id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0601119
Richard McClatchey
Haya El-Ghalayini, Mohammed Odeh, & Richard McClatchey
Engineering Conceptual Data Models from Domain Ontologies: A Critical Evaluation
12 pages, 3 figures, presented at the 4th International Conference on Computer Science and Information Technology (CSIT'06). Amman Jordan April 2006
null
null
null
cs.SE
null
This paper studies the differences and similarities between domain ontologies and conceptual data models and the role that ontologies can play in establishing conceptual data models during the process of information systems development. A mapping algorithm has been proposed and embedded in a special purpose Transformation Engine to generate a conceptual data model from a given domain ontology. Both quantitative and qualitative methods have been adopted to critically evaluate this new approach. In addition, this paper focuses on evaluating the quality of the generated conceptual data model elements using Bunge-Wand-Weber and OntoClean ontologies. The results of this evaluation indicate that the generated conceptual data model provides a high degree of accuracy in identifying the substantial domain entities along with their attributes and relationships being derived from the consensual semantics of domain knowledge. The results are encouraging and support the potential role that this approach can take part in process of information system development.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 17:40:44 GMT" } ]
2007-05-23T00:00:00
[ [ "El-Ghalayini", "Haya", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0601120
Jacob Binia
Jacob Binia
On The Minimum Mean-Square Estimation Error of the Normalized Sum of Independent Narrowband Waves in the Gaussian Channel
3 pages, Submitted to IEEE Symposium on Information Theory ISIT 2006
null
null
null
cs.IT math.IT
null
The minimum mean-square error of the estimation of a signal where observed from the additive white Gaussian noise (WGN) channel's output, is analyzed. It is assumed that the channel input's signal is composed of a (normalized) sum of N narrowband, mutually independent waves. It is shown that if N goes to infinity, then for any fixed signal energy to noise energy ratio (no mater how big) both the causal minimum mean-square error CMMSE and the non-causal minimum mean-square error MMSE converge to the signal energy at a rate which is proportional to 1/N.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 18:53:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Binia", "Jacob", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601121
Marko Antonio Rodriguez
Marko A. Rodriguez
A Multi-Relational Network to Support the Scholarly Communication Process
keywords: digital libraries and scholarly communication
International Journal of Public Information Systems, volume 2007, issue 1, pp. 13-29
null
LA-UR-06-2416
cs.DL cs.AI cs.IR
null
The general pupose of the scholarly communication process is to support the creation and dissemination of ideas within the scientific community. At a finer granularity, there exists multiple stages which, when confronted by a member of the community, have different requirements and therefore different solutions. In order to take a researcher's idea from an initial inspiration to a community resource, the scholarly communication infrastructure may be required to 1) provide a scientist initial seed ideas; 2) form a team of well suited collaborators; 3) located the most appropriate venue to publish the formalized idea; 4) determine the most appropriate peers to review the manuscript; and 5) disseminate the end product to the most interested members of the community. Through the various delinieations of this process, the requirements of each stage are tied soley to the multi-functional resources of the community: its researchers, its journals, and its manuscritps. It is within the collection of these resources and their inherent relationships that the solutions to scholarly communication are to be found. This paper describes an associative network composed of multiple scholarly artifacts that can be used as a medium for supporting the scholarly communication process.
[ { "version": "v1", "created": "Sat, 28 Jan 2006 22:45:42 GMT" }, { "version": "v2", "created": "Mon, 21 May 2007 13:35:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0601122
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom, Grzegorz Rozenberg
Reducibility of Gene Patterns in Ciliates using the Breakpoint Graph
30 pages, 13 figures
Theoretical Computer Science, v. 356, 26-45, 2006
10.1016/j.tcs.2006.01.041
null
cs.LO q-bio.GN
null
Gene assembly in ciliates is one of the most involved DNA processings going on in any organism. This process transforms one nucleus (the micronucleus) into another functionally different nucleus (the macronucleus). We continue the development of the theoretical models of gene assembly, and in particular we demonstrate the use of the concept of the breakpoint graph, known from another branch of DNA transformation research. More specifically: (1) we characterize the intermediate gene patterns that can occur during the transformation of a given micronuclear gene pattern to its macronuclear form; (2) we determine the number of applications of the loop recombination operation (the most basic of the three molecular operations that accomplish gene assembly) needed in this transformation; (3) we generalize previous results (and give elegant alternatives for some proofs) concerning characterizations of the micronuclear gene patterns that can be assembled using a specific subset of the three molecular operations.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 20:20:36 GMT" } ]
2014-03-26T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ], [ "Rozenberg", "Grzegorz", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" } ]
cs/0601123
Martin Wainwright
Emin Martinian, Martin J. Wainwright
Low density codes achieve the rate-distortion bound
To be published in Proceedings of the Data Compression Conference; Snowbird, Utah, March 2006; 10 pages total
null
null
null
cs.IT math.IT
null
We propose a new construction for low-density source codes with multiple parameters that can be tuned to optimize the performance of the code. In addition, we introduce a set of analysis techniques for deriving upper bounds for the expected distortion of our construction, as well as more general low-density constructions. We show that (with an optimal encoding algorithm) our codes achieve the rate-distortion bound for a binary symmetric source and Hamming distortion. Our methods also provide rigorous upper bounds on the minimum distortion achievable by previously proposed low-density constructions.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 02:33:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Martinian", "Emin", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601124
Onur Kaya
Onur Kaya and Sennur Ulukus
Power Control for User Cooperation
Submitted to IEEE Transactions on Wireless Communications, October 2005
null
null
null
cs.IT math.IT
null
For a fading Gaussian multiple access channel with user cooperation, we obtain the optimal power allocation policies that maximize the rates achievable by block Markov superposition coding. The optimal policies result in a coding scheme that is simpler than the one for a general multiple access channel with generalized feedback. This simpler coding scheme also leads to the possibility of formulating an otherwise non-concave optimization problem as a concave one. Using the channel state information at the transmitters to adapt the powers, we demonstrate significant gains over the achievable rates for existing cooperative systems.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 12:21:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Kaya", "Onur", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601125
Carl Lagoze
Carl Lagoze, Dean Krafft, Tim Cornwell, Naomi Dushay, Dean Eckstrom, and John Saylor
Metadata aggregation and "automated digital libraries": A retrospective on the NSDL experience
Submission to JCDL 2006
null
null
null
cs.DL
null
Over three years ago, the Core Integration team of the National Science Digital Library (NSDL) implemented a digital library based on metadata aggregation using Dublin Core and OAI-PMH. The initial expectation was that such low-barrier technologies would be relatively easy to automate and administer. While this architectural choice permitted rapid deployment of a production NSDL, our three years of experience have contradicted our original expectations of easy automation and low people cost. We have learned that alleged "low-barrier" standards are often harder to deploy than expected. In this paper we report on this experience and comment on the general cost, the functionality, and the ultimate effectiveness of this architecture.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 12:26:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Lagoze", "Carl", "" ], [ "Krafft", "Dean", "" ], [ "Cornwell", "Tim", "" ], [ "Dushay", "Naomi", "" ], [ "Eckstrom", "Dean", "" ], [ "Saylor", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0601126
Karunakaran Murali Krishnan
K. Murali Krishnan, Priti Shankar
Approximate Linear Time ML Decoding on Tail-Biting Trellises in Two Rounds
null
Proc. ISIT 2006, pp.2245-2249
null
null
cs.IT math.IT
null
A linear time approximate maximum likelihood decoding algorithm on tail-biting trellises is prsented, that requires exactly two rounds on the trellis. This is an adaptation of an algorithm proposed earlier with the advantage that it reduces the time complexity from O(mlogm) to O(m) where m is the number of nodes in the tail-biting trellis. A necessary condition for the output of the algorithm to differ from the output of the ideal ML decoder is reduced and simulation results on an AWGN channel using tail-biting rrellises for two rate 1/2 convoluational codes with memory 4 and 6 respectively are reported
[ { "version": "v1", "created": "Mon, 30 Jan 2006 13:47:54 GMT" } ]
2008-02-07T00:00:00
[ [ "Krishnan", "K. Murali", "" ], [ "Shankar", "Priti", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601127
Manor Mendel
Amos Fiat, Manor Mendel
Truly Online Paging with Locality of Reference
37 pages. Preliminary version appeared in FOCS '97
38th Annual Symposium on Foundations of Computer Science (FOCS '97), 1997, pp. 326
10.1109/SFCS.1997.646121
null
cs.DS
null
The competitive analysis fails to model locality of reference in the online paging problem. To deal with it, Borodin et. al. introduced the access graph model, which attempts to capture the locality of reference. However, the access graph model has a number of troubling aspects. The access graph has to be known in advance to the paging algorithm and the memory required to represent the access graph itself may be very large. In this paper we present truly online strongly competitive paging algorithms in the access graph model that do not have any prior information on the access sequence. We present both deterministic and randomized algorithms. The algorithms need only O(k log n) bits of memory, where k is the number of page slots available and n is the size of the virtual address space. I.e., asymptotically no more memory than needed to store the virtual address translation table. We also observe that our algorithms adapt themselves to temporal changes in the locality of reference. We model temporal changes in the locality of reference by extending the access graph model to the so called extended access graph model, in which many vertices of the graph can correspond to the same virtual page. We define a measure for the rate of change in the locality of reference in G denoted by Delta(G). We then show our algorithms remain strongly competitive as long as Delta(G) >= (1+ epsilon)k, and no truly online algorithm can be strongly competitive on a class of extended access graphs that includes all graphs G with Delta(G) >= k- o(k).
