id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0511032
Yangli Hector Yee
Yang Li Hector Yee (Cornell University)
Spatiotemporal sensistivity and visual attention for efficient rendering of dynamic environments
null
ACM Transactions on Graphics, 20(1), January 2001
null
null
cs.GR cs.CV
null
We present a method to accelerate global illumination computation in dynamic environments by taking advantage of limitations of the human visual system. A model of visual attention is used to locate regions of interest in a scene and to modulate spatiotemporal sensitivity. The method is applied in the form of a spatiotemporal error tolerance map. Perceptual acceleration combined with good sampling protocols provide a global illumination solution feasible for use in animation. Results indicate an order of magnitude improvement in computational speed. The method is adaptable and can also be used in image-based rendering, geometry level of detail selection, realistic image synthesis, video telephony and video compression.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 14:40:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Yee", "Yang Li Hector", "", "Cornell University" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0511033
Martin Ziegler
Martin Ziegler
Fast (Multi-)Evaluation of Linearly Recurrent Sequences: Improvements and Applications
null
null
null
null
cs.SC
null
For a linearly recurrent vector sequence P[n+1] = A(n) * P[n], consider the problem of calculating either the n-th term P[n] or L<=n arbitrary terms P[n_1],...,P[n_L], both for the case of constant coefficients A(n)=A and for a matrix A(n) with entries polynomial in n. We improve and extend known algorithms for this problem and present new applications for it. Specifically it turns out that for instance * any family (p_n) of classical orthogonal polynomials admits evaluation at given x within O(n^{1/2} log n) operations INDEPENDENT of the family (p_n) under consideration. * For any L indices n_1,...,n_L <= n, the values p_{n_i}(x) can be calculated simultaneously using O(n^{1/2} log n + L log(n/L)) arithmetic operations; again this running time bound holds uniformly. * Every hypergeometric (or, more generally, holonomic) function admits approximate evaluation up to absolute error e>0 within O((log(1/e)^{1/2} loglog(1/e)) -- as opposed to O(log(1/e)) -- arithmetic steps. * Given m and a polynomial p of degree d over a field of characteristic zero, the coefficient of p^m to term X^n can be computed within O(d^2 M(n^{1/2})) steps where M(n) denotes the cost of multiplying two degree-n polynomials. * The same time bound holds for the joint calculation of any L<=n^{1/2} desired coefficients of p^m to terms X^{n_i}, n_1,...,n_L <= n.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 16:46:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Ziegler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0511034
Stanislav Bulygin V.
Stanislav Bulygin
Generalized Hermitian Codes over GF(2^r)
null
null
null
null
cs.DM
null
In this paper we studied generalization of Hermitian function field proposed by A.Garcia and H.Stichtenoth. We calculated a Weierstrass semigroup of the point at infinity for the case q=2, r>=3. It turned out that unlike Hermitian case, we have already three generators for the semigroup. We then applied this result to codes, constructed on generalized Hermitian function fields. Further, we applied results of C.Kirfel and R.Pellikaan to estimating a Feng-Rao designed distance for GH-codes, which improved on Goppa designed distance. Next, we studied the question of codes dual to GH-codes. We identified that the duals are also GH-codes and gave an explicit formula. We concluded with some computational results. In particular, a new record-giving [32,16,>=12]-code over GF(8) was presented.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 19:29:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Bulygin", "Stanislav", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0511035
M. Angeles Serrano
M. Angeles Serrano, Ana Maguitman, Marian Boguna, Santo Fortunato, Alessandro Vespignani
Decoding the structure of the WWW: facts versus sampling biases
10 pages 19 figures. Values in Table 2 and Figure 1 corrected. Figure 7 updated. Minor changes in the text
ACM Transactions on the Web (TWEB) 1, 10 (2007)
null
null
cs.NI cond-mat.dis-nn physics.soc-ph
null
The understanding of the immense and intricate topological structure of the World Wide Web (WWW) is a major scientific and technological challenge. This has been tackled recently by characterizing the properties of its representative graphs in which vertices and directed edges are identified with web-pages and hyperlinks, respectively. Data gathered in large scale crawls have been analyzed by several groups resulting in a general picture of the WWW that encompasses many of the complex properties typical of rapidly evolving networks. In this paper, we report a detailed statistical analysis of the topological properties of four different WWW graphs obtained with different crawlers. We find that, despite the very large size of the samples, the statistical measures characterizing these graphs differ quantitatively, and in some cases qualitatively, depending on the domain analyzed and the crawl used for gathering the data. This spurs the issue of the presence of sampling biases and structural differences of Web crawls that might induce properties not representative of the actual global underlying graph. In order to provide a more accurate characterization of the Web graph and identify observables which are clearly discriminating with respect to the sampling process, we study the behavior of degree-degree correlation functions and the statistics of reciprocal connections. The latter appears to enclose the relevant correlations of the WWW graph and carry most of the topological information of theWeb. The analysis of this quantity is also of major interest in relation to the navigability and searchability of the Web.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 20:18:55 GMT" }, { "version": "v2", "created": "Tue, 14 Feb 2006 16:48:42 GMT" } ]
2008-01-23T00:00:00
[ [ "Serrano", "M. Angeles", "" ], [ "Maguitman", "Ana", "" ], [ "Boguna", "Marian", "" ], [ "Fortunato", "Santo", "" ], [ "Vespignani", "Alessandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0511036
Mei Chen
Mei Chen, Teng Li and Oliver M. Collins
A Capacity Achieving and Low Complexity Multilevel Coding Scheme for ISI Channels
10 pages, 7 figures, 43rd Anual Allerton Conference on Communication, Control and Computing
null
null
null
cs.IT math.IT
null
We propose a computationally efficient multilevel coding scheme to achieve the capacity of an ISI channel using layers of binary inputs. The transmitter employs multilevel coding with linear mapping. The receiver uses multistage decoding where each stage performs a separate linear minimum mean square error (LMMSE) equalization and decoding. The optimality of the scheme is due to the fact that the LMMSE equalizer is information lossless in an ISI channel when signal to noise ratio is sufficiently low. The computational complexity is low and scales linearly with the length of the channel impulse response and the number of layers. The decoder at each layer sees an equivalent AWGN channel, which makes coding straightforward.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 22:26:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Mei", "" ], [ "Li", "Teng", "" ], [ "Collins", "Oliver M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511037
Mei Chen
Mei Chen and Oliver M. Collins
Trellis Pruning for Peak-to-Average Power Ratio Reduction
5 pages, 10 figures, 2005 IEEE International Symposium on Information Theory
null
null
null
cs.IT math.IT
null
This paper introduces a new trellis pruning method which uses nonlinear convolutional coding for peak-to-average power ratio (PAPR) reduction of filtered QPSK and 16-QAM modulations. The Nyquist filter is viewed as a convolutional encoder that controls the analog waveforms of the filter output directly. Pruning some edges of the encoder trellis can effectively reduce the PAPR. The only tradeoff is a slightly lower channel capacity and increased complexity. The paper presents simulation results of the pruning action and the resulting PAPR, and also discusses the decoding algorithm and the capacity of the filtered and pruned QPSK and 16-QAM modulations on the AWGN channel. Simulation results show that the pruning method reduces the PAPR significantly without much damage to capacity.
[ { "version": "v1", "created": "Tue, 8 Nov 2005 22:29:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Mei", "" ], [ "Collins", "Oliver M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511038
Pascal Hitzler
Pascal Hitzler and Sibylle Schwarz
Towards a unified theory of logic programming semantics: Level mapping characterizations of selector generated models
17 pages
null
null
null
cs.AI cs.LO
null
Currently, the variety of expressive extensions and different semantics created for logic programs with negation is diverse and heterogeneous, and there is a lack of comprehensive comparative studies which map out the multitude of perspectives in a uniform way. Most recently, however, new methodologies have been proposed which allow one to derive uniform characterizations of different declarative semantics for logic programs with negation. In this paper, we study the relationship between two of these approaches, namely the level mapping characterizations due to [Hitzler and Wendt 2005], and the selector generated models due to [Schwarz 2004]. We will show that the latter can be captured by means of the former, thereby supporting the claim that level mappings provide a very flexible framework which is applicable to very diversely defined semantics.
[ { "version": "v1", "created": "Wed, 9 Nov 2005 14:22:55 GMT" } ]
2009-09-29T00:00:00
[ [ "Hitzler", "Pascal", "" ], [ "Schwarz", "Sibylle", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511039
Andrea Montanari
Cyril Measson, Andrea Montanari, Tom Richardson, Rudiger Urbanke
The Generalized Area Theorem and Some of its Consequences
27 pages, 46 ps figures
null
null
null
cs.IT math.IT
null
There is a fundamental relationship between belief propagation and maximum a posteriori decoding. The case of transmission over the binary erasure channel was investigated in detail in a companion paper. This paper investigates the extension to general memoryless channels (paying special attention to the binary case). An area theorem for transmission over general memoryless channels is introduced and some of its many consequences are discussed. We show that this area theorem gives rise to an upper-bound on the maximum a posteriori threshold for sparse graph codes. In situations where this bound is tight, the extrinsic soft bit estimates delivered by the belief propagation decoder coincide with the correct a posteriori probabilities above the maximum a posteriori threshold. More generally, it is conjectured that the fundamental relationship between the maximum a posteriori and the belief propagation decoder which was observed for transmission over the binary erasure channel carries over to the general case. We finally demonstrate that in order for the design rate of an ensemble to approach the capacity under belief propagation decoding the component codes have to be perfectly matched, a statement which is well known for the special case of transmission over the binary erasure channel.
[ { "version": "v1", "created": "Wed, 9 Nov 2005 10:31:26 GMT" } ]
2007-07-13T00:00:00
[ [ "Measson", "Cyril", "" ], [ "Montanari", "Andrea", "" ], [ "Richardson", "Tom", "" ], [ "Urbanke", "Rudiger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511040
Amir Bennatan
Amir Bennatan and David Burshtein
Design and Analysis of Nonbinary LDPC Codes for Arbitrary Discrete-Memoryless Channels
To appear, IEEE Transactions on Information Theory, (submitted October 2004, revised and accepted for publication, November 2005). The material in this paper was presented in part at the 41st Allerton Conference on Communications, Control and Computing, October 2003 and at the 2005 IEEE International Symposium on Information Theory
IEEE Transactions on Information Theory, vol. IT-52, no. 2, pp. 549-583, 2006
10.1109/TIT.2005.862080
null
cs.IT math.IT
null
We present an analysis, under iterative decoding, of coset LDPC codes over GF(q), designed for use over arbitrary discrete-memoryless channels (particularly nonbinary and asymmetric channels). We use a random-coset analysis to produce an effect that is similar to output-symmetry with binary channels. We show that the random selection of the nonzero elements of the GF(q) parity-check matrix induces a permutation-invariance property on the densities of the decoder messages, which simplifies their analysis and approximation. We generalize several properties, including symmetry and stability from the analysis of binary LDPC codes. We show that under a Gaussian approximation, the entire q-1 dimensional distribution of the vector messages is described by a single scalar parameter (like the distributions of binary LDPC messages). We apply this property to develop EXIT charts for our codes. We use appropriately designed signal constellations to obtain substantial shaping gains. Simulation results indicate that our codes outperform multilevel codes at short block lengths. We also present simulation results for the AWGN channel, including results within 0.56 dB of the unconstrained Shannon limit (i.e. not restricted to any signal constellation) at a spectral efficiency of 6 bits/s/Hz.
[ { "version": "v1", "created": "Wed, 9 Nov 2005 15:36:53 GMT" } ]
2007-07-16T00:00:00
[ [ "Bennatan", "Amir", "" ], [ "Burshtein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511041
Susumu Yamasaki
Susumu Yamasaki
Logic Programming with Default, Weak and Strict Negations
14 pages, to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
null
This paper treats logic programming with three kinds of negation: default, weak and strict negations. A 3-valued logic model theory is discussed for logic programs with three kinds of negation. The procedure is constructed for negations so that a soundness of the procedure is guaranteed in terms of 3-valued logic model theory.
[ { "version": "v1", "created": "Thu, 10 Nov 2005 06:29:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Yamasaki", "Susumu", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511042
Pascal Hitzler
Sebastian Bader and Pascal Hitzler
Dimensions of Neural-symbolic Integration - A Structured Survey
28 pages
null
null
null
cs.AI cs.LO cs.NE
null
Research on integrated neural-symbolic systems has made significant progress in the recent past. In particular the understanding of ways to deal with symbolic knowledge within connectionist systems (also called artificial neural networks) has reached a critical mass which enables the community to strive for applicable implementations and use cases. Recent work has covered a great variety of logics used in artificial intelligence and provides a multitude of techniques for dealing with them within the context of artificial neural networks. We present a comprehensive survey of the field of neural-symbolic integration, including a new classification of system according to their architectures and abilities.
[ { "version": "v1", "created": "Thu, 10 Nov 2005 10:00:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bader", "Sebastian", "" ], [ "Hitzler", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0511043
Damiano Bolzoni
Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle, Pieter Hartel
Poseidon: a 2-tier Anomaly-based Intrusion Detection System
null
null
null
TR-CTIT-05-53
cs.CR
null
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection rate and lower number of false positives than PAYL and PHAD.
