, 16 Oct 2005 16:05:31 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 10:56:18 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Montanari",
"Andrea",
""
],
[
"Prabhakar",
"Balaji",
""
],
[
"Tse",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510045
|
Andrea Montanari
|
Cyril Measson, Andrea Montanari, Rudiger Urbanke
|
Why We Can Not Surpass Capacity: The Matching Condition
|
10 pages, 27 ps figures. Forty-third Allerton Conference on
Communication, Control and Computing, invited paper
| null | null | null |
cs.IT math.IT
| null |
We show that iterative coding systems can not surpass capacity using only
quantities which naturally appear in density evolution. Although the result in
itself is trivial, the method which we apply shows that in order to achieve
capacity the various components in an iterative coding system have to be
perfectly matched. This generalizes the perfect matching condition which was
previously known for the case of transmission over the binary erasure channel
to the general class of binary-input memoryless output-symmetric channels.
Potential applications of this perfect matching condition are the construction
of capacity-achieving degree distributions and the determination of the number
required iterations as a function of the multiplicative gap to capacity.
|
[
{
"version": "v1",
"created": "Sun, 16 Oct 2005 16:32:58 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Measson",
"Cyril",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Urbanke",
"Rudiger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510046
|
Dmitry Mogilevsky
|
Dmitry Mogilevsky, Adam Lee, William Yurcik
|
Defining a Comprehensive Threat Model for High Performance Computational
Clusters
| null | null | null | null |
cs.CR cs.DC
| null |
Over the past decade, high performance computational (HPC) clusters have
become mainstream in academic and industrial settings as accessible means of
computation. Throughout their proliferation, HPC security has been a secondary
concern to performance. It is evident, however, that ensuring HPC security
presents different challenges than the ones faced when dealing with traditional
networks. To design suitable security measures for high performance computing,
it is necessary to first realize the threats faced by such an environment. This
task can be accomplished by the means of constructing a comprehensive threat
model. To our knowledge, no such threat model exists with regards to Cluster
Computing. In this paper, we explore the unique challenges of securing HPCs and
propose a threat model based on the classical Confidentiality, Integrity and
Availability security principles.
|
[
{
"version": "v1",
"created": "Sun, 16 Oct 2005 23:32:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mogilevsky",
"Dmitry",
""
],
[
"Lee",
"Adam",
""
],
[
"Yurcik",
"William",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0510047
|
Oliver Henkel
|
Oliver Henkel
|
Geometrical relations between space time block code designs and
complexity reduction
|
final version, 11 pages, two-column
|
IEEE Trans. Inform. Theory, vol. 52, no. 12 (Dec 2006), 5324-5335
|
10.1109/TIT.2006.885457
| null |
cs.IT math.IT
| null |
In this work, the geometric relation between space time block code design for
the coherent channel and its non-coherent counterpart is exploited to get an
analogue of the information theoretic inequality $I(X;S)\le I((X,H);S)$ in
terms of diversity. It provides a lower bound on the performance of
non-coherent codes when used in coherent scenarios. This leads in turn to a
code design decomposition result splitting coherent code design into two
complexity reduced sub tasks. Moreover a geometrical criterion for high
performance space time code design is derived.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2005 08:41:51 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Dec 2006 10:23:21 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Henkel",
"Oliver",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510048
|
Sandor P. Fekete
|
Alexander Kroeller and Sandor P. Fekete and Dennis Pfisterer and
Stefan Fischer
|
Deterministic boundary recognition and topology extraction for large
sensor networks
|
10 pages, 9 figures, Latex, to appear in Symposium on Discrete
Algorithms (SODA 2006)
| null | null | null |
cs.DC cs.CG
| null |
We present a new framework for the crucial challenge of self-organization of
a large sensor network. The basic scenario can be described as follows: Given a
large swarm of immobile sensor nodes that have been scattered in a polygonal
region, such as a street network. Nodes have no knowledge of size or shape of
the environment or the position of other nodes. Moreover, they have no way of
measuring coordinates, geometric distances to other nodes, or their direction.
Their only way of interacting with other nodes is to send or to receive
messages from any node that is within communication range. The objective is to
develop algorithms and protocols that allow self-organization of the swarm into
large-scale structures that reflect the structure of the street network,
setting the stage for global routing, tracking and guiding algorithms.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2005 12:23:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kroeller",
"Alexander",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Pfisterer",
"Dennis",
""
],
[
"Fischer",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0510049
|
Roxana Smarandache
|
Roxana Smarandache and Marcel Wauer
|
Bounds on the Pseudo-Weight of Minimal Pseudo-Codewords of Projective
Geometry Codes
|
12 pages 1 figure, submitted
| null | null | null |
cs.IT cs.DM math.IT
| null |
In this paper we focus our attention on a family of finite geometry codes,
called type-I projective geometry low-density parity-check (PG-LDPC) codes,
that are constructed based on the projective planes PG{2,q). In particular, we
study their minimal codewords and pseudo-codewords, as it is known that these
vectors characterize completely the code performance under maximum-likelihood
decoding and linear programming decoding, respectively. The main results of
this paper consist of upper and lower bounds on the pseudo-weight of the
minimal pseudo-codewords of type-I PG-LDPC codes.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2005 15:46:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Smarandache",
"Roxana",
""
],
[
"Wauer",
"Marcel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510050
|
Gilles Kassel
|
Gilles Kassel (LaRIA)
|
Integration of the DOLCE top-level ontology into the OntoSpec
methodology
| null | null | null |
LRR-2005-08
|
cs.AI
| null |
This report describes a new version of the OntoSpec methodology for ontology
building. Defined by the LaRIA Knowledge Engineering Team (University of
Picardie Jules Verne, Amiens, France), OntoSpec aims at helping builders to
model ontological knowledge (upstream of formal representation). The
methodology relies on a set of rigorously-defined modelling primitives and
principles. Its application leads to the elaboration of a semi-informal
ontology, which is independent of knowledge representation languages. We
recently enriched the OntoSpec methodology by endowing it with a new resource,
the DOLCE top-level ontology defined at the LOA (IST-CNR, Trento, Italy). The
goal of this integration is to provide modellers with additional help in
structuring application ontologies, while maintaining independence
vis-\`{a}-vis formal representation languages. In this report, we first provide
an overview of the OntoSpec methodology's general principles and then describe
the DOLCE re-engineering process. A complete version of DOLCE-OS (i.e. a
specification of DOLCE in the semi-informal OntoSpec language) is presented in
an appendix.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2005 08:32:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kassel",
"Gilles",
"",
"LaRIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510051
|
Gianluca Argentini
|
Gianluca Argentini
|
Numerical resolution of some BVP using Bernstein polynomials
|
7 pages, 3 figures
|
Posted since 2005-11-29 at Applied Mathematics E-Notes,
http://www.math.nthu.edu.tw/~amen/
| null | null |
cs.NA cs.MS math.CA physics.comp-ph
| null |
In this work we present a method, based on the use of Bernstein polynomials,
for the numerical resolution of some boundary values problems. The computations
have not need of particular approximations of derivatives, such as finite
differences, or particular techniques, such as finite elements. Also, the
method doesn't require the use of matrices, as in resolution of linear
algebraic systems, nor the use of like-Newton algorithms, as in resolution of
non linear sets of equations. An initial equation is resolved only once, then
the method is based on iterated evaluations of appropriate polynomials.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2005 09:55:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Argentini",
"Gianluca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
cs/0510052
|
Victor Grishchenko
|
Victor S. Grishchenko
|
Remarks on "Toward Compact Interdomain Routing"
| null | null | null | null |
cs.NI
| null |
This paper critically examines some propositions and arguments of
cs.NI/0508021 regarding applicability of hierarchical routing and perspectives
of compact routing. Arguments against the former are found to be inaccurate
while the latter is found to be equivalent to well-known deployed solutions.
Also, multiple (stacked) application of compact-routing solutions is found to
be equivalent to hierarchical routing.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2005 13:01:08 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Oct 2005 15:18:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grishchenko",
"Victor S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0510053
|
Martin Kutz
|
Martin Kutz
|
A pair of trees without a simultaneous geometric embedding in the plane
|
This paper has been withdrawn by the author because it had turned out
that the result was already known before
| null | null | null |
cs.CG
| null |
Any planar graph has a crossing-free straight-line drawing in the plane. A
simultaneous geometric embedding of two n-vertex graphs is a straight-line
drawing of both graphs on a common set of n points, such that the edges withing
each individual graph do not cross. We consider simultaneous embeddings of two
labeled trees, with predescribed vertex correspondences, and present an
instance of such a pair that cannot be embedded. Further we provide an example
of a planar graph that cannot be embedded together with a path when vertex
correspondences are given.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2005 18:26:00 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Nov 2005 13:14:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kutz",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0510054
|
Le Zhao Mr.
|
Le Zhao, Min Zhang, Shaoping Ma
|
The Nature of Novelty Detection
|
This paper pointed out the future direction for novelty detection
research. 37 pages, double spaced version
| null | null | null |
cs.IR cs.CL
| null |
Sentence level novelty detection aims at reducing redundant sentences from a
sentence list. In the task, sentences appearing later in the list with no new
meanings are eliminated. Aiming at a better accuracy for detecting redundancy,
this paper reveals the nature of the novelty detection task currently
overlooked by the Novelty community $-$ Novelty as a combination of the partial
overlap (PO, two sentences sharing common facts) and complete overlap (CO, the
first sentence covers all the facts of the second sentence) relations. By
formalizing novelty detection as a combination of the two relations between
sentences, new viewpoints toward techniques dealing with Novelty are proposed.
Among the methods discussed, the similarity, overlap, pool and language
modeling approaches are commonly used. Furthermore, a novel approach, selected
pool method is provided, which is immediate following the nature of the task.