[ { "version": "v1", "created": "Mon, 30 Jan 2006 20:58:23 GMT" } ]
2009-03-23T00:00:00
[ [ "Fiat", "Amos", "" ], [ "Mendel", "Manor", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0601128
Pierre Dehornoy
Pierre Dehornoy (DMA)
On the 3-distortion of a path
null
European Journal of Combinatorics (2008) http://www.elsevier.com/wps/find/journaldescription.cws_home/622824/description#description
10.1016/j.ejc.2006.11.002
null
cs.CG
null
We prove that, when a path of length n is embedded in R^2, the 3-distortion is an Omega(n^{1/2}), and that, when embedded in R^d, the 3-distortion is an O(n^{1/d-1}).
[ { "version": "v1", "created": "Mon, 30 Jan 2006 20:58:48 GMT" }, { "version": "v2", "created": "Sun, 18 May 2008 18:12:45 GMT" } ]
2008-05-19T00:00:00
[ [ "Dehornoy", "Pierre", "", "DMA" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0601129
Abhilash Ponnath
Abhilash Ponnath
Instantaneously Trained Neural Networks
13 pages
null
null
null
cs.NE cs.AI
null
This paper presents a review of instantaneously trained neural networks (ITNNs). These networks trade learning time for size and, in the basic model, a new hidden node is created for each training sample. Various versions of the corner-classification family of ITNNs, which have found applications in artificial intelligence (AI), are described. Implementation issues are also considered.
[ { "version": "v1", "created": "Mon, 30 Jan 2006 22:02:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ponnath", "Abhilash", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0601130
Alexandros Dimakis
A. G. Dimakis, D. Petrovic, K. Ramchandran
From Dumb Wireless Sensors to Smart Networks using Network Coding
To be presented at the Inaugural Workshop of the Center for Information Theory and Its Applications, University of California - San Diego, La Jolla, CA, February 6 - 10, 2006
null
null
null
cs.IT cs.NI math.IT
null
The vision of wireless sensor networks is one of a smart collection of tiny, dumb devices. These motes may be individually cheap, unintelligent, imprecise, and unreliable. Yet they are able to derive strength from numbers, rendering the whole to be strong, reliable and robust. Our approach is to adopt a distributed and randomized mindset and rely on in network processing and network coding. Our general abstraction is that nodes should act only locally and independently, and the desired global behavior should arise as a collective property of the network. We summarize our work and present how these ideas can be applied for communication and storage in sensor networks.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 02:15:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Dimakis", "A. G.", "" ], [ "Petrovic", "D.", "" ], [ "Ramchandran", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601131
Joel Predd
Joel B. Predd, Sanjeev R. Kulkarni, Daniel N. Osherson, and H. Vincent Poor
Scalable Algorithms for Aggregating Disparate Forecasts of Probability
To be presented at the Ninth International Conference on Information Fusion, Florence, Italy, July 10-13, 2006
null
null
null
cs.AI cs.DC cs.IT math.IT
null
In this paper, computational aspects of the panel aggregation problem are addressed. Motivated primarily by applications of risk assessment, an algorithm is developed for aggregating large corpora of internally incoherent probability assessments. The algorithm is characterized by a provable performance guarantee, and is demonstrated to be orders of magnitude faster than existing tools when tested on several real-world data-sets. In addition, unexpected connections between research in risk assessment and wireless sensor networks are exposed, as several key ideas are illustrated to be useful in both fields.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 03:01:35 GMT" }, { "version": "v2", "created": "Mon, 1 May 2006 19:52:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Predd", "Joel B.", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Osherson", "Daniel N.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0601132
Reza Rastegar
R. Rastegar, M. R. Meybodi
A Study on the Global Convergence Time Complexity of Estimation of Distribution Algorithms
Old paper with potential mistake
null
null
null
cs.AI cs.NE
null
The Estimation of Distribution Algorithm is a new class of population based search methods in that a probabilistic model of individuals is estimated based on the high quality individuals and used to generate the new individuals. In this paper we compute 1) some upper bounds on the number of iterations required for global convergence of EDA 2) the exact number of iterations needed for EDA to converge to global optima.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 07:10:45 GMT" }, { "version": "v2", "created": "Fri, 29 Mar 2019 14:25:56 GMT" }, { "version": "v3", "created": "Tue, 2 Apr 2019 10:03:57 GMT" } ]
2019-04-03T00:00:00
[ [ "Rastegar", "R.", "" ], [ "Meybodi", "M. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0601133
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Pascal Giorgi (LIRMM), Cl\'ement Pernet (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble)
Dense Linear Algebra over Finite Fields: the FFLAS and FFPACK packages
null
ACM Transactions on Mathematical Software 35, 3 (2009) article 19
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past two decades, some major efforts have been made to reduce exact (e.g. integer, rational, polynomial) linear algebra problems to matrix multiplication in order to provide algorithms with optimal asymptotic complexity. To provide efficient implementations of such algorithms one need to be careful with the underlying arithmetic. It is well known that modular techniques such as the Chinese remainder algorithm or the p-adic lifting allow very good practical performance, especially when word size arithmetic are used. Therefore, finite field arithmetic becomes an important core for efficient exact linear algebra libraries. In this paper, we study high performance implementations of basic linear algebra routines over word size prime fields: specially the matrix multiplication; our goal being to provide an exact alternate to the numerical BLAS library. We show that this is made possible by a carefull combination of numerical computations and asymptotically faster algorithms. Our kernel has several symbolic linear algebra applications enabled by diverse matrix multiplication reductions: symbolic triangularization, system solving, determinant and matrix inverse implementations are thus studied.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 09:54:41 GMT" }, { "version": "v2", "created": "Mon, 10 Dec 2007 10:03:32 GMT" }, { "version": "v3", "created": "Wed, 14 Jan 2009 16:30:28 GMT" } ]
2009-01-14T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Giorgi", "Pascal", "", "LIRMM" ], [ "Pernet", "Clément", "", "INRIA Rhône-Alpes / LIG Laboratoire d'Informatique de Grenoble" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0601134
Jeremy Avigad
Jeremy Avigad and Harvey Friedman
Combining decision procedures for the reals
Will appear in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 2, Issue 4 (October 18, 2006) lmcs:2240
10.2168/LMCS-2(4:4)2006
null
cs.LO
null
<p>We address the general problem of determining the validity of boolean combinations of equalities and inequalities between real-valued expressions. In particular, we consider methods of establishing such assertions using only restricted forms of distributivity. At the same time, we explore ways in which "local" decision or heuristic procedures for fragments of the theory of the reals can be amalgamated into global ones. </p> <p>Let <em>Tadd[Q]</em> be the first-order theory of the real numbers in the language of ordered groups, with negation, a constant <em>1</em>, and function symbols for multiplication by rational constants. Let <em>Tmult[Q]</em> be the analogous theory for the multiplicative structure, and let <em>T[Q]</em> be the union of the two. We show that although <em>T[Q]</em> is undecidable, the universal fragment of <em>T[Q]</em> is decidable. We also show that terms of <em>T[Q]</em>can fruitfully be put in a normal form. We prove analogous results for theories in which <em>Q</em> is replaced, more generally, by suitable subfields <em>F</em> of the reals. Finally, we consider practical methods of establishing quantifier-free validities that approximate our (impractical) decidability results.</p>
[ { "version": "v1", "created": "Tue, 31 Jan 2006 14:48:05 GMT" }, { "version": "v2", "created": "Thu, 2 Feb 2006 14:39:44 GMT" }, { "version": "v3", "created": "Fri, 15 Sep 2006 13:58:53 GMT" }, { "version": "v4", "created": "Wed, 18 Oct 2006 09:49:37 GMT" } ]
2017-01-11T00:00:00
[ [ "Avigad", "Jeremy", "" ], [ "Friedman", "Harvey", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0601135
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom, Michael Muskulus
Strategies of Loop Recombination in Ciliates
22 pages, 14 figures
Discrete Applied Mathematics, v. 156, 1736-1753, 2008
10.1016/j.dam.2007.08.032
LIACS Technical Report 2006-01
cs.LO q-bio.GN
null
Gene assembly in ciliates is an extremely involved DNA transformation process, which transforms a nucleus, the micronucleus, to another functionally different nucleus, the macronucleus. In this paper we characterize which loop recombination operations (one of the three types of molecular operations that accomplish gene assembly) can possibly be applied in the transformation of a given gene from its micronuclear form to its macronuclear form. We also characterize in which order these loop recombination operations are applicable. This is done in the abstract and more general setting of so-called legal strings.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 17:43:36 GMT" } ]