[ { "version": "v1", "created": "Fri, 11 Nov 2005 13:43:04 GMT" }, { "version": "v2", "created": "Wed, 7 Dec 2005 15:11:44 GMT" }, { "version": "v3", "created": "Mon, 30 Jan 2006 14:27:46 GMT" }, { "version": "v4", "created": "Fri, 3 Feb 2006 12:26:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Zambon", "Emmanuele", "" ], [ "Etalle", "Sandro", "" ], [ "Hartel", "Pieter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0511044
Mimmo Parente
J. Gruska, S. La Torre, M. Napoli, M. Parente
Various Solutions to the Firing Squad Synchronization Problems
null
null
null
null
cs.DS cs.CC
null
We present different classes of solutions to the Firing Squad Synchronization Problem on networks of different shapes. The nodes are finite state processors that work at unison discrete steps. The networks considered are the line, the ring and the square. For all of these models we have considered one and two-way communication modes and also constrained the quantity of information that adjacent processors can exchange each step. We are given a particular time expressed as a function of the number of nodes of the network, $f(n)$ and present synchronization algorithms in time $n^2$, $n \log n$, $n\sqrt n$, $2^n$. The solutions are presented as {\em signals} that are used as building blocks to compose new solutions for all times expressed by polynomials with nonnegative coefficients.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 06:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Gruska", "J.", "" ], [ "La Torre", "S.", "" ], [ "Napoli", "M.", "" ], [ "Parente", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0511045
Ugo Dal Lago
Ugo Dal Lago and Simone Martini
An Invariant Cost Model for the Lambda Calculus
19 pages
null
null
null
cs.LO cs.CC
null
We define a new cost model for the call-by-value lambda-calculus satisfying the invariance thesis. That is, under the proposed cost model, Turing machines and the call-by-value lambda-calculus can simulate each other within a polynomial time overhead. The model only relies on combinatorial properties of usual beta-reduction, without any reference to a specific machine or evaluator. In particular, the cost of a single beta reduction is proportional to the difference between the size of the redex and the size of the reduct. In this way, the total cost of normalizing a lambda term will take into account the size of all intermediate results (as well as the number of steps to normal form).
[ { "version": "v1", "created": "Sat, 12 Nov 2005 11:57:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Martini", "Simone", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0511046
Xiangyong Zeng
Xiangyong Zeng, Qingchong Liu, Lei Hu
Generalized Kasami Sequences: The Large Set
30 pages
null
null
null
cs.IT cs.CR math.IT
null
In this paper new binary sequence families $\mathcal{F}^k$ of period $2^n-1$ are constructed for even $n$ and any $k$ with ${\rm gcd}(k,n)=2$ if $n/2$ is odd or ${\rm gcd}(k,n)=1$ if $n/2$ is even. The distribution of their correlation values is completely determined. These families have maximum correlation $2^{n/2+1}+1$ and family size $2^{3n/2}+2^{n/2}$ for odd $n/2$ or $2^{3n/2}+2^{n/2}-1$ for even $n/2$. The construction of the large set of Kasami sequences which is exactly the $\mathcal{F}^{k}$ with $k=n/2+1$ is generalized.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 13:43:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Zeng", "Xiangyong", "" ], [ "Liu", "Qingchong", "" ], [ "Hu", "Lei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511047
Chunxuan Ye
Chunxuan Ye and Prakash Narayan
The Secret Key-Private Key Capacity Region for Three Terminals
Appeared in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4 -- 9, 2005
null
null
null
cs.IT math.IT
null
We consider a model for secrecy generation, with three terminals, by means of public interterminal communication, and examine the problem of characterizing all the rates at which all three terminals can generate a ``secret key,'' and -- simultaneously -- two designated terminals can generate a ``private key'' which is effectively concealed from the remaining terminal; both keys are also concealed from an eavesdropper that observes the public communication. Inner and outer bounds for the ``secret key--private key capacity region'' are derived. Under a certain special condition, these bounds coincide to yield the (exact) secret key--private key capacity region.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 16:08:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Ye", "Chunxuan", "" ], [ "Narayan", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511048
Nima Sarshar
Nima Sarshar and Xiaolin Wu
Joint Network-Source Coding: An Achievable Region with Diversity Routing
submitted to IEEE Informatoin Theory Workshop 2006
null
null
null
cs.IT math.IT
null
We are interested in how to best communicate a (usually real valued) source to a number of destinations (sinks) over a network with capacity constraints in a collective fidelity metric over all the sinks, a problem which we call joint network-source coding. Unlike the lossless network coding problem, lossy reconstruction of the source at the sinks is permitted. We make a first attempt to characterize the set of all distortions achievable by a set of sinks in a given network. While the entire region of all achievable distortions remains largely an open problem, we find a large, non-trivial subset of it using ideas in multiple description coding. The achievable region is derived over all balanced multiple-description codes and over all network flows, while the network nodes are allowed to forward and duplicate data packets.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 16:36:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Sarshar", "Nima", "" ], [ "Wu", "Xiaolin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511049
Gus Gutoski
Gus Gutoski
Entropy, Convex Optimization, and Competitive Quantum Interactions
withdrawn
null
null
null
cs.CC cs.GT quant-ph
null
This paper has been withdrawn by the author due to errors.
[ { "version": "v1", "created": "Sat, 12 Nov 2005 21:15:40 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2005 23:09:33 GMT" }, { "version": "v3", "created": "Mon, 30 Oct 2006 20:16:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0511050
Chunxuan Ye
Chunxuan Ye and Prakash Narayan
Secret Key and Private Key Constructions for Simple Multiterminal Source Models
Appeared in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4 -- 9, 2005
null
null
null
cs.IT cs.CR math.IT
null
This work is motivated by recent results of Csiszar and Narayan (IEEE Trans. on Inform. Theory, Dec. 2004), which highlight innate connections between secrecy generation by multiple terminals and multiterminal Slepian-Wolf near-lossless data compression (sans secrecy restrictions). We propose a new approach for constructing secret and private keys based on the long-known Slepian-Wolf code for sources connected by a virtual additive noise channel, due to Wyner (IEEE Trans. on Inform. Theory, Jan. 1974). Explicit procedures for such constructions, and their substantiation, are provided.
[ { "version": "v1", "created": "Sun, 13 Nov 2005 02:02:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Ye", "Chunxuan", "" ], [ "Narayan", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511051
Chunxuan Ye
Chunxuan Ye and Prakash Narayan
The Private Key Capacity Region for Three Terminals
Appeared in the proceedings of the 2004 IEEE International Symposium on Information Theory, Chicago, Illinois, June 27 -- July 2, 2004
null
null
null
cs.IT cs.CR math.IT
null
We consider a model with three terminals and examine the problem of characterizing the largest rates at which two pairs of terminals can simultaneously generate private keys, each of which is effectively concealed from the remaining terminal.
[ { "version": "v1", "created": "Sun, 13 Nov 2005 04:08:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Ye", "Chunxuan", "" ], [ "Narayan", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511052
Gilson Antonio Giraldi
Gilson A. Giraldi, Antonio A.F. Oliveira, Leonardo Carvalho
Mining Cellular Automata DataBases throug PCA Models
13 pages, 4 figures, 5 tables
null
null
null
cs.DM cs.DB
null
Cellular Automata are discrete dynamical systems that evolve following simple and local rules. Despite of its local simplicity, knowledge discovery in CA is a NP problem. This is the main motivation for using data mining techniques for CA study. The Principal Component Analysis (PCA) is a useful tool for data mining because it provides a compact and optimal description of data sets. Such feature have been explored to compute the best subspace which maximizes the projection of the I/O patterns of CA onto the principal axis. The stability of the principal components against the input patterns is the main result of this approach. In this paper we perform such analysis but in the presence of noise which randomly reverses the CA output values with probability $p$. As expected, the number of principal components increases when the pattern size is increased. However, it seems to remain stable when the pattern size is unchanged but the noise intensity gets larger. We describe our experiments and point out further works using KL transform theory and parameter sensitivity analysis.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 10:54:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Giraldi", "Gilson A.", "" ], [ "Oliveira", "Antonio A. F.", "" ], [ "Carvalho", "Leonardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0511053
Leland Smith
Leland Smith, Muthukumar Thirunavukkarasu, Srinidhi Varadarajan, and Naren Ramakrishnan
A Model Based Approach to Reachability Routing
In submission to IEEE Journal on Selected Areas of Communication
null
null
null
cs.NI
null
Current directions in network routing research have not kept pace with the latest developments in network architectures, such as peer-to-peer networks, sensor networks, ad-hoc wireless networks, and overlay networks. A common characteristic among all of these new technologies is the presence of highly dynamic network topologies. Currently deployed single-path routing protocols cannot adequately cope with this dynamism, and existing multi-path algorithms make trade-offs which lead to less than optimal performance on these networks. This drives the need for routing protocols designed with the unique characteristics of these networks in mind. In this paper we propose the notion of reachability routing as a solution to the challenges posed by routing on such dynamic networks. In particular, our formulation of reachability routing provides cost-sensitive multi-path forwarding along with loop avoidance within the confines of the Internet Protocol (IP) architecture. This is achieved through the application of reinforcement learning within a probabilistic routing framework. Following an explanation of our design decisions and a description of the algorithm, we provide an evaluation of the performance of the algorithm on a variety of network topologies. The results show consistently superior performance compared to other reinforcement learning based routing algorithms.
[ { "version": "v1", "created": "Mon, 14 Nov 2005 16:32:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Leland", "" ], [ "Thirunavukkarasu", "Muthukumar", "" ], [ "Varadarajan", "Srinidhi", "" ], [ "Ramakrishnan", "Naren", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0511054
Matthew Peacock
Matthew J.M. Peacock, Iain B. Collings, Michael L. Honig
Eigenvalue Distributions of Sums and Products of Large Random Matrices via Incremental Matrix Expansions
Submitted to Trans IT
null
null
null
cs.IT math.IT
null
This paper uses an incremental matrix expansion approach to derive asymptotic eigenvalue distributions (a.e.d.'s) of sums and products of large random matrices. We show that the result can be derived directly as a consequence of two common assumptions, and matches the results obtained from using R- and S-transforms in free probability theory. We also give a direct derivation of the a.e.d. of the sum of certain random matrices which are not free. This is used to determine the asymptotic signal-to-interference-ratio of a multiuser CDMA system with a minimum mean-square error linear receiver.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 03:16:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Peacock", "Matthew J. M.", "" ], [ "Collings", "Iain B.", "" ], [ "Honig", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511055
Guido Governatori
Grigoris Antoniou, David Billington, Guido Governatori, and Michael J. Maher
Embedding Defeasible Logic into Logic Programming
To appear in Theory and Practice of Logic Programming
Theory and Practice of Logic Programming, 6, 6 (2006): 703-735
10.1017/S147106840600277
null
cs.LO
null
Defeasible reasoning is a simple but efficient approach to nonmonotonic reasoning that has recently attracted considerable interest and that has found various applications. Defeasible logic and its variants are an important family of defeasible reasoning methods. So far no relationship has been established between defeasible logic and mainstream nonmonotonic reasoning approaches. In this paper we establish close links to known semantics of logic programs. In particular, we give a translation of a defeasible theory D into a meta-program P(D). We show that under a condition of decisiveness, the defeasible consequences of D correspond exactly to the sceptical conclusions of P(D) under the stable model semantics. Without decisiveness, the result holds only in one direction (all defeasible consequences of D are included in all stable models of P(D)). If we wish a complete embedding for the general case, we need to use the Kunen semantics of P(D), instead.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 10:39:38 GMT" } ]
2012-06-26T00:00:00
[ [ "Antoniou", "Grigoris", "" ], [ "Billington", "David", "" ], [ "Governatori", "Guido", "" ], [ "Maher", "Michael J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511056
Junsheng Han
Junsheng Han and Paul H. Siegel
Improved Upper Bounds on Stopping Redundancy
13 pages, 3 figures. Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT cs.DM math.IT
null
Let C be a linear code with length n and minimum distance d. The stopping redundancy of C is defined as the minimum number of rows in a parity-check matrix for C such that the smallest stopping sets in the corresponding Tanner graph have size d. We derive new upper bounds on the stopping redundancy of linear codes in general, and of maximum distance separable (MDS) codes specifically, and show how they improve upon previously known results. For MDS codes, the new bounds are found by upper bounding the stopping redundancy by a combinatorial quantity closely related to Turan numbers. (The Turan number, T(v,k,t), is the smallest number of t-subsets of a v-set, such that every k-subset of the v-set contains at least one of the t-subsets.) We further show that the stopping redundancy of MDS codes is T(n,d-1,d-2)(1+O(n^{-1})) for fixed d, and is at most T(n,d-1,d-2)(3+O(n^{-1})) for fixed code dimension k=n-d+1. For d=3,4, we prove that the stopping redundancy of MDS codes is equal to T(n,d-1,d-2), for which exact formulas are known. For d=5, we show that the stopping redundancy of MDS codes is either T(n,4,3) or T(n,4,3)+1.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 09:13:51 GMT" } ]
2007-07-13T00:00:00
[ [ "Han", "Junsheng", "" ], [ "Siegel", "Paul H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511057
Ratko Tomic V
Ratko V. Tomic
Quantized Indexing: Beyond Arithmetic Coding
Submitted to DCC-2006
IEEE/DCC 2006, p. 468
10.1109/DCC.2006.70
TR05-1115
cs.IT cs.DM math.CO math.IT
null
Quantized Indexing is a fast and space-efficient form of enumerative (combinatorial) coding, the strongest among asymptotically optimal universal entropy coding algorithms. The present advance in enumerative coding is similar to that made by arithmetic coding with respect to its unlimited precision predecessor, Elias coding. The arithmetic precision, execution time, table sizes and coding delay are all reduced by a factor O(n) at a redundancy below 2*log(e)/2^g bits/symbol (for n input symbols and g-bit QI precision). Due to its tighter enumeration, QI output redundancy is below that of arithmetic coding (which can be derived as a lower accuracy approximation of QI). The relative compression gain vanishes in large n and in high entropy limits and increases for shorter outputs and for less predictable data. QI is significantly faster than the fastest arithmetic coders, from factor 6 in high entropy limit to over 100 in low entropy limit (`typically' 10-20 times faster). These speedups are result of using only 3 adds, 1 shift and 2 array lookups (all in 32 bit precision) per less probable symbol and no coding operations for the most probable symbol . Further, the exact enumeration algorithm is sharpened and its lattice walks formulation is generalized. A new numeric type with a broader applicability, sliding window integer, is introduced.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 17:10:45 GMT" } ]
2016-11-18T00:00:00
[ [ "Tomic", "Ratko V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511058
Vladimir Vovk
Vladimir Vovk
On-line regression competitive with reproducing kernel Hilbert spaces
37 pages, 1 figure
null
null
null
cs.LG
null
We consider the problem of on-line prediction of real-valued labels, assumed bounded in absolute value by a known constant, of new objects from known labeled objects. The prediction algorithm's performance is measured by the squared deviation of the predictions from the actual labels. No stochastic assumptions are made about the way the labels and objects are generated. Instead, we are given a benchmark class of prediction rules some of which are hoped to produce good predictions. We show that for a wide range of infinite-dimensional benchmark classes one can construct a prediction algorithm whose cumulative loss over the first N examples does not exceed the cumulative loss of any prediction rule in the class plus O(sqrt(N)); the main differences from the known results are that we do not impose any upper bound on the norm of the considered prediction rules and that we achieve an optimal leading term in the excess loss of our algorithm. If the benchmark class is "universal" (dense in the class of continuous functions on each compact set), this provides an on-line non-stochastic analogue of universally consistent prediction in non-parametric statistics. We use two proof techniques: one is based on the Aggregating Algorithm and the other on the recently developed method of defensive forecasting.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 17:13:50 GMT" }, { "version": "v2", "created": "Tue, 24 Jan 2006 23:27:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0511059
Ke Liu
Ke Liu, Nael Abu-Ghazaleh
Virtual Coordinate Backtracking for Void Traversal in Geographic Routing
null
AdHocNow 2006
null
null
cs.NI
null
Geographical routing protocols have several desirable features for use in ad hoc and sensor networks but are susceptible to voids and localization errors. Virtual coordinate systems are an alternative solution to geographically based routing protocols that works by overlaying a coordinate system on the sensors relative to well chosen reference points. VC is resilient to localization errors; however, we show that it is vulnerable to different forms of the void problem and have no viable complementary approach to overcome them. Specifically, we show that there are instances when packets reach nodes with no viable next hop nodes in the forwarding set. In addition, it is possible for nodes with the same coordinates to arise at different points in the network in the presence of voids. This paper identifies and analyzes these problems. It also compares several existing routing protocols based on Virtual Coordinate systems. Finally, it presents a new routing algorithm that uses backtracking to overcome voids to achieve high connectivity in the greedy phase, higher overall path quality and more resilience to localization errors. We show these properties using extensive simulation analysis.
