id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0512024
Alexander Barg
Alexander Barg and Dmitry Nogin
A bound on Grassmannian codes
5 pages, submitted
Journal of Combinatorial Theory, Ser. A, vol.113,no.8, 2006, pp.1629-1635
10.1016/j.jcta.2006.03.025
null
cs.IT math.IT math.MG
null
We give a new asymptotic upper bound on the size of a code in the Grassmannian space. The bound is better than the upper bounds known previously in the entire range of distances except very large values.
[ { "version": "v1", "created": "Tue, 6 Dec 2005 04:30:57 GMT" } ]
2019-05-14T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Nogin", "Dmitry", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
cs/0512025
Alexander Barg
Alexander Barg and Dmitry Nogin
Spectral approach to linear programming bounds on codes
11 pages, submitted
Problems of Information Transmission 42, 2, 2006, 77-89
10.1134/S0032946006020025
null
cs.IT math.CO math.IT
null
We give new proofs of asymptotic upper bounds of coding theory obtained within the frame of Delsarte's linear programming method. The proofs rely on the analysis of eigenvectors of some finite-dimensional operators related to orthogonal polynomials. The examples of the method considered in the paper include binary codes, binary constant-weight codes, spherical codes, and codes in the projective spaces.
[ { "version": "v1", "created": "Tue, 6 Dec 2005 04:36:39 GMT" }, { "version": "v2", "created": "Mon, 13 Mar 2006 23:38:19 GMT" } ]
2019-05-14T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Nogin", "Dmitry", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512026
Ingo Josopait
I. Josopait
Checking C++ Programs for Dimensional Consistency
submitted to "Computing in Science and Engineering"
null
null
null
cs.PL
null
I will present my implementation 'n-units' of physical units into C++ programs. It allows the compiler to check for dimensional consistency.
[ { "version": "v1", "created": "Wed, 7 Dec 2005 15:51:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Josopait", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0512027
Jing Chen
Jing Chen
The Physical Foundation of Human Mind and a New Theory of Investment
null
null
null
null
cs.IT math.IT
null
This paper consists of two parts. In the first part, we develop a new information theory, in which it is not a coincidence that information and physical entropy share the same mathematical formula. It is an adaptation of mind to help search for resources. We then show that psychological patterns either reflect the constraints of physical laws or are evolutionary adaptations to efficiently process information and to increase the chance of survival in the environment of our evolutionary past. In the second part, we demonstrate that the new information theory provides the foundation to understand market behavior. One fundamental result from the information theory is that information is costly. In general, information with higher value is more costly. Another fundamental result from the information theory is that the amount of information one can receive is the amount of information generated minus equivocation. The level of equivocation, which is the measure of information asymmetry, is determined by the correlation between the source of information and the receiver of information. In general, how much information one can receive depends on the background knowledge of the receiver. The difference in cost different investors are willing to pay for information and the difference in background knowledge about a particular information causes the heterogeneity in information processing by the investment public, which is the main reason of the price and volume patterns observed in the market. Many assumptions in some of the recent models on behavioral finance can be derived naturally from this theory.
[ { "version": "v1", "created": "Wed, 7 Dec 2005 17:33:51 GMT" }, { "version": "v2", "created": "Thu, 22 Dec 2005 18:59:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Jing", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512028
Petros Elia
Petros Elia and P. Vijay Kumar
Approximately universal optimality over several dynamic and non-dynamic cooperative diversity schemes for wireless networks
null
null
null
null
cs.IT math.IT
null
In this work we explicitly provide the first ever optimal, with respect to the Zheng-Tse diversity multiplexing gain (D-MG) tradeoff, cooperative diversity schemes for wireless relay networks. The schemes are based on variants of perfect space-time codes and are optimal for any number of users and all statistically symmetric (and in some cases, asymmetric) fading distributions. We deduce that, with respect to the D-MG tradeoff, channel knowledge at the intermediate relays and infinite delay are unnecessary. We also show that the non-dynamic selection decode and forward strategy, the non-dynamic amplify and forward, the non-dynamic receive and forward, the dynamic amplify and forward and the dynamic receive and forward cooperative diversity strategies allow for exactly the same D-MG optimal performance.
[ { "version": "v1", "created": "Wed, 7 Dec 2005 21:16:51 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Kumar", "P. Vijay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512029
Elitza Maneva
Elitza N. Maneva and Amin Shokrollahi
New model for rigorous analysis of LT-codes
null
null
null
null
cs.IT math.IT
null
We present a new model for LT codes which simplifies the analysis of the error probability of decoding by belief propagation. For any given degree distribution, we provide the first rigorous expression for the limiting error probability as the length of the code goes to infinity via recent results in random hypergraphs [Darling-Norris 2005]. For a code of finite length, we provide an algorithm for computing the probability of error of the decoder. This algorithm improves the one of [Karp-Luby-Shokrollahi 2004] by a linear factor.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 02:46:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Maneva", "Elitza N.", "" ], [ "Shokrollahi", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512030
Leif Hanlen PhD
Ram Somaraju, Leif W. Hanlen
Uncertainty Principles for Signal Concentrations
5 pages, 1 figure, Australian Communications Theory Workshop 2006
null
null
null
cs.IT math.IT
null
Uncertainty principles for concentration of signals into truncated subspaces are considered. The ``classic'' uncertainty principle is explored as a special case of a more general operator framework. The time-bandwidth concentration problem is shown as a similar special case. A spatial concentration of radio signals example is provided, and it is shown that an uncertainty principle exists for concentration of single-frequency signals for regions in space. We show that the uncertainty is related to the volumes of the spatial regions.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 05:37:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Somaraju", "Ram", "" ], [ "Hanlen", "Leif W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512031
Slawomir Lasota
Slawomir Lasota and Igor Walukiewicz
Alternating Timed Automata
the full version of the Fossacs'05 conference preliminary paper revised according ot the referee's comments
null
null
null
cs.LO
null
A notion of alternating timed automata is proposed. It is shown that such automata with only one clock have decidable emptiness problem over finite words. This gives a new class of timed languages which is closed under boolean operations and which has an effective presentation. We prove that the complexity of the emptiness problem for alternating timed automata with one clock is non-primitive recursive. The proof gives also the same lower bound for the universality problem for nondeterministic timed automata with one clock. We investigate extension of the model with epsilon-transitions and prove that emptiness is undecidable. Over infinite words, we show undecidability of the universality problem.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 08:50:35 GMT" }, { "version": "v2", "created": "Thu, 24 Aug 2006 14:56:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Lasota", "Slawomir", "" ], [ "Walukiewicz", "Igor", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0512032
Angel Talamona
Sebasti\'an Bengochea (INRIA Rocquencourt), Angel Talamona (INRIA Rocquencourt), Michel Parent (INRIA Rocquencourt)
A Software Framework for Vehicle-Infrastructure Cooperative Applications
null
null
null
null
cs.IR
null
A growing category of vehicle-infrastructure cooperative (VIC) applications requires telematics software components distributed between an infrastructure-based management center and a number of vehicles. This article presents an approach based on a software framework, focusing on a Telematic Management System (TMS), a component suite aimed to run inside an infrastructure-based operations center, in some cases interacting with legacy systems like Advanced Traffic Management Systems or Vehicle Relationship Management. The TMS framework provides support for modular, flexible, prototyping and implementation of VIC applications. This work has received the support of the European Commission in the context of the projects REACT and CyberCars.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 09:37:49 GMT" } ]
2016-08-16T00:00:00
[ [ "Bengochea", "Sebastián", "", "INRIA Rocquencourt" ], [ "Talamona", "Angel", "", "INRIA\n Rocquencourt" ], [ "Parent", "Michel", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0512033
Bernardo Huberman
Bernardo A. Huberman and Fang Wu
Bootstrapping the Long Tail in Peer to Peer Systems
null
null
null
null
cs.NI cs.CY physics.soc-ph
null
We describe an efficient incentive mechanism for P2P systems that generates a wide diversity of content offerings while responding adaptively to customer demand. Files are served and paid for through a parimutuel market similar to that commonly used for betting in horse races. An analysis of the performance of such a system shows that there exists an equilibrium with a long tail in the distribution of content offerings, which guarantees the real time provision of any content regardless of its popularity.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 18:02:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Wu", "Fang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0512034
Bernardo Huberman
Bernardo A. Huberman, Fang Wu and Li Zhang
Ensuring Trust in One Time Exchanges: Solving the QoS Problem
null
null
null
null
cs.GT physics.soc-ph
null
We describe a pricing structure for the provision of IT services that ensures trust without requiring repeated interactions between service providers and users. It does so by offering a pricing structure that elicits truthful reporting of quality of service (QoS) by providers while making them profitable. This mechanism also induces truth-telling on the part of users reserving the service.
[ { "version": "v1", "created": "Thu, 8 Dec 2005 19:44:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Huberman", "Bernardo A.", "" ], [ "Wu", "Fang", "" ], [ "Zhang", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0512035
Michael N. Vyalyi
Sergey P. Tarasov, Mikhail N. Vyalyi
Semidefinite programming and arithmetic circuit evaluation
Submitted to Special issue of DAM in memory of L.Khachiyan
null
null
null
cs.CC
null
A rational number can be naturally presented by an arithmetic computation (AC): a sequence of elementary arithmetic operations starting from a fixed constant, say 1. The asymptotic complexity issues of such a representation are studied e.g. in the framework of the algebraic complexity theory over arbitrary field. Here we study a related problem of the complexity of performing arithmetic operations and computing elementary predicates, e.g. ``='' or ``>'', on rational numbers given by AC. In the first place, we prove that AC can be efficiently simulated by the exact semidefinite programming (SDP). Secondly, we give a BPP-algorithm for the equality predicate. Thirdly, we put ``>''-predicate into the complexity class PSPACE. We conjecture that ``>''-predicate is hard to compute. This conjecture, if true, would clarify the complexity status of the exact SDP - a well known open problem in the field of mathematical programming.
[ { "version": "v1", "created": "Fri, 9 Dec 2005 16:01:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Tarasov", "Sergey P.", "" ], [ "Vyalyi", "Mikhail N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0512036
Alwen Tiu
Alwen Tiu
A System of Interaction and Structure II: The Need for Deep Inference
null
Logical Methods in Computer Science, Volume 2, Issue 2 (April 3, 2006) lmcs:2252
10.2168/LMCS-2(2:4)2006
null
cs.LO
null
This paper studies properties of the logic BV, which is an extension of multiplicative linear logic (MLL) with a self-dual non-commutative operator. BV is presented in the calculus of structures, a proof theoretic formalism that supports deep inference, in which inference rules can be applied anywhere inside logical expressions. The use of deep inference results in a simple logical system for MLL extended with the self-dual non-commutative operator, which has been to date not known to be expressible in sequent calculus. In this paper, deep inference is shown to be crucial for the logic BV, that is, any restriction on the ``depth'' of the inference rules of BV would result in a strictly less expressive logical system.
[ { "version": "v1", "created": "Fri, 9 Dec 2005 16:36:54 GMT" }, { "version": "v2", "created": "Mon, 3 Apr 2006 15:43:35 GMT" } ]
2017-01-11T00:00:00
[ [ "Tiu", "Alwen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0512037
Aristoklis Anastasiadis
Aristoklis D. Anastasiadis, and George D. Magoulas
Evolving Stochastic Learning Algorithm Based on Tsallis Entropic Index
12 pages, 11 figures, journal
null
10.1140/epjb/e2006-00137-6
null
cs.NE cs.AI
null
In this paper, inspired from our previous algorithm, which was based on the theory of Tsallis statistical mechanics, we develop a new evolving stochastic learning algorithm for neural networks. The new algorithm combines deterministic and stochastic search steps by employing a different adaptive stepsize for each network weight, and applies a form of noise that is characterized by the nonextensive entropic index q, regulated by a weight decay term. The behavior of the learning algorithm can be made more stochastic or deterministic depending on the trade off between the temperature T and the q values. This is achieved by introducing a formula that defines a time--dependent relationship between these two important learning parameters. Our experimental study verifies that there are indeed improvements in the convergence speed of this new evolving stochastic learning algorithm, which makes learning faster than using the original Hybrid Learning Scheme (HLS). In addition, experiments are conducted to explore the influence of the entropic index q and temperature T on the convergence speed and stability of the proposed method.
[ { "version": "v1", "created": "Fri, 9 Dec 2005 20:30:02 GMT" }, { "version": "v2", "created": "Tue, 13 Dec 2005 09:52:53 GMT" } ]
2009-11-11T00:00:00
[ [ "Anastasiadis", "Aristoklis D.", "" ], [ "Magoulas", "George D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0512038
Aris L. Moustakas
Aris L. Moustakas, Steven H. Simon and Thomas L. Marzetta
Capacity of Differential versus Non-Differential Unitary Space-Time Modulation for MIMO channels
submitted to IEEE Trans. Information Theory Jan. 2004; current version addresses referees' minor comments; 13 pages
null
null
null
cs.IT cond-mat.stat-mech math-ph math.IT math.MP
null
Differential Unitary Space-Time Modulation (DUSTM) and its earlier nondifferential counterpart, USTM, permit high-throughput MIMO communication entirely without the possession of channel state information (CSI) by either the transmitter or the receiver. For an isotropically random unitary input we obtain the exact closed-form expression for the probability density of the DUSTM received signal, which permits the straightforward Monte Carlo evaluation of its mutual information. We compare the performance of DUSTM and USTM through both numerical computations of mutual information and through the analysis of low- and high-SNR asymptotic expressions. In our comparisons the symbol durations of the equivalent unitary space-time signals are both equal to T, as are the number of receive antennas N. For DUSTM the number of transmit antennas is constrained by the scheme to be M = T/2, while USTM has no such constraint. If DUSTM and USTM utilize the same number of transmit antennas at high SNR's the normalized mutual information of the differential and the nondifferential schemes expressed in bits/sec/Hz are asymptotically equal, with the differential scheme performing somewhat better, while at low SNR's the normalized mutual information of DUSTM is asymptotically twice the normalized mutual information of USTM. If, instead, USTM utilizes the optimum number of transmit antennas then USTM can outperform DUSTM at sufficiently low SNR's.