Experimental results obtained on all the three currently available novelty
datasets showed that selected pool is significantly better or no worse than the
current methods. Knowledge about the nature of the task also affects the
evaluation methodologies. We propose new evaluation measures for Novelty
according to the nature of the task, as well as possible directions for future
study.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2005 14:56:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zhao",
"Le",
""
],
[
"Zhang",
"Min",
""
],
[
"Ma",
"Shaoping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0510055
|
Syed Jafar
|
Syed A. Jafar, Maralle J. Fakhereddin
|
Degrees of Freedom in Multiuser MIMO
|
6 pages
| null | null | null |
cs.IT math.IT
| null |
We explore the available degrees of freedom for various multiuser MIMO
communication scenarios such as the multiple access, broadcast, interference,
relay, X and Z channels. For the two user MIMO interference channel, we find a
general inner bound and a genie-aided outer bound that give us the exact number
of degrees of freedom in many cases. We also study a share-and-transmit scheme
for transmitter cooperation. For the share-and-transmit scheme, we show how the
gains of transmitter cooperation are entirely offset by the cost of enabling
that cooperation so that the available degrees of freedom are not increased.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2005 18:24:51 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jafar",
"Syed A.",
""
],
[
"Fakhereddin",
"Maralle J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510056
|
Jackie (Jianhong) Shen
|
Yoon-Mo Jung and Jianhong Shen
|
First-Order Modeling and Stability Analysis of Illusory Contours
|
21 pages
| null | null | null |
cs.CV cs.AI
| null |
In visual cognition, illusions help elucidate certain intriguing latent
perceptual functions of the human vision system, and their proper mathematical
modeling and computational simulation are therefore deeply beneficial to both
biological and computer vision. Inspired by existent prior works, the current
paper proposes a first-order energy-based model for analyzing and simulating
illusory contours. The lower complexity of the proposed model facilitates
rigorous mathematical analysis on the detailed geometric structures of illusory
contours. After being asymptotically approximated by classical active contours,
the proposed model is then robustly computed using the celebrated level-set
method of Osher and Sethian (J. Comput. Phys., 79:12-49, 1988) with a natural
supervising scheme. Potential cognitive implications of the mathematical
results are addressed, and generic computational examples are demonstrated and
discussed.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2005 20:44:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jung",
"Yoon-Mo",
""
],
[
"Shen",
"Jianhong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510057
|
Jean-Guillaume Dumas
|
Jean-Guillaume Dumas (LMC - IMAG), Dominique Duval (LMC - IMAG)
|
Towards a diagrammatic modeling of the LinBox C++ linear algebra library
|
Published in Langages et Mod\`eles \`a Objets, N\^imes : France
(2006)
| null | null | null |
cs.SC
| null |
We propose a new diagrammatic modeling language, DML. The paradigm used is
that of the category theory and in particular of the pushout tool. We show that
most of the object-oriented structures can be described with this tool and have
many examples in C++, ranging from virtual inheritance and polymorphism to
template genericity. With this powerful tool, we propose a quite simple
description of the C++ LinBox library. This library has been designed for
efficiency and genericity and therefore makes heavy usage of complex template
and polymorphic mecanism. Be reverse engineering, we are able to describe in a
simple manner the complex structure of archetypes in LinBox.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2005 15:07:18 GMT"
}
] | 2008-09-04T00:00:00 |
[
[
"Dumas",
"Jean-Guillaume",
"",
"LMC - IMAG"
],
[
"Duval",
"Dominique",
"",
"LMC - IMAG"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0510058
|
Peter Jung
|
Peter Jung
|
Precoding for 2x2 Doubly-Dispersive WSSUS Channels
|
6 pages, 6th International ITG-Conference on Source and Channel
Coding (SCC 2006), Apr., 2006, Munich, typos corrected
| null | null | null |
cs.IT math.IT
| null |
Optimal link adaption to the scattering function of wide sense stationary
uncorrelated scattering (WSSUS) mobile communication channels is still an
unsolved problem despite its importance for next-generation system design. In
multicarrier transmission such link adaption is performed by pulse shaping
which in turn is equivalent to precoding with respect to the second order
channel statistics. In the present framework a translation of the precoder
optimization problem into an optimization problem over trace class operators is
used. This problem which is also well-known in the context of quantum
information theory is unsolved in general due to its non-convex nature. However
in very low dimension the problem formulation reveals an additional analytic
structure which again admits the solution to the optimal precoder and
multiplexing scheme. Hence, in this contribution the analytic solution of the
problem for the 2x2 doubly--dispersive WSSUS channel is presented.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2005 14:57:12 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 09:06:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jung",
"Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510059
|
Arnaud De La Fortelle
|
Michel Parent (INRIA Rocquencourt), Arnaud De La Fortelle (INRIA
Rocquencourt)
|
Cybercars : Past, Present and Future of the Technology
| null |
Dans ITS World Congress 2005
| null | null |
cs.RO
| null |
Automobile has become the dominant transport mode in the world in the last
century. In order to meet a continuously growing demand for transport, one
solution is to change the control approach for vehicle to full driving
automation, which removes the driver from the control loop to improve
efficiency and reduce accidents. Recent work shows that there are several
realistic paths towards this deployment : driving assistance on passenger cars,
automated commercial vehicles on dedicated infrastructures, and new forms of
urban transport (car-sharing and cybercars). Cybercars have already been put
into operation in Europe, and it seems that this approach could lead the way
towards full automation on most urban, and later interurban infrastructures.
The European project CyberCars has brought many improvements in the technology
needed to operate cybercars over the last three years. A new, larger European
project is now being prepared to carry this work further in order to meet more
ambitious objectives in terms of safety and efficiency. This paper will present
past and present technologies and will focus on the future developments.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2005 15:03:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Parent",
"Michel",
"",
"INRIA Rocquencourt"
],
[
"De La Fortelle",
"Arnaud",
"",
"INRIA\n Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0510060
|
Alex Grant
|
Leif W Hanlen and Alex J Grant
|
Optimal Transmit Covariance for Ergodic MIMO Channels
|
22 pages, 14 figures, Submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
| null |
In this paper we consider the computation of channel capacity for ergodic
multiple-input multiple-output channels with additive white Gaussian noise. Two
scenarios are considered. Firstly, a time-varying channel is considered in
which both the transmitter and the receiver have knowledge of the channel
realization. The optimal transmission strategy is water-filling over space and
time. It is shown that this may be achieved in a causal, indeed instantaneous
fashion. In the second scenario, only the receiver has perfect knowledge of the
channel realization, while the transmitter has knowledge of the channel gain
probability law. In this case we determine an optimality condition on the input
covariance for ergodic Gaussian vector channels with arbitrary channel
distribution under the condition that the channel gains are independent of the
transmit signal. Using this optimality condition, we find an iterative
algorithm for numerical computation of optimal input covariance matrices.
Applications to correlated Rayleigh and Ricean channels are given.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2005 02:12:57 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hanlen",
"Leif W",
""
],
[
"Grant",
"Alex J",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510061
|
Marcin Czenko
|
M. Czenko, H. Tran, J. Doumen, S. Etalle, P. Hartel, J. den Hartog
|
Nonmonotonic Trust Management for P2P Applications
|
This paper appears in the proceedings of the 1st International
Workshop on Security and Trust Management (STM 2005). To appear in ENTCS
| null | null |
TR-CTIT-05-22
|
cs.LO
| null |
Community decisions about access control in virtual communities are
non-monotonic in nature. This means that they cannot be expressed in current,
monotonic trust management languages such as the family of Role Based Trust
Management languages (RT). To solve this problem we propose RT-, which adds a
restricted form of negation to the standard RT language, thus admitting a
controlled form of non-monotonicity. The semantics of RT- is discussed and
presented in terms of the well-founded semantics for Logic Programs. Finally we
discuss how chain discovery can be accomplished for RT-.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2005 11:46:56 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Czenko",
"M.",
""
],
[
"Tran",
"H.",
""
],
[
"Doumen",
"J.",
""
],
[
"Etalle",
"S.",
""
],
[
"Hartel",
"P.",
""
],
[
"Hartog",
"J. den",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0510062
|
Jamal Saboune
|
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA
Lorraine - LORIA)
|
Using Interval Particle Filtering for Marker less 3D Human Motion
Capture
| null | null | null | null |
cs.AI
| null |
In this paper we present a new approach for marker less human motion capture
from conventional camera feeds. The aim of our study is to recover 3D positions
of key points of the body that can serve for gait analysis. Our approach is
based on foreground segmentation, an articulated body model and particle
filters. In order to be generic and simple no restrictive dynamic modelling was
used. A new modified particle filtering algorithm was introduced. It is used
efficiently to search the model configuration space. This new algorithm which
we call Interval Particle Filtering reorganizes the configurations search space
in an optimal deterministic way and proved to be efficient in tracking natural
human movement. Results for human motion capture from a single camera are
presented and compared to results obtained from a marker based system. The
system proved to be able to track motion successfully even in partial
occlusions.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2005 13:45:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Saboune",
"Jamal",
"",
"INRIA Lorraine - LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA\n Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510063
|
Jamal Saboune
|
Jamal Saboune (INRIA Lorraine - LORIA), Fran\c{c}ois Charpillet (INRIA
Lorraine - LORIA)
|
Markerless Human Motion Capture for Gait Analysis
| null | null | null | null |
cs.AI
| null |
The aim of our study is to detect balance disorders and a tendency towards
the falls in the elderly, knowing gait parameters. In this paper we present a
new tool for gait analysis based on markerless human motion capture, from
camera feeds. The system introduced here, recovers the 3D positions of several
key points of the human body while walking. Foreground segmentation, an
articulated body model and particle filtering are basic elements of our
approach. No dynamic model is used thus this system can be described as generic
and simple to implement. A modified particle filtering algorithm, which we call
Interval Particle Filtering, is used to reorganise and search through the
model's configurations search space in a deterministic optimal way. This
algorithm was able to perform human movement tracking with success. Results
from the treatment of a single cam feeds are shown and compared to results
obtained using a marker based human motion capture system.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2005 13:45:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Saboune",
"Jamal",
"",
"INRIA Lorraine - LORIA"
],
[
"Charpillet",
"François",
"",
"INRIA\n Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510064
|
Valmir Barbosa
|
Rosa M. V. Figueiredo, Valmir C. Barbosa, Nelson Maculan, Cid C. Souza
|
Acyclic orientations with path constraints
| null |
RAIRO Operations Research 42 (2008), 455-467
|
10.1051/ro:2008028
| null |
cs.DM
| null |
Many well-known combinatorial optimization problems can be stated over the
set of acyclic orientations of an undirected graph. For example, acyclic
orientations with certain diameter constraints are closely related to the
optimal solutions of the vertex coloring and frequency assignment problems. In
this paper we introduce a linear programming formulation of acyclic
orientations with path constraints, and discuss its use in the solution of the
vertex coloring problem and some versions of the frequency assignment problem.
A study of the polytope associated with the formulation is presented, including
proofs of which constraints of the formulation are facet-defining and the
introduction of new classes of valid inequalities.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2005 18:29:44 GMT"
}
] | 2008-10-15T00:00:00 |
[
[
"Figueiredo",
"Rosa M. V.",
""
],
[
"Barbosa",
"Valmir C.",
""
],
[
"Maculan",
"Nelson",
""
],
[
"Souza",
"Cid C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0510065
|
Aneta Zwierko
|
Adam Wierzbicki, Aneta Zwierko and Zbigniew Kotulski
|
A new authentication protocol for revocable anonymity in ad-hoc networks
|
8 pages, 8 figures, this an extended version of paper accepted for
IASTED conference CNIS'2005
| null | null | null |
cs.CR cs.DC cs.NI
| null |
This paper describes a new protocol for authentication in ad-hoc networks.
The protocol has been designed to meet specialized requirements of ad-hoc
networks, such as lack of direct communication between nodes or requirements
for revocable anonymity. At the same time, a ad-hoc authentication protocol
must be resistant to spoofing, eavesdropping and playback, and
man-in-the-middle attacks. The article analyzes existing authentication methods
based on the Public Key Infrastructure, and finds that they have several
drawbacks in ad-hoc networks. Therefore, a new authentication protocol, basing
on established cryptographic primitives (Merkle's puzzles and zero-knowledge
proofs) is proposed. The protocol is studied for a model ad-hoc chat
application that provides private conversations.
|
[
{
"version": "v1",
"created": "Sat, 22 Oct 2005 11:51:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wierzbicki",
"Adam",
""
],
[
"Zwierko",
"Aneta",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0510066
|
Bruno Courcelle
|
Bruno Courcelle
|
The monadic second-order logic of graphs XVI : Canonical graph<br>
decompositions
| null |
Logical Methods in Computer Science, Volume 2, Issue 2 (March 23,
2006) lmcs:2250
|
10.2168/LMCS-2(2:2)2006
| null |
cs.LO
| null |
This article establishes that the split decomposition of graphs introduced by
Cunnigham, is definable in Monadic Second-Order Logic.This result is actually
an instance of a more general result covering canonical graph decompositions
like the modular decomposition and the Tutte decomposition of 2-connected
graphs into 3-connected components. As an application, we prove that the set of
graphs having the same cycle matroid as a given 2-connected graph can be
defined from this graph by Monadic Second-Order formulas.