[ { "version": "v1", "created": "Tue, 15 Nov 2005 23:06:28 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 19:49:38 GMT" } ]
2008-03-28T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0511060
Jonghoon Ryu
Jonghoon Ryu and Oscar Y. Takeshita
On Quadratic Inverses for Quadratic Permutation Polynomials over Integer Rings
Submitted as a Correspondence to the IEEE Transactions on Information Theory Submitted : April 1, 2005 Revised : Nov. 15, 2005
null
null
null
cs.IT math.IT
null
An interleaver is a critical component for the channel coding performance of turbo codes. Algebraic constructions are of particular interest because they admit analytical designs and simple, practical hardware implementation. Sun and Takeshita have recently shown that the class of quadratic permutation polynomials over integer rings provides excellent performance for turbo codes. In this correspondence, a necessary and sufficient condition is proven for the existence of a quadratic inverse polynomial for a quadratic permutation polynomial over an integer ring. Further, a simple construction is given for the quadratic inverse. All but one of the quadratic interleavers proposed earlier by Sun and Takeshita are found to admit a quadratic inverse, although none were explicitly designed to do so. An explanation is argued for the observation that restriction to a quadratic inverse polynomial does not narrow the pool of good quadratic interleavers for turbo codes.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 05:18:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Ryu", "Jonghoon", "" ], [ "Takeshita", "Oscar Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511061
Stephan Merz
Moritz Hammer (IFI-LMU), Alexander Knapp (IFI-LMU), Stephan Merz (INRIA Lorraine - LORIA)
Truly On-The-Fly LTL Model Checking
null
Dans Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2005)
null
null
cs.LO
null
We propose a novel algorithm for automata-based LTL model checking that interleaves the construction of the generalized B\"{u}chi automaton for the negation of the formula and the emptiness check. Our algorithm first converts the LTL formula into a linear weak alternating automaton; configurations of the alternating automaton correspond to the locations of a generalized B\"{u}chi automaton, and a variant of Tarjan's algorithm is used to decide the existence of an accepting run of the product of the transition system and the automaton. Because we avoid an explicit construction of the B\"{u}chi automaton, our approach can yield significant improvements in runtime and memory, for large LTL formulas. The algorithm has been implemented within the SPIN model checker, and we present experimental results for some benchmark examples.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 12:56:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Hammer", "Moritz", "", "IFI-LMU" ], [ "Knapp", "Alexander", "", "IFI-LMU" ], [ "Merz", "Stephan", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511062
Liping Lu
Gerd Bumiller, Liping Lu (INRIA Lorraine - LORIA), Yeqiong Song (INRIA Lorraine - LORIA)
Analytic performance comparison of routing protocols in master-slave PLC networks
null
null
null
null
cs.NI
null
In the wide area master-slave PLC (powerline communication) system, the source node cannot reach the destination node without packet relay. Due to the time-variable attenuation in the powerline, the communication distance cannot be defined. Two kind of dynamic repeater algorithms are developed, dynamic source routing and flooding based routing. In this paper, we use analytic approach to compare the performance of those two routing protocols. We give formulas to calculate the average duration of a polling cycle for each protocols. Then we present simulation results to bolster the results of our analysis. We use three metrics, which are bandwidth consumed for routing signaling, normalized routing load and average duration of a polling cycle to evaluate those routing protocols.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 16:24:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Bumiller", "Gerd", "", "INRIA Lorraine - LORIA" ], [ "Lu", "Liping", "", "INRIA Lorraine - LORIA" ], [ "Song", "Yeqiong", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0511063
Michele Finelli
Michele Finelli
Pathwords: a user-friendly schema for common passwords management
null
null
null
null
cs.CR
null
Many computer-based authentication schemata are based on pass- words. Logging on a computer, reading email, accessing content on a web server are all examples of applications where the identification of the user is usually accomplished matching the data provided by the user with data known by the application. Such a widespread approach relies on some assumptions, whose satisfaction is of foremost importance to guarantee the robustness of the solution. Some of these assumptions, like having a "secure" chan- nel to transmit data, or having sound algorithms to check the correct- ness of the data, are not addressed by this paper. We will focus on two simple issues: the problem of using adequate passwords and the problem of managing passwords. The proposed solution, the pathword, is a method that guarantees: 1 that the passwords generated with the help of a pathword are adequate (i.e. that they are not easy to guess), 2 that managing pathwords is more user friendly than managing passwords and that pathwords are less amenable to problems typical of passwords.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 17:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Finelli", "Michele", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0511064
Alexander Evako
Alexander V. Evako
The consistency principle for a digitization procedure. An algorithm for building normal digital spaces of continuous n-dimensional objects
13 pages, 11 figures
null
null
null
cs.CV cs.DM
null
This paper considers conditions, which allow to preserve important topological and geometric properties in the process of digitization. For this purpose, we introduce a triplet {C,M,D} consisting of a continuous object C, an intermediate model M, which is a collection of subregions whose union is C, a digital model D, which is the intersection graph of M, and apply the consistency principle and criteria of similarity to M in order to make its mathematical structure consistent with the natural structure of D. Specifically, this paper introduces a locally centered lump collection of subregions and shows that for any locally centered lump cover of an n-dimensional continuous manifold, the digital model of the manifold is a digital normal n-dimensional space. In addition, we give examples of locally centered lump tilings of two-manifolds. We propose an algorithm for constructing normal digital models of continuous objects.
[ { "version": "v1", "created": "Wed, 16 Nov 2005 20:33:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0511065
Matthew Mckay Mr.
Matthew R. McKay, Alex J. Grant, and Iain B. Collings
Performance Analysis of MIMO-MRC in Double-Correlated Rayleigh Environments
25 pages. Submitted to the IEEE Transactions on Communications
null
10.1109/TCOMM.2007.892450
null
cs.IT math.IT
null
We consider multiple-input multiple-output (MIMO) transmit beamforming systems with maximum ratio combining (MRC) receivers. The operating environment is Rayleigh-fading with both transmit and receive spatial correlation. We present exact expressions for the probability density function (p.d.f.) of the output signal-to-noise ratio (SNR), as well as the system outage probability. The results are based on explicit closed-form expressions which we derive for the p.d.f. and c.d.f. of the maximum eigenvalue of double-correlated complex Wishart matrices. For systems with two antennas at either the transmitter or the receiver, we also derive exact closed-form expressions for the symbol error rate (SER). The new expressions are used to prove that MIMO-MRC achieves the maximum available spatial diversity order, and to demonstrate the effect of spatial correlation. The analysis is validated through comparison with Monte-Carlo simulations.
[ { "version": "v1", "created": "Thu, 17 Nov 2005 05:54:46 GMT" } ]
2016-11-17T00:00:00
[ [ "McKay", "Matthew R.", "" ], [ "Grant", "Alex J.", "" ], [ "Collings", "Iain B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511066
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Anna Urbanska (LJK)
An introspective algorithm for the integer determinant
Published in Transgressive Computing 2006, Grenade : Espagne (2006)
null
null
null
cs.SC
null
We present an algorithm computing the determinant of an integer matrix A. The algorithm is introspective in the sense that it uses several distinct algorithms that run in a concurrent manner. During the course of the algorithm partial results coming from distinct methods can be combined. Then, depending on the current running time of each method, the algorithm can emphasize a particular variant. With the use of very fast modular routines for linear algebra, our implementation is an order of magnitude faster than other existing implementations. Moreover, we prove that the expected complexity of our algorithm is only O(n^3 log^{2.5}(n ||A||)) bit operations in the dense case and O(Omega n^{1.5} log^2(n ||A||) + n^{2.5}log^3(n||A||)) in the sparse case, where ||A|| is the largest entry in absolute value of the matrix and Omega is the cost of matrix-vector multiplication in the case of a sparse matrix.
[ { "version": "v1", "created": "Thu, 17 Nov 2005 14:53:41 GMT" }, { "version": "v2", "created": "Fri, 18 Nov 2005 18:33:05 GMT" }, { "version": "v3", "created": "Tue, 30 May 2006 08:45:47 GMT" }, { "version": "v4", "created": "Thu, 19 Oct 2006 18:49:22 GMT" }, { "version": "v5", "created": "Thu, 13 Sep 2007 14:12:41 GMT" } ]
2008-09-04T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Urbanska", "Anna", "", "LJK" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0511067
Vedran Kordic
Dongqing He and Peisun Ma
Effects of Initial Stance of Quadruped Trotting on Walking Stability
null
null
null
null
cs.RO
null
It is very important for quadruped walking machine to keep its stability in high speed walking. It has been indicated that moment around the supporting diagonal line of quadruped in trotting gait largely influences walking stability. In this paper, moment around the supporting diagonal line of quadruped in trotting gait is modeled and its effects on body attitude are analyzed. The degree of influence varies with different initial stances of quadruped and we get the optimal initial stance of quadruped in trotting gait with maximal walking stability. Simulation results are presented. Keywords: quadruped, trotting, attitude, walking stability.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:39:01 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Dongqing", "" ], [ "Ma", "Peisun", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0511068
Vedran Kordic
S. Heinrich, H. Durr, T. Hanel and J. Lassig
An Agent-based Manufacturing Management System for Production and Logistics within Cross-Company Regional and National Production Networks
null
null
null
null
cs.RO
null
The goal is the development of a simultaneous, dynamic, technological as well as logistical real-time planning and an organizational control of the production by the production units themselves, working in the production network under the use of Multi-Agent-Technology. The design of the multi-agent-based manufacturing management system, the models of the single agents, algorithms for the agent-based, decentralized dispatching of orders, strategies and data management concepts as well as their integration into the SCM, basing on the solution described, will be explained in the following. Keywords: production engineering and management, dynamic manufacturing planning and control, multi-agentsystems (MAS), supply-chain-management (SCM), e-manufacturing
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:41:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Heinrich", "S.", "" ], [ "Durr", "H.", "" ], [ "Hanel", "T.", "" ], [ "Lassig", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0511069
Vedran Kordic
R. Hedjar and P. Boucher
Nonlinear Receding-Horizon Control of Rigid Link Robot Manipulators
null
null
null
null
cs.RO
null
The approximate nonlinear receding-horizon control law is used to treat the trajectory tracking control problem of rigid link robot manipulators. The derived nonlinear predictive law uses a quadratic performance index of the predicted tracking error and the predicted control effort. A key feature of this control law is that, for their implementation, there is no need to perform an online optimization, and asymptotic tracking of smooth reference trajectories is guaranteed. It is shown that this controller achieves the positions tracking objectives via link position measurements. The stability convergence of the output tracking error to the origin is proved. To enhance the robustness of the closed loop system with respect to payload uncertainties and viscous friction, an integral action is introduced in the loop. A nonlinear observer is used to estimate velocity. Simulation results for a two-link rigid robot are performed to validate the performance of the proposed controller. Keywords: receding-horizon control, nonlinear observer, robot manipulators, integral action, robustness.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 14:42:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Hedjar", "R.", "" ], [ "Boucher", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0511070
Arindam Mitra
Arindam Mitra
A particle can carry more than one bit of information
1301 words
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is believed that a particle cannot carry more than one bit of information. It is pointed out that particle or single-particle quantum state can carry more than one bit of information. It implies that minimum energy cost of transmitting a bit will be less than the accepted limit KTlog2.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 15:21:56 GMT" }, { "version": "v2", "created": "Wed, 1 Nov 2006 15:04:36 GMT" }, { "version": "v3", "created": "Sat, 4 Nov 2006 15:33:36 GMT" }, { "version": "v4", "created": "Fri, 13 Jun 2008 15:50:00 GMT" } ]
2008-06-13T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511071
Francesco Capasso
Francesco Capasso
A polynomial-time heuristic for Circuit-SAT
20 pages, 8 figures
null
null
null
cs.CC cs.DS
null
In this paper is presented an heuristic that, in polynomial time and space in the input dimension, determines if a circuit describes a tautology or a contradiction. If the circuit is neither a tautology nor a contradiction, then the heuristic finds an assignment to the circuit inputs such that the circuit is satisfied.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 20:23:46 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2005 21:56:11 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2005 22:19:18 GMT" }, { "version": "v4", "created": "Mon, 28 Nov 2005 19:52:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Capasso", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0511072
Atri Rudra
Venkatesan Guruswami and Atri Rudra
Explicit Codes Achieving List Decoding Capacity: Error-correction with Optimal Redundancy
28 pages, 6 figures
null
null
null
cs.IT math.IT
null
We present error-correcting codes that achieve the information-theoretically best possible trade-off between the rate and error-correction radius. Specifically, for every $0 < R < 1$ and $\eps> 0$, we present an explicit construction of error-correcting codes of rate $R$ that can be list decoded in polynomial time up to a fraction $(1-R-\eps)$ of {\em worst-case} errors. At least theoretically, this meets one of the central challenges in algorithmic coding theory. Our codes are simple to describe: they are {\em folded Reed-Solomon codes}, which are in fact {\em exactly} Reed-Solomon (RS) codes, but viewed as a code over a larger alphabet by careful bundling of codeword symbols. Given the ubiquity of RS codes, this is an appealing feature of our result, and in fact our methods directly yield better decoding algorithms for RS codes when errors occur in {\em phased bursts}. The alphabet size of these folded RS codes is polynomial in the block length. We are able to reduce this to a constant (depending on $\eps$) using ideas concerning ``list recovery'' and expander-based codes from \cite{GI-focs01,GI-ieeejl}. Concatenating the folded RS codes with suitable inner codes also gives us polynomial time constructible binary codes that can be efficiently list decoded up to the Zyablov bound, i.e., up to twice the radius achieved by the standard GMD decoding of concatenated codes.