[ { "version": "v1", "created": "Mon, 12 Dec 2005 13:39:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Moustakas", "Aris L.", "" ], [ "Simon", "Steven H.", "" ], [ "Marzetta", "Thomas L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
cs/0512039
Jianqin Zhou
Jianqin Zhou, Xirong Xu
An algorithm for the k-error linear complexity of a sequence with period 2pn over GF(q)
6 pages
null
null
null
cs.CR
null
The union cost is used, so that an efficient algorithm for computing the k-error linear complexity of a sequence with period 2pn over GF(q) is presented, where p and q are odd primes, and q is a primitive root of modulo p2.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:21:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ], [ "Xu", "Xirong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0512040
Jianqin Zhou
Jianqin Zhou
A fast algorithm for determining the linear complexity of periodic sequences
7 pages
null
null
null
cs.CR
null
A fast algorithm is presented for determining the linear complexity and the minimal polynomial of periodic sequences over GF(q) with period q n p m, where p is a prime, q is a prime and a primitive root modulo p2. The algorithm presented here generalizes both the algorithm in [4] where the period of a sequence over GF(q) is p m and the algorithm in [5] where the period of a binary sequence is 2 n p m . When m=0, the algorithm simplifies the generalized Games-Chan algorithm.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:38:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0512041
Jianqin Zhou
Jianqin Zhou
Generalized partially bent functions
7 pages
null
null
null
cs.CR
null
Based on the definition of generalized partially bent functions, using the theory of linear transformation, the relationship among generalized partially bent functions over ring Z N, generalized bent functions over ring Z N and affine functions is discussed. When N is a prime number, it is proved that a generalized partially bent function can be decomposed as the addition of a generalized bent function and an affine function. The result obtained here generalizes the main works concerning partially bent functions by Claud Carlet in [1].
[ { "version": "v1", "created": "Sat, 10 Dec 2005 00:43:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhou", "Jianqin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0512042
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo
Points on Computable Curves
10 pages, 12 pages appendix
null
null
null
cs.CC cs.CG
null
The ``analyst's traveling salesman theorem'' of geometric measure theory characterizes those subsets of Euclidean space that are contained in curves of finite length. This result, proven for the plane by Jones (1990) and extended to higher-dimensional Euclidean spaces by Okikiolu (1991), says that a bounded set $K$ is contained in some curve of finite length if and only if a certain ``square beta sum'', involving the ``width of $K$'' in each element of an infinite system of overlapping ``tiles'' of descending size, is finite. In this paper we characterize those {\it points} of Euclidean space that lie on {\it computable} curves of finite length by formulating and proving a computable extension of the analyst's traveling salesman theorem. Our extension says that a point in Euclidean space lies on some computable curve of finite length if and only if it is ``permitted'' by some computable ``Jones constriction''. A Jones constriction here is an explicit assignment of a rational cylinder to each of the above-mentioned tiles in such a way that, when the radius of the cylinder corresponding to a tile is used in place of the ``width of $K$'' in each tile, the square beta sum is finite. A point is permitted by a Jones constriction if it is contained in the cylinder assigned to each tile containing the point. The main part of our proof is the construction of a computable curve of finite length traversing all the points permitted by a given Jones constriction. Our construction uses the main ideas of Jones's ``farthest insertion'' construction, but our algorithm for computing the curve must work exclusively with the Jones constriction itself, because it has no direct access to the (typically uncomputable) points permitted by the Jones constriction.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 03:08:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ], [ "Mayordomo", "Elvira", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0512043
Dirk Wagner
Dirk Wagner, John Noga
Random Walks with Anti-Correlated Steps
5 pages, 1 chart, 2 tables
null
null
null
cs.DM cs.PF
null
We conjecture the expected value of random walks with anti-correlated steps to be exactly 1. We support this conjecture with 2 plausibility arguments and experimental data. The experimental analysis includes the computation of the expected values of random walks for steps up to 22. The result shows the expected value asymptotically converging to 1.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 08:04:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Wagner", "Dirk", "" ], [ "Noga", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0512044
Stanis{\l} aw Radziszowski
Joshua Stinehour, Stanis{\l}aw Radziszowski and Kung-Kuen Tse
Computation of the Ramsey Number $R(W_5,K_5)$
5 pages
Bulletin of the Institute of Combinatorics and Its Applications, 47 (2006) 53-57
null
null
cs.DM
null
We determine the value of the Ramsey number $R(W_5,K_5)$ to be 27, where $W_5 = K_1 + C_4$ is the 4-spoked wheel of order 5. This solves one of the four remaining open cases in the tables given in 1989 by George R. T. Hendry, which included the Ramsey numbers $R(G,H)$ for all pairs of graphs $G$ and $H$ having five vertices, except seven entries. In addition, we show that there exists a unique up to isomorphism critical Ramsey graph for $W_5$ versus $K_5$. Our results are based on computer algorithms.
[ { "version": "v1", "created": "Sat, 10 Dec 2005 23:57:02 GMT" } ]
2014-05-30T00:00:00
[ [ "Stinehour", "Joshua", "" ], [ "Radziszowski", "Stanisław", "" ], [ "Tse", "Kung-Kuen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0512045
Xuan-Ha Vu
Xuan-Ha Vu, Marius-Calin Silaghi, Djamila Sam-Haroud and Boi Faltings
Branch-and-Prune Search Strategies for Numerical Constraint Solving
43 pages, 11 figures
null
null
LIA-REPORT-2006-007
cs.AI
null
When solving numerical constraints such as nonlinear equations and inequalities, solvers often exploit pruning techniques, which remove redundant value combinations from the domains of variables, at pruning steps. To find the complete solution set, most of these solvers alternate the pruning steps with branching steps, which split each problem into subproblems. This forms the so-called branch-and-prune framework, well known among the approaches for solving numerical constraints. The basic branch-and-prune search strategy that uses domain bisections in place of the branching steps is called the bisection search. In general, the bisection search works well in case (i) the solutions are isolated, but it can be improved further in case (ii) there are continuums of solutions (this often occurs when inequalities are involved). In this paper, we propose a new branch-and-prune search strategy along with several variants, which not only allow yielding better branching decisions in the latter case, but also work as well as the bisection search does in the former case. These new search algorithms enable us to employ various pruning techniques in the construction of inner and outer approximations of the solution set. Our experiments show that these algorithms speed up the solving process often by one order of magnitude or more when solving problems with continuums of solutions, while keeping the same performance as the bisection search when the solutions are isolated.
[ { "version": "v1", "created": "Sun, 11 Dec 2005 19:47:42 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 22:59:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Vu", "Xuan-Ha", "" ], [ "Silaghi", "Marius-Calin", "" ], [ "Sam-Haroud", "Djamila", "" ], [ "Faltings", "Boi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0512046
Georgios Mertzios
George B. Mertzios
A polynomial algorithm for the k-cluster problem on interval graphs
12 pages, 5 figures
null
null
null
cs.DS
null
This paper deals with the problem of finding, for a given graph and a given natural number k, a subgraph of k nodes with a maximum number of edges. This problem is known as the k-cluster problem and it is NP-hard on general graphs as well as on chordal graphs. In this paper, it is shown that the k-cluster problem is solvable in polynomial time on interval graphs. In particular, we present two polynomial time algorithms for the class of proper interval graphs and the class of general interval graphs, respectively. Both algorithms are based on a matrix representation for interval graphs. In contrast to representations used in most of the previous work, this matrix representation does not make use of the maximal cliques in the investigated graph.
[ { "version": "v1", "created": "Sun, 11 Dec 2005 23:13:44 GMT" }, { "version": "v2", "created": "Tue, 20 Dec 2005 00:02:45 GMT" }, { "version": "v3", "created": "Fri, 11 Jan 2008 15:05:23 GMT" } ]
2011-11-09T00:00:00
[ [ "Mertzios", "George B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0512047
Florentin Smarandache
Jose L. Salmeron, Florentin Smarandache
Processing Uncertainty and Indeterminacy in Information Systems success mapping
13 pages, 2 figures
null
null
null
cs.AI
null
IS success is a complex concept, and its evaluation is complicated, unstructured and not readily quantifiable. Numerous scientific publications address the issue of success in the IS field as well as in other fields. But, little efforts have been done for processing indeterminacy and uncertainty in success research. This paper shows a formal method for mapping success using Neutrosophic Success Map. This is an emerging tool for processing indeterminacy and uncertainty in success research. EIS success have been analyzed using this tool.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 01:21:58 GMT" }, { "version": "v2", "created": "Thu, 15 Dec 2005 18:46:43 GMT" } ]
2011-11-09T00:00:00
[ [ "Salmeron", "Jose L.", "" ], [ "Smarandache", "Florentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0512048
Tharaka Lamahewa
Tharaka A. Lamahewa, Rodney A. Kennedy, Thushara D. Abhayapala, Van K. Nguyen
Spatial Precoder Design for Space-Time Coded MIMO Systems: Based on Fixed Parameters of MIMO Channels
15 Figures, 1-Table. Submitted to Personal Wireless Communications Springer 08/12/2005
null
null
null
cs.IT math.IT
null
In this paper, we introduce the novel use of linear spatial precoding based on fixed and known parameters of multiple-input multiple-output (MIMO) channels to improve the performance of space-time coded MIMO systems. We derive linear spatial precoding schemes for both coherent (channel is known at the receiver) and non-coherent (channel is un-known at the receiver) space-time coded MIMO systems. Antenna spacing and antenna placement (geometry) are considered as fixed parameters of MIMO channels, which are readily known at the transmitter. These precoding schemes exploit the antenna placement information at both ends of the MIMO channel to ameliorate the effect of non-ideal antenna placement on the performance of space-time coded systems. In these schemes, the precoder is fixed for given transmit and receive antenna configurations and transmitter does not require any feedback of channel state information (partial or full) from the receiver. Closed form solutions for both precoding schemes are presented for systems with up to three receiver antennas. A generalized method is proposed for more than three receiver antennas. We use the coherent space-time block codes (STBC) and differential space-time block codes to analyze the performance of proposed precoding schemes. Simulation results show that at low SNRs, both precoders give significant performance improvement over a non-precoded system for small antenna aperture sizes.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 02:11:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Lamahewa", "Tharaka A.", "" ], [ "Kennedy", "Rodney A.", "" ], [ "Abhayapala", "Thushara D.", "" ], [ "Nguyen", "Van K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512049
Gq Zhang Ph.D.
Jeff Stuckman and Guo-Qiang Zhang
Mastermind is NP-Complete
null
null
null
null
cs.CC cs.DM
null
In this paper we show that the Mastermind Satisfiability Problem (MSP) is NP-complete. The Mastermind is a popular game which can be turned into a logical puzzle called Mastermind Satisfiability Problem in a similar spirit to the Minesweeper puzzle. By proving that MSP is NP-complete, we reveal its intrinsic computational property that makes it challenging and interesting. This serves as an addition to our knowledge about a host of other puzzles, such as Minesweeper, Mah-Jongg, and the 15-puzzle.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 04:19:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Stuckman", "Jeff", "" ], [ "Zhang", "Guo-Qiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0512050
Jerome Aze
J\'er\^ome Az\'e (LRI), Mathieu Roche (LRI), Yves Kodratoff (LRI), Mich\`ele Sebag (LRI)
Preference Learning in Terminology Extraction: A ROC-based approach
null
Proceeedings of Applied Stochastic Models and Data Analysis (2005) 209-219
null
null
cs.LG
null
A key data preparation step in Text Mining, Term Extraction selects the terms, or collocation of words, attached to specific concepts. In this paper, the task of extracting relevant collocations is achieved through a supervised learning algorithm, exploiting a few collocations manually labelled as relevant/irrelevant. The candidate terms are described along 13 standard statistical criteria measures. From these examples, an evolutionary learning algorithm termed Roger, based on the optimization of the Area under the ROC curve criterion, extracts an order on the candidate terms. The robustness of the approach is demonstrated on two real-world domain applications, considering different domains (biology and human resources) and different languages (English and French).
[ { "version": "v1", "created": "Tue, 13 Dec 2005 13:25:57 GMT" } ]
2016-08-16T00:00:00
[ [ "Azé", "Jérôme", "", "LRI" ], [ "Roche", "Mathieu", "", "LRI" ], [ "Kodratoff", "Yves", "", "LRI" ], [ "Sebag", "Michèle", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0512051
Gwenael Richomme
Gw\'ena\"el Richomme (LaRIA), Francis Wlazinski (LaRIA)
Existence of finite test-sets for k-power-freeness of uniform morphisms
null
null
null
null
cs.DM
null
A challenging problem is to find an algorithm to decide whether a morphism is k-power-free. We provide such an algorithm when k >= 3 for uniform morphisms showing that in such a case, contrarily to the general case, there exist finite test-sets for k-power-freeness.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 13:51:13 GMT" } ]
2016-08-16T00:00:00
[ [ "Richomme", "Gwénaël", "", "LaRIA" ], [ "Wlazinski", "Francis", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0512052
Ion Mandoiu
Ion I. Mandoiu and Claudia Prajescu
High-Throughput SNP Genotyping by SBE/SBH
19 pages
null
null
null
cs.DS q-bio.GN
null
Despite much progress over the past decade, current Single Nucleotide Polymorphism (SNP) genotyping technologies still offer an insufficient degree of multiplexing when required to handle user-selected sets of SNPs. In this paper we propose a new genotyping assay architecture combining multiplexed solution-phase single-base extension (SBE) reactions with sequencing by hybridization (SBH) using universal DNA arrays such as all $k$-mer arrays. In addition to PCR amplification of genomic DNA, SNP genotyping using SBE/SBH assays involves the following steps: (1) Synthesizing primers complementing the genomic sequence immediately preceding SNPs of interest; (2) Hybridizing these primers with the genomic DNA; (3) Extending each primer by a single base using polymerase enzyme and dideoxynucleotides labeled with 4 different fluorescent dyes; and finally (4) Hybridizing extended primers to a universal DNA array and determining the identity of the bases that extend each primer by hybridization pattern analysis. Our contributions include a study of multiplexing algorithms for SBE/SBH genotyping assays and preliminary experimental results showing the achievable tradeoffs between the number of array probes and primer length on one hand and the number of SNPs that can be assayed simultaneously on the other. Simulation results on datasets both randomly generated and extracted from the NCBI dbSNP database suggest that the SBE/SBH architecture provides a flexible and cost-effective alternative to genotyping assays currently used in the industry, enabling genotyping of up to hundreds of thousands of user-specified SNPs per assay.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 18:01:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandoiu", "Ion I.", "" ], [ "Prajescu", "Claudia", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" } ]
cs/0512053
John Hitchcock
John M. Hitchcock
Online Learning and Resource-Bounded Dimension: Winnow Yields New Lower Bounds for Hard Sets
null
null
null
null
cs.CC cs.LG
null
We establish a relationship between the online mistake-bound model of learning and resource-bounded dimension. This connection is combined with the Winnow algorithm to obtain new results about the density of hard sets under adaptive reductions. This improves previous work of Fu (1995) and Lutz and Zhao (2000), and solves one of Lutz and Mayordomo's "Twelve Problems in Resource-Bounded Measure" (1999).