2014-03-26T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ], [ "Muskulus", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" } ]
cs/0602001
Lane A. Hemaspaandra
Lane A. Hemaspaandra and Mayur Thakur
Query-Monotonic Turing Reductions
null
null
null
URCS-TR-818
cs.CC
null
We study reductions that limit the extreme adaptivity of Turing reductions. In particular, we study reductions that make a rapid, structured progression through the set to which they are reducing: Each query is strictly longer (shorter) than the previous one. We call these reductions query-increasing (query-decreasing) Turing reductions. We also study query-nonincreasing (query-nondecreasing) Turing reductions. These are Turing reductions in which the sequence of query lengths is nonincreasing (nondecreasing). We ask whether these restrictions in fact limit the power of reductions. We prove that query-increasing and query-decreasing Turing reductions are incomparable with (that is, are neither strictly stronger than nor strictly weaker than) truth-table reductions and are strictly weaker than Turing reductions. In addition, we prove that query-nonincreasing and query-nondecreasing Turing reductions are strictly stronger than truth-table reductions and strictly weaker than Turing reductions. Despite the fact that we prove query-increasing and query-decreasing Turing reductions to in the general case be strictly weaker than Turing reductions, we identify a broad class of sets A for which any set that Turing reduces to A will also reduce to A via both query-increasing and query-decreasing Turing reductions. In particular, this holds for all tight paddable sets, where a set is said to be tight paddable exactly if it is paddable via a function whose output length is bounded tightly both from above and from below in the length of the input. We prove that many natural NP-complete problems such as satisfiability, clique, and vertex cover are tight paddable.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 22:02:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Hemaspaandra", "Lane A.", "" ], [ "Thakur", "Mayur", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0602002
Marko Antonio Rodriguez
Marko A. Rodriguez and Johan Bollen
Simulating Network Influence Algorithms Using Particle-Swarms: PageRank and PageRank-Priors
17 pages, currently in peer-review
null
null
null
cs.DS
null
A particle-swarm is a set of indivisible processing elements that traverse a network in order to perform a distributed function. This paper will describe a particular implementation of a particle-swarm that can simulate the behavior of the popular PageRank algorithm in both its {\it global-rank} and {\it relative-rank} incarnations. PageRank is compared against the particle-swarm method on artificially generated scale-free networks of 1,000 nodes constructed using a common gamma value, $\gamma = 2.5$. The running time of the particle-swarm algorithm is $O(|P|+|P|t)$ where $|P|$ is the size of the particle population and $t$ is the number of particle propagation iterations. The particle-swarm method is shown to be useful due to its ease of extension and running time.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 23:24:42 GMT" } ]
2009-09-29T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Bollen", "Johan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0602003
Subhash Kak
Navneet Mandhani and Subhash Kak
Watermarking Using Decimal Sequences
8 pages, 9 figures
Cryptologia, vol. 29, pp. 50-58, 2005
null
null
cs.CR
null
This paper introduces the use of decimal sequences in a code division multiple access (CDMA) based watermarking system to hide information for authentication in black and white images. Matlab version 6.5 was used to implement the algorithms discussed in this paper. The advantage of using d-sequences over PN sequences is that one can choose from a variety of prime numbers which provides a more flexible system.
[ { "version": "v1", "created": "Thu, 2 Feb 2006 19:43:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Mandhani", "Navneet", "" ], [ "Kak", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0602004
Christoph Koch
Georg Gottlob, Christoph Koch, Klaus U. Schulz
Conjunctive Queries over Trees
36 pages, 12 figures, 2 tables, long version of PODS 2004 papers. To appear in Journal of the ACM 53(2), March 2006
null
null
null
cs.DB cs.AI cs.CC cs.LO
null
We study the complexity and expressive power of conjunctive queries over unranked labeled trees represented using a variety of structure relations such as ``child'', ``descendant'', and ``following'' as well as unary relations for node labels. We establish a framework for characterizing structures representing trees for which conjunctive queries can be evaluated efficiently. Then we completely chart the tractability frontier of the problem and establish a dichotomy theorem for our axis relations, i.e., we find all subset-maximal sets of axes for which query evaluation is in polynomial time and show that for all other cases, query evaluation is NP-complete. All polynomial-time results are obtained immediately using the proof techniques from our framework. Finally, we study the expressiveness of conjunctive queries over trees and show that for each conjunctive query, there is an equivalent acyclic positive query (i.e., a set of acyclic conjunctive queries), but that in general this query is not of polynomial size.
[ { "version": "v1", "created": "Thu, 2 Feb 2006 23:28:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Gottlob", "Georg", "" ], [ "Koch", "Christoph", "" ], [ "Schulz", "Klaus U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0602005
Marc Daumas
Francisco Ch\'aves (LIP), Marc Daumas (LIRMM, LP2A)
A library of Taylor models for PVS automatic proof checker
null
null
null
null
cs.MS
null
We present in this paper a library to compute with Taylor models, a technique extending interval arithmetic to reduce decorrelation and to solve differential equations. Numerical software usually produces only numerical results. Our library can be used to produce both results and proofs. As seen during the development of Fermat's last theorem reported by Aczel 1996, providing a proof is not sufficient. Our library provides a proof that has been thoroughly scrutinized by a trustworthy and tireless assistant. PVS is an automatic proof assistant that has been fairly developed and used and that has no internal connection with interval arithmetic or Taylor models. We built our library so that PVS validates each result as it is produced. As producing and validating a proof, is and will certainly remain a bigger task than just producing a numerical result our library will never be a replacement to imperative implementations of Taylor models such as Cosy Infinity. Our library should mainly be used to validate small to medium size results that are involved in safety or life critical applications.
[ { "version": "v1", "created": "Fri, 3 Feb 2006 18:29:52 GMT" } ]
2016-08-16T00:00:00
[ [ "Cháves", "Francisco", "", "LIP" ], [ "Daumas", "Marc", "", "LIRMM, LP2A" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0602006
Christoph Koch
Christoph Koch
A Visual Query Language for Complex-Value Databases
12 pages, 6 figures, 1 table
null
null
null
cs.DB cs.HC
null
In this paper, a visual language, VCP, for queries on complex-value databases is proposed. The main strength of the new language is that it is purely visual: (i) It has no notion of variable, quantification, partiality, join, pattern matching, regular expression, recursion, or any other construct proper to logical, functional, or other database query languages and (ii) has a very natural, strong, and intuitive design metaphor. The main operation is that of copying and pasting in a schema tree. We show that despite its simplicity, VCP precisely captures complex-value algebra without powerset, or equivalently, monad algebra with union and difference. Thus, its expressive power is precisely that of the language that is usually considered to play the role of relational algebra for complex-value databases.
[ { "version": "v1", "created": "Fri, 3 Feb 2006 19:22:28 GMT" } ]
2009-09-29T00:00:00
[ [ "Koch", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0602007
Adam D. Smith
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
47 pp., 3 figures. Prelim. version in Eurocrypt 2004, Springer LNCS 3027, pp. 523-540. Differences from version 3: minor edits for grammar, clarity, and typos
SIAM Journal on Computing, 38(1):97-139, 2008
10.1137/060651380
null
cs.CR cs.IT math.IT
null
We provide formal definitions and efficient secure techniques for - turning noisy information into keys usable for any cryptographic application, and, in particular, - reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a "fuzzy extractor" reliably extracts nearly uniform randomness R from its input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in a cryptographic application. A "secure sketch" produces public information about its input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We define the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives for various measures of ``closeness'' of input data, such as Hamming distance, edit distance, and set difference.