|
[
{
"version": "v1",
"created": "Sat, 22 Oct 2005 13:09:38 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Nov 2005 09:20:09 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Mar 2006 13:04:11 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Courcelle",
"Bruno",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0510067
|
Arya Mazumdar
|
Arya Mazumdar, Adrish Banerjee and A K Chaturvedi
|
On the Spread of Random Interleaver
|
5 pages, published in Proceedings of IEEE International Symposium on
Information Theory 2005, Adelaide, Australia
|
IEEE International Symposium on Information Theory 2005
|
10.1109/ISIT.2005.1523372
| null |
cs.IT math.IT
| null |
For a given blocklength we determine the number of interleavers which have
spread equal to two. Using this, we find out the probability that a randomly
chosen interleaver has spread two. We show that as blocklength increases, this
probability increases but very quickly converges to the value $1-e^{-2} \approx
0.8647$. Subsequently, we determine a lower bound on the probability of an
interleaver having spread at least $s$. We show that this lower bound converges
to the value $e^{-2(s-2)^{2}}$, as the blocklength increases.
|
[
{
"version": "v1",
"created": "Sun, 23 Oct 2005 14:20:50 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Mazumdar",
"Arya",
""
],
[
"Banerjee",
"Adrish",
""
],
[
"Chaturvedi",
"A K",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510068
|
Sinan Gezici
|
Sinan Gezici, Zafer Sahinoglu, Hisashi Kobayashi, and H. Vincent Poor
|
Ultra Wideband Impulse Radio Systems with Multiple Pulse Types
|
To appear in the IEEE Journal on Selected Areas in Communications -
Special Issue on Ultrawideband Wireless Communications: Theory and
Applications
| null |
10.1109/JSAC.2005.863880
| null |
cs.IT math.IT
| null |
In an ultra wideband (UWB) impulse radio (IR) system, a number of pulses,
each transmitted in an interval called a "frame", is employed to represent one
information symbol. Conventionally, a single type of UWB pulse is used in all
frames of all users. In this paper, IR systems with multiple types of UWB
pulses are considered, where different types of pulses can be used in different
frames by different users. Both stored-reference (SR) and transmitted-reference
(TR) systems are considered. First, the spectral properties of a multi-pulse IR
system with polarity randomization is investigated. It is shown that the
average power spectral density is the average of the spectral contents of
different pulse shapes. Then, approximate closed-form expressions for the bit
error probability of a multi-pulse SR-IR system are derived for RAKE receivers
in asynchronous multiuser environments. The effects of both inter-frame
interference (IFI) and multiple-access interference (MAI) are analyzed. The
theoretical and simulation results indicate that SR-IR systems that are more
robust against IFI and MAI than a "conventional" SR-IR system can be designed
with multiple types of ultra-wideband pulses. Finally, extensions to
multi-pulse TR-IR systems are briefly described.
|
[
{
"version": "v1",
"created": "Sun, 23 Oct 2005 16:35:05 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Gezici",
"Sinan",
""
],
[
"Sahinoglu",
"Zafer",
""
],
[
"Kobayashi",
"Hisashi",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510069
|
Udi Boker
|
Udi Boker and Nachum Dershowitz
|
Comparing Computational Power
|
To appear in Logic Journal of the IGPL in 2006
|
Logic Journal of the IGPL, vol. 14, no. 5, pp. 633-648, 2006
| null | null |
cs.LO
| null |
It is common practice to compare the computational power of different models
of computation. For example, the recursive functions are strictly more powerful
than the primitive recursive functions, because the latter are a proper subset
of the former (which includes Ackermann's function). Side-by-side with this
"containment" method of measuring power, it is standard to use an approach
based on "simulation". For example, one says that the (untyped) lambda calculus
is as powerful--computationally speaking--as the partial recursive functions,
because the lambda calculus can simulate all partial recursive functions by
encoding the natural numbers as Church numerals.
The problem is that unbridled use of these two ways of comparing power allows
one to show that some computational models are strictly stronger than
themselves! We argue that a better definition is that model A is strictly
stronger than B if A can simulate B via some encoding, whereas B cannot
simulate A under any encoding. We then show that the recursive functions are
strictly stronger in this sense than the primitive recursive. We also prove
that the recursive functions, partial recursive functions, and Turing machines
are "complete", in the sense that no injective encoding can make them
equivalent to any "hypercomputational" model.
|
[
{
"version": "v1",
"created": "Sun, 23 Oct 2005 16:51:02 GMT"
}
] | 2020-06-11T00:00:00 |
[
[
"Boker",
"Udi",
""
],
[
"Dershowitz",
"Nachum",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0510070
|
Desmond Lun
|
Desmond S. Lun, Muriel Medard, Ralf Koetter, Michelle Effros
|
On Coding for Reliable Communication over Packet Networks
|
33 pages, 6 figures; revised appendix
|
Physical Communication, vol. 1, no. 1, pp. 3-20, March 2008.
|
10.1016/j.phycom.2008.01.006
| null |
cs.IT cs.NI math.IT
| null |
We present a capacity-achieving coding scheme for unicast or multicast over
lossy packet networks. In the scheme, intermediate nodes perform additional
coding yet do not decode nor even wait for a block of packets before sending
out coded packets. Rather, whenever they have a transmission opportunity, they
send out coded packets formed from random linear combinations of previously
received packets. All coding and decoding operations have polynomial
complexity.
We show that the scheme is capacity-achieving as long as packets received on
a link arrive according to a process that has an average rate. Thus, packet
losses on a link may exhibit correlation in time or with losses on other links.
In the special case of Poisson traffic with i.i.d. losses, we give error
exponents that quantify the rate of decay of the probability of error with
coding delay. Our analysis of the scheme shows that it is not only
capacity-achieving, but that the propagation of packets carrying "innovative"
information follows the propagation of jobs through a queueing network, and
therefore fluid flow models yield good approximations. We consider networks
with both lossy point-to-point and broadcast links, allowing us to model both
wireline and wireless packet networks.
|
[
{
"version": "v1",
"created": "Sun, 23 Oct 2005 22:42:43 GMT"
},
{
"version": "v2",
"created": "Tue, 2 May 2006 14:27:13 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Jan 2007 22:20:04 GMT"
}
] | 2008-04-11T00:00:00 |
[
[
"Lun",
"Desmond S.",
""
],
[
"Medard",
"Muriel",
""
],
[
"Koetter",
"Ralf",
""
],
[
"Effros",
"Michelle",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510071
|
Ashish Khisti
|
Aggelos Bletsas, Ashish Khisti, David P. Reed, Andrew Lippman
|
A Simple Cooperative Diversity Method Based on Network Path Selection
|
To appear, IEEE JSAC, special issue on 4G
| null |
10.1109/JSAC.2005.862417
| null |
cs.IT math.IT
| null |
Cooperative diversity has been recently proposed as a way to form virtual
antenna arrays that provide dramatic gains in slow fading wireless
environments. However most of the proposed solutions require distributed
space-time coding algorithms, the careful design of which is left for future
investigation if there is more than one cooperative relay. We propose a novel
scheme, that alleviates these problems and provides diversity gains on the
order of the number of relays in the network. Our scheme first selects the best
relay from a set of M available relays and then uses this best relay for
cooperation between the source and the destination. We develop and analyze a
distributed method to select the best relay that requires no topology
information and is based on local measurements of the instantaneous channel
conditions. This method also requires no explicit communication among the
relays. The success (or failure) to select the best available path depends on
the statistics of the wireless channel, and a methodology to evaluate
performance for any kind of wireless channel statistics, is provided.
Information theoretic analysis of outage probability shows that our scheme
achieves the same diversity-multiplexing tradeoff as achieved by more complex
protocols, where coordination and distributed space-time coding for M nodes is
required, such as those proposed in [7]. The simplicity of the technique,
allows for immediate implementation in existing radio hardware and its adoption
could provide for improved flexibility, reliability and efficiency in future 4G
wireless systems.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2005 01:18:23 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Bletsas",
"Aggelos",
""
],
[
"Khisti",
"Ashish",
""
],
[
"Reed",
"David P.",
""
],
[
"Lippman",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510072
|
Dumitru Mihai Ionescu Dr.
|
Dumitru Mihai Ionescu, Dung N. Doan, Steven D. Gray
|
On Interleaving Techniques for MIMO Channels and Limitations of Bit
Interleaved Coded Modulation
|
20 pages, 11 figures, uses IEEEtran.cls
| null | null | null |
cs.IT math.IT
| null |
It is shown that while the mutual information curves for coded modulation
(CM) and bit interleaved coded modulation (BICM) overlap in the case of a
single input single output channel, the same is not true in multiple input
multiple output (MIMO) channels. A method for mitigating fading in the presence
of multiple transmit antennas, named coordinate interleaving (CI), is presented
as a generalization of component interleaving for a single transmit antenna.
The extent of any advantages of CI over BICM, relative to CM, is analyzed from
a mutual information perspective; the analysis is based on an equivalent
parallel channel model for CI. Several expressions for mutual information in
the presence of CI and multiple transmit and receive antennas are derived.