[ { "version": "v1", "created": "Tue, 13 Dec 2005 22:01:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Hitchcock", "John M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0512054
Vyacheslav Gorshkov Mr
Gennady P.Berman (Los Alamos National Laboratory, T-13), Vyacheslav N.Gorshkov (Los Alamos National Laboratory, Center for Nonlinear Studies), Xidi Wang (Citigroup, Sao Paulo, Brasil)
Irreducible Frequent Patterns in Transactional Databases
30 pages, 18 figures
null
null
null
cs.DS cs.DB
null
Irreducible frequent patters (IFPs) are introduced for transactional databases. An IFP is such a frequent pattern (FP),(x1,x2,...xn), the probability of which, P(x1,x2,...xn), cannot be represented as a product of the probabilities of two (or more) other FPs of the smaller lengths. We have developed an algorithm for searching IFPs in transactional databases. We argue that IFPs represent useful tools for characterizing the transactional databases and may have important applications to bio-systems including the immune systems and for improving vaccination strategies. The effectiveness of the IFPs approach has been illustrated in application to a classification problem.
[ { "version": "v1", "created": "Tue, 13 Dec 2005 22:53:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Berman", "Gennady P.", "", "Los Alamos National Laboratory, T-13" ], [ "Gorshkov", "Vyacheslav N.", "", "Los Alamos National Laboratory, Center for Nonlinear Studies" ], [ "Wang", "Xidi", "", "Citigroup, Sao Paulo, Brasil" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0512055
Yi-Dong Shen
Yi-Dong Shen and Danny De Schreye
Termination Analysis of General Logic Programs for Moded Queries: A Dynamic Approach
24 Pages
null
null
null
cs.LO cs.PL
null
The termination problem of a logic program can be addressed in either a static or a dynamic way. A static approach performs termination analysis at compile time, while a dynamic approach characterizes and tests termination of a logic program by applying a loop checking technique. In this paper, we present a novel dynamic approach to termination analysis for general logic programs with moded queries. We address several interesting questions, including how to formulate an SLDNF-derivation for a moded query, how to characterize an infinite SLDNF-derivation with a moded query, and how to apply a loop checking mechanism to cut infinite SLDNF-derivations for the purpose of termination analysis. The proposed approach is very powerful and useful. It can be used (1) to test if a logic program terminates for a given concrete or moded query, (2) to test if a logic program terminates for all concrete or moded queries, and (3) to find all (most general) concrete/moded queries that are most likely terminating (or non-terminating).
[ { "version": "v1", "created": "Wed, 14 Dec 2005 07:09:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "De Schreye", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0512056
Roberto Bagnara
Roberto Bagnara, Andrea Pescetti, Alessandro Zaccagnini, Enea Zaffanella (University of Parma)
PURRS: Towards Computer Algebra Support for Fully Automatic Worst-Case Complexity Analysis
6 pages
null
null
null
cs.MS cs.CC
null
Fully automatic worst-case complexity analysis has a number of applications in computer-assisted program manipulation. A classical and powerful approach to complexity analysis consists in formally deriving, from the program syntax, a set of constraints expressing bounds on the resources required by the program, which are then solved, possibly applying safe approximations. In several interesting cases, these constraints take the form of recurrence relations. While techniques for solving recurrences are known and implemented in several computer algebra systems, these do not completely fulfill the needs of fully automatic complexity analysis: they only deal with a somewhat restricted class of recurrence relations, or sometimes require user intervention, or they are restricted to the computation of exact solutions that are often so complex to be unmanageable, and thus useless in practice. In this paper we briefly describe PURRS, a system and software library aimed at providing all the computer algebra services needed by applications performing or exploiting the results of worst-case complexity analyses. The capabilities of the system are illustrated by means of examples derived from the analysis of programs written in a domain-specific functional programming language for real-time embedded systems.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 09:54:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bagnara", "Roberto", "", "University of Parma" ], [ "Pescetti", "Andrea", "", "University of Parma" ], [ "Zaccagnini", "Alessandro", "", "University of Parma" ], [ "Zaffanella", "Enea", "", "University of Parma" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0512057
Roberto Amadio
Roberto Amadio (PPS), Silvano Dal Zilio (LIF)
Resource Control for Synchronous Cooperative Threads
null
Journal of Theoretical Computer Science (TCS) 358 (15/08/2006) 229-254
null
null
cs.PL
null
We develop new methods to statically bound the resources needed for the execution of systems of concurrent, interactive threads. Our study is concerned with a \emph{synchronous} model of interaction based on cooperative threads whose execution proceeds in synchronous rounds called instants. Our contribution is a system of compositional static analyses to guarantee that each instant terminates and to bound the size of the values computed by the system as a function of the size of its parameters at the beginning of the instant. Our method generalises an approach designed for first-order functional languages that relies on a combination of standard termination techniques for term rewriting systems and an analysis of the size of the computed values based on the notion of quasi-interpretation. We show that these two methods can be combined to obtain an explicit polynomial bound on the resources needed for the execution of the system during an instant. As a second contribution, we introduce a virtual machine and a related bytecode thus producing a precise description of the resources needed for the execution of a system. In this context, we present a suitable control flow analysis that allows to formulte the static analyses for resource control at byte code level.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 13:41:07 GMT" } ]
2007-06-13T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ], [ "Zilio", "Silvano Dal", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0512058
Roberto Amadio
Roberto Amadio (PPS), Gerard Boudol, Ilaria Castellani, Frederic Boussinot
Reactive concurrent programming revisited
null
Workshop on Process Algebra (29/09/2006) 49-60
null
null
cs.PL
null
In this note we revisit the so-called reactive programming style, which evolves from the synchronous programming model of the Esterel language by weakening the assumption that the absence of an event can be detected instantaneously. We review some research directions that have been explored since the emergence of the reactive model ten years ago. We shall also outline some questions that remain to be investigated.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 13:42:17 GMT" } ]
2007-06-12T00:00:00
[ [ "Amadio", "Roberto", "", "PPS" ], [ "Boudol", "Gerard", "" ], [ "Castellani", "Ilaria", "" ], [ "Boussinot", "Frederic", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0512059
Vladimir Vovk
Vladimir Vovk
Competing with wild prediction rules
28 pages, 3 figures
null
null
null
cs.LG
null
We consider the problem of on-line prediction competitive with a benchmark class of continuous but highly irregular prediction rules. It is known that if the benchmark class is a reproducing kernel Hilbert space, there exists a prediction algorithm whose average loss over the first N examples does not exceed the average loss of any prediction rule in the class plus a "regret term" of O(N^(-1/2)). The elements of some natural benchmark classes, however, are so irregular that these classes are not Hilbert spaces. In this paper we develop Banach-space methods to construct a prediction algorithm with a regret term of O(N^(-1/p)), where p is in [2,infty) and p-2 reflects the degree to which the benchmark class fails to be a Hilbert space.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 20:03:30 GMT" }, { "version": "v2", "created": "Wed, 25 Jan 2006 17:36:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0512060
Chiranjeeb Buragohain
Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri
Distributed Navigation Algorithms for Sensor Networks
To Appear in INFOCOM 2006
null
null
null
cs.NI cs.DC cs.DS
null
We propose efficient distributed algorithms to aid navigation of a user through a geographic area covered by sensors. The sensors sense the level of danger at their locations and we use this information to find a safe path for the user through the sensor field. Traditional distributed navigation algorithms rely upon flooding the whole network with packets to find an optimal safe path. To reduce the communication expense, we introduce the concept of a skeleton graph which is a sparse subset of the true sensor network communication graph. Using skeleton graphs we show that it is possible to find approximate safe paths with much lower communication cost. We give tight theoretical guarantees on the quality of our approximation and by simulation, show the effectiveness of our algorithms in realistic sensor network situations.
[ { "version": "v1", "created": "Wed, 14 Dec 2005 22:36:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Buragohain", "Chiranjeeb", "" ], [ "Agrawal", "Divyakant", "" ], [ "Suri", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0512061
Philip Bille
Philip Bille and Inge Li Goertz
Matching Subsequences in Trees
Minor correction of typos, etc
null
null
null
cs.DS
null
Given two rooted, labeled trees $P$ and $T$ the tree path subsequence problem is to determine which paths in $P$ are subsequences of which paths in $T$. Here a path begins at the root and ends at a leaf. In this paper we propose this problem as a useful query primitive for XML data, and provide new algorithms improving the previously best known time and space bounds.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 10:28:04 GMT" }, { "version": "v2", "created": "Thu, 8 Jun 2006 13:53:07 GMT" }, { "version": "v3", "created": "Fri, 7 Dec 2007 08:40:11 GMT" } ]
2011-11-09T00:00:00
[ [ "Bille", "Philip", "" ], [ "Goertz", "Inge Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0512062
Matteo Gagliolo
Juergen Schmidhuber, Matteo Gagliolo, Daan Wierstra, Faustino Gomez
Evolino for recurrent support vector machines
10 pages, 2 figures
null
null
IDSIA-19-05 version 2.0
cs.NE
null
Traditional Support Vector Machines (SVMs) need pre-wired finite time windows to predict and classify time series. They do not have an internal state necessary to deal with sequences involving arbitrary long-term dependencies. Here we introduce a new class of recurrent, truly sequential SVM-like devices with internal adaptive states, trained by a novel method called EVOlution of systems with KErnel-based outputs (Evoke), an instance of the recent Evolino class of methods. Evoke evolves recurrent neural networks to detect and represent temporal dependencies while using quadratic programming/support vector regression to produce precise outputs. Evoke is the first SVM-based mechanism learning to classify a context-sensitive language. It also outperforms recent state-of-the-art gradient-based recurrent neural networks (RNNs) on various time series prediction tasks.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 15:05:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmidhuber", "Juergen", "" ], [ "Gagliolo", "Matteo", "" ], [ "Wierstra", "Daan", "" ], [ "Gomez", "Faustino", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0512063
Jan Eriksson
Jan Eriksson and Visa Koivunen
Complex Random Vectors and ICA Models: Identifiability, Uniqueness and Separability
To appear in IEEE TR-IT March 2006
Information Theory, IEEE Transactions on , vol.52, no.3pp. 1017- 1029, March 2006
10.1109/TIT.2005.864440
null
cs.IT cs.CE cs.IR cs.LG math.IT
null
In this paper the conditions for identifiability, separability and uniqueness of linear complex valued independent component analysis (ICA) models are established. These results extend the well-known conditions for solving real-valued ICA problems to complex-valued models. Relevant properties of complex random vectors are described in order to extend the Darmois-Skitovich theorem for complex-valued models. This theorem is used to construct a proof of a theorem for each of the above ICA model concepts. Both circular and noncircular complex random vectors are covered. Examples clarifying the above concepts are presented.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 14:51:36 GMT" } ]
2011-11-09T00:00:00
[ [ "Eriksson", "Jan", "" ], [ "Koivunen", "Visa", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512064
Martin Kutz
Martin Kutz
Computing shortest non-trivial cycles on orientable surfaces of bounded genus in almost linear time
13 pages, 7 figures
null
null
null
cs.CG
null
We present an algorithm that computes a shortest non-contractible and a shortest non-separating cycle on an orientable combinatorial surface of bounded genus in O(n \log n) time, where n denotes the complexity of the surface. This solves a central open problem in computational topology, improving upon the current-best O(n^{3/2})-time algorithm by Cabello and Mohar (ESA 2005). Our algorithm uses universal-cover constructions to find short cycles and makes extensive use of existing tools from the field.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 17:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Kutz", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0512065
Todd Veldhuizen
Todd L. Veldhuizen
Tradeoffs in Metaprogramming
2006 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program Manipulation (PEPM 2006)
null
null
null
cs.PL
null
The design of metaprogramming languages requires appreciation of the tradeoffs that exist between important language characteristics such as safety properties, expressive power, and succinctness. Unfortunately, such tradeoffs are little understood, a situation we try to correct by embarking on a study of metaprogramming language tradeoffs using tools from computability theory. Safety properties of metaprograms are in general undecidable; for example, the property that a metaprogram always halts and produces a type-correct instance is $\Pi^0_2$-complete. Although such safety properties are undecidable, they may sometimes be captured by a restricted language, a notion we adapt from complexity theory. We give some sufficient conditions and negative results on when languages capturing properties can exist: there can be no languages capturing total correctness for metaprograms, and no `functional' safety properties above $\Sigma^0_3$ can be captured. We prove that translating a metaprogram from a general-purpose to a restricted metaprogramming language capturing a property is tantamount to proving that property for the metaprogram. Surprisingly, when one shifts perspective from programming to metaprogramming, the corresponding safety questions do not become substantially harder -- there is no `jump' of Turing degree for typical safety properties.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 21:22:23 GMT" } ]
2009-09-29T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0512066
Vishwambhar Rathi
Vishwambhar Rathi
On the Asymptotic Weight and Stopping Set Distribution of Regular LDPC Ensembles
Submitted to IEEE Trans on Information Theory (revised version). Minor comments from reviewers addressed
null
10.1109/TIT.2006.880065
null
cs.IT math.IT
null
We estimate the variance of weight and stopping set distribution of regular LDPC ensembles. Using this estimate and the second moment method we obtain bounds on the probability that a randomly chosen code from regular LDPC ensemble has its weight distribution and stopping set distribution close to respective ensemble averages. We are able to show that a large fraction of total number of codes have their weight and stopping set distribution close to the average.