[ { "version": "v1", "created": "Sat, 4 Feb 2006 18:13:35 GMT" }, { "version": "v2", "created": "Fri, 28 Apr 2006 18:10:15 GMT" }, { "version": "v3", "created": "Fri, 21 Sep 2007 21:43:52 GMT" }, { "version": "v4", "created": "Tue, 1 Apr 2008 17:50:49 GMT" } ]
2008-04-01T00:00:00
[ [ "Dodis", "Yevgeniy", "" ], [ "Ostrovsky", "Rafail", "" ], [ "Reyzin", "Leonid", "" ], [ "Smith", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602008
Julio Mari\~no
Julio Marino, Angel Herranz and Juan Jose Moreno-Navarro
Demand Analysis with Partial Predicates
This is the extended version of a paper accepted for publication in a forthcoming special issue of Theory and Practice of Logic Programming on Multiparadigm and Constraint Programming (Falaschi and Maher, eds.) Appendices are missing in the printed version
null
null
null
cs.PL cs.SC
null
In order to alleviate the inefficiencies caused by the interaction of the logic and functional sides, integrated languages may take advantage of \emph{demand} information -- i.e. knowing in advance which computations are needed and, to which extent, in a particular context. This work studies \emph{demand analysis} -- which is closely related to \emph{backwards strictness analysis} -- in a semantic framework of \emph{partial predicates}, which in turn are constructive realizations of ideals in a domain. This will allow us to give a concise, unified presentation of demand analysis, to relate it to other analyses based on abstract interpretation or strictness logics, some hints for the implementation, and, more important, to prove the soundness of our analysis based on \emph{demand equations}. There are also some innovative results. One of them is that a set constraint-based analysis has been derived in a stepwise manner using ideas taken from the area of program transformation. The other one is the possibility of using program transformation itself to perform the analysis, specially in those domains of properties where algorithms based on constraint solving are too weak.
[ { "version": "v1", "created": "Sat, 4 Feb 2006 20:22:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Marino", "Julio", "" ], [ "Herranz", "Angel", "" ], [ "Moreno-Navarro", "Juan Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0602009
Endre Cs\'oka
Endre Cs\'oka
Efficient Teamwork
51 pages. It contains some colored figures on the first few pages, but these are readable in black and white
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our goal is to solve both problems of adverse selection and moral hazard for multi-agent projects. In our model, each selected agent can work according to his private "capability tree". This means a process involving hidden actions, hidden chance events and hidden costs in a dynamic manner, and providing contractible consequences which are affecting each other's working process and the outcome of the project. We will construct a mechanism that induces truthful revelation of the agents' capability trees and chance events and to follow the instructions about their hidden decisions. This enables the planner to select the optimal subset of agents and obtain the efficient joint execution. We will construct another mechanism that is collusion-resistant but implements an only approximately efficient outcome. The latter mechanism is widely applicable, and the major application details will be elaborated.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 19:25:54 GMT" }, { "version": "v10", "created": "Sat, 29 Apr 2006 21:20:46 GMT" }, { "version": "v100", "created": "Mon, 8 Feb 2016 15:56:25 GMT" }, { "version": "v101", "created": "Thu, 14 Apr 2016 07:41:36 GMT" }, { "version": "v102", "created": "Mon, 9 Jan 2017 17:23:44 GMT" }, { "version": "v103", "created": "Wed, 10 Jan 2018 16:53:03 GMT" }, { "version": "v11", "created": "Sat, 10 Jun 2006 10:46:08 GMT" }, { "version": "v12", "created": "Wed, 14 Jun 2006 13:15:56 GMT" }, { "version": "v13", "created": "Fri, 16 Jun 2006 23:59:22 GMT" }, { "version": "v14", "created": "Tue, 20 Jun 2006 19:32:43 GMT" }, { "version": "v15", "created": "Thu, 22 Jun 2006 19:21:49 GMT" }, { "version": "v16", "created": "Tue, 11 Jul 2006 09:23:46 GMT" }, { "version": "v17", "created": "Wed, 12 Jul 2006 14:09:26 GMT" }, { "version": "v18", "created": "Sat, 15 Jul 2006 19:11:20 GMT" }, { "version": "v19", "created": "Thu, 3 Aug 2006 19:47:18 GMT" }, { "version": "v2", "created": "Fri, 10 Feb 2006 20:56:15 GMT" }, { "version": "v20", "created": "Fri, 4 Aug 2006 21:55:34 GMT" }, { "version": "v21", "created": "Wed, 9 Aug 2006 23:43:04 GMT" }, { "version": "v22", "created": "Wed, 30 Aug 2006 21:45:26 GMT" }, { "version": "v23", "created": "Sat, 9 Sep 2006 15:54:42 GMT" }, { "version": "v24", "created": "Wed, 20 Sep 2006 15:26:08 GMT" }, { "version": "v25", "created": "Wed, 20 Sep 2006 22:19:54 GMT" }, { "version": "v26", "created": "Sun, 24 Sep 2006 21:34:44 GMT" }, { "version": "v27", "created": "Mon, 25 Sep 2006 21:37:29 GMT" }, { "version": "v28", "created": "Wed, 27 Sep 2006 11:03:46 GMT" }, { "version": "v29", "created": "Thu, 28 Sep 2006 19:38:37 GMT" }, { "version": "v3", "created": "Mon, 13 Feb 2006 20:55:09 GMT" }, { "version": "v30", "created": "Sat, 30 Sep 2006 15:52:38 GMT" }, { "version": "v31", "created": "Tue, 3 Oct 2006 18:19:48 GMT" }, { "version": "v32", "created": "Thu, 5 Oct 2006 21:33:47 GMT" }, { "version": "v33", "created": "Sun, 8 Oct 2006 20:40:44 GMT" }, { "version": "v34", "created": "Tue, 10 Oct 2006 23:55:21 GMT" }, { "version": "v35", "created": "Thu, 12 Oct 2006 01:07:50 GMT" }, { "version": "v36", "created": "Sun, 15 Oct 2006 21:25:58 GMT" }, { "version": "v37", "created": "Wed, 18 Oct 2006 10:57:56 GMT" }, { "version": "v38", "created": "Tue, 24 Oct 2006 22:32:08 GMT" }, { "version": "v39", "created": "Fri, 27 Oct 2006 22:20:55 GMT" }, { "version": "v4", "created": "Tue, 14 Feb 2006 17:46:10 GMT" }, { "version": "v40", "created": "Tue, 31 Oct 2006 20:29:05 GMT" }, { "version": "v41", "created": "Wed, 1 Nov 2006 00:01:07 GMT" }, { "version": "v42", "created": "Tue, 7 Nov 2006 20:31:09 GMT" }, { "version": "v43", "created": "Wed, 8 Nov 2006 00:20:12 GMT" }, { "version": "v44", "created": "Mon, 13 Nov 2006 00:55:18 GMT" }, { "version": "v45", "created": "Wed, 3 Jan 2007 20:50:35 GMT" }, { "version": "v46", "created": "Fri, 16 Feb 2007 08:20:34 GMT" }, { "version": "v47", "created": "Tue, 20 Feb 2007 00:19:00 GMT" }, { "version": "v48", "created": "Thu, 12 Apr 2007 21:35:54 GMT" }, { "version": "v49", "created": "Wed, 18 Apr 2007 19:38:31 GMT" }, { "version": "v5", "created": "Fri, 24 Feb 2006 02:08:27 GMT" }, { "version": "v50", "created": "Thu, 19 Apr 2007 18:11:23 GMT" }, { "version": "v51", "created": "Sun, 15 Jul 2007 22:20:10 GMT" }, { "version": "v52", "created": "Tue, 17 Jul 2007 23:44:56 GMT" }, { "version": "v53", "created": "Wed, 18 Jul 2007 23:29:31 GMT" }, { "version": "v54", "created": "Mon, 23 Jul 2007 00:31:18 GMT" }, { "version": "v55", "created": "Thu, 2 Aug 2007 20:47:04 GMT" }, { "version": "v56", "created": "Fri, 10 Aug 2007 15:37:39 GMT" }, { "version": "v57", "created": "Mon, 13 Aug 2007 16:29:04 GMT" }, { "version": "v58", "created": "Wed, 15 Aug 2007 00:01:09 GMT" }, { "version": "v59", "created": "Tue, 21 Aug 2007 21:12:23 GMT" }, { "version": "v6", "created": "Mon, 27 Feb 2006 20:57:49 GMT" }, { "version": "v60", "created": "Tue, 28 Aug 2007 23:47:47 GMT" }, { "version": "v61", "created": "Wed, 29 Aug 2007 22:45:42 GMT" }, { "version": "v62", "created": "Tue, 11 Sep 2007 21:47:44 GMT" }, { "version": "v63", "created": "Sun, 30 Sep 2007 19:50:40 GMT" }, { "version": "v64", "created": "Mon, 15 Oct 2007 00:38:26 GMT" }, { "version": "v65", "created": "Wed, 31 Oct 2007 15:46:57 GMT" }, { "version": "v66", "created": "Mon, 19 Nov 2007 01:11:17 GMT" }, { "version": "v67", "created": "Tue, 20 Nov 2007 23:39:20 GMT" }, { "version": "v68", "created": "Thu, 22 Nov 2007 10:19:39 GMT" }, { "version": "v69", "created": "Sun, 25 Nov 2007 12:18:00 GMT" }, { "version": "v7", "created": "Tue, 28 Feb 2006 20:43:46 GMT" }, { "version": "v70", "created": "Thu, 29 Nov 2007 20:25:52 GMT" }, { "version": "v71", "created": "Thu, 29 Nov 2007 23:49:34 GMT" }, { "version": "v72", "created": "Tue, 15 Jan 2008 20:55:07 GMT" }, { "version": "v73", "created": "Fri, 18 Jan 2008 20:59:47 GMT" }, { "version": "v74", "created": "Tue, 22 Jan 2008 20:59:13 GMT" }, { "version": "v75", "created": "Sat, 26 Jan 2008 20:56:52 GMT" }, { "version": "v76", "created": "Wed, 30 Jan 2008 22:39:02 GMT" }, { "version": "v77", "created": "Wed, 13 Feb 2008 08:46:28 GMT" }, { "version": "v78", "created": "Tue, 18 Mar 2008 17:28:14 GMT" }, { "version": "v79", "created": "Tue, 18 Mar 2008 20:48:42 GMT" }, { "version": "v8", "created": "Tue, 21 Mar 2006 00:37:12 GMT" }, { "version": "v80", "created": "Tue, 8 Apr 2008 19:57:57 GMT" }, { "version": "v81", "created": "Tue, 15 Apr 2008 11:23:11 GMT" }, { "version": "v82", "created": "Wed, 16 Apr 2008 22:46:53 GMT" }, { "version": "v83", "created": "Tue, 29 Apr 2008 11:29:42 GMT" }, { "version": "v84", "created": "Tue, 13 May 2008 19:11:53 GMT" }, { "version": "v85", "created": "Mon, 9 Jun 2008 23:19:02 GMT" }, { "version": "v86", "created": "Wed, 24 Sep 2008 12:38:05 GMT" }, { "version": "v87", "created": "Thu, 25 Sep 2008 23:18:29 GMT" }, { "version": "v88", "created": "Sun, 28 Sep 2008 14:34:31 GMT" }, { "version": "v89", "created": "Mon, 6 Oct 2008 09:54:17 GMT" }, { "version": "v9", "created": "Wed, 22 Mar 2006 18:54:34 GMT" }, { "version": "v90", "created": "Sun, 19 Apr 2009 15:09:15 GMT" }, { "version": "v91", "created": "Wed, 22 Apr 2009 05:43:24 GMT" }, { "version": "v92", "created": "Wed, 13 May 2009 21:42:43 GMT" }, { "version": "v93", "created": "Thu, 2 Jun 2011 22:00:45 GMT" }, { "version": "v94", "created": "Sat, 8 Sep 2012 06:29:43 GMT" }, { "version": "v95", "created": "Mon, 11 Feb 2013 03:11:58 GMT" }, { "version": "v96", "created": "Mon, 24 Jun 2013 12:29:57 GMT" }, { "version": "v97", "created": "Sat, 22 Feb 2014 14:34:58 GMT" }, { "version": "v98", "created": "Fri, 5 Jun 2015 03:43:04 GMT" }, { "version": "v99", "created": "Thu, 20 Aug 2015 00:00:42 GMT" } ]
2018-01-11T00:00:00
[ [ "Csóka", "Endre", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0602010
Robert Schweller
Ming-Yang Kao, Robert Schweller
Reducing Tile Complexity for Self-Assembly Through Temperature Programming
A preliminary version of this paper appeared in Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2006), Miami, Florida, Jan. 2006