[ { "version": "v1", "created": "Fri, 18 Nov 2005 22:31:44 GMT" }, { "version": "v2", "created": "Mon, 8 Oct 2007 18:36:41 GMT" } ]
2007-10-08T00:00:00
[ [ "Guruswami", "Venkatesan", "" ], [ "Rudra", "Atri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511073
Eric Mjolsness
Eric Mjolsness
Stochastic Process Semantics for Dynamical Grammar Syntax: An Overview
Accepted for: Ninth International Symposium on Artificial Intelligence and Mathematics, January 2006
null
null
UCI ICS TR# 05-14
cs.AI cs.LO nlin.AO
null
We define a class of probabilistic models in terms of an operator algebra of stochastic processes, and a representation for this class in terms of stochastic parameterized grammars. A syntactic specification of a grammar is mapped to semantics given in terms of a ring of operators, so that grammatical composition corresponds to operator addition or multiplication. The operators are generators for the time-evolution of stochastic processes. Within this modeling framework one can express data clustering models, logic programs, ordinary and stochastic differential equations, graph grammars, and stochastic chemical reaction kinetics. This mathematical formulation connects these apparently distant fields to one another and to mathematical methods from quantum field theory and operator algebra.
[ { "version": "v1", "created": "Sun, 20 Nov 2005 00:42:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Mjolsness", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
cs/0511074
David Doty
David Doty
Every Sequence is Decompressible from a Random One
revised conclusion to remove possibly incorrect statements about reversibility of decompression; restated as open question
null
null
null
cs.IT cs.CC math.IT
null
Kucera and Gacs independently showed that every infinite sequence is Turing reducible to a Martin-Lof random sequence. This result is extended by showing that every infinite sequence S is Turing reducible to a Martin-Lof random sequence R such that the asymptotic number of bits of R needed to compute n bits of S, divided by n, is precisely the constructive dimension of S. It is shown that this is the optimal ratio of query bits to computed bits achievable with Turing reductions. As an application of this result, a new characterization of constructive dimension is given in terms of Turing reduction compression ratios.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 19:52:39 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2005 17:47:23 GMT" }, { "version": "v3", "created": "Tue, 22 Nov 2005 23:24:42 GMT" }, { "version": "v4", "created": "Wed, 30 Nov 2005 23:18:57 GMT" }, { "version": "v5", "created": "Fri, 11 Aug 2006 05:24:12 GMT" } ]
2007-07-16T00:00:00
[ [ "Doty", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511075
Vasant Honavar
Michael Terribilini, Jae-Hyung Lee, Changhui Yan, Robert L. Jernigan, Susan Carpenter, Vasant Honavar, Drena Dobbs
Identifying Interaction Sites in "Recalcitrant" Proteins: Predicted Protein and Rna Binding Sites in Rev Proteins of Hiv-1 and Eiav Agree with Experimental Data
Pacific Symposium on Biocomputing, Hawaii, In press, Accepted, 2006
null
null
null
cs.LG cs.AI
null
Protein-protein and protein nucleic acid interactions are vitally important for a wide range of biological processes, including regulation of gene expression, protein synthesis, and replication and assembly of many viruses. We have developed machine learning approaches for predicting which amino acids of a protein participate in its interactions with other proteins and/or nucleic acids, using only the protein sequence as input. In this paper, we describe an application of classifiers trained on datasets of well-characterized protein-protein and protein-RNA complexes for which experimental structures are available. We apply these classifiers to the problem of predicting protein and RNA binding sites in the sequence of a clinically important protein for which the structure is not known: the regulatory protein Rev, essential for the replication of HIV-1 and other lentiviruses. We compare our predictions with published biochemical, genetic and partial structural information for HIV-1 and EIAV Rev and with our own published experimental mapping of RNA binding sites in EIAV Rev. The predicted and experimentally determined binding sites are in very good agreement. The ability to predict reliably the residues of a protein that directly contribute to specific binding events - without the requirement for structural information regarding either the protein or complexes in which it participates - can potentially generate new disease intervention strategies.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 01:47:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Terribilini", "Michael", "" ], [ "Lee", "Jae-Hyung", "" ], [ "Yan", "Changhui", "" ], [ "Jernigan", "Robert L.", "" ], [ "Carpenter", "Susan", "" ], [ "Honavar", "Vasant", "" ], [ "Dobbs", "Drena", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0511076
Yves Laprie
Blaise Potard (INRIA Lorraine - LORIA), Yves Laprie (INRIA Lorraine - LORIA)
Using phonetic constraints in acoustic-to-articulatory inversion
null
Proceedings of Interspeech, 9th European Conference on Speech Communication and Technology (2005) 3217-3220
null
null
cs.CL
null
The goal of this work is to recover articulatory information from the speech signal by acoustic-to-articulatory inversion. One of the main difficulties with inversion is that the problem is underdetermined and inversion methods generally offer no guarantee on the phonetical realism of the inverse solutions. A way to adress this issue is to use additional phonetic constraints. Knowledge of the phonetic caracteristics of French vowels enable the derivation of reasonable articulatory domains in the space of Maeda parameters: given the formants frequencies (F1,F2,F3) of a speech sample, and thus the vowel identity, an "ideal" articulatory domain can be derived. The space of formants frequencies is partitioned into vowels, using either speaker-specific data or generic information on formants. Then, to each articulatory vector can be associated a phonetic score varying with the distance to the "ideal domain" associated with the corresponding vowel. Inversion experiments were conducted on isolated vowels and vowel-to-vowel transitions. Articulatory parameters were compared with those obtained without using these constraints and those measured from X-ray data.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 14:50:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Potard", "Blaise", "", "INRIA Lorraine - LORIA" ], [ "Laprie", "Yves", "", "INRIA Lorraine -\n LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0511077
Frank McCown
Frank McCown, Sheffan Chan, Michael L. Nelson, Johan Bollen
The Availability and Persistence of Web References in D-Lib Magazine
11 pages, 7 figures, 3 tables
5th International Web Archiving Workshop (IWAW05), Vienna, Austria, 2005
null
null
cs.DL
null
We explore the availability and persistence of URLs cited in articles published in D-Lib Magazine. We extracted 4387 unique URLs referenced in 453 articles published from July 1995 to August 2004. The availability was checked three times a week for 25 weeks from September 2004 to February 2005. We found that approximately 28% of those URLs failed to resolve initially, and 30% failed to resolve at the last check. A majority of the unresolved URLs were due to 404 (page not found) and 500 (internal server error) errors. The content pointed to by the URLs was relatively stable; only 16% of the content registered more than a 1 KB change during the testing period. We explore possible factors which may cause a URL to fail by examining its age, path depth, top-level domain and file extension. Based on the data collected, we found the half-life of a URL referenced in a D-Lib Magazine article is approximately 10 years. We also found that URLs were more likely to be unavailable if they pointed to resources in the .net, .edu or country-specific top-level domain, used non-standard ports (i.e., not port 80), or pointed to resources with uncommon or deprecated extensions (e.g., .shtml, .ps, .txt).
[ { "version": "v1", "created": "Mon, 21 Nov 2005 15:56:17 GMT" } ]
2011-11-09T00:00:00
[ [ "McCown", "Frank", "" ], [ "Chan", "Sheffan", "" ], [ "Nelson", "Michael L.", "" ], [ "Bollen", "Johan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0511078
Ambedkar Dukkipati
Ambedkar Dukkipati, M. Narasimha Murty and Shalabh Bhatnagar
Uniqueness of Nonextensive entropy under Renyi's Recipe
null
null
null
null
cs.IT math.IT
null
By replacing linear averaging in Shannon entropy with Kolmogorov-Nagumo average (KN-averages) or quasilinear mean and further imposing the additivity constraint, R\'{e}nyi proposed the first formal generalization of Shannon entropy. Using this recipe of R\'{e}nyi, one can prepare only two information measures: Shannon and R\'{e}nyi entropy. Indeed, using this formalism R\'{e}nyi characterized these additive entropies in terms of axioms of quasilinear mean. As additivity is a characteristic property of Shannon entropy, pseudo-additivity of the form $x \oplus_{q} y = x + y + (1-q)x y$ is a characteristic property of nonextensive (or Tsallis) entropy. One can apply R\'{e}nyi's recipe in the nonextensive case by replacing the linear averaging in Tsallis entropy with KN-averages and thereby imposing the constraint of pseudo-additivity. In this paper we show that nonextensive entropy is unique under the R\'{e}nyi's recipe, and there by give a characterization.
[ { "version": "v1", "created": "Mon, 21 Nov 2005 18:38:19 GMT" } ]
2007-07-13T00:00:00
[ [ "Dukkipati", "Ambedkar", "" ], [ "Murty", "M. Narasimha", "" ], [ "Bhatnagar", "Shalabh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511079
Anne Bonneau
Jean-Baptiste Maj (LORIA), Anne Bonneau (LORIA), Dominique Fohr (LORIA), Yves Laprie (LORIA)
An elitist approach for extracting automatically well-realized speech sounds with high confidence
null
null
null
null
cs.CL
null
This paper presents an "elitist approach" for extracting automatically well-realized speech sounds with high confidence. The elitist approach uses a speech recognition system based on Hidden Markov Models (HMM). The HMM are trained on speech sounds which are systematically well-detected in an iterative procedure. The results show that, by using the HMM models defined in the training phase, the speech recognizer detects reliably specific speech sounds with a small rate of errors.
[ { "version": "v1", "created": "Tue, 22 Nov 2005 07:06:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Maj", "Jean-Baptiste", "", "LORIA" ], [ "Bonneau", "Anne", "", "LORIA" ], [ "Fohr", "Dominique", "", "LORIA" ], [ "Laprie", "Yves", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0511080
Valmir Barbosa
Alexandre O. Stauffer, Valmir C. Barbosa
A dissemination strategy for immunizing scale-free networks
null
Physical Review E 74 (2006), 056105
10.1103/PhysRevE.74.056105
null
cs.NI
null
We consider the problem of distributing a vaccine for immunizing a scale-free network against a given virus or worm. We introduce a new method, based on vaccine dissemination, that seems to reflect more accurately what is expected to occur in real-world networks. Also, since the dissemination is performed using only local information, the method can be easily employed in practice. Using a random-graph framework, we analyze our method both mathematically and by means of simulations. We demonstrate its efficacy regarding the trade-off between the expected number of nodes that receive the vaccine and the network's resulting vulnerability to develop an epidemic as the virus or worm attempts to infect one of its nodes. For some scenarios, the new method is seen to render the network practically invulnerable to attacks while requiring only a small fraction of the nodes to receive the vaccine.
[ { "version": "v1", "created": "Tue, 22 Nov 2005 10:59:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Stauffer", "Alexandre O.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0511081
Shashibhushan Borade
Shashi Borade and Lizhong Zheng
Writing on Fading Paper and Causal Transmitter CSI
null
null
null
null
cs.IT math.IT
null
A wideband fading channel is considered with causal channel state information (CSI) at the transmitter and no receiver CSI. A simple orthogonal code with energy detection rule at the receiver (similar to [6]) is shown to achieve the capacity of this channel in the limit of large bandwidth. This code transmits energy only when the channel gain is large enough. In this limit, this capacity without any receiver CSI is the same as the capacity with full receiver CSI--a phenomenon also true for dirty paper coding. For Rayleigh fading, this capacity (per unit time) is proportional to the logarithm of the bandwidth. Our coding scheme is motivated from the Gel'fand-Pinsker [2,3] coding and dirty paper coding [4]. Nonetheless, for our case, only causal CSI is required at the transmitter in contrast with dirty-paper coding and Gel'fand-Pinsker coding, where non-causal CSI is required. Then we consider a general discrete channel with i.i.d. states. Each input has an associated cost and a zero cost input "0" exists. The channel state is assumed be to be known at the transmitter in a causal manner. Capacity per unit cost is found for this channel and a simple orthogonal code is shown to achieve this capacity. Later, a novel orthogonal coding scheme is proposed for the case of causal transmitter CSI and a condition for equivalence of capacity per unit cost for causal and non-causal transmitter CSI is derived. Finally, some connections are made to the case of non-causal transmitter CSI in [8].