[ { "version": "v1", "created": "Thu, 15 Dec 2005 23:53:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Rathi", "Vishwambhar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512067
Peter J. Stuckey
Michael Codish, Vitaly Lagoon, and Peter J. Stuckey
Solving Partial Order Constraints for LPO Termination
15 pages, 2 figures, 2 tables
Journal of Satisfiability, Boolean Modeling and Computation, 5:193-215: 2008
null
null
cs.PL cs.LO cs.SC
null
This paper introduces a new kind of propositional encoding for reasoning about partial orders. The symbols in an unspecified partial order are viewed as variables which take integer values and are interpreted as indices in the order. For a partial order statement on n symbols each index is represented in log2 n propositional variables and partial order constraints between symbols are modeled on the bit representations. We illustrate the application of our approach to determine LPO termination for term rewrite systems. Experimental results are unequivocal, indicating orders of magnitude speedups in comparison with current implementations for LPO termination. The proposed encoding is general and relevant to other applications which involve propositional reasoning about partial orders.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 01:28:25 GMT" } ]
2010-09-03T00:00:00
[ [ "Codish", "Michael", "" ], [ "Lagoon", "Vitaly", "" ], [ "Stuckey", "Peter J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0512068
Frank McCown
Daniel S. Swaney, Frank McCown and Michael L. Nelson
Dynamic Web File Format Transformations with Grace
12 pages, 9 figures
5th International Web Archiving Workshop and Digital Preservation (IWAW'05). September 22-23, 2005
null
null
cs.DL
null
Web accessible content stored in obscure, unpopular or obsolete formats represents a significant problem for digital preservation. The file formats that encode web content represent the implicit and explicit choices of web site maintainers at a particular point in time. Older file formats that have fallen out of favor are obviously a problem, but so are new file formats that have not yet been fully supported by browsers. Often browsers use plug-in software for displaying old and new formats, but plug-ins can be difficult to find, install and replicate across all environments that one may use. We introduce Grace, an http proxy server that transparently converts browser-incompatible and obsolete web content into web content that a browser is able to display without the use of plug-ins. Grace is configurable on a per user basis and can be expanded to provide an array of conversion services. We illustrate how the Grace prototype transforms several image formats (XBM, PNG with various alpha channels, and JPEG 2000) so they are viewable in Internet Explorer.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 17:21:57 GMT" } ]
2011-11-09T00:00:00
[ [ "Swaney", "Daniel S.", "" ], [ "McCown", "Frank", "" ], [ "Nelson", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0512069
Frank McCown
Frank McCown, Joan A. Smith, Michael L. Nelson, Johan Bollen
Reconstructing Websites for the Lazy Webmaster
13 pages, 11 figures, 4 tables
null
null
null
cs.IR cs.CY
null
Backup or preservation of websites is often not considered until after a catastrophic event has occurred. In the face of complete website loss, "lazy" webmasters or concerned third parties may be able to recover some of their website from the Internet Archive. Other pages may also be salvaged from commercial search engine caches. We introduce the concept of "lazy preservation"- digital preservation performed as a result of the normal operations of the Web infrastructure (search engines and caches). We present Warrick, a tool to automate the process of website reconstruction from the Internet Archive, Google, MSN and Yahoo. Using Warrick, we have reconstructed 24 websites of varying sizes and composition to demonstrate the feasibility and limitations of website reconstruction from the public Web infrastructure. To measure Warrick's window of opportunity, we have profiled the time required for new Web resources to enter and leave search engine caches.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 16:02:13 GMT" } ]
2011-11-09T00:00:00
[ [ "McCown", "Frank", "" ], [ "Smith", "Joan A.", "" ], [ "Nelson", "Michael L.", "" ], [ "Bollen", "Johan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0512070
Bertrand Nouvel
Bertrand Nouvel (LIP), Eric Remila (LIP)
Incremental and Transitive Discrete Rotations
null
null
null
null
cs.DM cs.GR
null
A discrete rotation algorithm can be apprehended as a parametric application $f\_\alpha$ from $\ZZ[i]$ to $\ZZ[i]$, whose resulting permutation ``looks like'' the map induced by an Euclidean rotation. For this kind of algorithm, to be incremental means to compute successively all the intermediate rotate d copies of an image for angles in-between 0 and a destination angle. The di scretized rotation consists in the composition of an Euclidean rotation with a discretization; the aim of this article is to describe an algorithm whic h computes incrementally a discretized rotation. The suggested method uses o nly integer arithmetic and does not compute any sine nor any cosine. More pr ecisely, its design relies on the analysis of the discretized rotation as a step function: the precise description of the discontinuities turns to be th e key ingredient that will make the resulting procedure optimally fast and e xact. A complete description of the incremental rotation process is provided, also this result may be useful in the specification of a consistent set of defin itions for discrete geometry.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 16:12:12 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2006 07:02:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouvel", "Bertrand", "", "LIP" ], [ "Remila", "Eric", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0512071
Martyn Amos
Jon Timmis, Martyn Amos, Wolfgang Banzhaf and Andy Tyrrell
"Going back to our roots": second generation biocomputing
Submitted to the International Journal of Unconventional Computing
null
null
null
cs.AI cs.NE
null
Researchers in the field of biocomputing have, for many years, successfully "harvested and exploited" the natural world for inspiration in developing systems that are robust, adaptable and capable of generating novel and even "creative" solutions to human-defined problems. However, in this position paper we argue that the time has now come for a reassessment of how we exploit biology to generate new computational systems. Previous solutions (the "first generation" of biocomputing techniques), whilst reasonably effective, are crude analogues of actual biological systems. We believe that a new, inherently inter-disciplinary approach is needed for the development of the emerging "second generation" of bio-inspired methods. This new modus operandi will require much closer interaction between the engineering and life sciences communities, as well as a bidirectional flow of concepts, applications and expertise. We support our argument by examining, in this new light, three existing areas of biocomputing (genetic programming, artificial immune systems and evolvable hardware), as well as an emerging area (natural genetic engineering) which may provide useful pointers as to the way forward.
[ { "version": "v1", "created": "Fri, 16 Dec 2005 16:42:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Timmis", "Jon", "" ], [ "Amos", "Martyn", "" ], [ "Banzhaf", "Wolfgang", "" ], [ "Tyrrell", "Andy", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0512072
Elias Tsigaridas
Ioannis Z. Emiris and Elias P. Tsigaridas
Computations with one and two real algebraic numbers
null
null
null
null
cs.SC cs.MS
null
We present algorithmic and complexity results concerning computations with one and two real algebraic numbers, as well as real solving of univariate polynomials and bivariate polynomial systems with integer coefficients using Sturm-Habicht sequences. Our main results, in the univariate case, concern the problems of real root isolation (Th. 19) and simultaneous inequalities (Cor.26) and in the bivariate, the problems of system real solving (Th.42), sign evaluation (Th. 37) and simultaneous inequalities (Cor. 43).
[ { "version": "v1", "created": "Sun, 18 Dec 2005 16:58:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Emiris", "Ioannis Z.", "" ], [ "Tsigaridas", "Elias P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0512073
Vladimir V Kisil
Vladimir V. Kisil
Schwerdtfeger-Fillmore-Springer-Cnops Construction Implemented in GiNaC
LaTeX, 82 p; 11 PS graphics in two figures, the full source files and ISO image of Live DVD are included; v9: library update for the book on Moebius transformations; v10: an ISO image of a Live DVD is attached to the paper; v11: a bug is fixed; v12: Library is uupdated, the reference to a larger project is added
Adv. Appl. Clifford Algebr. v.17 (2007), no.1, 59-70
10.1007/s00006-006-0017-4
LEEDS-MATH-PURE-2005-29
cs.MS cs.CG cs.SC
http://creativecommons.org/licenses/by/4.0/
This paper presents an implementation of the Schwerdtfeger-Fillmore-Springer-Cnops construction (SFSCc) along with illustrations of its usage. SFSCc linearises the linear-fraction action of the Moebius group in R^n. This has clear advantages in several theoretical and applied fields including engineering. Our implementation is based on the Clifford algebra capacities of the GiNaC computer algebra system (http://www.ginac.de/), which were described in cs.MS/0410044. The core of this realisation of SFSCc is done for an arbitrary dimension of R^n with a metric given by an arbitrary bilinear form. We also present a subclass for two dimensional cycles (i.e. circles, parabolas and hyperbolas), which add some 2D specific routines including a visualisation to PostScript files through the MetaPost (http://www.tug.org/metapost.html) or Asymptote (http://asymptote.sourceforge.net/) packages. This software is the backbone of many results published in math.CV/0512416 and we use its applications their for demonstration. The library can be ported (with various level of required changes) to other CAS with Clifford algebras capabilities similar to GiNaC. There is an ISO image of a Live Debian DVD attached to this paper as an auxiliary file, a copy is stored on Google Drive as well.
[ { "version": "v1", "created": "Sat, 17 Dec 2005 15:09:11 GMT" }, { "version": "v10", "created": "Sun, 16 Oct 2011 17:03:58 GMT" }, { "version": "v11", "created": "Wed, 10 Jul 2013 16:49:13 GMT" }, { "version": "v12", "created": "Thu, 10 Dec 2015 20:53:25 GMT" }, { "version": "v2", "created": "Thu, 29 Dec 2005 10:12:50 GMT" }, { "version": "v3", "created": "Thu, 18 May 2006 18:39:35 GMT" }, { "version": "v4", "created": "Mon, 17 Jul 2006 12:32:29 GMT" }, { "version": "v5", "created": "Sun, 23 Jul 2006 12:36:54 GMT" }, { "version": "v6", "created": "Mon, 26 Feb 2007 09:05:10 GMT" }, { "version": "v7", "created": "Fri, 27 Jul 2007 13:02:23 GMT" }, { "version": "v8", "created": "Thu, 9 Sep 2010 17:53:33 GMT" }, { "version": "v9", "created": "Sat, 8 Oct 2011 20:37:25 GMT" } ]
2015-12-11T00:00:00
[ [ "Kisil", "Vladimir V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0512074
Igal Sason
Igal Sason and Shlomo Shamai
Analytical Bounds on Maximum-Likelihood Decoded Linear Codes with Applications to Turbo-Like Codes: An Overview
6 pages, 3 figures. Accepted for presentation in Fourth International Symposium on Turbo Codes and Related Topics, Munich, Germany, 3--7 April, 2006
null
null
null
cs.IT math.IT
null
Upper and lower bounds on the error probability of linear codes under maximum-likelihood (ML) decoding are shortly surveyed and applied to ensembles of codes on graphs. For upper bounds, focus is put on Gallager bounding techniques and their relation to a variety of other reported bounds. Within the class of lower bounds, we address de Caen's based bounds and their improvements, sphere-packing bounds, and information-theoretic bounds on the bit error probability of codes defined on graphs. A comprehensive overview is provided in a monograph by the authors which is currently in preparation.
[ { "version": "v1", "created": "Sun, 18 Dec 2005 13:07:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Sason", "Igal", "" ], [ "Shamai", "Shlomo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512075
Igal Sason
Igal Sason and Gil Wiechman
Performance versus Complexity Per Iteration for Low-Density Parity-Check Codes: An Information-Theoretic Approach
Accepted for presentation in the Fourth International Symposium on Turbo Codes and Related Topics, Munich, Germany, 3--7 April, 2006
null
null
null
cs.IT math.IT
null
The paper is focused on the tradeoff between performance and decoding complexity per iteration for LDPC codes in terms of their gap (in rate) to capacity. The study of this tradeoff is done via information-theoretic bounds which also enable to get an indication on the sub-optimality of message-passing iterative decoding algorithms (as compared to optimal ML decoding). The bounds are generalized for parallel channels, and are applied to ensembles of punctured LDPC codes where both intentional and random puncturing are addressed. This work suggests an improvement in the tightness of some information-theoretic bounds which were previously derived by Burshtein et al. and by Sason and Urbanke.
[ { "version": "v1", "created": "Sun, 18 Dec 2005 13:22:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Sason", "Igal", "" ], [ "Wiechman", "Gil", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512076
Igal Sason
Igal Sason and Gil Wiechman
On Achievable Rates and Complexity of LDPC Codes for Parallel Channels: Information-Theoretic Bounds and Applications
5 pages. The paper is submitted to the 2006 IEEE International Symposium on Information Theory (ISIT 2006), Seatle, Washington, USA, 9--14 July, 2006. The full paper version was submitted to the IEEE Trans. on Information Theory, August 2005 and is online available at http://arxiv.org/abs/cs.IT/0508072
null
null
null
cs.IT math.IT
null
The paper presents bounds on the achievable rates and the decoding complexity of low-density parity-check (LDPC) codes. It is assumed that the communication of these codes takes place over statistically independent parallel channels where these channels are memoryless, binary-input and output-symmetric (MBIOS). The bounds are applied to punctured LDPC codes. A diagram concludes our discussion by showing interconnections between the theorems in this paper and some previously reported results.