null
null
null
cs.CC
null
We consider the tile self-assembly model and how tile complexity can be eliminated by permitting the temperature of the self-assembly system to be adjusted throughout the assembly process. To do this, we propose novel techniques for designing tile sets that permit an arbitrary length $m$ binary number to be encoded into a sequence of $O(m)$ temperature changes such that the tile set uniquely assembles a supertile that precisely encodes the corresponding binary number. As an application, we show how this provides a general tile set of size O(1) that is capable of uniquely assembling essentially any $n\times n$ square, where the assembled square is determined by a temperature sequence of length $O(\log n)$ that encodes a binary description of $n$. This yields an important decrease in tile complexity from the required $\Omega(\frac{\log n}{\log\log n})$ for almost all $n$ when the temperature of the system is fixed. We further show that for almost all $n$, no tile system can simultaneously achieve both $o(\log n)$ temperature complexity and $o(\frac{\log n}{\log\log n})$ tile complexity, showing that both versions of an optimal square building scheme have been discovered. This work suggests that temperature change can constitute a natural, dynamic method for providing input to self-assembly systems that is potentially superior to the current technique of designing large tile sets with specific inputs hardwired into the tileset.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 01:00:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Kao", "Ming-Yang", "" ], [ "Schweller", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0602011
Giorgi Japaridze
Giorgi Japaridze
The intuitionistic fragment of computability logic at the propositional level
null
Annals of Pure and Applied Logic 147 (2007), pp. 187-227
10.1016/j.apal.2007.05.001
null
cs.LO cs.AI math.LO
null
This paper presents a soundness and completeness proof for propositional intuitionistic calculus with respect to the semantics of computability logic. The latter interprets formulas as interactive computational problems, formalized as games between a machine and its environment. Intuitionistic implication is understood as algorithmic reduction in the weakest possible -- and hence most natural -- sense, disjunction and conjunction as deterministic-choice combinations of problems (disjunction = machine's choice, conjunction = environment's choice), and "absurd" as a computational problem of universal strength. See http://www.cis.upenn.edu/~giorgi/cl.html for a comprehensive online source on computability logic.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 12:55:17 GMT" }, { "version": "v2", "created": "Sat, 11 Feb 2006 16:02:41 GMT" } ]
2011-04-15T00:00:00
[ [ "Japaridze", "Giorgi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
cs/0602012
Vladimir Anashin
Vladimir Anashin
Wreath Products in Stream Cipher Design
18 pages, 2 figures. To be published in Proceedings of the Int'l Conference `Mathematics and Secure Information Technologies' (Moscow, 2005). The paper is mainly based on the preprint http://arxiv.org/abs/cs.CR/0401030, yet contains some new results and no proofs
"Applied Algebraic Dynamics", volume 49 of de Gruyter Expositions in Mathematics, 2009, 269-304
null
null
cs.CR
null
The paper develops a novel approach to stream cipher design: Both the state update function and the output function of the corresponding pseudorandom generators are compositions of arithmetic and bitwise logical operations, which are standard instructions of modern microprocessors. Moreover, both the state update function and the output function are being modified dynamically during the encryption. Also, these compositions could be keyed, so the only information available to an attacker is that these functions belong to some exponentially large class. The paper shows that under rather loose conditions the output sequence is uniformly distributed, achieves maximum period length and has high linear complexity and high $\ell$-error linear complexity. Ciphers of this kind are flexible: One could choose a suitable combination of instructions to obtain due performance without affecting the quality of the output sequence. Finally, some evidence is given that a key recovery problem for (reasonably designed) stream ciphers of this kind is intractable up to plausible conjectures.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 13:45:19 GMT" } ]
2011-11-15T00:00:00
[ [ "Anashin", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0602013
David Pritchard
David Pritchard
An Optimal Distributed Edge-Biconnectivity Algorithm
Submitted to PODC 2006. Contains a pstricks figure
null
null
null
cs.DC
null
We describe a synchronous distributed algorithm which identifies the edge-biconnected components of a connected network. It requires a leader, and uses messages of size O(log |V|). The main idea is to preorder a BFS spanning tree, and then to efficiently compute least common ancestors so as to mark cycle edges. This algorithm takes O(Diam) time and uses O(|E|) messages. Furthermore, we show that no correct singly-initiated edge-biconnectivity algorithm can beat either bound on any graph by more than a constant factor. We also describe a near-optimal local algorithm for edge-biconnectivity.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 20:47:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritchard", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0602014
Amir Leshem
Amir Laufer, Amir Leshem, Hagit Messer
Game theoretic aspects of distributed spectral coordination with application to DSL networks
null
null
null
null
cs.IT math.IT
null
In this paper we use game theoretic techniques to study the value of cooperation in distributed spectrum management problems. We show that the celebrated iterative water-filling algorithm is subject to the prisoner's dilemma and therefore can lead to severe degradation of the achievable rate region in an interference channel environment. We also provide thorough analysis of a simple two bands near-far situation where we are able to provide closed form tight bounds on the rate region of both fixed margin iterative water filling (FM-IWF) and dynamic frequency division multiplexing (DFDM) methods. This is the only case where such analytic expressions are known and all previous studies included only simulated results of the rate region. We then propose an alternative algorithm that alleviates some of the drawbacks of the IWF algorithm in near-far scenarios relevant to DSL access networks. We also provide experimental analysis based on measured DSL channels of both algorithms as well as the centralized optimum spectrum management.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 00:14:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Laufer", "Amir", "" ], [ "Leshem", "Amir", "" ], [ "Messer", "Hagit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602015
Ahmad Khoshnevis
Ahmad Khoshnevis and Ashutosh Sabharwal
On the Asymptotic Performance of Multiple Antenna Channels with Fast Channel Feedback
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper, we analyze the asymptotic performance of multiple antenna channels where the transmitter has either perfect or finite bit channel state information. Using the diversity-multiplexing tradeoff to characterize the system performance, we demonstrate that channel feedback can fundamentally change the system behavior. Even one-bit of information can increase the diversity order of the system compared to the system with no transmitter information. In addition, as the amount of channel information at the transmitter increases, the diversity order for each multiplexing gain increases and goes to infinity for perfect transmitter information. The major reason for diversity order gain is a "location-dependent" temporal power control, which adapts the power control strategy based on the average channel conditions of the channel.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 07:29:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Khoshnevis", "Ahmad", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602016
Christoph D\"urr
Christoph Durr and Mathilde Hurand
Finding total unimodularity in optimization problems solved by linear programs
null
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A popular approach in combinatorial optimization is to model problems as integer linear programs. Ideally, the relaxed linear program would have only integer solutions, which happens for instance when the constraint matrix is totally unimodular. Still, sometimes it is possible to build an integer solution with the same cost from the fractional solution. Examples are two scheduling problems and the single disk prefetching/caching problem. We show that problems such as the three previously mentioned can be separated into two subproblems: (1) finding an optimal feasible set of slots, and (2) assigning the jobs or pages to the slots. It is straigthforward to show that the latter can be solved greedily. We are able to solve the former with a totally unimodular linear program, from which we obtain simple combinatorial algorithms with improved worst case running time.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 09:09:03 GMT" }, { "version": "v2", "created": "Fri, 2 Jun 2006 13:58:41 GMT" }, { "version": "v3", "created": "Tue, 14 Apr 2009 06:25:26 GMT" } ]
2009-09-29T00:00:00
[ [ "Durr", "Christoph", "" ], [ "Hurand", "Mathilde", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0602017
Julio Ortiz
J. S. Espinoza Ortiz, Gilson A. Giraldi, E.A. de Souza Neto, Raul A. Feij\'oo
Quasi-Linear Soft Tissue Models Revisited
11 pages, 8figures
null
null
null
cs.OH
null
Incompressibility, nonlinear deformation under stress and viscoelasticity are the fingerprint of soft tissue mechanical behavior. In order to model soft tissues appropriately, we must pursue to complete these requirements. In this work we revisited different soft tissue quasi-linear model possibilities in trying to achieve for this commitment.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 13:01:24 GMT" } ]
2016-08-16T00:00:00
[ [ "Ortiz", "J. S. Espinoza", "" ], [ "Giraldi", "Gilson A.", "" ], [ "Neto", "E. A. de Souza", "" ], [ "Feijóo", "Raul A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0602018
Jiyou Jia Dr.