[ { "version": "v1", "created": "Tue, 22 Nov 2005 22:11:46 GMT" }, { "version": "v2", "created": "Tue, 29 Nov 2005 01:41:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Borade", "Shashi", "" ], [ "Zheng", "Lizhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511082
Gianluca Della Vedova
Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi
Approximating Clustering of Fingerprint Vectors with Missing Values
13 pages, 4 figures
null
10.1007/s00453-008-9265-0
null
cs.DS
null
The problem of clustering fingerprint vectors is an interesting problem in Computational Biology that has been proposed in (Figureroa et al. 2004). In this paper we show some improvements in closing the gaps between the known lower bounds and upper bounds on the approximability of some variants of the biological problem. Namely we are able to prove that the problem is APX-hard even when each fingerprint contains only two unknown position. Moreover we have studied some variants of the orginal problem, and we give two 2-approximation algorithm for the IECMV and OECMV problems when the number of unknown entries for each vector is at most a constant.
[ { "version": "v1", "created": "Wed, 23 Nov 2005 10:32:47 GMT" } ]
2011-08-02T00:00:00
[ [ "Bonizzoni", "Paola", "" ], [ "Della Vedova", "Gianluca", "" ], [ "Dondi", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0511083
Olivier Powell
Olivier Powell, Aubin Jarry, Pierre Leone, Jose Rolim
Gradient Based Routing in Wireless Sensor Networks: a Mixed Strategy
4 pages, 2 figures
null
null
null
cs.DC
null
We show how recent theoretical advances for data-propagation in Wireless Sensor Networks (WSNs) can be combined to improve gradient-based routing (GBR) in Wireless Sensor Networks. We propose a mixed-strategy of direct transmission and multi-hop propagation of data which improves the lifespan of WSNs by reaching better energy-load-balancing amongst sensor nodes.
[ { "version": "v1", "created": "Wed, 23 Nov 2005 18:13:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Powell", "Olivier", "" ], [ "Jarry", "Aubin", "" ], [ "Leone", "Pierre", "" ], [ "Rolim", "Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0511084
Assaf Naor
Manor Mendel and Assaf Naor
Ramsey partitions and proximity data structures
21 pages. Two explanatory figures were added, a few typos were fixed
J. European Math. Soc. 9(2): 253-275, 2007
10.4171/JEMS/79
null
cs.DS cs.CG math.FA math.MG
null
This paper addresses two problems lying at the intersection of geometric analysis and theoretical computer science: The non-linear isomorphic Dvoretzky theorem and the design of good approximate distance oracles for large distortion. We introduce the notion of Ramsey partitions of a finite metric space, and show that the existence of good Ramsey partitions implies a solution to the metric Ramsey problem for large distortion (a.k.a. the non-linear version of the isomorphic Dvoretzky theorem, as introduced by Bourgain, Figiel, and Milman). We then proceed to construct optimal Ramsey partitions, and use them to show that for every e\in (0,1), any n-point metric space has a subset of size n^{1-e} which embeds into Hilbert space with distortion O(1/e). This result is best possible and improves part of the metric Ramsey theorem of Bartal, Linial, Mendel and Naor, in addition to considerably simplifying its proof. We use our new Ramsey partitions to design the best known approximate distance oracles when the distortion is large, closing a gap left open by Thorup and Zwick. Namely, we show that for any $n$ point metric space X, and k>1, there exists an O(k)-approximate distance oracle whose storage requirement is O(n^{1+1/k}), and whose query time is a universal constant. We also discuss applications of Ramsey partitions to various other geometric data structure problems, such as the design of efficient data structures for approximate ranking.
[ { "version": "v1", "created": "Wed, 23 Nov 2005 20:06:15 GMT" }, { "version": "v2", "created": "Mon, 5 Dec 2005 06:35:16 GMT" }, { "version": "v3", "created": "Wed, 10 May 2006 19:00:50 GMT" } ]
2012-11-15T00:00:00
[ [ "Mendel", "Manor", "" ], [ "Naor", "Assaf", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
cs/0511085
Ron Cohen
R. A. Cohen
Proving that P is not equal to NP and that P is not equal to the intersection of NP and co-NP
9 pages ; 3 figures
null
null
null
cs.CC
null
The open question, P=NP?, was presented by Cook (1971). In this paper, a proof that P is not equal to NP is presented. In addition, it is shown that P is not equal to the intersection of NP and co-NP. Finally, the exact inclusion relationships between the classes P, NP and co-NP are presented.
[ { "version": "v1", "created": "Fri, 25 Nov 2005 15:23:18 GMT" }, { "version": "v2", "created": "Sat, 26 Nov 2005 14:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Cohen", "R. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0511086
Xin Wang
Xin Wang and Georgios B. Giannakis
Energy-Efficient Resource Allocation in Time Division Multiple-Access over Fading Channels
45 pages, 9 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We investigate energy-efficiency issues and resource allocation policies for time division multi-access (TDMA) over fading channels in the power-limited regime. Supposing that the channels are frequency-flat block-fading and transmitters have full or quantized channel state information (CSI), we first minimize power under a weighted sum-rate constraint and show that the optimal rate and time allocation policies can be obtained by water-filling over realizations of convex envelopes of the minima for cost-reward functions. We then address a related minimization under individual rate constraints and derive the optimal allocation policies via greedy water-filling. Using water-filling across frequencies and fading states, we also extend our results to frequency-selective channels. Our approaches not only provide fundamental power limits when each user can support an infinite number of capacity-achieving codebooks, but also yield guidelines for practical designs where users can only support a finite number of adaptive modulation and coding (AMC) modes with prescribed symbol error probabilities, and also for systems where only discrete-time allocations are allowed.
[ { "version": "v1", "created": "Thu, 24 Nov 2005 17:38:49 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Xin", "" ], [ "Giannakis", "Georgios B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511087
Marcus Hutter
Marco Zaffalon and Marcus Hutter
Robust Inference of Trees
26 pages, 7 figures
Annals of Mathematics and Artificial Intelligence, 45 (2005) 215-239
10.1007/s10472-005-9007-9
IDSIA-11-03
cs.LG cs.AI cs.IT math.IT
null
This paper is concerned with the reliable inference of optimal tree-approximations to the dependency structure of an unknown distribution generating data. The traditional approach to the problem measures the dependency strength between random variables by the index called mutual information. In this paper reliability is achieved by Walley's imprecise Dirichlet model, which generalizes Bayesian learning with Dirichlet priors. Adopting the imprecise Dirichlet model results in posterior interval expectation for mutual information, and in a set of plausible trees consistent with the data. Reliable inference about the actual tree is achieved by focusing on the substructure common to all the plausible trees. We develop an exact algorithm that infers the substructure in time O(m^4), m being the number of random variables. The new algorithm is applied to a set of data sampled from a known distribution. The method is shown to reliably infer edges of the actual tree even when the data are very scarce, unlike the traditional approach. Finally, we provide lower and upper credibility limits for mutual information under the imprecise Dirichlet model. These enable the previous developments to be extended to a full inferential method for trees.
[ { "version": "v1", "created": "Fri, 25 Nov 2005 10:59:35 GMT" } ]
2007-07-16T00:00:00
[ [ "Zaffalon", "Marco", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511088
Barak Pearlmutter
Barak A. Pearlmutter
Bounds on Query Convergence
6 pages, 2 figures
null
null
null
cs.LG
null
The problem of finding an optimum using noisy evaluations of a smooth cost function arises in many contexts, including economics, business, medicine, experiment design, and foraging theory. We derive an asymptotic bound E[ (x_t - x*)^2 ] >= O(1/sqrt(t)) on the rate of convergence of a sequence (x_0, x_1, >...) generated by an unbiased feedback process observing noisy evaluations of an unknown quadratic function maximised at x*. The bound is tight, as the proof leads to a simple algorithm which meets it. We further establish a bound on the total regret, E[ sum_{i=1..t} (x_i - x*)^2 ] >= O(sqrt(t)) These bounds may impose practical limitations on an agent's performance, as O(eps^-4) queries are made before the queries converge to x* with eps accuracy.
[ { "version": "v1", "created": "Fri, 25 Nov 2005 15:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Pearlmutter", "Barak A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0511089
Michael Vielhaber
Michael Vielhaber
Continued Fraction Expansion as Isometry: The Law of the Iterated Logarithm for Linear, Jump, and 2--Adic Complexity
32 pages Submitted (in revised form: 24 pages) to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In the cryptanalysis of stream ciphers and pseudorandom sequences, the notions of linear, jump, and 2-adic complexity arise naturally to measure the (non)randomness of a given string. We define an isometry K on F_q^\infty that is the precise equivalent to Euclid's algorithm over the reals to calculate the continued fraction expansion of a formal power series. The continued fraction expansion allows to deduce the linear and jump complexity profiles of the input sequence. Since K is an isometry, the resulting F_q^\infty-sequence is i.i.d. for i.i.d. input. Hence the linear and jump complexity profiles may be modelled via Bernoulli experiments (for F_2: coin tossing), and we can apply the very precise bounds as collected by Revesz, among others the Law of the Iterated Logarithm. The second topic is the 2-adic span and complexity, as defined by Goresky and Klapper. We derive again an isometry, this time on the dyadic integers Z_2 which induces an isometry A on F_2}^\infty. The corresponding jump complexity behaves on average exactly like coin tossing. Index terms: Formal power series, isometry, linear complexity, jump complexity, 2-adic complexity, 2-adic span, law of the iterated logarithm, Levy classes, stream ciphers, pseudorandom sequences
[ { "version": "v1", "created": "Sat, 26 Nov 2005 00:02:40 GMT" } ]
2016-08-31T00:00:00
[ [ "Vielhaber", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511090
Petra Hofstedt
Petra Hofstedt, Peter Pepper
Integration of Declarative and Constraint Programming
30 pages, 9 figures, To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.AI
null
Combining a set of existing constraint solvers into an integrated system of cooperating solvers is a useful and economic principle to solve hybrid constraint problems. In this paper we show that this approach can also be used to integrate different language paradigms into a unified framework. Furthermore, we study the syntactic, semantic and operational impacts of this idea for the amalgamation of declarative and constraint programming.