[ { "version": "v1", "created": "Sun, 18 Dec 2005 13:44:49 GMT" } ]
2007-07-13T00:00:00
[ [ "Sason", "Igal", "" ], [ "Wiechman", "Gil", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512077
Leonid A. Levin
Gene Itkis, Leonid A. Levin
Flat Holonomies on Automata Networks
20 pages, significant revision
null
null
null
cs.DC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider asynchronous networks of identical finite (independent of network's size or topology) automata. Our automata drive any network from any initial configuration of states, to a coherent one in which it can carry efficiently any computations implementable on synchronous properly initialized networks of the same size. A useful data structure on such networks is a partial orientation of its edges. It needs to be flat, i.e. have null holonomy (no excess of up or down edges in any cycle). It also needs to be centered, i.e. have a unique node with no down edges. There are (interdependent) self-stabilizing asynchronous finite automata protocols assuring flat centered orientation. Such protocols may vary in assorted efficiency parameters and it is desirable to have each replaceable with any alternative, responsible for a simple limited task. We describe an efficient reduction of any computational task to any such set of protocols compliant with our interface conditions.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 11:35:10 GMT" }, { "version": "v2", "created": "Wed, 22 Feb 2006 19:39:42 GMT" }, { "version": "v3", "created": "Mon, 5 Mar 2007 20:41:07 GMT" }, { "version": "v4", "created": "Fri, 30 May 2008 19:57:55 GMT" }, { "version": "v5", "created": "Thu, 4 Dec 2008 19:20:41 GMT" }, { "version": "v6", "created": "Wed, 31 Dec 2008 23:46:30 GMT" }, { "version": "v7", "created": "Fri, 30 Dec 2011 21:02:24 GMT" } ]
2012-01-04T00:00:00
[ [ "Itkis", "Gene", "" ], [ "Levin", "Leonid A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0512078
Pascal Vontobel
Pascal O. Vontobel and Ralf Koetter
Graph-Cover Decoding and Finite-Length Analysis of Message-Passing Iterative Decoding of LDPC Codes
Submitted to IEEE Transactions on Information Theory, December 2005
null
null
null
cs.IT math.IT
null
The goal of the present paper is the derivation of a framework for the finite-length analysis of message-passing iterative decoding of low-density parity-check codes. To this end we introduce the concept of graph-cover decoding. Whereas in maximum-likelihood decoding all codewords in a code are competing to be the best explanation of the received vector, under graph-cover decoding all codewords in all finite covers of a Tanner graph representation of the code are competing to be the best explanation. We are interested in graph-cover decoding because it is a theoretical tool that can be used to show connections between linear programming decoding and message-passing iterative decoding. Namely, on the one hand it turns out that graph-cover decoding is essentially equivalent to linear programming decoding. On the other hand, because iterative, locally operating decoding algorithms like message-passing iterative decoding cannot distinguish the underlying Tanner graph from any covering graph, graph-cover decoding can serve as a model to explain the behavior of message-passing iterative decoding. Understanding the behavior of graph-cover decoding is tantamount to understanding the so-called fundamental polytope. Therefore, we give some characterizations of this polytope and explain its relation to earlier concepts that were introduced to understand the behavior of message-passing iterative decoding for finite-length codes.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 10:41:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Vontobel", "Pascal O.", "" ], [ "Koetter", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512079
Eirik Fossgaard
Eirik Fossgaard
An invariant bayesian model selection principle for gaussian data in a sparse representation
168 pages, PhD-thesis
null
null
82-92461-43-4
cs.IT math.IT
null
We develop a code length principle which is invariant to the choice of parameterization on the model distributions. An invariant approximation formula for easy computation of the marginal distribution is provided for gaussian likelihood models. We provide invariant estimators of the model parameters and formulate conditions under which these estimators are essentially posteriori unbiased for gaussian models. An upper bound on the coarseness of discretization on the model parameters is deduced. We introduce a discrimination measure between probability distributions and use it to construct probability distributions on model classes. The total code length is shown to equal the NML code length of Rissanen to within an additive constant when choosing Jeffreys prior distribution on the model parameters together with a particular choice of prior distribution on the model classes. Our model selection principle is applied to a gaussian estimation problem for data in a wavelet representation and its performance is tested and compared to alternative wavelet-based estimation methods in numerical experiments
[ { "version": "v1", "created": "Tue, 20 Dec 2005 16:55:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Fossgaard", "Eirik", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512080
Grigorii Pivovarov
G. B. Pivovarov and S. E. Trunov
EqRank: Theme Evolution in Citation Graphs
8 pages, 7 figs, 2 tables
null
null
null
cs.DS cs.DL
null
Time evolution of the classification scheme generated by the EqRank algorithm is studied with hep-th citation graph as an example. Intuitive expectations about evolution of an adequate classification scheme for a growing set of objects are formulated. Evolution compliant with these expectations is called natural. It is demonstrated that EqRank yields a naturally evolving classification scheme. We conclude that EqRank can be used as a means to detect new scientific themes, and to track their development.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 14:01:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Pivovarov", "G. B.", "" ], [ "Trunov", "S. E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0512081
Mihai Patrascu
Erik D. Demaine, Friedhelm Meyer auf der Heide, Rasmus Pagh and Mihai Patrascu
De Dictionariis Dynamicis Pauco Spatio Utentibus
14 pages. Full version of a paper accepted to LATIN'06
null
null
null
cs.DS
null
We develop dynamic dictionaries on the word RAM that use asymptotically optimal space, up to constant factors, subject to insertions and deletions, and subject to supporting perfect-hashing queries and/or membership queries, each operation in constant time with high probability. When supporting only membership queries, we attain the optimal space bound of Theta(n lg(u/n)) bits, where n and u are the sizes of the dictionary and the universe, respectively. Previous dictionaries either did not achieve this space bound or had time bounds that were only expected and amortized. When supporting perfect-hashing queries, the optimal space bound depends on the range {1,2,...,n+t} of hashcodes allowed as output. We prove that the optimal space bound is Theta(n lglg(u/n) + n lg(n/(t+1))) bits when supporting only perfect-hashing queries, and it is Theta(n lg(u/n) + n lg(n/(t+1))) bits when also supporting membership queries. All upper bounds are new, as is the Omega(n lg(n/(t+1))) lower bound.
[ { "version": "v1", "created": "Tue, 20 Dec 2005 23:01:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "der Heide", "Friedhelm Meyer auf", "" ], [ "Pagh", "Rasmus", "" ], [ "Patrascu", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0512082
Didier Bert
Hector Ruiz Barradas (LSR - IMAG), Didier Bert (LSR - IMAG)
A Fixpoint Semantics of Event Systems with and without Fairness Assumptions
null
null
null
RR 1081-L LSR 21
cs.LO
null
We present a fixpoint semantics of event systems. The semantics is presented in a general framework without concerns of fairness. Soundness and completeness of rules for deriving "leads-to" properties are proved in this general framework. The general framework is instantiated to minimal progress and weak fairness assumptions and similar results are obtained. We show the power of these results by deriving sufficient conditions for "leads-to" under minimal progress proving soundness of proof obligations without reasoning over state-traces.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 08:23:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Barradas", "Hector Ruiz", "", "LSR - IMAG" ], [ "Bert", "Didier", "", "LSR - IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0512083
Jiangtao Meng
Jiangtao Meng
New directions in mechanism design
null
null
null
null
cs.GT
null
Mechanism design uses the tools of economics and game theory to design rules of interaction for economic transactions that will,in principle, yield some de- sired outcome. In the last few years this field has received much interest of researchers in computer science, especially with the Internet developing as a platform for communications and connections among enormous numbers of computers and humans. Arguably the most positive result in mechanism de- sign is truthful and there are only one general truthful mechanisms so far : the generalized Vickrey-Clarke-Groves (VCG) mechanism. But VCG mecha- nism has one shortage: The implementation of truthfulness is on the cost of decreasing the revenue of the mechanism. (e.g., Ning Chen and Hong Zhu. [1999]). We introduce three new characters of mechanism:partly truthful, criti- cal, consistent, and introduce a new mechanism: X mechanism that satisfy the above three characters. Like VCG mechanism, X mechanism also generalizes from Vickery Auction and is consistent with Vickery auction in many ways, but the extended methods used in X mechanism is different from that in VCG mechanism . This paper will demonstrate that X mechanism better than VCG mechanism in optimizing utility of mechanism, which is the original intention of mechanism design. So partly truthful,critical and consistent are at least as important as truthful in mechanism design, and they beyond truthful in many situations.As a result, we conclude that partly truthful,critical and consistent are three new directions in mechanism design.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 12:09:57 GMT" }, { "version": "v2", "created": "Thu, 22 Dec 2005 04:27:14 GMT" } ]
2009-09-29T00:00:00
[ [ "Meng", "Jiangtao", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0512084
Hanna E. Makaruk
Nikita Sakhanenko, Hanna Makaruk
Understanding physics from interconnected data
9 pages, 8 figures
null
null
LA-UR-05-5921
cs.CV
null
Metal melting on release after explosion is a physical system far from quilibrium. A complete physical model of this system does not exist, because many interrelated effects have to be considered. General methodology needs to be developed so as to describe and understand physical phenomena involved. The high noise of the data, moving blur of images, the high degree of uncertainty due to the different types of sensors, and the information entangled and hidden inside the noisy images makes reasoning about the physical processes very difficult. Major problems include proper information extraction and the problem of reconstruction, as well as prediction of the missing data. In this paper, several techniques addressing the first problem are given, building the basis for tackling the second problem.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 20:23:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Sakhanenko", "Nikita", "" ], [ "Makaruk", "Hanna", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0512085
Todd Holloway
Todd Holloway, Miran Bozicevic, Katy B\"orner
Analyzing and Visualizing the Semantic Coverage of Wikipedia and Its Authors
null
null
null
null
cs.IR
null
This paper presents a novel analysis and visualization of English Wikipedia data. Our specific interest is the analysis of basic statistics, the identification of the semantic structure and age of the categories in this free online encyclopedia, and the content coverage of its highly productive authors. The paper starts with an introduction of Wikipedia and a review of related work. We then introduce a suite of measures and approaches to analyze and map the semantic structure of Wikipedia. The results show that co-occurrences of categories within individual articles have a power-law distribution, and when mapped reveal the nicely clustered semantic structure of Wikipedia. The results also reveal the content coverage of the article's authors, although the roles these authors play are as varied as the authors themselves. We conclude with a discussion of major results and planned future work.
[ { "version": "v1", "created": "Wed, 21 Dec 2005 19:31:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Holloway", "Todd", "" ], [ "Bozicevic", "Miran", "" ], [ "Börner", "Katy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0512086
Lutz Strassburger
Lutz Strassburger
On the Axiomatisation of Boolean Categories with and without Medial
66 pages LaTeX, using TAC style, v3: minor changes as requested by the referee
null
null
null
cs.LO
null
The term ``Boolean category'' should be used for describing an object that is to categories what a Boolean algebra is to posets. More specifically, a Boolean category should provide the abstract algebraic structure underlying the proofs in Boolean Logic, in the same sense as a Cartesian closed category captures the proofs in intuitionistic logic and a *-autonomous category captures the proofs in linear logic. However, recent work has shown that there is no canonical axiomatisation of a Boolean category. In this work, we will see a series (with increasing strength) of possible such axiomatisations, all based on the notion of *-autonomous category. We will particularly focus on the medial map, which has its origin in an inference rule in KS, a cut-free deductive system for Boolean logic in the calculus of structures. Finally, we will present a category of proof nets as a particularly well-behaved example of a Boolean category.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 17:43:53 GMT" }, { "version": "v2", "created": "Mon, 10 Apr 2006 16:07:57 GMT" }, { "version": "v3", "created": "Fri, 5 Oct 2007 15:58:08 GMT" } ]
2011-11-09T00:00:00
[ [ "Strassburger", "Lutz", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0512087
Ashish Khisti
Ashish Khisti, Uri Erez, Gregory Wornell
Fundamental Limits and Scaling Behavior of Cooperative Multicasting in Wireless Networks
The upper bound in Section (IV) has been modified so that it immediately generalizes to the multiple antenna case. The new version does not rely on Teletar's conjecture being true. Some additional typos have been corrected
null
null
null
cs.IT cs.NI math.IT
null
A framework is developed for analyzing capacity gains from user cooperation in slow fading wireless networks when the number of nodes (network size) is large. The framework is illustrated for the case of a simple multipath-rich Rayleigh fading channel model. Both unicasting (one source and one destination) and multicasting (one source and several destinations) scenarios are considered. We introduce a meaningful notion of Shannon capacity for such systems, evaluate this capacity as a function of signal-to-noise ratio (SNR), and develop a simple two-phase cooperative network protocol that achieves it. We observe that the resulting capacity is the same for both unicasting and multicasting, but show that the network size required to achieve any target error probability is smaller for unicasting than for multicasting. Finally, we introduce the notion of a network ``scaling exponent'' to quantify the rate of decay of error probability with network size as a function of the targeted fraction of the capacity. This exponent provides additional insights to system designers by enabling a finer grain comparison of candidate cooperative transmission protocols in even moderately sized networks.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 16:25:18 GMT" }, { "version": "v2", "created": "Sat, 6 May 2006 03:33:12 GMT" } ]
2009-09-29T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Erez", "Uri", "" ], [ "Wornell", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512088
Philippe Robert
Nelson Antunes, Christine Fricker, Philippe Robert, Danielle Tibi
Analysis of loss networks with routing
Published at http://dx.doi.org/10.1214/105051606000000466 in the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 16, 4 (2006) 2007-2026
null
null
cs.NI math.PR
null
This paper analyzes stochastic networks consisting of finite capacity nodes with different classes of requests which move according to some routing policy. The Markov processes describing these networks do not, in general, have reversibility properties, so the explicit expression of their invariant distribution is not known. Kelly's limiting regime is considered: the arrival rates of calls as well as the capacities of the nodes are proportional to a factor going to infinity. It is proved that, in limit, the associated rescaled Markov process converges to a deterministic dynamical system with a unique equilibrium point characterized by a nonstandard fixed point equation.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 17:00:30 GMT" }, { "version": "v2", "created": "Fri, 13 Jan 2006 07:06:00 GMT" }, { "version": "v3", "created": "Fri, 28 Apr 2006 09:03:43 GMT" }, { "version": "v4", "created": "Wed, 14 Feb 2007 09:12:59 GMT" } ]
2007-08-13T00:00:00
[ [ "Antunes", "Nelson", "" ], [ "Fricker", "Christine", "" ], [ "Robert", "Philippe", "" ], [ "Tibi", "Danielle", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0512089
Stephen F. Bush PhD
Stephen F. Bush, Todd Hughes
On The Effectiveness of Kolmogorov Complexity Estimation to Discriminate Semantic Types
null
SFI Workshop: Resilient and Adaptive Defense of Computing Networks 2003, Santa Fe Institute, Santa Fe, NM, Nov 5-6, 2003
null
null
cs.NI cs.CR
null
We present progress on the experimental validation of a fundamental and universally applicable vulnerability analysis framework that is capable of identifying new types of vulnerabilities before attackers innovate attacks. This new framework proactively identifies system components that are vulnerable based upon their Kolmogorov Complexity estimates and it facilitates prediction of previously unknown vulnerabilities that are likely to be exploited by future attack methods. A tool that utilizes a growing library of complexity estimators is presented. This work is an incremental step towards validation of the concept of complexity-based vulnerability analysis. In particular, results indicate that data types (semantic types) can be identified by estimates of their complexity. Thus, a map of complexity can identify suspicious types, such as executable data embedded within passive data types, without resorting to predefined headers, signatures, or other limiting a priori information.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 22:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Hughes", "Todd", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0512090
Renaud Lambiotte
R. Lambiotte and M. Ausloos
Collaborative tagging as a tripartite network
null
Lecture Notes in Computer Science, 3993 (2006) 1114 - 1117
10.1007/11758532_152
null
cs.DS cs.DL
null
We describe online collaborative communities by tripartite networks, the nodes being persons, items and tags. We introduce projection methods in order to uncover the structures of the networks, i.e. communities of users, genre families... To do so, we focus on the correlations between the nodes, depending on their profiles, and use percolation techniques that consist in removing less correlated links and observing the shaping of disconnected islands. The structuring of the network is visualised by using a tree representation. The notion of diversity in the system is also discussed.