Results show that CI gives higher mutual information compared to that of BICM
if proper signal mappings are used. Effects like constellation rotation in the
presence of CI are also considered and illustrated; it is shown that
constellation rotation can increase the constrained capacity.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2005 02:09:18 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Ionescu",
"Dumitru Mihai",
""
],
[
"Doan",
"Dung N.",
""
],
[
"Gray",
"Steven D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510073
|
Christian Attiogb
|
Christian Attiogbe
|
Semantic Embedding of Petri Nets into Event-B
|
16 pages, 3 figures
| null | null | null |
cs.LO
| null |
We present an embedding of Petri nets into B abstract systems. The embedding
is achieved by translating both the static structure (modelling aspect) and the
evolution semantics of Petri nets. The static structure of a Petri-net is
captured within a B abstract system through a graph structure. This abstract
system is then included in another abstract system which captures the evolution
semantics of Petri-nets. The evolution semantics results in some B events
depending on the chosen policies: basic nets or high level Petri nets. The
current embedding enables one to use conjointly Petri nets and Event-B in the
same system development, but at different steps and for various analysis.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2005 09:17:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Attiogbe",
"Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0510074
|
Riccardo Pucella
|
Matthew Fluet, Riccardo Pucella
|
Practical Datatype Specializations with Phantom Types and Recursion
Schemes
|
25 pages. Appeared in the Proc. of the 2005 ACM SIGPLAN Workshop on
ML
| null | null | null |
cs.PL
| null |
Datatype specialization is a form of subtyping that captures program
invariants on data structures that are expressed using the convenient and
intuitive datatype notation. Of particular interest are structural invariants
such as well-formedness. We investigate the use of phantom types for describing
datatype specializations. We show that it is possible to express
statically-checked specializations within the type system of Standard ML. We
also show that this can be done in a way that does not lose useful programming
facilities such as pattern matching in case expressions.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2005 16:27:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fluet",
"Matthew",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0510075
|
Mustafa Cenk Gursoy
|
Mustafa Cenk Gursoy, Sergio Verdu, H. Vincent Poor
|
On-Off Frequency-Shift-Keying for Wideband Fading Channels
|
To appear in the EURASIP Journal on Wireless Communications and
Networking
| null | null | null |
cs.IT math.IT
| null |
M-ary On-Off Frequency-Shift-Keying (OOFSK) is a digital modulation format in
which M-ary FSK signaling is overlaid on On/Off keying. This paper investigates
the potential of this modulation format in the context of wideband fading
channels. First it is assumed that the receiver uses energy detection for the
reception of OOFSK signals. Capacity expressions are obtained for the cases in
which the receiver has perfect and imperfect fading side information. Power
efficiency is investigated when the transmitter is subject to a peak-to-average
power ratio (PAR) limitation or a peak power limitation. It is shown that under
a PAR limitation, it is extremely power inefficient to operate in the very low
SNR regime. On the other hand, if there is only a peak power limitation, it is
demonstrated that power efficiency improves as one operates with smaller SNR
and vanishing duty factor. Also studied are the capacity improvements that
accrue when the receiver can track phase shifts in the channel or if the
received signal has a specular component. To take advantage of those features,
the phase of the modulation is also allowed to carry information.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2005 19:50:59 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gursoy",
"Mustafa Cenk",
""
],
[
"Verdu",
"Sergio",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510076
|
Olivier Pauplin
|
Olivier Pauplin (INRIA Rocquencourt), Jean Louchet (INRIA
Rocquencourt), Evelyne Lutton (INRIA Rocquencourt), Michel Parent (INRIA
Rocquencourt)
|
Applying Evolutionary Optimisation to Robot Obstacle Avoidance
| null |
Dans ISCIIA 2004
| null | null |
cs.AI cs.RO
| null |
This paper presents an artificial evolutionbased method for stereo image
analysis and its application to real-time obstacle detection and avoidance for
a mobile robot. It uses the Parisian approach, which consists here in splitting
the representation of the robot's environment into a large number of simple
primitives, the "flies", which are evolved following a biologically inspired
scheme and give a fast, low-cost solution to the obstacle detection problem in
mobile robotics.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2005 07:07:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pauplin",
"Olivier",
"",
"INRIA Rocquencourt"
],
[
"Louchet",
"Jean",
"",
"INRIA\n Rocquencourt"
],
[
"Lutton",
"Evelyne",
"",
"INRIA Rocquencourt"
],
[
"Parent",
"Michel",
"",
"INRIA\n Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0510077
|
Oskari Ajanki
|
Oskari Ajanki, Antti Knowles
|
Connection state overhead in a dynamic linear network
|
8 pages, 3 figures, uses IEEEtran.cls
| null | null | null |
cs.IT cs.NI math.IT
| null |
We consider a dynamical linear network where nearest neighbours communicate
via links whose states form binary (open/closed) valued independent and
identically distributed Markov processes. Our main result is the tight
information-theoretic lower bound on the network traffic required by the
connection state overhead, or the information required for all nodes to know
their connected neighbourhood. These results, and especially their possible
generalisations to more realistic network models, could give us valuable
understanding of the unavoidable protocol overheads in rapidly changing Ad hoc
and sensor networks.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2005 12:00:06 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Ajanki",
"Oskari",
""
],
[
"Knowles",
"Antti",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510078
|
Hua Wang
|
H. Wang and P. Viswanath
|
Vector Gaussian Multiple Description with Individual and Central
Receivers
| null | null | null | null |
cs.IT math.IT
| null |
L multiple descriptions of a vector Gaussian source for individual and
central receivers are investigated. The sum rate of the descriptions with
covariance distortion measure constraints, in a positive semidefinite ordering,
is exactly characterized. For two descriptions, the entire rate region is
characterized. Jointly Gaussian descriptions are optimal in achieving the
limiting rates. The key component of the solution is a novel
information-theoretic inequality that is used to lower bound the achievable
multiple description rates.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2005 16:48:36 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"H.",
""
],
[
"Viswanath",
"P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510079
|
Riccardo Pucella
|
Joseph Y. Halpern, Riccardo Pucella
|
Evidence with Uncertain Likelihoods
|
21 pages. A preliminary version appeared in the Proceedings of UAI'05
| null | null | null |
cs.AI
| null |
An agent often has a number of hypotheses, and must choose among them based
on observations, or outcomes of experiments. Each of these observations can be
viewed as providing evidence for or against various hypotheses. All the
attempts to formalize this intuition up to now have assumed that associated
with each hypothesis h there is a likelihood function \mu_h, which is a
probability measure that intuitively describes how likely each observation is,
conditional on h being the correct hypothesis. We consider an extension of this
framework where there is uncertainty as to which of a number of likelihood
functions is appropriate, and discuss how one formal approach to defining
evidence, which views evidence as a function from priors to posteriors, can be
generalized to accommodate this uncertainty.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2005 21:15:31 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Aug 2006 17:34:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Halpern",
"Joseph Y.",
""
],
[
"Pucella",
"Riccardo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510080
|
Joseph Y. Halpern
|
Peter D. Grunwald and Joseph Y. Halpern
|
When Ignorance is Bliss
|
In Proceedings of the Twentieth Conference on Uncertainty in AI,
2004, pp. 226-234
| null | null | null |
cs.AI cs.LG
| null |
It is commonly-accepted wisdom that more information is better, and that
information should never be ignored. Here we argue, using both a Bayesian and a
non-Bayesian analysis, that in some situations you are better off ignoring
information if your uncertainty is represented by a set of probability
measures. These include situations in which the information is relevant for the
prediction task at hand. In the non-Bayesian analysis, we show how ignoring
information avoids dilation, the phenomenon that additional pieces of
information sometimes lead to an increase in uncertainty. In the Bayesian
analysis, we show that for small sample sizes and certain prediction tasks, the
Bayesian posterior based on a noninformative prior yields worse predictions
than simply ignoring the given information.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2005 22:14:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grunwald",
"Peter D.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0510081
|
Toan Nguyen
|
Toan Nguyen (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Lizhe Wang
(INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Vittorio Selmin (ALENIA
Aeronautica)
|
Virtual Environments for multiphysics code validation on Computing Grids
| null | null | null | null |
cs.DC
| null |
We advocate in this paper the use of grid-based infrastructures that are
designed for seamless approaches to the numerical expert users, i.e., the
multiphysics applications designers. It relies on sophisticated computing
environments based on computing grids, connecting heterogeneous computing
resources: mainframes, PC-clusters and workstations running multiphysics codes
and utility software, e.g., visualization tools. The approach is based on
concepts defined by the HEAVEN* consortium. HEAVEN is a European scientific
consortium including industrial partners from the aerospace, telecommunication
and software industries, as well as academic research institutes. Currently,
the HEAVEN consortium works on a project that aims to create advanced services
platforms. It is intended to enable "virtual private grids" supporting various
environments for users manipulating a suitable high-level interface. This will
become the basis for future generalized services allowing the integration of
various services without the need to deploy specific grid infrastructures.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2005 12:26:57 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Nguyen",
"Toan",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Wang",
"Lizhe",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Selmin",
"Vittorio",
"",
"ALENIA\n Aeronautica"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0510082
|
Jose Ignacio Alvarez-Hamelin
|
Jos\'e Ignacio Alvarez-Hamelin (LPT, FIUBA), Aline Carneiro Viana
(IRISA / INRIA Rennes), Marcelo Dias De Amorim (LIP6)
|
Architectural Considerations for a Self-Configuring Routing Scheme for
Spontaneous Networks
| null | null | null | null |
cs.NI
| null |
Decoupling the permanent identifier of a node from the node's
topology-dependent address is a promising approach toward completely scalable
self-organizing networks. A group of proposals that have adopted such an
approach use the same structure to: address nodes, perform routing, and
implement location service. In this way, the consistency of the routing
protocol relies on the coherent sharing of the addressing space among all nodes
in the network. Such proposals use a logical tree-like structure where routes
in this space correspond to routes in the physical level. The advantage of
tree-like spaces is that it allows for simple address assignment and
management. Nevertheless, it has low route selection flexibility, which results
in low routing performance and poor resilience to failures. In this paper, we
propose to increase the number of paths using incomplete hypercubes. The design
of more complex structures, like multi-dimensional Cartesian spaces, improves
the resilience and routing performance due to the flexibility in route
selection. We present a framework for using hypercubes to implement indirect
routing. This framework allows to give a solution adapted to the dynamics of
the network, providing a proactive and reactive routing protocols, our major
contributions. We show that, contrary to traditional approaches, our proposal
supports more dynamic networks and is more robust to node failures.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2005 14:42:59 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Alvarez-Hamelin",
"José Ignacio",
"",
"LPT, FIUBA"
],
[
"Viana",
"Aline Carneiro",
"",
"IRISA / INRIA Rennes"
],
[
"De Amorim",
"Marcelo Dias",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0510083
|
Nizar Kerkeni
|
Nizar Kerkeni (TIM), Frederic Alexandre (CORTEX), Mohamed Hedi Bedoui
(TIM), Laurent Bougrain (CORTEX), Mohamed Dogui (SAHLOUL)
|
Neuronal Spectral Analysis of EEG and Expert Knowledge Integration for
Automatic Classification of Sleep Stages
| null | null | null | null |
cs.AI
| null |
Being able to analyze and interpret signal coming from electroencephalogram
(EEG) recording can be of high interest for many applications including medical
diagnosis and Brain-Computer Interfaces. Indeed, human experts are today able
to extract from this signal many hints related to physiological as well as
cognitive states of the recorded subject and it would be very interesting to
perform such task automatically but today no completely automatic system
exists. In previous studies, we have compared human expertise and automatic
processing tools, including artificial neural networks (ANN), to better
understand the competences of each and determine which are the difficult
aspects to integrate in a fully automatic system. In this paper, we bring more
elements to that study in reporting the main results of a practical experiment
which was carried out in an hospital for sleep pathology study. An EEG
recording was studied and labeled by a human expert and an ANN. We describe
here the characteristics of the experiment, both human and neuronal procedure
of analysis, compare their performances and point out the main limitations
which arise from this study.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2005 14:47:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kerkeni",
"Nizar",
"",
"TIM"
],
[
"Alexandre",
"Frederic",
"",
"CORTEX"
],
[
"Bedoui",
"Mohamed Hedi",
"",
"TIM"
],
[
"Bougrain",
"Laurent",
"",
"CORTEX"
],
[
"Dogui",
"Mohamed",
"",
"SAHLOUL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510084
|
Michel Fliess
|
Michel Fliess
|
R\'{e}flexions sur la question fr\'{e}quentielle en traitement du signal
| null | null | null | null |
cs.CE cs.IR math-ph math.MP math.SP
| null |
New definitions are suggested for frequencies which may be instantaneous or
not. The Heisenberg-Gabor inequality and the Shannon sampling theorem are
briefly discussed.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2005 14:49:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fliess",
"Michel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.SP",
"description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices",
"span": "(Spectral Theory)"
}
] |
cs/0510085
|
Scott Rickard
|
Scott T. Rickard, Radu V. Balan, H. Vincent Poor, Sergio Verdu
|
Canonical time-frequency, time-scale, and frequency-scale
representations of time-varying channels
|
To appear in Communications in Information and Systems - special
issue in honor of Thomas Kailath's seventieth birthday
| null | null | null |
cs.IT math.IT
| null |
Mobile communication channels are often modeled as linear time-varying
filters or, equivalently, as time-frequency integral operators with finite
support in time and frequency. Such a characterization inherently assumes the
signals are narrowband and may not be appropriate for wideband signals. In this
paper time-scale characterizations are examined that are useful in wideband
time-varying channels, for which a time-scale integral operator is physically
justifiable. A review of these time-frequency and time-scale characterizations
is presented. Both the time-frequency and time-scale integral operators have a
two-dimensional discrete characterization which motivates the design of
time-frequency or time-scale rake receivers. These receivers have taps for both
time and frequency (or time and scale) shifts of the transmitted signal. A
general theory of these characterizations which generates, as specific cases,
the discrete time-frequency and time-scale models is presented here. The
interpretation of these models, namely, that they can be seen to arise from
processing assumptions on the transmit and receive waveforms is discussed. Out
of this discussion a third model arises: a frequency-scale continuous channel
model with an associated discrete frequency-scale characterization.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2005 00:47:47 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Rickard",
"Scott T.",
""
],
[
"Balan",
"Radu V.",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Verdu",
"Sergio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0510086
|
Krishnaram Kenthapadi
|
K. Kenthapadi and R. Panigrahy
|
Balanced Allocation on Graphs
| null | null | null | null |
cs.DS
| null |
In this paper, we study the two choice balls and bins process when balls are
not allowed to choose any two random bins, but only bins that are connected by
an edge in an underlying graph. We show that for $n$ balls and $n$ bins, if the
graph is almost regular with degree $n^\epsilon$, where $\epsilon$ is not too
small, the previous bounds on the maximum load continue to hold. Precisely, the
maximum load is $\log \log n + O(1/\epsilon) + O(1)$. For general
$\Delta$-regular graphs, we show that the maximum load is $\log\log n +
O(\frac{\log n}{\log (\Delta/\log^4 n)}) + O(1)$ and also provide an almost
matching lower bound of $\log \log n + \frac{\log n}{\log (\Delta \log n)}$.