[ { "version": "v1", "created": "Sun, 27 Nov 2005 14:58:22 GMT" }, { "version": "v2", "created": "Sat, 14 Jan 2006 15:48:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Hofstedt", "Petra", "" ], [ "Pepper", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0511091
Marc Schoenauer
Carlos Kavka (INRIA Futurs, UNSL-DI), Patricia Roggero (UNSL-DI), Marc Schoenauer (INRIA Futurs)
Evolution of Voronoi based Fuzzy Recurrent Controllers
null
Dans GECCO 2005
null
null
cs.AI
null
A fuzzy controller is usually designed by formulating the knowledge of a human expert into a set of linguistic variables and fuzzy rules. Among the most successful methods to automate the fuzzy controllers development process are evolutionary algorithms. In this work, we propose the Recurrent Fuzzy Voronoi (RFV) model, a representation for recurrent fuzzy systems. It is an extension of the FV model proposed by Kavka and Schoenauer that extends the application domain to include temporal problems. The FV model is a representation for fuzzy controllers based on Voronoi diagrams that can represent fuzzy systems with synergistic rules, fulfilling the $\epsilon$-completeness property and providing a simple way to introduce a priory knowledge. In the proposed representation, the temporal relations are embedded by including internal units that provide feedback by connecting outputs to inputs. These internal units act as memory elements. In the RFV model, the semantic of the internal units can be specified together with the a priori rules. The geometric interpretation of the rules allows the use of geometric variational operators during the evolution. The representation and the algorithms are validated in two problems in the area of system identification and evolutionary robotics.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 07:14:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Kavka", "Carlos", "", "INRIA Futurs, UNSL-DI" ], [ "Roggero", "Patricia", "", "UNSL-DI" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0511092
Roberto Amadio
Roberto Amadio (PPS)
The SL synchronous language, revisited
null
Journal of Logic and Algebraic Programming 70 (15/02/2007) 121-150
null
null
cs.PL
null
We revisit the SL synchronous programming model introduced by Boussinot and De Simone (IEEE, Trans. on Soft. Eng., 1996). We discuss an alternative design of the model including thread spawning and recursive definitions and we explore some basic properties of the revised model: determinism, reactivity, CPS translation to a tail recursive form, computational expressivity, and a compositional notion of program equivalence.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 07:20:43 GMT" } ]
2007-06-13T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0511093
Marc Schoenauer
Yann Semet (INRIA Futurs), Sylvain Gelly (INRIA Futurs), Marc Schoenauer (INRIA Futurs), Mich\`ele Sebag (INRIA Futurs)
Artificial Agents and Speculative Bubbles
null
null
null
null
cs.GT cs.AI
null
Pertaining to Agent-based Computational Economics (ACE), this work presents two models for the rise and downfall of speculative bubbles through an exchange price fixing based on double auction mechanisms. The first model is based on a finite time horizon context, where the expected dividends decrease along time. The second model follows the {\em greater fool} hypothesis; the agent behaviour depends on the comparison of the estimated risk with the greater fool's. Simulations shed some light on the influent parameters and the necessary conditions for the apparition of speculative bubbles in an asset market within the considered framework.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 13:29:38 GMT" } ]
2016-08-16T00:00:00
[ [ "Semet", "Yann", "", "INRIA Futurs" ], [ "Gelly", "Sylvain", "", "INRIA Futurs" ], [ "Schoenauer", "Marc", "", "INRIA Futurs" ], [ "Sebag", "Michèle", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0511094
Ignatios Souvatzis
Ignatios Souvatzis
A Machine-Independent port of the MPD language run time system to NetBSD
6 pages
Christian Tschudin et al. (Eds.): Proceedings of the Fourth European BSD Conference, 2005 Basel, Switzerland
null
null
cs.DC cs.PL
null
SR (synchronizing resources) is a PASCAL - style language enhanced with constructs for concurrent programming developed at the University of Arizona in the late 1980s. MPD (presented in Gregory Andrews' book about Foundations of Multithreaded, Parallel, and Distributed Programming) is its successor, providing the same language primitives with a different, more C-style, syntax. The run-time system (in theory, identical, but not designed for sharing) of those languages provides the illusion of a multiprocessor machine on a single Unix-like system or a (local area) network of Unix-like machines. Chair V of the Computer Science Department of the University of Bonn is operating a laboratory for a practical course in parallel programming consisting of computing nodes running NetBSD/arm, normally used via PVM, MPI etc. We are considering to offer SR and MPD for this, too. As the original language distributions were only targeted at a few commercial Unix systems, some porting effort is needed. However, some of the porting effort of our earlier SR port should be reusable. The integrated POSIX threads support of NetBSD-2.0 and later allows us to use library primitives provided for NetBSD's phtread system to implement the primitives needed by the SR run-time system, thus implementing 13 target CPUs at once and automatically making use of SMP on VAX, Alpha, PowerPC, Sparc, 32-bit Intel and 64 bit AMD CPUs. We'll present some methods used for the impementation and compare some performance values to the traditional implementation.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 13:33:14 GMT" } ]
2016-08-31T00:00:00
[ [ "Souvatzis", "Ignatios", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0511095
Ashish Khisti
Ashish Khisti, Uri Erez, Amos Lapidoth, Gregory Wornell
Carbon Copying Onto Dirty Paper
To appear, IT. Trans. on Information Theory. Modified to incorporate reviewer's comments. Also includes some additional results for the Gaussian case
null
null
null
cs.IT math.IT
null
A generalization of the problem of writing on dirty paper is considered in which one transmitter sends a common message to multiple receivers. Each receiver experiences on its link an additive interference (in addition to the additive noise), which is known noncausally to the transmitter but not to any of the receivers. Applications range from wireless multi-antenna multicasting to robust dirty paper coding. We develop results for memoryless channels in Gaussian and binary special cases. In most cases, we observe that the availability of side information at the transmitter increases capacity relative to systems without such side information, and that the lack of side information at the receivers decreases capacity relative to systems with such side information. For the noiseless binary case, we establish the capacity when there are two receivers. When there are many receivers, we show that the transmitter side information provides a vanishingly small benefit. When the interference is large and independent across the users, we show that time sharing is optimal. For the Gaussian case we present a coding scheme and establish its optimality in the high signal-to-interference-plus-noise limit when there are two receivers. When the interference is large and independent across users we show that time-sharing is again optimal. Connections to the problem of robust dirty paper coding are also discussed.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 16:02:01 GMT" }, { "version": "v2", "created": "Mon, 30 Oct 2006 01:33:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Erez", "Uri", "" ], [ "Lapidoth", "Amos", "" ], [ "Wornell", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511096
Wei Kang
W. Kang and S. Ulukus
A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources
5 pages, pdf file, Proc. 39th Asilomar Conf. on Signals, Systems and Computers
null
null
null
cs.IT math.IT
null
The capacity region of the multiple access channel with arbitrarily correlated sources remains an open problem. Cover, El Gamal and Salehi gave an achievable region in the form of single-letter entropy and mutual information expressions, without a single-letter converse. Cover, El Gamal and Salehi also gave a converse in terms of some n-letter mutual informations, which are incomputable. In this paper, we derive an upper bound for the sum rate of this channel in a single-letter expression by using spectrum analysis. The incomputability of the sum rate of Cover, El Gamal and Salehi scheme comes from the difficulty of characterizing the possible joint distributions for the n-letter channel inputs. Here we introduce a new data processing inequality, which leads to a single-letter necessary condition for these possible joint distributions. We develop a single-letter upper bound for the sum rate by using this single-letter necessary condition on the possible joint distributions.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 18:37:55 GMT" } ]
2007-07-16T00:00:00
[ [ "Kang", "W.", "" ], [ "Ulukus", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511097
Christopher Hardin
Christopher Hardin
Modularizing the Elimination of r=0 in Kleene Algebra
null
Logical Methods in Computer Science, Volume 1, Issue 3 (December 21, 2005) lmcs:2264
10.2168/LMCS-1(3:4)2005
null
cs.LO
null
Given a universal Horn formula of Kleene algebra with hypotheses of the form r = 0, it is already known that we can efficiently construct an equation which is valid if and only if the Horn formula is valid. This is an example of <i>elimination of hypotheses</i>, which is useful because the equational theory of Kleene algebra is decidable while the universal Horn theory is not. We show that hypotheses of the form r = 0 can still be eliminated in the presence of other hypotheses. This lets us extend any technique for eliminating hypotheses to include hypotheses of the form r = 0.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 19:15:39 GMT" }, { "version": "v2", "created": "Wed, 21 Dec 2005 11:46:58 GMT" }, { "version": "v3", "created": "Mon, 16 Jan 2006 12:22:38 GMT" } ]
2017-01-11T00:00:00
[ [ "Hardin", "Christopher", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0511098
Kenton K. Yee
Kenton K. Yee
Information and Stock Prices: A Simple Introduction
http://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=240309 contains background references
null
null
http://www.columbia.edu/~kky2001/
cs.CY cs.IT math.IT nlin.AO physics.soc-ph
null
This article summarizes recent research in financial economics about why information, such as earnings announcements, moves stock prices. The article does not presume any prior exposure to finance beyond what you might read in newspapers.
[ { "version": "v1", "created": "Tue, 29 Nov 2005 06:42:08 GMT" } ]
2007-07-16T00:00:00
[ [ "Yee", "Kenton K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0511099
Na Li
Na Li and Wen-feng Qi
Symmetric Boolean Function with Maximum Algebraic Immunity on Odd Number of Variables
null
null
null
null
cs.CR
null
To resist algebraic attack, a Boolean function should possess good algebraic immunity (AI). Several papers constructed symmetric functions with the maximum algebraic immunity $\lceil \frac{n}{2}\rceil $. In this correspondence we prove that for each odd $n$, there is exactly one trivial balanced $n$-variable symmetric Boolean function achieving the algebraic immunity $\lceil \frac{n}{2}\rceil $. And we also obtain a necessary condition for the algebraic normal form of a symmetric Boolean function with maximum algebraic immunity.
[ { "version": "v1", "created": "Tue, 29 Nov 2005 11:42:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Na", "" ], [ "Qi", "Wen-feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0511100
Vishwambhar Rathi
Vishwambhar Rathi, Rudiger Urbanke
Density Evolution, Thresholds and the Stability Condition for Non-binary LDPC Codes
To appear in IEE Proc. Communications, December, 2005
null
null
null
cs.IT math.IT
null
We derive the density evolution equations for non-binary low-density parity-check (LDPC) ensembles when transmission takes place over the binary erasure channel. We introduce ensembles defined with respect to the general linear group over the binary field. For these ensembles the density evolution equations can be written compactly. The density evolution for the general linear group helps us in understanding the density evolution for codes defined with respect to finite fields. We compute thresholds for different alphabet sizes for various LDPC ensembles. Surprisingly, the threshold is not a monotonic function of the alphabet size. We state the stability condition for non-binary LDPC ensembles over any binary memoryless symmetric channel. We also give upper bounds on the MAP thresholds for various non-binary ensembles based on EXIT curves and the area theorem.
[ { "version": "v1", "created": "Tue, 29 Nov 2005 12:08:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Rathi", "Vishwambhar", "" ], [ "Urbanke", "Rudiger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511101
Shi Zhou Dr.
Shi Zhou, Guo-Qiang Zhang and Guo-Qing Zhang
Chinese Internet AS-level Topology
This paper is a preprint of a paper submitted to IEE Proceedings on Communications and is subject to Institution of Engineering and Technology Copyright. If accepted, the copy of record will be available at IET Digital Library
IET Communications, vol.1, no.2, pp.209-214, 2007
10.1049/iet-com:20060518
null
cs.NI
null
We present the first complete measurement of the Chinese Internet topology at the autonomous systems (AS) level based on traceroute data probed from servers of major ISPs in mainland China. We show that both the Chinese Internet AS graph and the global Internet AS graph can be accurately reproduced by the Positive-Feedback Preference (PFP) model with the same parameters. This result suggests that the Chinese Internet preserves well the topological characteristics of the global Internet. This is the first demonstration of the Internet's topological fractality, or self-similarity, performed at the level of topology evolution modeling.
[ { "version": "v1", "created": "Tue, 29 Nov 2005 12:52:21 GMT" }, { "version": "v2", "created": "Wed, 31 May 2006 15:50:42 GMT" }, { "version": "v3", "created": "Wed, 27 Sep 2006 13:21:38 GMT" }, { "version": "v4", "created": "Mon, 4 Dec 2006 13:40:50 GMT" } ]
2007-08-08T00:00:00
[ [ "Zhou", "Shi", "" ], [ "Zhang", "Guo-Qiang", "" ], [ "Zhang", "Guo-Qing", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0511102
J?r?mie Leguay M.
Jeremie Leguay, Timur Friedman, Vania Conan
Evaluating Mobility Pattern Space Routing for DTNs
IEEE INFOCOM 2006 preprint
null
10.1109/INFOCOM.2006.299
null
cs.NI
null
Because a delay tolerant network (DTN) can often be partitioned, the problem of routing is very challenging. However, routing benefits considerably if one can take advantage of knowledge concerning node mobility. This paper addresses this problem with a generic algorithm based on the use of a high-dimensional Euclidean space, that we call MobySpace, constructed upon nodes' mobility patterns. We provide here an analysis and the large scale evaluation of this routing scheme in the context of ambient networking by replaying real mobility traces. The specific MobySpace evaluated is based on the frequency of visit of nodes for each possible location. We show that the MobySpace can achieve good performance compared to that of the other algorithms we implemented, especially when we perform routing on the nodes that have a high connection time. We determine that the degree of homogeneity of mobility patterns of nodes has a high impact on routing. And finally, we study the ability of nodes to learn their own mobility patterns.
[ { "version": "v1", "created": "Tue, 29 Nov 2005 19:38:58 GMT" } ]
2016-11-15T00:00:00
[ [ "Leguay", "Jeremie", "" ], [ "Friedman", "Timur", "" ], [ "Conan", "Vania", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0511103
Aaron Wagner
Aaron B. Wagner and Venkat Anantharam
An Infeasibility Result for the Multiterminal Source-Coding Problem
42 pages; submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
null
We prove a new outer bound on the rate-distortion region for the multiterminal source-coding problem. This bound subsumes the best outer bound in the literature and improves upon it strictly in some cases. The improved bound enables us to obtain a new, conclusive result for the binary erasure version of the "CEO problem." The bound recovers many of the converse results that have been established for special cases of the problem, including the recent one for the Gaussian version of the CEO problem.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 00:03:03 GMT" } ]
2007-07-16T00:00:00
[ [ "Wagner", "Aaron B.", "" ], [ "Anantharam", "Venkat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511104
Hossein Kakavand
Hossein Kakavand
Channel Model and Upper Bound on the Information Capacity of the Fiber Optical Communication Channel Based on the Effects of XPM Induced Nonlinearity
10 pages, 43rd Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
An upper bound to the information capacity of a wavelength-division multi- plexed optical fiber communication system is derived in a model incorporating the nonlinear propagation effects of cross-phase modulation (XPM). This work is based on the paper by Mitra et al., finding lower bounds to the channel capacity, in which physical models for propagation are used to calculate statistical properties of the conditional probability distribution relating input and output in a single WDM channel. In this paper we present a tractable channel model incorporating the effects of cross phase modulation. Using this model we find an upper bound to the information capacity of the fiber optical communication channel at high SNR. The results provide physical insight into the manner in which nonlinearities degrade the information capacity.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 01:17:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Kakavand", "Hossein", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0511105
Todd Young
Erik M. Boczko, Todd R. Young
The Signed Distance Function: A New Tool for Binary Classification
13 pages, 5 figures
null
null
null
cs.LG cs.CG
null
From a geometric perspective most nonlinear binary classification algorithms, including state of the art versions of Support Vector Machine (SVM) and Radial Basis Function Network (RBFN) classifiers, and are based on the idea of reconstructing indicator functions. We propose instead to use reconstruction of the signed distance function (SDF) as a basis for binary classification. We discuss properties of the signed distance function that can be exploited in classification algorithms. We develop simple versions of such classifiers and test them on several linear and nonlinear problems. On linear tests accuracy of the new algorithm exceeds that of standard SVM methods, with an average of 50% fewer misclassifications. Performance of the new methods also matches or exceeds that of standard methods on several nonlinear problems including classification of benchmark diagnostic micro-array data sets.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 14:15:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Boczko", "Erik M.", "" ], [ "Young", "Todd R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0511106
Sergiu Chelcea
Sergiu Theodor Chelcea (INRIA Rocquencourt / INRIA Sophia Antipolis), Alzennyr Da Silva (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis), Doru Tanasa (INRIA Rocquencourt / INRIA Sophia Antipolis), Brigitte Trousse (INRIA Rocquencourt / INRIA Sophia Antipolis)
Benefits of InterSite Pre-Processing and Clustering Methods in E-Commerce Domain
null
Dans Proceedings of the ECML/PKDD2005 Discovery Challenge, A Collaborative Effort in Knowledge Discovery from Databases
null
null
cs.DB
null
This paper presents our preprocessing and clustering analysis on the clickstream dataset proposed for the ECMLPKDD 2005 Discovery Challenge. The main contributions of this article are double. First, after presenting the clickstream dataset, we show how we build a rich data warehouse based an advanced preprocesing. We take into account the intersite aspects in the given ecommerce domain, which offers an interesting data structuration. A preliminary statistical analysis based on time period clickstreams is given, emphasing the importance of intersite user visits in such a context. Secondly, we describe our crossed-clustering method which is applied on data generated from our data warehouse. Our preliminary results are interesting and promising illustrating the benefits of our WUM methods, even if more investigations are needed on the same dataset.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 16:12:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Chelcea", "Sergiu Theodor", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Da Silva", "Alzennyr", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Tanasa", "Doru", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Trousse", "Brigitte", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0511107
J. G. Esteve
J. G. Esteve and F. Falceto
Phase transition in the assignment problem for random matrices
7 pages, 5 figures; accepted for publication in Europhys. Lett. http://www.edpsciences.org/journal/index.cfm?edpsname=epl
null
10.1209/epl/i2005-10296-6
null
cs.CC cond-mat.stat-mech
null
We report an analytic and numerical study of a phase transition in a P problem (the assignment problem) that separates two phases whose representatives are the simple matching problem (an easy P problem) and the traveling salesman problem (a NP-complete problem). Like other phase transitions found in combinatoric problems (K-satisfiability, number partitioning) this can help to understand the nature of the difficulties in solving NP problems an to find more accurate algorithms for them.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 18:03:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Esteve", "J. G.", "" ], [ "Falceto", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
cs/0511108
Abdelhadi Benabdallah
A. Benabdallah and G. Radons
Parameter Estimation of Hidden Diffusion Processes: Particle Filter vs. Modified Baum-Welch Algorithm
15 pages, 3 figures, 2 tables
null
null
null
cs.DS cs.LG
null
We propose a new method for the estimation of parameters of hidden diffusion processes. Based on parametrization of the transition matrix, the Baum-Welch algorithm is improved. The algorithm is compared to the particle filter in application to the noisy periodic systems. It is shown that the modified Baum-Welch algorithm is capable of estimating the system parameters with better accuracy than particle filters.