[ { "version": "v1", "created": "Fri, 23 Dec 2005 13:38:57 GMT" }, { "version": "v2", "created": "Thu, 29 Dec 2005 09:14:19 GMT" } ]
2016-08-31T00:00:00
[ [ "Lambiotte", "R.", "" ], [ "Ausloos", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0512091
Erik Demaine
Boris Aronov, Prosenjit Bose, Erik D. Demaine, Joachim Gudmundsson, John Iacono, Stefan Langerman, Michiel Smid
Data Structures for Halfplane Proximity Queries and Incremental Voronoi Diagrams
17 pages, 6 figures. Various small improvements. To appear in Algorithmica
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider preprocessing a set $S$ of $n$ points in convex position in the plane into a data structure supporting queries of the following form: given a point $q$ and a directed line $\ell$ in the plane, report the point of $S$ that is farthest from (or, alternatively, nearest to) the point $q$ among all points to the left of line $\ell$. We present two data structures for this problem. The first data structure uses $O(n^{1+\varepsilon})$ space and preprocessing time, and answers queries in $O(2^{1/\varepsilon} \log n)$ time, for any $0 < \varepsilon < 1$. The second data structure uses $O(n \log^3 n)$ space and polynomial preprocessing time, and answers queries in $O(\log n)$ time. These are the first solutions to the problem with $O(\log n)$ query time and $o(n^2)$ space. The second data structure uses a new representation of nearest- and farthest-point Voronoi diagrams of points in convex position. This representation supports the insertion of new points in clockwise order using only $O(\log n)$ amortized pointer changes, in addition to $O(\log n)$-time point-location queries, even though every such update may make $\Theta(n)$ combinatorial changes to the Voronoi diagram. This data structure is the first demonstration that deterministically and incrementally constructed Voronoi diagrams can be maintained in $o(n)$ amortized pointer changes per operation while keeping $O(\log n)$-time point-location queries.
[ { "version": "v1", "created": "Fri, 23 Dec 2005 04:28:12 GMT" }, { "version": "v2", "created": "Wed, 15 Jul 2015 13:10:07 GMT" }, { "version": "v3", "created": "Fri, 13 Oct 2017 16:47:53 GMT" } ]
2017-10-16T00:00:00
[ [ "Aronov", "Boris", "" ], [ "Bose", "Prosenjit", "" ], [ "Demaine", "Erik D.", "" ], [ "Gudmundsson", "Joachim", "" ], [ "Iacono", "John", "" ], [ "Langerman", "Stefan", "" ], [ "Smid", "Michiel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0512092
Stephen F. Bush PhD
Stephen F. Bush and Nathan Smith
The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance
Introduces flash routing
The 2005 International Conference on Wireless Networks (ICWN-05) Monte Carlo Resort, Las Vegas, Nevada, USA, June 27-30, 2005
null
null
cs.NI
null
A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for wireless ad hoc routing.
[ { "version": "v1", "created": "Thu, 22 Dec 2005 22:17:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ], [ "Smith", "Nathan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0512093
Arya Mazumdar
Arya Mazumdar, A K Chaturvedi, Adrish Banerjee
Construction of Turbo Code Interleavers from 3-Regular Hamiltonian Graphs
This paper has been accepted for publication in IEEE Communication Letters
IEEE Communications Letters, pp. 284-286, Vol. 10, Issue 4, April, 2006.
10.1109/LCOMM.2006.04013
null
cs.IT math.IT
null
In this letter we present a new construction of interleavers for turbo codes from 3-regular Hamiltonian graphs. The interleavers can be generated using a few parameters, which can be selected in such a way that the girth of the interleaver graph (IG) becomes large, inducing a high summary distance. The size of the search space for these parameters is derived. The proposed interleavers themselves work as their de-interleavers.
[ { "version": "v1", "created": "Fri, 23 Dec 2005 21:11:35 GMT" } ]
2014-11-17T00:00:00
[ [ "Mazumdar", "Arya", "" ], [ "Chaturvedi", "A K", "" ], [ "Banerjee", "Adrish", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512094
Stephen F. Bush PhD
Stephen F. Bush
Low-Energy Sensor Network Time Synchronization as an Emergent Property
null
null
null
null
cs.NI
null
The primary contribution of this work is to examine the energy efficiency of pulse coupled oscillation for time synchronization in a realistic wireless network environment and to explore the impact of mobility on convergence rate. Energy coupled oscillation is susceptible to interference; this approach uses reception and decoding of short packet bursts to eliminate this problem. The energy efficiency of a commonly used timestamp broadcast algorithm is compared and contrasted with pulse-coupled oscillation. The emergent pulse coupled oscillation technique shows greater energy efficiency as well as robustness with mobility. A proportion of the sensors may be integrated with GPS receivers in order to obtain a master clock time.
[ { "version": "v1", "created": "Fri, 23 Dec 2005 21:45:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Bush", "Stephen F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0512095
Dmitri Krioukov
Priya Mahadevan, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
The Internet AS-Level Topology: Three Data Sources and One Definitive Metric
This paper is a revised journal version of cs.NI/0508033
ACM SIGCOMM Computer Communication Review (CCR), v.36, n.1, p.17-26, 2006
10.1145/1111322.1111328
null
cs.NI physics.soc-ph
null
We calculate an extensive set of characteristics for Internet AS topologies extracted from the three data sources most frequently used by the research community: traceroutes, BGP, and WHOIS. We discover that traceroute and BGP topologies are similar to one another but differ substantially from the WHOIS topology. Among the widely considered metrics, we find that the joint degree distribution appears to fundamentally characterize Internet AS topologies as well as narrowly define values for other important metrics. We discuss the interplay between the specifics of the three data collection mechanisms and the resulting topology views. In particular, we show how the data collection peculiarities explain differences in the resulting joint degree distributions of the respective topologies. Finally, we release to the community the input topology datasets, along with the scripts and output of our calculations. This supplement should enable researchers to validate their models against real data and to make more informed selection of topology data sources for their specific needs.
[ { "version": "v1", "created": "Sat, 24 Dec 2005 03:19:24 GMT" } ]
2008-04-16T00:00:00
[ [ "Mahadevan", "Priya", "" ], [ "Krioukov", "Dmitri", "" ], [ "Fomenkov", "Marina", "" ], [ "Huffaker", "Bradley", "" ], [ "Dimitropoulos", "Xenofontas", "" ], [ "claffy", "kc", "" ], [ "Vahdat", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0512096
Ralf L\"ammel
Ralf Laemmel
Book review "The Haskell Road to Logic, Maths and Programming"
To appear in the JoLLI journal in 2006
null
null
null
cs.PL cs.LO
null
The textbook by Doets and van Eijck puts the Haskell programming language systematically to work for presenting a major piece of logic and mathematics. The reader is taken through chapters on basic logic, proof recipes, sets and lists, relations and functions, recursion and co-recursion, the number systems, polynomials and power series, ending with Cantor's infinities. The book uses Haskell for the executable and strongly typed manifestation of various mathematical notions at the level of declarative programming. The book adopts a systematic but relaxed mathematical style (definition, example, exercise, ...); the text is very pleasant to read due to a small amount of anecdotal information, and due to the fact that definitions are fluently integrated in the running text. An important goal of the book is to get the reader acquainted with reasoning about programs.
[ { "version": "v1", "created": "Sat, 24 Dec 2005 23:08:25 GMT" }, { "version": "v2", "created": "Thu, 22 Jun 2006 00:50:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Laemmel", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0512097
Jialing Liu
Jialing Liu and Nicola Elia
Gaussian Channels with Feedback: Optimality, Fundamental Limitations, and Connections of Communication, Estimation, and Control
37 pages, 14 figures. The material in this paper was presented in part at the 43rd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2005. This paper was submitted to IEEE Transactions on Information Theory in October, 2005
null
null
null
cs.IT math.IT
null
Gaussian channels with memory and with noiseless feedback have been widely studied in the information theory literature. However, a coding scheme to achieve the feedback capacity is not available. In this paper, a coding scheme is proposed to achieve the feedback capacity for Gaussian channels. The coding scheme essentially implements the celebrated Kalman filter algorithm, and is equivalent to an estimation system over the same channel without feedback. It reveals that the achievable information rate of the feedback communication system can be alternatively given by the decay rate of the Cramer-Rao bound of the associated estimation system. Thus, combined with the control theoretic characterizations of feedback communication (proposed by Elia), this implies that the fundamental limitations in feedback communication, estimation, and control coincide. This leads to a unifying perspective that integrates information, estimation, and control. We also establish the optimality of the Kalman filtering in the sense of information transmission, a supplement to the optimality of Kalman filtering in the sense of information processing proposed by Mitter and Newton. In addition, the proposed coding scheme generalizes the Schalkwijk-Kailath codes and reduces the coding complexity and coding delay. The construction of the coding scheme amounts to solving a finite-dimensional optimization problem. A simplification to the optimal stationary input distribution developed by Yang, Kavcic, and Tatikonda is also obtained. The results are verified in a numerical example.
[ { "version": "v1", "created": "Mon, 26 Dec 2005 05:44:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Jialing", "" ], [ "Elia", "Nicola", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512098
Dmitry Paukov
Dmitry P. Paukov
Mathematical models of the complex surfaces in simulation and visualization systems
8 pages, 4 figures
null
null
null
cs.GR cs.CG
null
Modeling, simulation and visualization of three-dimension complex bodies widely use mathematical model of curves and surfaces. The most important curves and surfaces for these purposes are curves and surfaces in Hermite and Bezier forms, splines and NURBS. Article is devoted to survey this way to use geometrical data in various computer graphics systems and adjacent fields.
[ { "version": "v1", "created": "Mon, 26 Dec 2005 14:45:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Paukov", "Dmitry P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0512099
Mark Burgin
Mark Burgin
Mathematical Models in Schema Theory
null
null
null
null
cs.AI
null
In this paper, a mathematical schema theory is developed. This theory has three roots: brain theory schemas, grid automata, and block-shemas. In Section 2 of this paper, elements of the theory of grid automata necessary for the mathematical schema theory are presented. In Section 3, elements of brain theory necessary for the mathematical schema theory are presented. In Section 4, other types of schemas are considered. In Section 5, the mathematical schema theory is developed. The achieved level of schema representation allows one to model by mathematical tools virtually any type of schemas considered before, including schemas in neurophisiology, psychology, computer science, Internet technology, databases, logic, and mathematics.
[ { "version": "v1", "created": "Tue, 27 Dec 2005 21:29:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Burgin", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0512100
Giorgi Japaridze
Giorgi Japaridze
The logic of interactive Turing reduction
null
Journal of Symbolic Logic 72 (2007), pp. 243-276
10.2178/jsl/1174668394
null
cs.LO cs.AI math.LO
null
The paper gives a soundness and completeness proof for the implicative fragment of intuitionistic calculus with respect to the semantics of computability logic, which understands intuitionistic implication as interactive algorithmic reduction. This concept -- more precisely, the associated concept of reducibility -- is a generalization of Turing reducibility from the traditional, input/output sorts of problems to computational tasks of arbitrary degrees of interactivity. See http://www.cis.upenn.edu/~giorgi/cl.html for a comprehensive online source on computability logic.