V{\"o}cking [Voc99] showed that the maximum bin size with $d$ choice load
balancing can be further improved to $O(\log\log n /d)$ by breaking ties to the
left. This requires $d$ random bin choices. We show that such bounds can be
achieved by making only two random accesses and querying $d/2$ contiguous bins
in each access. By grouping a sequence of $n$ bins into $2n/d$ groups, each of
$d/2$ consecutive bins, if each ball chooses two groups at random and inserts
the new ball into the least-loaded bin in the lesser loaded group, then the
maximum load is $O(\log\log n/d)$ with high probability.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2005 21:59:21 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kenthapadi",
"K.",
""
],
[
"Panigrahy",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0510087
|
Johannes Gro{\ss}e
|
J. Grosse
|
MathPSfrag: Creating Publication-Quality Labels in Mathematica Plots
|
7 pages, 8 figures, for associated Mathematica package, see
http://wwwth.mppmu.mpg.de/members/jgrosse/mathpsfrag/MathPSfrag-1.0.tar.gz
| null | null |
LMU-ASC 70/05; MPP-2005-126
|
cs.GR
| null |
This article introduces a Mathematica package providing a graphics export
function that automatically replaces Mathematica expressions in a graphic by
the corresponding LaTeX constructs and positions them correctly. It thus
facilitates the creation of publication-quality Enscapulated PostScript (EPS)
graphics.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 09:40:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grosse",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0510088
|
Assaf Naor
|
Rajeev Motwani and Assaf Naor and Rina Panigrahy
|
Lower bounds on Locality Sensitive Hashing
| null | null | null | null |
cs.CG
| null |
Given a metric space $(X,d_X)$, $c\ge 1$, $r>0$, and $p,q\in [0,1]$, a
distribution over mappings $\h:X\to \mathbb N$ is called a
$(r,cr,p,q)$-sensitive hash family if any two points in $X$ at distance at most
$r$ are mapped by $\h$ to the same value with probability at least $p$, and any
two points at distance greater than $cr$ are mapped by $\h$ to the same value
with probability at most $q$. This notion was introduced by Indyk and Motwani
in 1998 as the basis for an efficient approximate nearest neighbor search
algorithm, and has since been used extensively for this purpose. The
performance of these algorithms is governed by the parameter
$\rho=\frac{\log(1/p)}{\log(1/q)}$, and constructing hash families with small
$\rho$ automatically yields improved nearest neighbor algorithms. Here we show
that for $X=\ell_1$ it is impossible to achieve $\rho\le \frac{1}{2c}$. This
almost matches the construction of Indyk and Motwani which achieves $\rho\le
\frac{1}{c}$.
|
[
{
"version": "v1",
"created": "Sat, 29 Oct 2005 15:05:52 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Nov 2005 20:32:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Motwani",
"Rajeev",
""
],
[
"Naor",
"Assaf",
""
],
[
"Panigrahy",
"Rina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0510089
|
Cyrille Bertelle
|
Rawan Ghnemat (IT), Khalaf Khatatneh (IT), Saleh Oqeili (IT), Cyrille
Bertelle (LIH), G\'erard Henry Edmond Duchamp (LIPN)
|
Automata-based adaptive behavior for economic modeling using game theory
| null |
Dans EPNADS'05 within ECCS'05 - Emergent Properties in Natural and
Artificial Dynamical Systems, Paris : France (2005)
| null | null |
cs.MA cs.DM
| null |
In this paper, we deal with some specific domains of applications to game
theory. This is one of the major class of models in the new approaches of
modelling in the economic domain. For that, we use genetic automata which allow
to buid adaptive strategies for the players. We explain how the automata-based
formalism proposed - matrix representation of automata with multiplicities -
allows to define a semi-distance between the strategy behaviors. With that
tools, we are able to generate an automatic processus to compute emergent
systems of entities whose behaviors are represented by these genetic automata.
|
[
{
"version": "v1",
"created": "Sun, 30 Oct 2005 16:06:56 GMT"
}
] | 2007-12-17T00:00:00 |
[
[
"Ghnemat",
"Rawan",
"",
"IT"
],
[
"Khatatneh",
"Khalaf",
"",
"IT"
],
[
"Oqeili",
"Saleh",
"",
"IT"
],
[
"Bertelle",
"Cyrille",
"",
"LIH"
],
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0510090
|
Sheng-Gwo Chen
|
Jyh-Yang Wu, Sheng-Gwo Chen and Mei-Hsiu Chi
|
A simple effective method for curvatures estimation on triangular meshes
| null | null | null | null |
cs.CG
| null |
To definite and compute differential invariants, like curvatures, for
triangular meshes (or polyhedral surfaces) is a key problem in CAGD and the
computer vision. The Gaussian curvature and the mean curvature are determined
by the differential of the Gauss map of the underlying surface. The Gauss map
assigns to each point in the surface the unit normal vector of the tangent
plane to the surface at this point. We follow the ideas developed in Chen and
Wu \cite{Chen2}(2004) and Wu, Chen and Chi\cite{Wu}(2005) to describe a new and
simple approach to estimate the differential of the Gauss map and curvatures
from the viewpoint of the gradient and the centroid weights. This will give us
a much better estimation of curvatures than Taubin's algorithm \cite{Taubin}
(1995).
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 02:41:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wu",
"Jyh-Yang",
""
],
[
"Chen",
"Sheng-Gwo",
""
],
[
"Chi",
"Mei-Hsiu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0510091
|
Marc Schoenauer
|
Marc Schoenauer (INRIA Futurs), Yann Semet (INRIA Futurs)
|
An efficient memetic, permutation-based evolutionary algorithm for
real-world train timetabling
| null | null | null | null |
cs.AI
| null |
Train timetabling is a difficult and very tightly constrained combinatorial
problem that deals with the construction of train schedules. We focus on the
particular problem of local reconstruction of the schedule following a small
perturbation, seeking minimisation of the total accumulated delay by adapting
times of departure and arrival for each train and allocation of resources
(tracks, routing nodes, etc.). We describe a permutation-based evolutionary
algorithm that relies on a semi-greedy heuristic to gradually reconstruct the
schedule by inserting trains one after the other following the permutation.
This algorithm can be hybridised with ILOG commercial MIP programming tool
CPLEX in a coarse-grained manner: the evolutionary part is used to quickly
obtain a good but suboptimal solution and this intermediate solution is refined
using CPLEX. Experimental results are presented on a large real-world case
involving more than one million variables and 2 million constraints. Results
are surprisingly good as the evolutionary algorithm, alone or hybridised,
produces excellent solutions much faster than CPLEX alone.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 06:06:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schoenauer",
"Marc",
"",
"INRIA Futurs"
],
[
"Semet",
"Yann",
"",
"INRIA Futurs"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0510092
|
Ugo Dal Lago
|
Ugo Dal Lago
|
Context Semantics, Linear Logic and Computational Complexity
|
22 pages
| null | null | null |
cs.LO cs.CC
| null |
We show that context semantics can be fruitfully applied to the quantitative
analysis of proof normalization in linear logic. In particular, context
semantics lets us define the weight of a proof-net as a measure of its inherent
complexity: it is both an upper bound to normalization time (modulo a
polynomial overhead, independently on the reduction strategy) and a lower bound
to the number of steps to normal form (for certain reduction strategies).
Weights are then exploited in proving strong soundness theorems for various
subsystems of linear logic, namely elementary linear logic, soft linear logic
and light linear logic.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 11:05:41 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Feb 2006 10:36:20 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Oct 2006 11:38:54 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Lago",
"Ugo Dal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0510093
|
Tentyukov Mikhail
|
M.Tentyukov, J.A.M.Vermaseren and H.M.Staudenmaier
|
ParFORM: recent development
|
5 pages, 6 Encapsulated postscript figures, LaTeX2e, uses espcrc2.sty
(included). Talk given at ACAT05
| null |
10.1016/j.nima.2005.11.142
| null |
cs.SC
| null |
We report on the status of our project of parallelization of the symbolic
manipulation program FORM. We have now parallel versions of FORM running on
Cluster- or SMP-architectures. These versions can be used to run arbitrary FORM
programs in parallel.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 14:19:41 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Tentyukov",
"M.",
""
],
[
"Vermaseren",
"J. A. M.",
""
],
[
"Staudenmaier",
"H. M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0510094
|
Angel de Vicente
|
Angel de Vicente, Nayra Rodriguez
|
Big Science with a Small Budget: Non-Embarrassingly Parallel
Applications in a Non-Dedicated Network of Workstations
|
4 pages; to appear in Proceedings of ADASS XV
(http://www.adass.org:8080/Conferences/2005/Venue/)
| null | null | null |
cs.DC astro-ph
| null |
Many astronomers and astrophysicists require large computing resources for
their research, which are usually obtained via dedicated (and expensive)
parallel machines. Depending on the type of the problem to be solved, an
alternative solution can be provided by creating dynamically a computer cluster
out of non-dedicated workstations using the Condor High Throughput Computing
System and the Master-Worker (MW) framework. As an example of this we show in
this paper how a radiative transfer application previously coded with MPI is
solved using this solution without the need for dedicated machines.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 14:55:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"de Vicente",
"Angel",
""
],
[
"Rodriguez",
"Nayra",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
null
] |
cs/0510095
|
Aaron Wagner
|
Aaron B. Wagner, Saurabha Tavildar, and Pramod Viswanath
|
Rate Region of the Quadratic Gaussian Two-Encoder Source-Coding Problem
|
Contains additional results. To appear in IEEE Trans. Inf. Theory
| null | null | null |
cs.IT math.IT
| null |
We determine the rate region of the quadratic Gaussian two-encoder
source-coding problem. This rate region is achieved by a simple architecture
that separates the analog and digital aspects of the compression. Furthermore,
this architecture requires higher rates to send a Gaussian source than it does
to send any other source with the same covariance. Our techniques can also be
used to determine the sum rate of some generalizations of this classical
problem. Our approach involves coupling the problem to a quadratic Gaussian
``CEO problem.''
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 18:36:29 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Feb 2006 22:01:32 GMT"
},
{
"version": "v3",
"created": "Sat, 9 Feb 2008 01:33:21 GMT"
}
] | 2008-02-09T00:00:00 |
[
[
"Wagner",
"Aaron B.",
""
],
[
"Tavildar",
"Saurabha",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511001
|
Syed Jafar
|
Syed A. Jafar
|
Capacity with Causal and Non-Causal Side Information - A Unified View
|
This work was presented in part at the IEEE Communication Theory
Workshop, June 12-15, 2005 and at the Forty-third Annual Allerton Conference
on Communication, Control, and Computing, Sept. 28-30, 2005
| null | null | null |
cs.IT math.IT
| null |
We identify the common underlying form of the capacity expression that is
applicable to both cases where causal or non-causal side information is made
available to the transmitter. Using this common form we find that for the
single user channel, the multiple access channel, the degraded broadcast
channel, and the degraded relay channel, the sum capacity with causal and
non-causal side information are identical when all the transmitter side
information is also made available to all the receivers. A genie-aided
outerbound is developed that states that when a genie provides $n$ bits of side
information to a receiver the resulting capacity improvement can not be more
than $n$ bits. Combining these two results we are able to bound the relative
capacity advantage of non-causal side information over causal side information
for both single user as well as various multiple user communication scenarios.