Jiyou Jia, Shufen Hou, Weichao Chen
Improving the CSIEC Project and Adapting It to the English Teaching and Learning in China
null
null
null
null
cs.CY cs.AI cs.CL cs.HC cs.MA
null
In this paper after short review of the CSIEC project initialized by us in 2003 we present the continuing development and improvement of the CSIEC project in details, including the design of five new Microsoft agent characters representing different virtual chatting partners and the limitation of simulated dialogs in specific practical scenarios like graduate job application interview, then briefly analyze the actual conditions and features of its application field: web-based English education in China. Finally we introduce our efforts to adapt this system to the requirements of English teaching and learning in China and point out the work next to do.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 15:17:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Jia", "Jiyou", "" ], [ "Hou", "Shufen", "" ], [ "Chen", "Weichao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0602019
Nie Nie
Nie Nie and Cristina Comaniciu
Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks
ACM MONET (Mobile Networks and Applications), special issue on "Reconfigurable Radio Technologies in Support of Ubiquitous Seamless Computing"
null
null
null
cs.GT
null
In this work, we propose a game theoretic framework to analyze the behavior of cognitive radios for distributed adaptive channel allocation. We define two different objective functions for the spectrum sharing games, which capture the utility of selfish users and cooperative users, respectively. Based on the utility definition for cooperative users, we show that the channel allocation problem can be formulated as a potential game, and thus converges to a deterministic channel allocation Nash equilibrium point. Alternatively, a no-regret learning implementation is proposed for both scenarios and it is shown to have similar performance with the potential game when cooperation is enforced, but with a higher variability across users. The no-regret learning formulation is particularly useful to accommodate selfish users. Non-cooperative learning games have the advantage of a very low overhead for information exchange in the network. We show that cooperation based spectrum sharing etiquette improves the overall network performance at the expense of an increased overhead required for information exchange.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 00:25:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Nie", "Nie", "" ], [ "Comaniciu", "Cristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0602020
Yan-Xiu Zheng
Yan-Xiu Zheng and Yu T. Su
Inter-Block Permuted Turbo Codes
44 pages, 17 figures
null
null
null
cs.IT math.IT
null
The structure and size of the interleaver used in a turbo code critically affect the distance spectrum and the covariance property of a component decoder's information input and soft output. This paper introduces a new class of interleavers, the inter-block permutation (IBP) interleavers, that can be build on any existing "good" block-wise interleaver by simply adding an IBP stage. The IBP interleavers reduce the above-mentioned correlation and increase the effective interleaving size. The increased effective interleaving size improves the distance spectrum while the reduced covariance enhances the iterative decoder's performance. Moreover, the structure of the IBP(-interleaved) turbo codes (IBPTC) is naturally fit for high rate applications that necessitate parallel decoding. We present some useful bounds and constraints associated with the IBPTC that can be used as design guidelines. The corresponding codeword weight upper bounds for weight-2 and weight-4 input sequences are derived. Based on some of the design guidelines, we propose a simple IBP algorithm and show that the associated IBPTC yields 0.3 to 1.2 dB performance gain, or equivalently, an IBPTC renders the same performance with a much reduced interleaving delay. The EXIT and covariance behaviors provide another numerical proof of the superiority of the proposed IBPTC.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 06:36:09 GMT" } ]
2009-09-29T00:00:00
[ [ "Zheng", "Yan-Xiu", "" ], [ "Su", "Yu T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602021
Marc Schoenauer
Marc Schoenauer, Mich\`ele Sebag (LMS)
Using Domain Knowledge in Evolutionary System Identification
null
null
null
null
cs.AI math.AP
null
Two example of Evolutionary System Identification are presented to highlight the importance of incorporating Domain Knowledge: the discovery of an analytical indentation law in Structural Mechanics using constrained Genetic Programming, and the identification of the repartition of underground velocities in Seismic Prospection. Critical issues for sucessful ESI are discussed in the light of these results.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 07:45:26 GMT" } ]
2016-08-16T00:00:00
[ [ "Schoenauer", "Marc", "", "LMS" ], [ "Sebag", "Michèle", "", "LMS" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.AP", "description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics", "span": "(Analysis of PDEs)" } ]
cs/0602022
Marc Schoenauer
Alain Ratle (LMS), Mich\`ele Sebag (LMS)
Avoiding the Bloat with Stochastic Grammar-based Genetic Programming
null
null
null
null
cs.AI
null
The application of Genetic Programming to the discovery of empirical laws is often impaired by the huge size of the search space, and consequently by the computer resources needed. In many cases, the extreme demand for memory and CPU is due to the massive growth of non-coding segments, the introns. The paper presents a new program evolution framework which combines distribution-based evolution in the PBIL spirit, with grammar-based genetic programming; the information is stored as a probability distribution on the gra mmar rules, rather than in a population. Experiments on a real-world like problem show that this approach gives a practical solution to the problem of intron growth.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 07:48:27 GMT" } ]
2016-08-16T00:00:00
[ [ "Ratle", "Alain", "", "LMS" ], [ "Sebag", "Michèle", "", "LMS" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0602023
Oded Kafri
Oded Kafri
Information theory and Thermodynamics
16 pages and 5 figures. The paper was submitted to IEEE Transaction on Information theory
null
null
null
cs.IT math.IT
null
A communication theory for a transmitter broadcasting to many receivers is presented. In this case energetic considerations cannot be neglected as in Shannon theory. It is shown that, when energy is assigned to the information bit, information theory complies with classical thermodynamic and is part of it. To provide a thermodynamic theory of communication it is necessary to define equilibrium for informatics systems that are not in thermal equilibrium and to calculate temperature, heat, and entropy with accordance to Clausius inequality. It is shown that for a binary file the temperature is proportional to the bit energy and that information is thermodynamic entropy. Equilibrium exists in random files that cannot be compressed. Thermodynamic bounds on the computing power of a physical device, and the maximum information that an antenna can broadcast are calculated.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 07:53:37 GMT" } ]
2007-07-16T00:00:00
[ [ "Kafri", "Oded", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602024
Valentin Goranko
Willem Conradie, Valentin Goranko and Dimiter Vakarelov
Algorithmic correspondence and completeness in modal logic. I. The core algorithm SQEMA
26 pages, no figures, to appear in the Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 2, Issue 1 (March 7, 2006) lmcs:2259
10.2168/LMCS-2(1:5)2006
null
cs.LO
null
Modal formulae express monadic second-order properties on Kripke frames, but in many important cases these have first-order equivalents. Computing such equivalents is important for both logical and computational reasons. On the other hand, canonicity of modal formulae is important, too, because it implies frame-completeness of logics axiomatized with canonical formulae. Computing a first-order equivalent of a modal formula amounts to elimination of second-order quantifiers. Two algorithms have been developed for second-order quantifier elimination: SCAN, based on constraint resolution, and DLS, based on a logical equivalence established by Ackermann. In this paper we introduce a new algorithm, SQEMA, for computing first-order equivalents (using a modal version of Ackermann's lemma) and, moreover, for proving canonicity of modal formulae. Unlike SCAN and DLS, it works directly on modal formulae, thus avoiding Skolemization and the subsequent problem of unskolemization. We present the core algorithm and illustrate it with some examples. We then prove its correctness and the canonicity of all formulae on which the algorithm succeeds. We show that it succeeds not only on all Sahlqvist formulae, but also on the larger class of inductive formulae, introduced in our earlier papers. Thus, we develop a purely algorithmic approach to proving canonical completeness in modal logic and, in particular, establish one of the most general completeness results in modal logic so far.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 10:10:12 GMT" }, { "version": "v2", "created": "Mon, 6 Mar 2006 14:10:44 GMT" }, { "version": "v3", "created": "Tue, 7 Mar 2006 15:46:14 GMT" }, { "version": "v4", "created": "Wed, 8 Mar 2006 15:42:17 GMT" } ]