[ { "version": "v1", "created": "Wed, 28 Dec 2005 07:25:57 GMT" }, { "version": "v2", "created": "Thu, 29 Dec 2005 22:03:06 GMT" }, { "version": "v3", "created": "Fri, 3 Feb 2006 05:44:27 GMT" }, { "version": "v4", "created": "Sat, 11 Feb 2006 15:38:42 GMT" } ]
2011-04-15T00:00:00
[ [ "Japaridze", "Giorgi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
cs/0512101
Karunakaran Murali Krishnan
K. Murali Krishnan, Priti Shankar
On the Complexity of finding Stopping Distance in Tanner Graphs
A decision problem proved NP-complete in the earlier version was not equivalent to stopping distance problem for Tanner graphs. Now corrected
IEEE Trans. Info. Theory, 53(6), 2007, pp. 2278-2280.
null
null
cs.IT cs.CC math.IT
null
Two decision problems related to the computation of stopping sets in Tanner graphs are shown to be NP-complete. NP-hardness of the problem of computing the stopping distance of a Tanner graph follows as a consequence
[ { "version": "v1", "created": "Wed, 28 Dec 2005 09:42:36 GMT" }, { "version": "v2", "created": "Mon, 29 May 2006 06:19:58 GMT" } ]
2008-07-21T00:00:00
[ [ "Krishnan", "K. Murali", "" ], [ "Shankar", "Priti", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0512102
Andrij Rovenchak
Solomija Buk and Andrij Rovenchak
Statistical Parameters of the Novel "Perekhresni stezhky" ("The Cross-Paths") by Ivan Franko
11 pages
Quantitative Linguistics 62: Exact methods in the study of language and text: dedicated to Professor Gabriel Altmann on the occasion of his 75th birthday / Ed. by P. Grzybek and R. Kohler (Berlin; New York: de Gruyter), 39-48 (2007)
10.1515/9783110894219.39
null
cs.CL
null
In the paper, a complex statistical characteristics of a Ukrainian novel is given for the first time. The distribution of word-forms with respect to their size is studied. The linguistic laws by Zipf-Mandelbrot and Altmann-Menzerath are analyzed.
[ { "version": "v1", "created": "Wed, 28 Dec 2005 13:45:54 GMT" } ]
2024-01-04T00:00:00
[ [ "Buk", "Solomija", "" ], [ "Rovenchak", "Andrij", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0512103
Louis Mello
Louis Mello
The Fibonacci Sequence Mod m
null
null
null
null
cs.OH
null
This paper proposes a computational method for obtaining the length of the cycle that arises from the Fibonacci series taken mod m (some number) and mod p (some prime number).
[ { "version": "v1", "created": "Wed, 28 Dec 2005 18:21:08 GMT" } ]
2011-11-09T00:00:00
[ [ "Mello", "Louis", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0512104
Robert Burger PhD
John Robert Burger
Reversible CAM Processor Modeled After Quantum Computer Behavior
null
null
null
null
cs.AR quant-ph
null
Proposed below is a reversible digital computer modeled after the natural behavior of a quantum system. Using approaches usually reserved for idealized quantum computers, the Reversible CAM, or State Vector Parallel (RSVP) processor can easily find keywords in an unstructured database (that is, it can solve a needle in a haystack problem). The RSVP processor efficiently solves a SAT (Satisfiability of Boolean Formulae) problem; also it can aid in the solution of a GP (Global Properties of Truth Table) problem. The power delay product of the RSVP processor is exponentially lower than that of a standard CAM programmed to perform similar operations.
[ { "version": "v1", "created": "Wed, 28 Dec 2005 19:59:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0512105
Valmir Barbosa
Alexandre O. Stauffer, Valmir C. Barbosa
A study of the edge-switching Markov-chain method for the generation of random graphs
Minor typos corrected
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of generating connected random graphs with no self-loops or multiple edges and that, in addition, have a given degree sequence. The generation method we focus on is the edge-switching Markov-chain method, whose functioning depends on a parameter w related to the method's core operation of an edge switch. We analyze two existing heuristics for adjusting w during the generation of a graph and show that they result in a Markov chain whose stationary distribution is uniform, thus ensuring that generation occurs uniformly at random. We also introduce a novel w-adjusting heuristic which, even though it does not always lead to a Markov chain, is still guaranteed to converge to the uniform distribution under relatively mild conditions. We report on extensive computer experiments comparing the three heuristics' performance at generating random graphs whose node degrees are distributed as power laws.
[ { "version": "v1", "created": "Thu, 29 Dec 2005 18:37:01 GMT" }, { "version": "v2", "created": "Thu, 30 Jun 2011 18:52:12 GMT" } ]
2011-07-01T00:00:00
[ [ "Stauffer", "Alexandre O.", "" ], [ "Barbosa", "Valmir C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0601001
Jens Oehlschl\"agel
Jens Oehlschl\"agel
Truecluster: robust scalable clustering with model selection
Article (10 figures). Changes in 2nd version: dropped supplements in favor of better integrated presentation, better literature coverage, put into proper English. Author's website available via http://www.truecluster.com
null
null
null
cs.AI
null
Data-based classification is fundamental to most branches of science. While recent years have brought enormous progress in various areas of statistical computing and clustering, some general challenges in clustering remain: model selection, robustness, and scalability to large datasets. We consider the important problem of deciding on the optimal number of clusters, given an arbitrary definition of space and clusteriness. We show how to construct a cluster information criterion that allows objective model selection. Differing from other approaches, our truecluster method does not require specific assumptions about underlying distributions, dissimilarity definitions or cluster models. Truecluster puts arbitrary clustering algorithms into a generic unified (sampling-based) statistical framework. It is scalable to big datasets and provides robust cluster assignments and case-wise diagnostics. Truecluster will make clustering more objective, allows for automation, and will save time and costs. Free R software is available.
[ { "version": "v1", "created": "Mon, 2 Jan 2006 13:17:09 GMT" }, { "version": "v2", "created": "Mon, 28 May 2007 17:18:09 GMT" } ]
2007-06-13T00:00:00
[ [ "Oehlschlägel", "Jens", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0601002
G\"unter Rote
Wolfgang Mulzer and Guenter Rote
Minimum-weight triangulation is NP-hard
45 pages (including a technical appendix of 13 pages), 28 figures. This revision contains a few improvements in the exposition
Journal of the ACM, 55, no. 2 (May 2008), Article 11, 29 pp.
10.1145/1346330.1346336
B 05-23 (revised)
cs.CG cs.CC
null
A triangulation of a planar point set S is a maximal plane straight-line graph with vertex set S. In the minimum-weight triangulation (MWT) problem, we are looking for a triangulation of a given point set that minimizes the sum of the edge lengths. We prove that the decision version of this problem is NP-hard. We use a reduction from PLANAR-1-IN-3-SAT. The correct working of the gadgets is established with computer assistance, using dynamic programming on polygonal faces, as well as the beta-skeleton heuristic to certify that certain edges belong to the minimum-weight triangulation.
[ { "version": "v1", "created": "Mon, 2 Jan 2006 16:11:29 GMT" }, { "version": "v2", "created": "Wed, 12 Sep 2007 01:33:35 GMT" }, { "version": "v3", "created": "Wed, 13 Feb 2008 22:30:23 GMT" } ]
2010-04-19T00:00:00
[ [ "Mulzer", "Wolfgang", "" ], [ "Rote", "Guenter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0601003
Ruben Vandeginste
Ruben Vandeginste, Bart Demoen
Incremental copying garbage collection for WAM-based Prolog systems
33 pages, 22 figures, 5 tables. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL
null
The design and implementation of an incremental copying heap garbage collector for WAM-based Prolog systems is presented. Its heap layout consists of a number of equal-sized blocks. Other changes to the standard WAM allow these blocks to be garbage collected independently. The independent collection of heap blocks forms the basis of an incremental collecting algorithm which employs copying without marking (contrary to the more frequently used mark&copy or mark&slide algorithms in the context of Prolog). Compared to standard semi-space copying collectors, this approach to heap garbage collection lowers in many cases the memory usage and reduces pause times. The algorithm also allows for a wide variety of garbage collection policies including generational ones. The algorithm is implemented and evaluated in the context of hProlog.
[ { "version": "v1", "created": "Mon, 2 Jan 2006 20:58:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Vandeginste", "Ruben", "" ], [ "Demoen", "Bart", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0601004
Benoit Girard
Beno\^it Girard (LIP6, LPPA), David Filliat, Jean-Arcady Meyer (LIP6), Alain Berthoz (LPPA), Agn\`es Guillot (LIP6)
Integration of navigation and action selection functionalities in a computational model of cortico-basal ganglia-thalamo-cortical loops
null
Adaptive Behavior 13 (2005) 115-130
10.1177/105971230501300204
null
cs.AI cs.RO
null
This article describes a biomimetic control architecture affording an animat both action selection and navigation functionalities. It satisfies the survival constraint of an artificial metabolism and supports several complementary navigation strategies. It builds upon an action selection model based on the basal ganglia of the vertebrate brain, using two interconnected cortico-basal ganglia-thalamo-cortical loops: a ventral one concerned with appetitive actions and a dorsal one dedicated to consummatory actions. The performances of the resulting model are evaluated in simulation. The experiments assess the prolonged survival permitted by the use of high level navigation strategies and the complementarity of navigation strategies in dynamic environments. The correctness of the behavioral choices in situations of antagonistic or synergetic internal states are also tested. Finally, the modelling choices are discussed with regard to their biomimetic plausibility, while the experimental results are estimated in terms of animat adaptivity.
[ { "version": "v1", "created": "Tue, 3 Jan 2006 10:39:24 GMT" } ]
2016-08-16T00:00:00
[ [ "Girard", "Benoît", "", "LIP6, LPPA" ], [ "Filliat", "David", "", "LIP6" ], [ "Meyer", "Jean-Arcady", "", "LIP6" ], [ "Berthoz", "Alain", "", "LPPA" ], [ "Guillot", "Agnès", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0601005
Jinyun Ke
J-Y Ke and Y. Yao
Analyzing language development from a network approach
22 pages, 12 figures
null
null
null
cs.CL
null
In this paper we propose some new measures of language development using network analyses, which is inspired by the recent surge of interests in network studies of many real-world systems. Children's and care-takers' speech data from a longitudinal study are represented as a series of networks, word forms being taken as nodes and collocation of words as links. Measures on the properties of the networks, such as size, connectivity, hub and authority analyses, etc., allow us to make quantitative comparison so as to reveal different paths of development. For example, the asynchrony of development in network size and average degree suggests that children cannot be simply classified as early talkers or late talkers by one or two measures. Children follow different paths in a multi-dimensional space. They may develop faster in one dimension but slower in another dimension. The network approach requires little preprocessing of words and analyses on sentence structures, and the characteristics of words and their usage emerge from the network and are independent of any grammatical presumptions. We show that the change of the two articles "the" and "a" in their roles as important nodes in the network reflects the progress of children's syntactic development: the two articles often start in children's networks as hubs and later shift to authorities, while they are authorities constantly in the adult's networks. The network analyses provide a new approach to study language development, and at the same time language development also presents a rich area for network theories to explore.
[ { "version": "v1", "created": "Wed, 4 Jan 2006 18:33:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Ke", "J-Y", "" ], [ "Yao", "Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0601006
Fady Alajaji
Y. Zhong, F. Alajaji and L. L. Campbell
On the Joint Source-Channel Coding Error Exponent for Discrete Memoryless Systems: Computation and Comparison with Separate Coding
Technical Report, December 2005
null
null
null
cs.IT math.IT
null
We investigate the computation of Csiszar's bounds for the joint source-channel coding (JSCC) error exponent, E_J, of a communication system consisting of a discrete memoryless source and a discrete memoryless channel. We provide equivalent expressions for these bounds and derive explicit formulas for the rates where the bounds are attained. These equivalent representations can be readily computed for arbitrary source-channel pairs via Arimoto's algorithm. When the channel's distribution satisfies a symmetry property, the bounds admit closed-form parametric expressions. We then use our results to provide a systematic comparison between the JSCC error exponent E_J and the tandem coding error exponent E_T, which applies if the source and channel are separately coded. It is shown that E_T <= E_J <= 2E_T. We establish conditions for which E_J > E_T and for which E_J = 2E_T. Numerical examples indicate that E_J is close to 2E_T for many source-channel pairs. This gain translates into a power saving larger than 2 dB for a binary source transmitted over additive white Gaussian noise channels and Rayleigh fading channels with finite output quantization. Finally, we study the computation of the lossy JSCC error exponent under the Hamming distortion measure.
[ { "version": "v1", "created": "Wed, 4 Jan 2006 19:26:57 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhong", "Y.", "" ], [ "Alajaji", "F.", "" ], [ "Campbell", "L. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601007
Anant Sahai
Anant Sahai and Sanjoy Mitter
The necessity and sufficiency of anytime capacity for stabilization of a linear system over a noisy communication link Part I: scalar systems
27 pages, submitted to Information Theory Transactions
null
null
null
cs.IT math.IT
null
We review how Shannon's classical notion of capacity is not enough to characterize a noisy communication channel if the channel is intended to be used as part of a feedback loop to stabilize an unstable scalar linear system. While classical capacity is not enough, another sense of capacity (parametrized by reliability) called ``anytime capacity'' is shown to be necessary for the stabilization of an unstable process. The required rate is given by the log of the unstable system gain and the required reliability comes from the sense of stability desired. A consequence of this necessity result is a sequential generalization of the Schalkwijk/Kailath scheme for communication over the AWGN channel with feedback. In cases of sufficiently rich information patterns between the encoder and decoder, adequate anytime capacity is also shown to be sufficient for there to exist a stabilizing controller. These sufficiency results are then generalized to cases with noisy observations, delayed control actions, and without any explicit feedback between the observer and the controller. Both necessary and sufficient conditions are extended to continuous time systems as well. We close with comments discussing a hierarchy of difficulty for communication problems and how these results establish where stabilization problems sit in that hierarchy.