[ { "version": "v1", "created": "Wed, 30 Nov 2005 20:23:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Benabdallah", "A.", "" ], [ "Radons", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0512001
Frank Ruskey
Jeremy Carroll (1), Frank Ruskey (2), Mark Weston (2) ((1) HP Laboratories, Bristol, UK, (2) University of Victoria, Canada)
Which n-Venn diagrams can be drawn with convex k-gons?
10 pages, 3 figures. To be published in Proceedings of the Second International Workshop on Euler Diagrams (Euler 2005), Electronic Notes in Theoretical Computer Science
null
null
null
cs.CG
null
We establish a new lower bound for the number of sides required for the component curves of simple Venn diagrams made from polygons. Specifically, for any n-Venn diagram of convex k-gons, we prove that k >= (2^n - 2 - n) / (n (n-2)). In the process we prove that Venn diagrams of seven curves, simple or not, cannot be formed from triangles. We then give an example achieving the new lower bound of a (simple, symmetric) Venn diagram of seven quadrilaterals. Previously Grunbaum had constructed a 7-Venn diagram of non-convex 5-gons [``Venn Diagrams II'', Geombinatorics 2:25-31, 1992].
[ { "version": "v1", "created": "Wed, 30 Nov 2005 23:30:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Carroll", "Jeremy", "" ], [ "Ruskey", "Frank", "" ], [ "Weston", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0512002
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa
On Self-Regulated Swarms, Societal Memory, Speed and Dynamics
11 pages, 8 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos/refs_2005.html, KEYWORDS: Dynamic Optimization, Dynamic Optimal Control problems, Swarm Intelligence, Self-Organization, Societal Implicit Memory. Submitted to ALIFE-X, Int. Conf. on the Simulation and Synthesis of Living Systems, Bloomington, Indiana, USA, June 3-7, 2006
null
null
null
cs.NE cs.AI
null
We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of our dynamic search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control problems, measuring reaction speeds and performance. Final comparisons were made with standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found. One of the most interesting illustrate that the present SRS collective swarm of bio-inspired ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single individual composing that precise swarm tracking system.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 03:10:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0512003
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes, Agostinho C. Rosa
Societal Implicit Memory and his Speed on Tracking Extrema over Dynamic Environments using Self-Regulatory Swarms
20 pages, 25 figures, http://alfa.ist.utl.pt/~cvrm/staff/vramos . Draft submitted to Journal of Systems Architecture, Farooq M. and Menezes R. (Eds.), Special issue on Nature Inspired Applied Systems, Elsevier, 2006
null
null
null
cs.MA cs.AI
null
In order to overcome difficult dynamic optimization and environment extrema tracking problems, We propose a Self-Regulated Swarm (SRS) algorithm which hybridizes the advantageous characteristics of Swarm Intelligence as the emergence of a societal environmental memory or cognitive map via collective pheromone laying in the landscape (properly balancing the exploration/exploitation nature of our dynamic search strategy), with a simple Evolutionary mechanism that trough a direct reproduction procedure linked to local environmental features is able to self-regulate the above exploratory swarm population, speeding it up globally. In order to test his adaptive response and robustness, we have recurred to different dynamic multimodal complex functions as well as to Dynamic Optimization Control problems, measuring reaction speeds and performance. Final comparisons were made with standard Genetic Algorithms (GAs), Bacterial Foraging strategies (BFOA), as well as with recent Co-Evolutionary approaches. SRS's were able to demonstrate quick adaptive responses, while outperforming the results obtained by the other approaches. Additionally, some successful behaviors were found. One of the most interesting illustrate that the present SRS collective swarm of bio-inspired ant-like agents is able to track about 65% of moving peaks traveling up to ten times faster than the velocity of a single individual composing that precise swarm tracking system.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:09:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0512004
Vitorino Ramos Dr.
Carlos Fernandes, Vitorino Ramos and Agostinho C. Rosa
Self-Regulated Artificial Ant Colonies on Digital Image Habitats
8 pages, 17 figures, full pictures in http://alfa.ist.utl.pt/~cvrm/staff/vramos/Vramos-WCLC05b.pdf
in International Journal of Lateral Computing, IJLC, vol. 2 (1), pp. 1-8, ISSN 0973-208X, Dec. 2005
null
null
cs.MA cs.AI
null
Artificial life models, swarm intelligent and evolutionary computation algorithms are usually built on fixed size populations. Some studies indicate however that varying the population size can increase the adaptability of these systems and their capability to react to changing environments. In this paper we present an extended model of an artificial ant colony system designed to evolve on digital image habitats. We will show that the present swarm can adapt the size of the population according to the type of image on which it is evolving and reacting faster to changing images, thus converging more rapidly to the new desired regions, regulating the number of his image foraging agents. Finally, we will show evidences that the model can be associated with the Mathematical Morphology Watershed algorithm to improve the segmentation of digital grey-scale images. KEYWORDS: Swarm Intelligence, Perception and Image Processing, Pattern Recognition, Mathematical Morphology, Social Cognitive Maps, Social Foraging, Self-Organization, Distributed Search.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:39:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Fernandes", "Carlos", "" ], [ "Ramos", "Vitorino", "" ], [ "Rosa", "Agostinho C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0512005
Vitorino Ramos Dr.
Vitorino Ramos, Carlos Fernandes and Agostinho C. Rosa
On Ants, Bacteria and Dynamic Environments
8 pages, 6 figures, full paper with pictures in http://alfa.ist.utl.pt/~cvrm/staff/vramos/ref_63.html, keywords: Swarm Intelligence and Perception, Social Cognitive Maps, Social Foraging, Self-Organization, Distributed Search and Optimization in Dynamic Environments. In NCA-05, Natural Computing and Applications Workshop, IEEE Computer Press, Timisoara, Romania, Sep. 25-29, 2005
null
null
null
cs.DC
null
Wasps, bees, ants and termites all make effective use of their environment and resources by displaying collective swarm intelligence. Termite colonies - for instance - build nests with a complexity far beyond the comprehension of the individual termite, while ant colonies dynamically allocate labor to various vital tasks such as foraging or defense without any central decision-making ability. Recent research suggests that microbial life can be even richer: highly social, intricately networked, and teeming with interactions, as found in bacteria. What strikes from these observations is that both ant colonies and bacteria have similar natural mechanisms based on Stigmergy and Self-Organization in order to emerge coherent and sophisticated patterns of global behaviour. Keeping in mind the above characteristics we will present a simple model to tackle the collective adaptation of a social swarm based on real ant colony behaviors (SSA algorithm) for tracking extrema in dynamic environments and highly multimodal complex functions described in the well-know De Jong test suite. Then, for the purpose of comparison, a recent model of artificial bacterial foraging (BFOA algorithm) based on similar stigmergic features is described and analyzed. Final results indicate that the SSA collective intelligence is able to cope and quickly adapt to unforeseen situations even when over the same cooperative foraging period, the community is requested to deal with two different and contradictory purposes, while outperforming BFOA in adaptive speed.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 04:52:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "Carlos", "" ], [ "Rosa", "Agostinho C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0512006
Igal Sason
Henry D. Pfister and Igal Sason
Capacity-Achieving Ensembles of Accumulate-Repeat-Accumulate Codes for the Erasure Channel with Bounded Complexity
Submitted to IEEE Trans. on Information Theory, December 1st, 2005. Includes 50 pages and 13 figures
IEEE Transactions on Information Theory, Vol. 53 (6), pp. 2088-2115, June 2007
10.1109/TIT.2007.896873
null
cs.IT math.IT
null
The paper introduces ensembles of accumulate-repeat-accumulate (ARA) codes which asymptotically achieve capacity on the binary erasure channel (BEC) with {\em bounded complexity}, per information bit, of encoding and decoding. It also introduces symmetry properties which play a central role in the construction of capacity-achieving ensembles for the BEC with bounded complexity. The results here improve on the tradeoff between performance and complexity provided by previous constructions of capacity-achieving ensembles of codes defined on graphs. The superiority of ARA codes with moderate to large block length is exemplified by computer simulations which compare their performance with those of previously reported capacity-achieving ensembles of LDPC and IRA codes. The ARA codes also have the advantage of being systematic.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 15:16:05 GMT" } ]
2009-09-29T00:00:00
[ [ "Pfister", "Henry D.", "" ], [ "Sason", "Igal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512007
Arindam Mitra
Arindam Mitra
Entangled messages
PDF, 2 Pages
null
null
null
cs.CR cs.IR
null
It is sometimes necessary to send copies of the same email to different parties, but it is impossible to ensure that if one party reads the message the other parties will bound to read it. We propose an entanglement based scheme where if one party reads the message the other party will bound to read it simultaneously.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 15:40:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0512008
Joel Friedman
Joel Friedman
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
70 pages, abstract corrected and modified
null
null
null
cs.CC math.AG
null
This paper is motivated by questions such as P vs. NP and other questions in Boolean complexity theory. We describe an approach to attacking such questions with cohomology, and we show that using Grothendieck topologies and other ideas from the Grothendieck school gives new hope for such an attack. We focus on circuit depth complexity, and consider only finite topological spaces or Grothendieck topologies based on finite categories; as such, we do not use algebraic geometry or manifolds. Given two sheaves on a Grothendieck topology, their "cohomological complexity" is the sum of the dimensions of their Ext groups. We seek to model the depth complexity of Boolean functions by the cohomological complexity of sheaves on a Grothendieck topology. We propose that the logical AND of two Boolean functions will have its corresponding cohomological complexity bounded in terms of those of the two functions using ``virtual zero extensions.'' We propose that the logical negation of a function will have its corresponding cohomological complexity equal to that of the original function using duality theory. We explain these approaches and show that they are stable under pullbacks and base change. It is the subject of ongoing work to achieve AND and negation bounds simultaneously in a way that yields an interesting depth lower bound.
[ { "version": "v1", "created": "Thu, 1 Dec 2005 22:40:27 GMT" }, { "version": "v2", "created": "Fri, 2 Dec 2005 21:25:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
cs/0512009
Bas Spitters
Bas Spitters
Almost periodic functions, constructively
null
Logical Methods in Computer Science, Volume 1, Issue 3 (December 20, 2005) lmcs:2263
10.2168/LMCS-1(3:3)2005
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The almost periodic functions form a natural example of a non-separable normed space. As such, it has been a challenge for constructive mathematicians to find a natural treatment of them. Here we present a simple proof of Bohr's fundamental theorem for almost periodic functions which we then generalize to almost periodic functions on general topological groups.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 11:30:12 GMT" }, { "version": "v2", "created": "Tue, 20 Dec 2005 15:54:25 GMT" }, { "version": "v3", "created": "Tue, 7 Oct 2008 10:01:28 GMT" } ]
2017-01-11T00:00:00
[ [ "Spitters", "Bas", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0512010
Timothy Porter
Jonathan Gratus and Timothy Porter
A geometry of information, I: Nerves, posets and differential forms
28 pages. A version of this paper appears also on the Dagstuhl seminar portal http://drops.dagstuhl.de/portals/04351/
null
null
null
cs.AI cs.GR
null
The main theme of this workshop (Dagstuhl seminar 04351) is `Spatial Representation: Continuous vs. Discrete'. Spatial representation has two contrasting but interacting aspects (i) representation of spaces' and (ii) representation by spaces. In this paper, we will examine two aspects that are common to both interpretations of the theme, namely nerve constructions and refinement. Representations change, data changes, spaces change. We will examine the possibility of a `differential geometry' of spatial representations of both types, and in the sequel give an algebra of differential forms that has the potential to handle the dynamical aspect of such a geometry. We will discuss briefly a conjectured class of spaces, generalising the Cantor set which would seem ideal as a test-bed for the set of tools we are developing.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 16:18:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Gratus", "Jonathan", "" ], [ "Porter", "Timothy", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0512011
Shi Zhou Dr.
Shi Zhou
Understanding the internet topology evolution dynamics
15 figures
Physical Review E, vol. 70, no. 016124, July 2006.