2017-01-11T00:00:00
[ [ "Conradie", "Willem", "" ], [ "Goranko", "Valentin", "" ], [ "Vakarelov", "Dimiter", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0602025
Gianluca Argentini
Gianluca Argentini
On local symbolic approximation and resolution of ODEs using Implicit Function Theorem
12 pages, 2 figures; keywords: ordinary differential equations, implicit function theorem, local solutions, symbolic solutions, cavitation
null
null
null
cs.NA math.CA physics.comp-ph
null
In this work the implicit function theorem is used for searching local symbolic resolution of differential equations. General results of existence for first order equations are proven and some examples, one relative to cavitation in a fluid, are developed. These examples seem to show that local approximation of non linear differential equations can give useful informations about symbolic form of possible solutions, and in the case a global solution is known, locally the accuracy of approximation can be good.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 11:44:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
cs/0602026
Richard McClatchey
Ashiq Anjum, Richard McClatchey, Arshad Ali & Ian Willers
Bulk Scheduling with DIANA Scheduler
4 pages, 5 figures. Accepted by the Computing for High Energy Physics Conference. Mumbai, Indai. February 2006
null
null
null
cs.DC
null
Results from and progress on the development of a Data Intensive and Network Aware (DIANA) Scheduling engine, primarily for data intensive sciences such as physics analysis, are described. Scientific analysis tasks can involve thousands of computing, data handling, and network resources and the size of the input and output files and the amount of overall storage space allocated to a user necessarily can have significant bearing on the scheduling of data intensive applications. If the input or output files must be retrieved from a remote location, then the time required transferring the files must also be taken into consideration when scheduling compute resources for the given application. The central problem in this study is the coordinated management of computation and data at multiple locations and not simply data movement. However, this can be a very costly operation and efficient scheduling can be a challenge if compute and data resources are mapped without network cost. We have implemented an adaptive algorithm within the DIANA Scheduler which takes into account data location and size, network performance and computation capability to make efficient global scheduling decisions. DIANA is a performance-aware as well as an economy-guided Meta Scheduler. It iteratively allocates each job to the site that is likely to produce the best performance as well as optimizing the global queue for any remaining pending jobs. Therefore it is equally suitable whether a single job is being submitted or bulk scheduling is being performed. Results suggest that considerable performance improvements are to be gained by adopting the DIANA scheduling approach.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 16:47:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Anjum", "Ashiq", "" ], [ "McClatchey", "Richard", "" ], [ "Ali", "Arshad", "" ], [ "Willers", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0602027
Krzysztof R. Apt
Krzysztof R. Apt
Explaining Constraint Programming
15 pages, appeared in "Processes, Terms and Cycles: Steps on the Road to Infinity", (A. Middeldorp, V. van Oostrom, F. van Raamsdonk, R. de Vrijer, eds.), LNCS 3838, pp. 55-69. (2005)
null
null
null
cs.PL cs.AI
null
We discuss here constraint programming (CP) by using a proof-theoretic perspective. To this end we identify three levels of abstraction. Each level sheds light on the essence of CP. In particular, the highest level allows us to bring CP closer to the computation as deduction paradigm. At the middle level we can explain various constraint propagation algorithms. Finally, at the lowest level we can address the issue of automatic generation and optimization of the constraint propagation algorithms.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 15:19:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0602028
Andrea Montanari
Andrea Montanari and David Tse
Analysis of Belief Propagation for Non-Linear Problems: The Example of CDMA (or: How to Prove Tanaka's Formula)
5 pages, 3 eps figures, IEEE Information Theory Workshop, Punta del Este, Uruguay, March 13-17, 2006 (invited)
null
null
null
cs.IT math.IT
null
We consider the CDMA (code-division multiple-access) multi-user detection problem for binary signals and additive white gaussian noise. We propose a spreading sequences scheme based on random sparse signatures, and a detection algorithm based on belief propagation (BP) with linear time complexity. In the new scheme, each user conveys its power onto a finite number of chips l, in the large system limit. We analyze the performances of BP detection and prove that they coincide with the ones of optimal (symbol MAP) detection in the l->\infty limit. In the same limit, we prove that the information capacity of the system converges to Tanaka's formula for random `dense' signatures, thus providing the first rigorous justification of this formula. Apart from being computationally convenient, the new scheme allows for optimization in close analogy with irregular low density parity check code ensembles.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 18:56:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Tse", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602029
Kevin Wortman
John Augustine and David Eppstein and Kevin A. Wortman
Approximate Weighted Farthest Neighbors and Minimum Dilation Stars
12 pages, 2 figures
null
null
null
cs.CG cs.DS
null
We provide an efficient reduction from the problem of querying approximate multiplicatively weighted farthest neighbors in a metric space to the unweighted problem. Combining our techniques with core-sets for approximate unweighted farthest neighbors, we show how to find (1+epsilon)-approximate farthest neighbors in time O(log n) per query in D-dimensional Euclidean space for any constants D and epsilon. As an application, we find an O(n log n) expected time algorithm for choosing the center of a star topology network connecting a given set of points, so as to approximately minimize the maximum dilation between any pair of points.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 21:09:11 GMT" } ]
2009-09-29T00:00:00
[ [ "Augustine", "John", "" ], [ "Eppstein", "David", "" ], [ "Wortman", "Kevin A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0602030
Mohammed Khan Zafar
Md. Zafar ALi Khan and B. Sundar Rajan
Single-Symbol Maximum Likelihood Decodable Linear STBCs
38 pages, 9 Figures, accepted for publication in IEEE Trans. Information Theory, 2006
null
null
null
cs.IT math.IT
null
Space-Time block codes (STBC) from Orthogonal Designs (OD) and Co-ordinate Interleaved Orthogonal Designs (CIOD) have been attracting wider attention due to their amenability for fast (single-symbol) ML decoding, and full-rate with full-rank over quasi-static fading channels. However, these codes are instances of single-symbol decodable codes and it is natural to ask, if there exist codes other than STBCs form ODs and CIODs that allow single-symbol coding? In this paper, the above question is answered in the affirmative by characterizing all linear STBCs, that allow single-symbol ML decoding (not necessarily full-diversity) over quasi-static fading channels-calling them single-symbol decodable designs (SDD). The class SDD includes ODs and CIODs as proper subclasses. Further, among the SDD, a class of those that offer full-diversity, called Full-rank SDD (FSDD) are characterized and classified.
[ { "version": "v1", "created": "Wed, 8 Feb 2006 08:46:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Khan", "Md. Zafar ALi", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602031
Wit Jakuczun
Wit Jakuczun
Classifying Signals with Local Classifiers
null
null
null
null
cs.AI
null
This paper deals with the problem of classifying signals. The new method for building so called local classifiers and local features is presented. The method is a combination of the lifting scheme and the support vector machines. Its main aim is to produce effective and yet comprehensible classifiers that would help in understanding processes hidden behind classified signals. To illustrate the method we present the results obtained on an artificial and a real dataset.