Applications of these capacity bounds are demonstrated through examples of
random access channels. Interestingly, the capacity results indicate that the
excessive MAC layer overheads common in present wireless systems may be avoided
through coding across multiple access blocks. It is also shown that even one
bit of side information at the transmitter can result in unbounded capacity
improvement. As a side, we obtain the sum capacity for a multiple access
channel when the side information available to the transmitter is causal and
possibly correlated to the side information available to the receiver.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 22:30:54 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jun 2006 03:13:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jafar",
"Syed A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511002
|
Alberto Accomazzi
|
Alberto Accomazzi, Michael J. Kurtz, Guenther Eichhorn, Edwin
Henneken, Carolyn S. Grant, Markus Demleitner, Stephen S. Murray
|
Bibliographic Classification using the ADS Databases
|
Latex, 4 pages, 1 Figure. To be published in the Proceedings of the
Conference "Astronomical Data Analysis Software & Systems XV" held October
2-5, 2005, in San Lorenzo de El Escorial, Spain
| null | null | null |
cs.IR cs.DL
| null |
We discuss two techniques used to characterize bibliographic records based on
their similarity to and relationship with the contents of the NASA Astrophysics
Data System (ADS) databases. The first method has been used to classify input
text as being relevant to one or more subject areas based on an analysis of the
frequency distribution of its individual words. The second method has been used
to classify existing records as being relevant to one or more databases based
on the distribution of the papers citing them. Both techniques have proven to
be valuable tools in assigning new and existing bibliographic records to
different disciplines within the ADS databases.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2005 22:34:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Accomazzi",
"Alberto",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Henneken",
"Edwin",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Murray",
"Stephen S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0511003
|
Michael Baer
|
Michael B. Baer
|
Optimal Prefix Codes for Infinite Alphabets with Nonlinear Costs
|
14 pages, 6 figures, accepted to IEEE Trans. Inform. Theory
| null |
10.1109/TIT.2007.915696
| null |
cs.IT cs.DS math.IT
| null |
Let $P = \{p(i)\}$ be a measure of strictly positive probabilities on the set
of nonnegative integers. Although the countable number of inputs prevents usage
of the Huffman algorithm, there are nontrivial $P$ for which known methods find
a source code that is optimal in the sense of minimizing expected codeword
length. For some applications, however, a source code should instead minimize
one of a family of nonlinear objective functions, $\beta$-exponential means,
those of the form $\log_a \sum_i p(i) a^{n(i)}$, where $n(i)$ is the length of
the $i$th codeword and $a$ is a positive constant. Applications of such
minimizations include a novel problem of maximizing the chance of message
receipt in single-shot communications ($a<1$) and a previously known problem of
minimizing the chance of buffer overflow in a queueing system ($a>1$). This
paper introduces methods for finding codes optimal for such exponential means.
One method applies to geometric distributions, while another applies to
distributions with lighter tails. The latter algorithm is applied to Poisson
distributions and both are extended to alphabetic codes, as well as to
minimizing maximum pointwise redundancy. The aforementioned application of
minimizing the chance of buffer overflow is also considered.
|
[
{
"version": "v1",
"created": "Tue, 1 Nov 2005 07:00:11 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Dec 2006 02:20:18 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Nov 2007 04:21:19 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511004
|
Marc Schoenauer
|
Aguston E. Eiben (VU), Marc Schoenauer (FRACTALES)
|
Evolutionary Computing
| null | null | null | null |
cs.AI
| null |
Evolutionary computing (EC) is an exciting development in Computer Science.
It amounts to building, applying and studying algorithms based on the Darwinian
principles of natural selection. In this paper we briefly introduce the main
concepts behind evolutionary computing. We present the main components all
evolutionary algorithms (EA), sketch the differences between different types of
EAs and survey application areas ranging from optimization, modeling and
simulation to entertainment.
|
[
{
"version": "v1",
"created": "Tue, 1 Nov 2005 19:46:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Eiben",
"Aguston E.",
"",
"VU"
],
[
"Schoenauer",
"Marc",
"",
"FRACTALES"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0511005
|
Santo Fortunato Dr
|
Santo Fortunato, Alessandro Flammini, Filippo Menczer, Alessandro
Vespignani
|
The egalitarian effect of search engines
|
9 pages, 8 figures, 2 appendices. The final version of this e-print
has been published on the Proc. Natl. Acad. Sci. USA 103(34), 12684-12689
(2006), http://www.pnas.org/cgi/content/abstract/103/34/12684
| null |
10.1073/pnas.0605525103
| null |
cs.CY cs.IR physics.soc-ph
| null |
Search engines have become key media for our scientific, economic, and social
activities by enabling people to access information on the Web in spite of its
size and complexity. On the down side, search engines bias the traffic of users
according to their page-ranking strategies, and some have argued that they
create a vicious cycle that amplifies the dominance of established and already
popular sites. We show that, contrary to these prior claims and our own
intuition, the use of search engines actually has an egalitarian effect. We
reconcile theoretical arguments with empirical evidence showing that the
combination of retrieval by search engines and search behavior by users
mitigates the attraction of popular pages, directing more traffic toward less
popular sites, even in comparison to what would be expected from users randomly
surfing the Web.
|
[
{
"version": "v1",
"created": "Tue, 1 Nov 2005 22:33:48 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Aug 2006 21:23:55 GMT"
}
] | 2009-02-19T00:00:00 |
[
[
"Fortunato",
"Santo",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
],
[
"Vespignani",
"Alessandro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0511006
|
David Nowak
|
Jean Goubault-Larrecq, Slawomir Lasota and David Nowak
|
Logical Relations for Monadic Types
|
83 pages
|
Mathematical Structures in Computer Science, 18(6):1169-1217,
December 2008
|
10.1017/S0960129508007172
| null |
cs.LO
| null |
Logical relations and their generalizations are a fundamental tool in proving
properties of lambda-calculi, e.g., yielding sound principles for observational
equivalence. We propose a natural notion of logical relations able to deal with
the monadic types of Moggi's computational lambda-calculus. The treatment is
categorical, and is based on notions of subsconing, mono factorization systems,
and monad morphisms. Our approach has a number of interesting applications,
including cases for lambda-calculi with non-determinism (where being in logical
relation means being bisimilar), dynamic name creation, and probabilistic
systems.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2005 01:45:56 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Mar 2008 06:15:56 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Goubault-Larrecq",
"Jean",
""
],
[
"Lasota",
"Slawomir",
""
],
[
"Nowak",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0511007
|
Alain Barrat
|
Jos\'e Ignacio Alvarez-Hamelin (LPT), Luca Dall'Asta (LPT), Alain
Barrat (LPT), Alessandro Vespignani
|
K-core decomposition of Internet graphs: hierarchies, self-similarity
and measurement biases
| null |
Networks and Heterogeneous Media 3 (2008) 371
| null | null |
cs.NI cond-mat.stat-mech
| null |
We consider the $k$-core decomposition of network models and Internet graphs
at the autonomous system (AS) level. The $k$-core analysis allows to
characterize networks beyond the degree distribution and uncover structural
properties and hierarchies due to the specific architecture of the system. We
compare the $k$-core structure obtained for AS graphs with those of several
network models and discuss the differences and similarities with the real
Internet architecture. The presence of biases and the incompleteness of the
real maps are discussed and their effect on the $k$-core analysis is assessed
with numerical experiments simulating biased exploration on a wide range of
network models. We find that the $k$-core analysis provides an interesting
characterization of the fluctuations and incompleteness of maps as well as
information helping to discriminate the original underlying structure.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2005 08:06:51 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Nov 2005 09:18:47 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Apr 2008 06:30:36 GMT"
},
{
"version": "v4",
"created": "Wed, 16 Apr 2008 06:10:41 GMT"
}
] | 2008-04-16T00:00:00 |
[
[
"Alvarez-Hamelin",
"José Ignacio",
"",
"LPT"
],
[
"Dall'Asta",
"Luca",
"",
"LPT"
],
[
"Barrat",
"Alain",
"",
"LPT"
],
[
"Vespignani",
"Alessandro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
cs/0511008
|
Yuming Jiang
|
Yuming Jiang
|
Analysis of Stochastic Service Guarantees in Communication Networks: A
Basic Calculus
| null | null | null | null |
cs.PF cs.IT cs.NI math.IT
| null |
A basic calculus is presented for stochastic service guarantee analysis in
communication networks. Central to the calculus are two definitions,
maximum-(virtual)-backlog-centric (m.b.c) stochastic arrival curve and
stochastic service curve, which respectively generalize arrival curve and
service curve in the deterministic network calculus framework. With m.b.c
stochastic arrival curve and stochastic service curve, various basic results
are derived under the (min, +) algebra for the general case analysis, which are
crucial to the development of stochastic network calculus. These results
include (i) superposition of flows, (ii) concatenation of servers, (iii) output
characterization, (iv) per-flow service under aggregation, and (v) stochastic
backlog and delay guarantees. In addition, to perform independent case
analysis, stochastic strict server is defined, which uses an ideal service
process and an impairment process to characterize a server. The concept of
stochastic strict server not only allows us to improve the basic results (i) --
(v) under the independent case, but also provides a convenient way to find the
stochastic service curve of a serve. Moreover, an approach is introduced to
find the m.b.c stochastic arrival curve of a flow and the stochastic service
curve of a server.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2005 14:23:48 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Jiang",
"Yuming",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511009
|
Ioannis Kontoyiannis
|
Ioannis Kontoyiannis (Athens U of Econ & Business) and Rami Zamir
(Tel-Aviv University)
|
Mismatched codebooks and the role of entropy-coding in lossy data
compression
|
35 pages, 37 references, no figures. Submitted to IEEE Transactions
on Information Theory
| null | null | null |
cs.IT math.IT math.PR
| null |
We introduce a universal quantization scheme based on random coding, and we
analyze its performance. This scheme consists of a source-independent random
codebook (typically_mismatched_ to the source distribution), followed by
optimal entropy-coding that is_matched_ to the quantized codeword distribution.
A single-letter formula is derived for the rate achieved by this scheme at a
given distortion, in the limit of large codebook dimension. The rate reduction
due to entropy-coding is quantified, and it is shown that it can be arbitrarily
large. In the special case of "almost uniform" codebooks (e.g., an i.i.d.
Gaussian codebook with large variance) and difference distortion measures, a
novel connection is drawn between the compression achieved by the present
scheme and the performance of "universal" entropy-coded dithered lattice
quantizers. This connection generalizes the "half-a-bit" bound on the
redundancy of dithered lattice quantizers. Moreover, it demonstrates a strong
notion of universality where a single "almost uniform" codebook is near-optimal
for_any_ source and_any_ difference distortion measure.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2005 14:12:04 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kontoyiannis",
"Ioannis",
"",
"Athens U of Econ & Business"
],
[
"Zamir",
"Rami",
"",
"Tel-Aviv University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0511010
|
Nadir Kiyanclar
|
Nadir Kiyanclar
|
A Survey of Virtualization Techniques Focusing on Secure On-Demand
Cluster Computing
| null | null | null | null |
cs.OS
| null |
Virtualization, a technique once used to multiplex the resources of
high-priced mainframe hardware, is seeing a resurgence in applicability with
the increasing computing power of commodity computers. By inserting a layer of
software between the machine and traditional operating systems, this technology
allows access to a shared computing medium in a manner that is secure,
resource-controlled, and efficient. These properties are attractive in the
field of on-demand computing, where the fine-grained subdivision of resources
provided by virtualized systems allows potentially higher utilization of
computing resources.