10.1103/PhysRevE.74.016124
null
cs.NI
null
The internet structure is extremely complex. The Positive-Feedback Preference (PFP) model is a recently introduced internet topology generator. The model uses two generic algorithms to replicate the evolution dynamics observed on the internet historic data. The phenomenological model was originally designed to match only two topology properties of the internet, i.e. the rich-club connectivity and the exact form of degree distribution. Whereas numerical evaluation has shown that the PFP model accurately reproduces a large set of other nontrivial characteristics as well. This paper aims to investigate why and how this generative model captures so many diverse properties of the internet. Based on comprehensive simulation results, the paper presents a detailed analysis on the exact origin of each of the topology properties produced by the model. This work reveals how network evolution mechanisms control the obtained topology properties and it also provides insights on correlations between various structural characteristics of complex networks.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 18:24:10 GMT" }, { "version": "v2", "created": "Tue, 18 Apr 2006 11:45:01 GMT" }, { "version": "v3", "created": "Thu, 13 Jul 2006 08:37:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Shi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0512012
Brijesh Dongol
Brijesh Dongol and Doug Goldson
Extending the theory of Owicki and Gries with a logic of progress
null
Logical Methods in Computer Science, Volume 2, Issue 1 (March 10, 2006) lmcs:2260
10.2168/LMCS-2(1:6)2006
null
cs.LO
null
This paper describes a logic of progress for concurrent programs. The logic is based on that of UNITY, molded to fit a sequential programming model. Integration of the two is achieved by using auxiliary variables in a systematic way that incorporates program counters into the program text. The rules for progress in UNITY are then modified to suit this new system. This modification is however subtle enough to allow the theory of Owicki and Gries to be used without change.
[ { "version": "v1", "created": "Sat, 3 Dec 2005 01:04:16 GMT" }, { "version": "v2", "created": "Wed, 18 Jan 2006 22:20:46 GMT" }, { "version": "v3", "created": "Fri, 10 Mar 2006 12:52:35 GMT" } ]
2017-01-11T00:00:00
[ [ "Dongol", "Brijesh", "" ], [ "Goldson", "Doug", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0512013
Lifeng Lai
Lifeng Lai and Hesham El Gamal
The Water-Filling Game in Fading Multiple Access Channels
26 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We adopt a game theoretic approach for the design and analysis of distributed resource allocation algorithms in fading multiple access channels. The users are assumed to be selfish, rational, and limited by average power constraints. We show that the sum-rate optimal point on the boundary of the multipleaccess channel capacity region is the unique Nash Equilibrium of the corresponding water-filling game. This result sheds a new light on the opportunistic communication principle and argues for the fairness of the sum-rate optimal point, at least from a game theoretic perspective. The base-station is then introduced as a player interested in maximizing a weighted sum of the individual rates. We propose a Stackelberg formulation in which the base-station is the designated game leader. In this set-up, the base-station announces first its strategy defined as the decoding order of the different users, in the successive cancellation receiver, as a function of the channel state. In the second stage, the users compete conditioned on this particular decoding strategy. We show that this formulation allows for achieving all the corner points of the capacity region, in addition to the sum-rate optimal point. On the negative side, we prove the non-existence of a base-station strategy in this formulation that achieves the rest of the boundary points. To overcome this limitation, we present a repeated game approach which achieves the capacity region of the fading multiple access channel. Finally, we extend our study to vector channels highlighting interesting differences between this scenario and the scalar channel case.
[ { "version": "v1", "created": "Sat, 3 Dec 2005 05:58:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512014
Farhad Meshkati
Farhad Meshkati, Mung Chiang, H. Vincent Poor and Stuart C. Schwartz
A Game-Theoretic Approach to Energy-Efficient Power Control in Multi-Carrier CDMA Systems
To appear in the IEEE Journal on Selected Areas in Communications (JSAC) special issue on advances in multi-carrier CDMA
null
null
null
cs.IT math.IT
null
A game-theoretic model for studying power control in multi-carrier CDMA systems is proposed. Power control is modeled as a non-cooperative game in which each user decides how much power to transmit over each carrier to maximize its own utility. The utility function considered here measures the number of reliable bits transmitted over all the carriers per Joule of energy consumed and is particularly suitable for networks where energy efficiency is important. The multi-dimensional nature of users' strategies and the non-quasiconcavity of the utility function make the multi-carrier problem much more challenging than the single-carrier or throughput-based-utility case. It is shown that, for all linear receivers including the matched filter, the decorrelator, and the minimum-mean-square-error (MMSE) detector, a user's utility is maximized when the user transmits only on its "best" carrier. This is the carrier that requires the least amount of power to achieve a particular target signal-to-interference-plus-noise ratio (SINR) at the output of the receiver. The existence and uniqueness of Nash equilibrium for the proposed power control game are studied. In particular, conditions are given that must be satisfied by the channel gains for a Nash equilibrium to exist, and the distribution of the users among the carriers at equilibrium is also characterized. In addition, an iterative and distributed algorithm for reaching the equilibrium (when it exists) is presented. It is shown that the proposed approach results in significant improvements in the total utility achieved at equilibrium compared to a single-carrier system and also to a multi-carrier system in which each user maximizes its utility over each carrier independently.
[ { "version": "v1", "created": "Sat, 3 Dec 2005 15:38:43 GMT" } ]
2007-07-13T00:00:00
[ [ "Meshkati", "Farhad", "" ], [ "Chiang", "Mung", "" ], [ "Poor", "H. Vincent", "" ], [ "Schwartz", "Stuart C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512015
Maxim Raginsky
Maxim Raginsky
Joint fixed-rate universal lossy coding and identification of continuous-alphabet memoryless sources
28 pages, 2 eps figures; revised version submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT cs.LG math.IT
null
The problem of joint universal source coding and identification is considered in the setting of fixed-rate lossy coding of continuous-alphabet memoryless sources. For a wide class of bounded distortion measures, it is shown that any compactly parametrized family of $\R^d$-valued i.i.d. sources with absolutely continuous distributions satisfying appropriate smoothness and Vapnik--Chervonenkis learnability conditions, admits a joint scheme for universal lossy block coding and parameter estimation, such that when the block length $n$ tends to infinity, the overhead per-letter rate and the distortion redundancies converge to zero as $O(n^{-1}\log n)$ and $O(\sqrt{n^{-1}\log n})$, respectively. Moreover, the active source can be determined at the decoder up to a ball of radius $O(\sqrt{n^{-1} \log n})$ in variational distance, asymptotically almost surely. The system has finite memory length equal to the block length, and can be thought of as blockwise application of a time-invariant nonlinear filter with initial conditions determined from the previous block. Comparisons are presented with several existing schemes for universal vector quantization, which do not include parameter estimation explicitly, and an extension to unbounded distortion measures is outlined. Finally, finite mixture classes and exponential families are given as explicit examples of parametric sources admitting joint universal compression and modeling schemes of the kind studied here.
[ { "version": "v1", "created": "Sat, 3 Dec 2005 19:21:33 GMT" }, { "version": "v2", "created": "Wed, 8 Nov 2006 15:41:07 GMT" }, { "version": "v3", "created": "Thu, 17 May 2007 18:57:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Raginsky", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512016
Mikl\'os Cs\H{u}r\"os
Mikl\'os Cs\H{u}r\"os
A linear-time algorithm for finding the longest segment which scores above a given threshold
null
null
null
null
cs.DS cs.CE
null
This paper describes a linear-time algorithm that finds the longest stretch in a sequence of real numbers (``scores'') in which the sum exceeds an input parameter. The algorithm also solves the problem of finding the longest interval in which the average of the scores is above a fixed threshold. The problem originates from molecular sequence analysis: for instance, the algorithm can be employed to identify long GC-rich regions in DNA sequences. The algorithm can also be used to trim low-quality ends of shotgun sequences in a preprocessing step of whole-genome assembly.
[ { "version": "v1", "created": "Sun, 4 Dec 2005 04:28:00 GMT" }, { "version": "v2", "created": "Sun, 12 Mar 2006 02:40:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Csűrös", "Miklós", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0512017
Saurabha Tavildar
Saurabha Tavildar and Pramod Viswanath
Approximately Universal Codes over Slow Fading Channels
Revised version. Accepted for IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Performance of reliable communication over a coherent slow fading channel at high SNR is succinctly captured as a fundamental tradeoff between diversity and multiplexing gains. We study the problem of designing codes that optimally tradeoff the diversity and multiplexing gains. Our main contribution is a precise characterization of codes that are universally tradeoff-optimal, i.e., they optimally tradeoff the diversity and multiplexing gains for every statistical characterization of the fading channel. We denote this characterization as one of approximate universality where the approximation is in the connection between error probability and outage capacity with diversity and multiplexing gains, respectively. The characterization of approximate universality is then used to construct new coding schemes as well as to show optimality of several schemes proposed in the space-time coding literature.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 20:19:51 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2005 22:32:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Tavildar", "Saurabha", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512018
Anthony Mouraud
Anthony Mouraud (GRIMAAG, ISC), Didier Puzenat (GRIMAAG), H\'el\`ene Paugam-Moisy (ISC)
DAMNED: A Distributed and Multithreaded Neural Event-Driven simulation framework
6 pages
null
null
null
cs.NE cs.LG
null
In a Spiking Neural Networks (SNN), spike emissions are sparsely and irregularly distributed both in time and in the network architecture. Since a current feature of SNNs is a low average activity, efficient implementations of SNNs are usually based on an Event-Driven Simulation (EDS). On the other hand, simulations of large scale neural networks can take advantage of distributing the neurons on a set of processors (either workstation cluster or parallel computer). This article presents DAMNED, a large scale SNN simulation framework able to gather the benefits of EDS and parallel computing. Two levels of parallelism are combined: Distributed mapping of the neural topology, at the network level, and local multithreaded allocation of resources for simultaneous processing of events, at the neuron level. Based on the causality of events, a distributed solution is proposed for solving the complex problem of scheduling without synchronization barrier.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 06:57:39 GMT" }, { "version": "v2", "created": "Tue, 21 Mar 2006 12:31:02 GMT" } ]
2016-08-16T00:00:00
[ [ "Mouraud", "Anthony", "", "GRIMAAG, ISC" ], [ "Puzenat", "Didier", "", "GRIMAAG" ], [ "Paugam-Moisy", "Hélène", "", "ISC" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0512019
Marek W. Gutowski
Marek W. Gutowski
Amazing geometry of genetic space or are genetic algorithms convergent?
7 pages, presented on VII KAEiOG (VII Domestic Conference on Evolutionary Algorithms and Global Optimization), May 24-26, 2004, Kazimierz Dolny, Poland
null
null
null
cs.NE cs.DM cs.SE
null
There is no proof yet of convergence of Genetic Algorithms. We do not supply it too. Instead, we present some thoughts and arguments to convince the Reader, that Genetic Algorithms are essentially bound for success. For this purpose, we consider only the crossover operators, single- or multiple-point, together with selection procedure. We also give a proof that the soft selection is superior to other selection schemes.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 11:12:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutowski", "Marek W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0512020
Nima Sarshar
Nima Sarshar and Xiaolin Wu
A Practical Approach to Joint Network-Source Coding
submitted to Data Compression Conference, 2006
null
null
null
cs.IT math.IT
null
We are interested in how to best communicate a real valued source to a number of destinations (sinks) over a network with capacity constraints in a collective fidelity metric over all the sinks, a problem which we call joint network-source coding. It is demonstrated that multiple description codes along with proper diversity routing provide a powerful solution to joint network-source coding. A systematic optimization approach is proposed. It consists of optimizing the network routing given a multiple description code and designing optimal multiple description code for the corresponding optimized routes.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 19:09:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Sarshar", "Nima", "" ], [ "Wu", "Xiaolin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512021
Ted Herman
Brahim Hamid (1), Ted Herman (2), Morten Mjelde (3) ((1) LaBRI University of Bordeaux-1 France, (2) University of Iowa, (3) University in Bergen Norway)
The Poster Session of SSS 2005
3 pages, related to Springer LNCS 3764, Proceedings of Symposium on Self-Stabilizing Systems
null
null
TR-05-13
cs.DC cs.DS
null
This technical report documents the poster session of SSS 2005, the Symposium on Self-Stabilizing Systems published by Springer as LNCS volume 3764. The poster session included five presentations. Two of these presentations are summarized in brief abstracts contained in this technical report.
[ { "version": "v1", "created": "Mon, 5 Dec 2005 22:51:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hamid", "Brahim", "" ], [ "Herman", "Ted", "" ], [ "Mjelde", "Morten", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0512022
Louis Mello
Louis Mello
Fat Tailed Distributions in Catastrophe Prediction
null
null
null
null
cs.OH
null
This paper discusses the use of fat-tailed distributions in catastrophe prediction as opposed to the more common use of the Normal Distribution.
[ { "version": "v1", "created": "Tue, 6 Dec 2005 01:21:39 GMT" } ]
2011-11-09T00:00:00
[ [ "Mello", "Louis", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0512023
Petros Elia
Petros Elia, B. A. Sethuraman and P. Vijay Kumar
Perfect Space-Time Codes with Minimum and Non-Minimum Delay for Any Number of Antennas
null
null
null
null
cs.IT math.IT
null
Perfect space-time codes were first introduced by Oggier et. al. to be the space-time codes that have full rate, full diversity-gain, non-vanishing determinant for increasing spectral efficiency, uniform average transmitted energy per antenna and good shaping of the constellation. These defining conditions jointly correspond to optimality with respect to the Zheng-Tse D-MG tradeoff, independent of channel statistics, as well as to near optimality in maximizing mutual information. All the above traits endow the code with error performance that is currently unmatched. Yet perfect space-time codes have been constructed only for 2,3,4 and 6 transmit antennas. We construct minimum and non-minimum delay perfect codes for all channel dimensions.
[ { "version": "v1", "created": "Tue, 6 Dec 2005 02:03:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Sethuraman", "B. A.", "" ], [ "Kumar", "P. Vijay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]