[ { "version": "v1", "created": "Wed, 4 Jan 2006 19:57:53 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ], [ "Mitter", "Sanjoy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601008
Ben Moszkowski
Ben Moszkowski
A Hierarchical Analysis of Propositional Temporal Logic Based on Intervals
64 pages, revised and expanded version of published work. An earlier version of this appeared in "We Will Show Them: Essays in Honour of Dov Gabbay on his 60th Birthday", Volume 2. S. Artemov, H. Barringer, A. S. d'Avila Garcez, L. C. Lamb, and J. Woods (editors.), pages 371-440, College Publications (formely KCL Publications), King's College, London, 2005, http://www.collegepublications.co.uk
null
null
null
cs.LO
null
We present a hierarchical framework for analysing propositional linear-time temporal logic (PTL) to obtain standard results such as a small model property, decision procedures and axiomatic completeness. Both finite time and infinite time are considered and one consequent benefit of the framework is the ability to systematically reduce infinite-time reasoning to finite-time reasoning. The treatment of PTL with both the operator Until and past time naturally reduces to that for PTL without either one. Our method utilises a low-level normal form for PTL called a "transition configuration". In addition, we employ reasoning about intervals of time. Besides being hierarchical and interval-based, the approach differs from other analyses of PTL typically based on sets of formulas and sequences of such sets. Instead we describe models using time intervals represented as finite and infinite sequences of states. The analysis relates larger intervals with smaller ones. Steps involved are expressed in Propositional Interval Temporal Logic (PITL) which is better suited than PTL for sequentially combining and decomposing formulas. Consequently, we can articulate issues in PTL model construction of equal relevance in more conventional analyses but normally only considered at the metalevel. We also describe a decision procedure based on Binary Decision Diagrams.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 18:35:38 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2006 23:30:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Moszkowski", "Ben", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0601009
Tobias Koch
Tobias Koch, Amos Lapidoth
Gaussian Fading is the Worst Fading
Presented at the IEEE International Symposium on Information Theory (ISIT) 2006; replaced with version that appears in the proceedings
null
null
null
cs.IT math.IT
null
The capacity of peak-power limited, single-antenna, non-coherent, flat-fading channels with memory is considered. The emphasis is on the capacity pre-log, i.e., on the limiting ratio of channel capacity to the logarithm of the signal-to-noise ratio (SNR), as the SNR tends to infinity. It is shown that, among all stationary and ergodic fading processes of a given spectral distribution function whose law has no mass point at zero, the Gaussian process gives rise to the smallest pre-log.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 18:47:49 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2008 12:33:46 GMT" } ]
2008-04-14T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601010
Xiaowen Zhang
Xiaowen Zhang, Li Shu, Ke Tang
Multi-Map Orbit Hopping Chaotic Stream Cipher
9 pages
null
null
null
cs.CR
null
In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum mechanism for secure digital communications and fundamental chaos characteristics of mixing, unpredictable, and extremely sensitive to initial conditions. The design, key and subkeys, and detail implementation of the system are addressed. A variable number of well studied chaotic maps form a map bank. And the key determines how the system hops between multiple orbits, and it also determines the number of maps, the number of orbits for each map, and the number of sample points for each orbits. A detailed example is provided.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 21:52:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Shu", "Li", "" ], [ "Tang", "Ke", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0601011
Avner Magen
Hamed Hatami and Avner Magen and Vangelis Markakis
Integrality gaps of semidefinite programs for Vertex Cover and relations to $\ell_1$ embeddability of Negative Type metrics
A more complete version. Changed order of results. A complete proof of (current) Theorem 5
null
null
null
cs.DS cs.DM math.MG
null
We study various SDP formulations for {\sc Vertex Cover} by adding different constraints to the standard formulation. We show that {\sc Vertex Cover} cannot be approximated better than $2-o(1)$ even when we add the so called pentagonal inequality constraints to the standard SDP formulation, en route answering an open question of Karakostas~\cite{Karakostas}. We further show the surprising fact that by strengthening the SDP with the (intractable) requirement that the metric interpretation of the solution is an $\ell_1$ metric, we get an exact relaxation (integrality gap is 1), and on the other hand if the solution is arbitrarily close to being $\ell_1$ embeddable, the integrality gap may be as big as $2-o(1)$. Finally, inspired by the above findings, we use ideas from the integrality gap construction of Charikar \cite{Char02} to provide a family of simple examples for negative type metrics that cannot be embedded into $\ell_1$ with distortion better than $8/7-\eps$. To this end we prove a new isoperimetric inequality for the hypercube.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 23:10:58 GMT" }, { "version": "v2", "created": "Wed, 12 Apr 2006 14:01:50 GMT" }, { "version": "v3", "created": "Thu, 13 Apr 2006 20:17:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Hatami", "Hamed", "" ], [ "Magen", "Avner", "" ], [ "Markakis", "Vangelis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
cs/0601012
Ritesh Madan
Ritesh Madan, Devavrat Shah, and Olivier Leveque
Product Multicommodity Flow in Wireless Networks
Revised version of "Capacity-Delay Scaling in Arbitrary Wireless Networks" submitted to the IEEE Transactions on Information Theory. Part of this work appeared in the Allerton Conference on Communication, Control, and Computing, Monticello, IL, 2005, and the Internation Symposium on Information Theory (ISIT), 2006
null
10.1109/TIT.2008.917663
null
cs.IT math.IT
null
We provide a tight approximate characterization of the $n$-dimensional product multicommodity flow (PMF) region for a wireless network of $n$ nodes. Separate characterizations in terms of the spectral properties of appropriate network graphs are obtained in both an information theoretic sense and for a combinatorial interference model (e.g., Protocol model). These provide an inner approximation to the $n^2$ dimensional capacity region. These results answer the following questions which arise naturally from previous work: (a) What is the significance of $1/\sqrt{n}$ in the scaling laws for the Protocol interference model obtained by Gupta and Kumar (2000)? (b) Can we obtain a tight approximation to the "maximum supportable flow" for node distributions more general than the geometric random distribution, traffic models other than randomly chosen source-destination pairs, and under very general assumptions on the channel fading model? We first establish that the random source-destination model is essentially a one-dimensional approximation to the capacity region, and a special case of product multi-commodity flow. Building on previous results, for a combinatorial interference model given by a network and a conflict graph, we relate the product multicommodity flow to the spectral properties of the underlying graphs resulting in computational upper and lower bounds. For the more interesting random fading model with additive white Gaussian noise (AWGN), we show that the scaling laws for PMF can again be tightly characterized by the spectral properties of appropriately defined graphs. As an implication, we obtain computationally efficient upper and lower bounds on the PMF for any wireless network with a guaranteed approximation factor.
[ { "version": "v1", "created": "Thu, 5 Jan 2006 23:40:19 GMT" }, { "version": "v2", "created": "Thu, 16 Feb 2006 08:28:27 GMT" }, { "version": "v3", "created": "Mon, 19 Feb 2007 01:05:22 GMT" } ]
2016-11-17T00:00:00
[ [ "Madan", "Ritesh", "" ], [ "Shah", "Devavrat", "" ], [ "Leveque", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601013
Germ\'an Vidal
Josep Silva and Germ\'an Vidal
Forward slicing of functional logic programs by partial evaluation
To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.LO
null
Program slicing has been mainly studied in the context of imperative languages, where it has been applied to a wide variety of software engineering tasks, like program understanding, maintenance, debugging, testing, code reuse, etc. This work introduces the first forward slicing technique for declarative multi-paradigm programs which integrate features from functional and logic programming. Basically, given a program and a slicing criterion (a function call in our setting), the computed forward slice contains those parts of the original program which are reachable from the slicing criterion. Our approach to program slicing is based on an extension of (online) partial evaluation. Therefore, it provides a simple way to develop program slicing tools from existing partial evaluators and helps to clarify the relation between both methodologies. A slicing tool for the multi-paradigm language Curry, which demonstrates the usefulness of our approach, has been implemented in Curry itself.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 00:41:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Silva", "Josep", "" ], [ "Vidal", "Germán", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0601014
Yuan Feng
Yuan Feng, Runyao Duan, Zhengfeng Ji, and Mingsheng Ying
Probabilistic bisimilarities between quantum processes
Journal version
Information and Computation 2007, 205:1608-1639
null
null
cs.LO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modeling and reasoning about concurrent quantum systems is very important both for distributed quantum computing and for quantum protocol verification. As a consequence, a general framework describing formally the communication and concurrency in complex quantum systems is necessary. For this purpose, we propose a model qCCS which is a natural quantum extension of classical value-passing CCS with the input and output of quantum states, and unitary transformations and measurements on quantum systems. The operational semantics of qCCS is given based on probabilistic labeled transition system. This semantics has many different features compared with the proposals in literature in order to describe input and output of quantum systems which are possibly correlated with other components. Based on this operational semantics, we introduce the notions of strong probabilistic bisimilarity and weak probabilistic bisimilarity between quantum processes and discuss some properties of them, such as congruence under various combinators.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 02:47:41 GMT" }, { "version": "v2", "created": "Tue, 28 Feb 2006 13:31:33 GMT" }, { "version": "v3", "created": "Thu, 14 Nov 2013 09:03:39 GMT" } ]
2013-11-15T00:00:00
[ [ "Feng", "Yuan", "" ], [ "Duan", "Runyao", "" ], [ "Ji", "Zhengfeng", "" ], [ "Ying", "Mingsheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0601015
Philippe Robert
Nelson Antunes, Christine Fricker, Fabrice Guillemin (FT R&D), Philippe Robert
Perturbation Analysis of a Variable M/M/1 Queue: A Probabilistic Approach
null
Advances in Applied Probability 38, 1 (2006) 263-283
null
null
cs.NI
null
Motivated by the problem of the coexistence on transmission links of telecommunication networks of elastic and unresponsive traffic, we study in this paper the impact on the busy period of an M/M/1 queue of a small perturbation in the server rate. The perturbation depends upon an independent stationary process (X(t)) and is quantified by means of a parameter \eps \ll 1. We specifically compute the two first terms of the power series expansion in \eps of the mean value of the busy period duration. This allows us to study the validity of the Reduced Service Rate (RSR) approximation, which consists in comparing the perturbed M/M/1 queue with the M/M/1 queue where the service rate is constant and equal to the mean value of the perturbation. For the first term of the expansion, the two systems are equivalent. For the second term, the situation is more complex and it is shown that the correlations of the environment process (X(t)) play a key role.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 09:35:35 GMT" } ]
2007-08-13T00:00:00
[ [ "Antunes", "Nelson", "", "FT R&D" ], [ "Fricker", "Christine", "", "FT R&D" ], [ "Guillemin", "Fabrice", "", "FT R&D" ], [ "Robert", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0601016
Philippe Robert
Nelson Antunes, Christine Fricker, Fabrice Guillemin (FT R&D), Philippe Robert
Integration of streaming services and TCP data transmission in the Internet
null
Performance Evaluation 62, 1-4 (2006) 263-277
10.1016/j.peva.2005.07.006
null
cs.NI
null
We study in this paper the integration of elastic and streaming traffic on a same link in an IP network. We are specifically interested in the computation of the mean bit rate obtained by a data transfer. For this purpose, we consider that the bit rate offered by streaming traffic is low, of the order of magnitude of a small parameter \eps \ll 1 and related to an auxiliary stationary Markovian process (X(t)). Under the assumption that data transfers are exponentially distributed, arrive according to a Poisson process, and share the available bandwidth according to the ideal processor sharing discipline, we derive the mean bit rate of a data transfer as a power series expansion in \eps. Since the system can be described by means of an M/M/1 queue with a time-varying server rate, which depends upon the parameter \eps and process (X(t)), the key issue is to compute an expansion of the area swept under the occupation process of this queue in a busy period. We obtain closed formulas for the power series expansion in \eps of the mean bit rate, which allow us to verify the validity of the so-called reduced service rate at the first order. The second order term yields more insight into the negative impact of the variability of streaming flows.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 09:36:45 GMT" } ]
2007-08-13T00:00:00
[ [ "Antunes", "Nelson", "", "FT R&D" ], [ "Fricker", "Christine", "", "FT R&D" ], [ "Guillemin", "Fabrice", "", "FT R&D" ], [ "Robert", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0601017
Peter Jung
Peter Jung
Weighted Norms of Ambiguity Functions and Wigner Distributions
5 twocolumn pages,2 figures, accepted for 2006 IEEE International Symposium on Information Theory, typos corrected, some additional cites, legend in Fig.2 corrected
null
10.1109/ISIT.2006.262122
null
cs.IT math.IT quant-ph
null
In this article new bounds on weighted p-norms of ambiguity functions and Wigner functions are derived. Such norms occur frequently in several areas of physics and engineering. In pulse optimization for Weyl--Heisenberg signaling in wide-sense stationary uncorrelated scattering channels for example it is a key step to find the optimal waveforms for a given scattering statistics which is a problem also well known in radar and sonar waveform optimizations. The same situation arises in quantum information processing and optical communication when optimizing pure quantum states for communicating in bosonic quantum channels, i.e. find optimal channel input states maximizing the pure state channel fidelity. Due to the non-convex nature of this problem the optimum and the maximizers itself are in general difficult find, numerically and analytically. Therefore upper bounds on the achievable performance are important which will be provided by this contribution. Based on a result due to E. Lieb, the main theorem states a new upper bound which is independent of the waveforms and becomes tight only for Gaussian weights and waveforms. A discussion of this particular important case, which tighten recent results on Gaussian quantum fidelity and coherent states, will be given. Another bound is presented for the case where scattering is determined only by some arbitrary region in phase space.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 19:10:57 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2006 09:13:02 GMT" }, { "version": "v3", "created": "Fri, 19 May 2006 14:12:38 GMT" }, { "version": "v4", "created": "Fri, 7 Jul 2006 09:28:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Jung", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0601018
Miguel Palomino
Miguel Palomino
A comparison between two logical formalisms for rewriting
31 pages, 2 figures To appear in Theory and Practice of Logic Programming
null
null
null
cs.LO
null
Meseguer's rewriting logic and the rewriting logic CRWL are two well-known approaches to rewriting as logical deduction that, despite some clear similarities, were designed with different objectives. Here we study the relationships between them, both at a syntactic and at a semantic level. Even though it is not possible to establish an entailment system map between them, both can be naturally simulated in each other. Semantically, there is no embedding between the corresponding institutions. Along the way, the notions of entailment and satisfaction in Meseguer's rewriting logic are generalized. We also use the syntactic results to prove reflective properties of CRWL.
[ { "version": "v1", "created": "Fri, 6 Jan 2006 12:01:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Palomino", "Miguel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]