It this work, we survey a number of virtual machine systems with the goal of
finding an appropriate candidate to serve as the basis for the On-Demand Secure
Cluster Computing project at the National Center for Supercomputing
Applications. Contenders are reviewed on a number of desirable properties
including portability and security. We conclude with a comparison and
justification of our choice.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2005 19:52:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kiyanclar",
"Nadir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0511011
|
Hamilton Link
|
Hamilton Link and Jared Saia and Terran Lane and Randall A. LaViolette
|
The Impact of Social Networks on Multi-Agent Recommender Systems
|
12 pages, 4 figures. Published in the Proceedings of the Workshop on
Cooperative Multi-Agent Learning (ECML/PKDD '05). Resubmitted to fix
citations and metadata
| null | null | null |
cs.LG cs.CC cs.MA
| null |
Awerbuch et al.'s approach to distributed recommender systems (DRSs) is to
have agents sample products at random while randomly querying one another for
the best item they have found; we improve upon this by adding a communication
network. Agents can only communicate with their immediate neighbors in the
network, but neighboring agents may or may not represent users with common
interests. We define two network structures: in the ``mailing-list model,''
agents representing similar users form cliques, while in the ``word-of-mouth
model'' the agents are distributed randomly in a scale-free network (SFN). In
both models, agents tell their neighbors about satisfactory products as they
are found. In the word-of-mouth model, knowledge of items propagates only
through interested agents, and the SFN parameters affect the system's
performance. We include a summary of our new results on the character and
parameters of random subgraphs of SFNs, in particular SFNs with power-law
degree distributions down to minimum degree 1. These networks are not as
resilient as Cohen et al. originally suggested. In the case of the widely-cited
``Internet resilience'' result, high failure rates actually lead to the
orphaning of half of the surviving nodes after 60% of the network has failed
and the complete disintegration of the network at 90%. We show that given an
appropriate network, the communication network reduces the number of sampled
items, the number of messages sent, and the amount of ``spam.'' We conclude
that in many cases DRSs will be useful for sharing information in a multi-agent
learning system.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2005 23:44:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Link",
"Hamilton",
""
],
[
"Saia",
"Jared",
""
],
[
"Lane",
"Terran",
""
],
[
"LaViolette",
"Randall A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0511012
|
Hamilton Link
|
Hamilton Link and Randall A. LaViolette and Jared Saia and Terran Lane
|
Parameters Affecting the Resilience of Scale-Free Networks to Random
Failures
|
12 pages, 7 figures. Submitting to Phys. Rev. Lett
| null | null | null |
cs.NI cs.AR cs.MA
| null |
It is commonly believed that scale-free networks are robust to massive
numbers of random node deletions. For example, Cohen et al. study scale-free
networks including some which approximate the measured degree distribution of
the Internet. Their results suggest that if each node in this network failed
independently with probability 0.99, the remaining network would continue to
have a giant component. In this paper, we show that a large and important
subclass of scale-free networks are not robust to massive numbers of random
node deletions for practical purposes. In particular, we study finite
scale-free networks which have minimum node degree of 1 and a power-law degree
distribution beginning with nodes of degree 1 (power-law networks). We show
that, in a power-law network approximating the Internet's reported
distribution, when the probability of deletion of each node is 0.5 only about
25% of the surviving nodes in the network remain connected in a giant
component, and the giant component does not persist beyond a critical failure
rate of 0.9. The new result is partially due to improved analytical
accommodation of the large number of degree-0 nodes that result after node
deletions. Our results apply to finite power-law networks with a wide range of
power-law exponents, including Internet-like networks. We give both analytical
and empirical evidence that such networks are not generally robust to massive
random node deletions.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2005 22:22:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Link",
"Hamilton",
""
],
[
"LaViolette",
"Randall A.",
""
],
[
"Saia",
"Jared",
""
],
[
"Lane",
"Terran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0511013
|
Zengyou He
|
Zengyou He, Xiaofei Xu, Shengchun Deng
|
K-ANMI: A Mutual Information Based Clustering Algorithm for Categorical
Data
|
18 pages
| null | null |
Tr-2004-03
|
cs.AI cs.DB
| null |
Clustering categorical data is an integral part of data mining and has
attracted much attention recently. In this paper, we present k-ANMI, a new
efficient algorithm for clustering categorical data. The k-ANMI algorithm works
in a way that is similar to the popular k-means algorithm, and the goodness of
clustering in each step is evaluated using a mutual information based criterion
(namely, Average Normalized Mutual Information-ANMI) borrowed from cluster
ensemble. Experimental results on real datasets show that k-ANMI algorithm is
competitive with those state-of-art categorical data clustering algorithms with
respect to clustering accuracy.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2005 01:18:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"He",
"Zengyou",
""
],
[
"Xu",
"Xiaofei",
""
],
[
"Deng",
"Shengchun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0511014
|
Kumar Neeraj Verma
|
Helmut Seidl, Kumar Neeraj Verma
|
Flat and One-Variable Clauses: Complexity of Verifying Cryptographic
Protocols with Single Blind Copying
|
Long version of paper presented at LPAR 2004
| null | null | null |
cs.LO cs.CR
| null |
Cryptographic protocols with single blind copying were defined and modeled by
Comon and Cortier using the new class $\mathcal C$ of first order clauses. They
showed its satisfiability problem to be in 3-DEXPTIME. We improve this result
by showing that satisfiability for this class is NEXPTIME-complete, using new
resolution techniques. We show satisfiability to be DEXPTIME-complete if
clauses are Horn, which is what is required for modeling cryptographic
protocols. While translation to Horn clauses only gives a DEXPTIME upper bound
for the secrecy problem for these protocols, we further show that this secrecy
problem is actually DEXPTIME-complete.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2005 13:40:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Seidl",
"Helmut",
""
],
[
"Verma",
"Kumar Neeraj",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0511015
|
Prashant Singh
|
Prashant
|
Towards a Hierarchical Model of Consciousness, Intelligence, Mind and
Body
|
12 pages, 2 figures
| null | null | null |
cs.AI
| null |
This article is taken out.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2005 16:28:05 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 00:00:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Prashant",
"",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0511016
|
Santo Fortunato Dr
|
Santo Fortunato, Marian Boguna, Alessandro Flammini, Filippo Menczer
|
How to make the top ten: Approximating PageRank from in-degree
|
8 pages, 7 figures, 2 tables
| null | null | null |
cs.IR physics.soc-ph
| null |
PageRank has become a key element in the success of search engines, allowing
to rank the most important hits in the top screen of results. One key aspect
that distinguishes PageRank from other prestige measures such as in-degree is
its global nature. From the information provider perspective, this makes it
difficult or impossible to predict how their pages will be ranked. Consequently
a market has emerged for the optimization of search engine results. Here we
study the accuracy with which PageRank can be approximated by in-degree, a
local measure made freely available by search engines. Theoretical and
empirical analyses lead to conclude that given the weak degree correlations in
the Web link graph, the approximation can be relatively accurate, giving
service and information providers an effective new marketing tool.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:01:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fortunato",
"Santo",
""
],
[
"Boguna",
"Marian",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0511017
|
Gus Gutoski
|
Gus Gutoski
|
Short Quantum Games
|
MSc thesis, 79 pages single-spaced
| null | null | null |
cs.CC quant-ph
| null |
In this thesis we introduce quantum refereed games, which are quantum
interactive proof systems with two competing provers. We focus on a restriction
of this model that we call "short quantum games" and we prove an upper bound
and a lower bound on the expressive power of these games.
For the lower bound, we prove that every language having an ordinary quantum
interactive proof system also has a short quantum game. An important part of
this proof is the establishment of a quantum measurement that reliably
distinguishes between quantum states chosen from disjoint convex sets.
For the upper bound, we show that certain types of quantum refereed games,
including short quantum games, are decidable in deterministic exponential time
by supplying a separation oracle for use with the ellipsoid method for convex
feasibility.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:00:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gutoski",
"Gus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0511018
|
Prashant Singh
|
Prashant
|
From General Systems to Soft Systems to Soft Computing: Applications for
Large and Complex Real World Systems
|
9 pages
| null | null | null |
cs.SE
| null |
This is article is taken out.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2005 23:29:55 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jan 2007 00:00:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Prashant",
"",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0511019
|
Young-Han Kim
|
Young-Han Kim
|
A Counterexample to Cover's 2P Conjecture on Gaussian Feedback Capacity
|
2 pages, submitted to IEEE Transactions on Information Theory
| null |
10.1109/TIT.2006.878167
| null |
cs.IT math.IT
| null |
We provide a counterexample to Cover's conjecture that the feedback capacity
$C_\textrm{FB}$ of an additive Gaussian noise channel under power constraint
$P$ be no greater than the nonfeedback capacity $C$ of the same channel under
power constraint $2P$, i.e., $C_\textrm{FB}(P) \le C(2P)$.
|
[
{
"version": "v1",
"created": "Fri, 4 Nov 2005 01:22:16 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Kim",
"Young-Han",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511020
|
David P{\l}aneta S
|
David S. P{\l}aneta
|
Pbit and other list sorting algorithms
|
25 pages, 4 tables
|
Cornell University Computing and Information Science Technical
Reports, 2006
| null |
TR2006-2013
|
cs.DS
| null |
Pbit, besides its simplicity, is definitely the fastest list sorting
algorithm. It considerably surpasses all already known methods. Among many
advantages, it is stable, linear and be made to run in place. I will compare
Pbit with algorithm described by Donald E. Knuth in the third volume of ''The
Art of Computer Programming'' and other (QuickerSort, MergeSort) list sorting
algorithms.
|
[
{
"version": "v1",
"created": "Fri, 4 Nov 2005 01:52:02 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Jan 2006 23:48:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Płaneta",
"David S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0511021
|
Thorsten Theobald
|
Ravi Kannan and Thorsten Theobald
|
Games of fixed rank: A hierarchy of bimatrix games
|
13 pages
| null | null | null |
cs.GT math.CO
| null |
We propose a new hierarchical approach to understand the complexity of the
open problem of computing a Nash equilibrium in a bimatrix game. Specifically,
we investigate a hierarchy of bimatrix games $(A,B)$ which results from
restricting the rank of the matrix $A+B$ to be of fixed rank at most $k$. For
every fixed $k$, this class strictly generalizes the class of zero-sum games,
but is a very special case of general bimatrix games. We show that even for
$k=1$ the set of Nash equilibria of these games can consist of an arbitrarily
large number of connected components. While the question of exact polynomial
time algorithms to find a Nash equilibrium remains open for games of fixed
rank, we can provide polynomial time algorithms for finding an
$\epsilon$-approximation.
|
[
{
"version": "v1",
"created": "Fri, 4 Nov 2005 10:29:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kannan",
"Ravi",
""
],
[
"Theobald",
"Thorsten",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0511022
|
Emanuel Diamant
|
Emanuel Diamant
|
Does a Plane Imitate a Bird? Does Computer Vision Have to Follow
Biological Paradigms?
|
Proceedings of the 1st International Symposium on Brain, Vision, and
Artificial Intelligence, 19-21 October 2005, Naples, Italy
|
LNCS, vol. 3704, pp. 108-115, 2005, Springer Verlag Berlin
Heidelberg 2005
| null | null |
cs.NE
| null |
We posit a new paradigm for image information processing. For the last 25
years, this task was usually approached in the frame of Treisman's two-stage
paradigm [1]. The latter supposes an unsupervised, bottom-up directed process
of preliminary information pieces gathering at the lower processing stages and
a supervised, top-down directed process of information pieces binding and
grouping at the higher stages. It is acknowledged that these sub-processes
interact and intervene between them in a tricky and a complicated manner.
Notwithstanding the prevalence of this paradigm in biological and computer
vision, we nevertheless propose to replace it with a new one, which we would
like to designate as a two-part paradigm. In it, information contained in an
image is initially extracted in an independent top-down manner by one part of
the system, and then it is examined and interpreted by another, separate system
part. We argue that the new paradigm seems to be more plausible than its
forerunner. We provide evidence from human attention vision studies and
insights of Kolmogorov's complexity theory to support our arguments. We also
provide some reasons in favor of separate image interpretation issues.
|
[
{
"version": "v1",
"created": "Fri, 4 Nov 2005 15:08:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Diamant",
"Emanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0511023
|
Nathalie Bertrand
|
Christel Baier, Nathalie Bertrand and Philippe Schnoebelen
|
Verifying nondeterministic probabilistic channel systems against
$\omega$-regular linear-time properties
|
39 pages
|
ACM Trans. Computational Logic 9(1), 2007
|
10.1145/1297658.1297663
| null |
cs.LO
| null |
Lossy channel systems (LCSs) are systems of finite state automata that
communicate via unreliable unbounded fifo channels. In order to circumvent the
undecidability of model checking for nondeterministic
LCSs, probabilistic models have been introduced, where it can be decided
whether a linear-time property holds almost surely. However, such fully
probabilistic systems are not a faithful model of nondeterministic protocols.
We study a hybrid model for LCSs where losses of messages are seen as faults
occurring with some given probability, and where the internal behavior of the
system remains nondeterministic. Thus the semantics is in terms of
infinite-state Markov decision processes. The purpose of this article is to
discuss the decidability of linear-time properties formalized by formulas of
linear temporal logic (LTL). Our focus is on the qualitative setting where one
asks, e.g., whether a LTL-formula holds almost surely or with zero probability
(in case the formula describes the bad behaviors). Surprisingly, it turns out
that -- in contrast to finite-state Markov decision processes -- the
satisfaction relation for LTL formulas depends on the chosen type of schedulers
that resolve the nondeterminism. While all variants of the qualitative LTL
model checking problem for the full class of history-dependent schedulers are
undecidable, the same questions for finite-memory scheduler can be solved
algorithmically. However, the restriction to reachability properties and
special kinds of recurrent reachability properties yields decidable
verification problems for the full class of schedulers, which -- for this
restricted class of properties -- are as powerful as finite-memory schedulers,
or even a subclass of them.
|
[
{
"version": "v1",
"created": "Fri, 4 Nov 2005 17:03:45 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Nov 2005 16:58:14 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Apr 2006 14:43:47 GMT"
}
] | 2012-03-19T00:00:00 |
[
[
"Baier",
"Christel",
""
],
[
"Bertrand",
"Nathalie",
""
],
[
"Schnoebelen",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0511024
|
Bourgade Paul
|
Bourgade Paul, Croissant Olivier
|
Heat kernel expansion for a family of stochastic volatility models :
delta-geometry
| null | null | null | null |
cs.CE
| null |
In this paper, we study a family of stochastic volatility processes; this
family features a mean reversion term for the volatility and a double CEV-like
exponent that generalizes SABR and Heston's models. We derive approximated
closed form formulas for the digital prices, the local and implied
volatilities. Our formulas are efficient for small maturities.
Our method is based on differential geometry, especially small time
diffusions on riemanian spaces. This geometrical point of view can be extended
to other processes, and is very accurate to produce variate smiles for small
maturities and small moneyness.
|
[
{
"version": "v1",
"created": "Fri, 4 Nov 2005 18:31:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Paul",
"Bourgade",
""
],
[
"Olivier",
"Croissant",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0511025
|
Riccardo Pucella
|
James Cheney
|
Logic Column 14: Nominal Logic and Abstract Syntax
|
24 pages
|
SIGACT News 36 (4), pp. 47-69, 2005
| null | null |
cs.LO
| null |
Formalizing syntactic proofs of properties of logics, programming languages,
security protocols, and other formal systems is a significant challenge, in
large part because of the obligation to handle name-binding correctly. We
present an approach called nominal abstract syntax that has attracted
considerable interest since its introduction approximately six years ago. After
an overview of other approaches, we describe nominal abstract syntax and
nominal logic, a logic for reasoning about nominal abstract syntax. We also
discuss applications of nominal techniques to programming, automated reasoning,
and identify some future directions.
|
[
{
"version": "v1",
"created": "Sat, 5 Nov 2005 02:47:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cheney",
"James",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0511026
|
Aditya Mahajan
|
Aditya Mahajan, Demosthenis Teneketzis
|
A Decision Theoretic Framework for Real-Time Communication
|
10 pages, 1 figure: Forty Third Allerton Conference of Control
Communication and Computing
| null | null | null |
cs.IT math.IT
| null |
We consider a communication system in which the outputs of a Markov source
are encoded and decoded in \emph{real-time} by a finite memory receiver, and
the distortion measure does not tolerate delays. The objective is to choose
designs, i.e. real-time encoding, decoding and memory update strategies that
minimize a total expected distortion measure. This is a dynamic team problem
with non-classical information structure [Witsenhausen:1971]. We use the
structural results of [Teneketzis:2004] to develop a sequential decomposition
for the finite and infinite horizon problems. Thus, we obtain a systematic
methodology for the determination of jointly optimal encoding decoding and
memory update strategies for real-time point-to-point communication systems.
|
[
{
"version": "v1",
"created": "Sun, 6 Nov 2005 02:34:34 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mahajan",
"Aditya",
""
],
[
"Teneketzis",
"Demosthenis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511027
|
Stephen Luttrell
|
Stephen Luttrell
|
Discrete Network Dynamics. Part 1: Operator Theory
|
39 pages, 5 figures
| null | null | null |
cs.NE
| null |
An operator algebra implementation of Markov chain Monte Carlo algorithms for
simulating Markov random fields is proposed. It allows the dynamics of networks
whose nodes have discrete state spaces to be specified by the action of an
update operator that is composed of creation and annihilation operators. This
formulation of discrete network dynamics has properties that are similar to
those of a quantum field theory of bosons, which allows reuse of many
conceptual and theoretical structures from QFT. The equilibrium behaviour of
one of these generalised MRFs and of the adaptive cluster expansion network
(ACEnet) are shown to be equivalent, which provides a way of unifying these two
theories.
|
[
{
"version": "v1",
"created": "Mon, 7 Nov 2005 19:09:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Luttrell",
"Stephen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0511028
|
Hyundong Shin
|
Hyundong Shin and Moe Z. Win
|
MIMO Diversity in the Presence of Double Scattering
|
Revised for publication in the IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
| null |
The potential benefits of multiple-antenna systems may be limited by two
types of channel degradations rank deficiency and spatial fading correlation of
the channel. In this paper, we assess the effects of these degradations on the
diversity performance of multiple-input multiple-output (MIMO) systems, with an
emphasis on orthogonal space-time block codes, in terms of the symbol error
probability, the effective fading figure (EFF), and the capacity at low
signal-to-noise ratio (SNR). In particular, we consider a general family of
MIMO channels known as double-scattering channels, which encompasses a variety
of propagation environments from independent and identically distributed
Rayleigh to degenerate keyhole or pinhole cases by embracing both
rank-deficient and spatial correlation effects. It is shown that a MIMO system
with $n_T$ transmit and $n_R$ receive antennas achieves the diversity of order
$\frac{\n_T n_S n_R}{\max(n_T,n_S,n_R)}$ in a double-scattering channel with
$n_S$ effective scatterers. We also quantify the combined effect of the spatial
correlation and the lack of scattering richness on the EFF and the low-SNR
capacity in terms of the correlation figures of transmit, receive, and
scatterer correlation matrices. We further show the monotonicity properties of
these performance measures with respect to the strength of spatial correlation,
characterized by the eigenvalue majorization relations of the correlation
matrices.
|
[
{
"version": "v1",
"created": "Sun, 6 Nov 2005 21:31:26 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Nov 2005 04:00:31 GMT"
},
{
"version": "v3",
"created": "Thu, 31 Aug 2006 08:35:42 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shin",
"Hyundong",
""
],
[
"Win",
"Moe Z.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511029
|
Rasika Perera Mr
|
Rasika R Perera, Tony S Pollock, Thushara D Abhayapala
|
Non-coherent Rayleigh fading MIMO channels: Capacity Supremum
|
08 pages, 5 figures, IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
This paper investigates the limits of information transfer over a fast
Rayleigh fading MIMO channel, where neither the transmitter nor the receiver
has the knowledge of the channel state information (CSI) except the fading
statistics. We develop a scalar channel model due to absence of the phase
information in non-coherent Rayleigh fading and derive a capacity supremum with
the number of receive antennas at any signal to noise ratio (SNR) using
Lagrange optimisation. Also, we conceptualise the discrete nature of the
optimal input distribution by posing the optimisation on the channel mutual
information for $N$ discrete inputs. Furthermore, we derive an expression for
the asymptotic capacity when the input power is large, and compare with the
existing capacity results when the receiver is equipped with a large number of
antennas.
|
[
{
"version": "v1",
"created": "Mon, 7 Nov 2005 03:42:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Perera",
"Rasika R",
""
],
[
"Pollock",
"Tony S",
""
],
[
"Abhayapala",
"Thushara D",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0511030
|
Gregory Gutin
|
G. Gutin, A. Rafiey, S. Szeider, A. Yeo
|
The Linear Arrangement Problem Parameterized Above Guaranteed Value
| null | null | null | null |
cs.DS cs.CC
| null |
A linear arrangement (LA) is an assignment of distinct integers to the
vertices of a graph. The cost of an LA is the sum of lengths of the edges of
the graph, where the length of an edge is defined as the absolute value of the
difference of the integers assigned to its ends. For many application one hopes
to find an LA with small cost. However, it is a classical NP-complete problem
to decide whether a given graph $G$ admits an LA of cost bounded by a given
integer. Since every edge of $G$ contributes at least one to the cost of any
LA, the problem becomes trivially fixed-parameter tractable (FPT) if
parameterized by the upper bound of the cost. Fernau asked whether the problem
remains FPT if parameterized by the upper bound of the cost minus the number of
edges of the given graph; thus whether the problem is FPT ``parameterized above
guaranteed value.'' We answer this question positively by deriving an algorithm
which decides in time $O(m+n+5.88^k)$ whether a given graph with $m$ edges and
$n$ vertices admits an LA of cost at most $m+k$ (the algorithm computes such an
LA if it exists). Our algorithm is based on a procedure which generates a
problem kernel of linear size in linear time for a connected graph $G$. We also
prove that more general parameterized LA problems stated by Serna and Thilikos
are not FPT, unless P=NP.
|
[
{
"version": "v1",
"created": "Mon, 7 Nov 2005 17:47:55 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Dec 2005 18:26:42 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Mar 2006 10:00:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Szeider",
"S.",
""
],
[
"Yeo",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0511031
|
Prashant Singh
|
Prashant
|
Internet Protocol Black Holes: A E-Security Threat
| null | null | null | null |
cs.NI
| null |
The paper is taken out.
|
[
{
"version": "v1",
"created": "Tue, 8 Nov 2005 00:14:06 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2007 17:05:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Prashant",
"",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.