[ { "version": "v1", "created": "Wed, 8 Feb 2006 11:38:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Jakuczun", "Wit", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0602032
David Doty
David Doty, Jack H. Lutz, Satyadev Nandakumar
Finite-State Dimension and Real Arithmetic
15 pages
null
null
null
cs.CC cs.IT math.IT
null
We use entropy rates and Schur concavity to prove that, for every integer k >= 2, every nonzero rational number q, and every real number alpha, the base-k expansions of alpha, q+alpha, and q*alpha all have the same finite-state dimension and the same finite-state strong dimension. This extends, and gives a new proof of, Wall's 1949 theorem stating that the sum or product of a nonzero rational number and a Borel normal number is always Borel normal.
[ { "version": "v1", "created": "Thu, 9 Feb 2006 00:20:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Doty", "David", "" ], [ "Lutz", "Jack H.", "" ], [ "Nandakumar", "Satyadev", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602033
Leonid A. Levin
Leonid A. Levin
Self-stabilization of Circular Arrays of Automata
2 pages
Theoretical Computer Science, 235(1):143-144, 2000
null
null
cs.DC cs.DM
null
[Gacs, Kurdiumov, Levin, 78] proposed simple one-dimensional cellular automata with 2 states. In an infinite array they are self-stabilizing: if all but a finite minority of automata are in the same state, the minority states disappear. Implicit in the paper was a stronger result that a sufficiently small minority of states vanish even in a finite circular array. The following note makes this strengthening explicit.
[ { "version": "v1", "created": "Thu, 9 Feb 2006 02:07:52 GMT" } ]
2018-12-03T00:00:00
[ [ "Levin", "Leonid A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0602034
Yuchun Guo
Yuchun Guo, Changjia Chen and Shi Zhou
A topology visualisation tool for large-scale communications networks
9 pages, 2 figures. Published
ELECTRONICS LETTERS, Vol. 43, No. 10, PP. 597-598, May 2007.
null
null
cs.NI
null
A visualisation tool is presented to facilitate the study on large-scale communications networks. This tool provides a simple and effective way to summarise the topology of a complex network at a coarse level.
[ { "version": "v1", "created": "Thu, 9 Feb 2006 03:25:21 GMT" }, { "version": "v2", "created": "Mon, 27 Nov 2006 16:54:07 GMT" }, { "version": "v3", "created": "Mon, 13 Aug 2007 13:08:51 GMT" } ]
2009-09-29T00:00:00
[ [ "Guo", "Yuchun", "" ], [ "Chen", "Changjia", "" ], [ "Zhou", "Shi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0602035
Jan Ostergaard
Jan Ostergaard, Jesper Jensen, and Richard Heusdens
n-Channel Entropy-Constrained Multiple-Description Lattice Vector Quantization
17 Pages, two-columns. Accepted for publication in IEEE Trans. on Inform. Th
null
10.1109/TIT.2006.872847
null
cs.IT math.IT
null
In this paper we derive analytical expressions for the central and side quantizers which, under high-resolutions assumptions, minimize the expected distortion of a symmetric multiple-description lattice vector quantization (MD-LVQ) system subject to entropy constraints on the side descriptions for given packet-loss probabilities. We consider a special case of the general n-channel symmetric multiple-description problem where only a single parameter controls the redundancy tradeoffs between the central and the side distortions. Previous work on two-channel MD-LVQ showed that the distortions of the side quantizers can be expressed through the normalized second moment of a sphere. We show here that this is also the case for three-channel MD-LVQ. Furthermore, we conjecture that this is true for the general n-channel MD-LVQ. For given source, target rate and packet-loss probabilities we find the optimal number of descriptions and construct the MD-LVQ system that minimizes the expected distortion. We verify theoretical expressions by numerical simulations and show in a practical setup that significant performance improvements can be achieved over state-of-the-art two-channel MD-LVQ by using three-channel MD-LVQ.
[ { "version": "v1", "created": "Thu, 9 Feb 2006 08:51:57 GMT" } ]
2016-11-17T00:00:00
[ [ "Ostergaard", "Jan", "" ], [ "Jensen", "Jesper", "" ], [ "Heusdens", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602036
Rene Ndoundam
Ren\'e Ndoundam, Maurice Tchuente
R\'{e}seaux d'Automates de Caianiello Revisit\'{e}
39 pages
null
null
null
cs.NE
null
We exhibit a family of neural networks of McCulloch and Pitts of size $2nk+2$ which can be simulated by a neural networks of Caianiello of size $2n+2$ and memory length $k$. This simulation allows us to find again one of the result of the following article: [Cycles exponentiels des r\'{e}seaux de Caianiello et compteurs en arithm\'{e}tique redondante, Technique et Science Informatiques Vol. 19, pages 985-1008] on the existence of neural networks of Caianiello of size $2n+2$ and memory length $k$ which describes a cycle of length $k \times 2^{nk}$.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 06:32:29 GMT" } ]
2016-08-16T00:00:00
[ [ "Ndoundam", "René", "" ], [ "Tchuente", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0602037
Elisa Gorla
J. J. Climent, E. Gorla, J. Rosenthal
Cryptanalysis of the CFVZ cryptosystem
12 pages
null
null
null
cs.CR
null
The paper analyzes a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an elliptic curve. Using an adapted Pollard rho algorithm it is shown that this problem is essentially as hard as solving one discrete logarithm problem in the group of an elliptic curve.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 08:40:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Climent", "J. J.", "" ], [ "Gorla", "E.", "" ], [ "Rosenthal", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0602038
Gregory Gutin
G. Gutin, P. Hell, A. Rafiey, A. Yeo
Minimum Cost Homomorphisms to Proper Interval Graphs and Bigraphs
null
null
null
null
cs.DM cs.AI
null
For graphs $G$ and $H$, a mapping $f: V(G)\dom V(H)$ is a homomorphism of $G$ to $H$ if $uv\in E(G)$ implies $f(u)f(v)\in E(H).$ If, moreover, each vertex $u \in V(G)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the homomorphism $f$ is $\sum_{u\in V(G)}c_{f(u)}(u)$. For each fixed graph $H$, we have the {\em minimum cost homomorphism problem}, written as MinHOM($H)$. The problem is to decide, for an input graph $G$ with costs $c_i(u),$ $u \in V(G), i\in V(H)$, whether there exists a homomorphism of $G$ to $H$ and, if one exists, to find one of minimum cost. Minimum cost homomorphism problems encompass (or are related to) many well studied optimization problems. We describe a dichotomy of the minimum cost homomorphism problems for graphs $H$, with loops allowed. When each connected component of $H$ is either a reflexive proper interval graph or an irreflexive proper interval bigraph, the problem MinHOM($H)$ is polynomial time solvable. In all other cases the problem MinHOM($H)$ is NP-hard. This solves an open problem from an earlier paper. Along the way, we prove a new characterization of the class of proper interval bigraphs.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 09:39:36 GMT" }, { "version": "v2", "created": "Tue, 14 Feb 2006 15:36:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Hell", "P.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0602039
Andrei Arion
Andrei Arion (INRIA Futurs), Angela Bonifati, Ioana Manolescu (INRIA Futurs), Andrea Pugliese
Path Summaries and Path Partitioning in Modern XML Databases
null
null
null
null
cs.DB
null
We study the applicability of XML path summaries in the context of current-day XML databases. We find that summaries provide an excellent basis for optimizing data access methods, which furthermore mixes very well with path-partitioned stores. We provide practical algorithms for building and exploiting summaries, and prove its benefits through extensive experiments.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 12:21:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Arion", "Andrei", "", "INRIA Futurs" ], [ "Bonifati", "Angela", "", "INRIA\n Futurs" ], [ "Manolescu", "Ioana", "", "INRIA\n Futurs" ], [ "Pugliese", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0602040
Pierre-Alain Masson
Samir Chouali (LIFC), Jacques Julliand (LIFC), Pierre-Alain Masson (LIFC), Fran\c{c}oise Bellegarde (LIFC)
PLTL Partitioned Model Checking for Reactive Systems under Fairness Assumptions
null
ACM Transactions on Embedded Computing Systems 4(2) (2005) 267-301
10.1145/1067915.1067918
null
cs.LO
null
We are interested in verifying dynamic properties of finite state reactive systems under fairness assumptions by model checking. The systems we want to verify are specified through a top-down refinement process. In order to deal with the state explosion problem, we have proposed in previous works to partition the reachability graph, and to perform the verification on each part separately. Moreover, we have defined a class, called Bmod, of dynamic properties that are verifiable by parts, whatever the partition. We decide if a property P belongs to Bmod by looking at the form of the Buchi automaton that accepts the negation of P. However, when a property P belongs to Bmod, the property f => P, where f is a fairness assumption, does not necessarily belong to Bmod. In this paper, we propose to use the refinement process in order to build the parts on which the verification has to be performed. We then show that with such a partition, if a property P is verifiable by parts and if f is the expression of the fairness assumptions on a system, then the property f => P is still verifiable by parts. This approach is illustrated by its application to the chip card protocol T=1 using the B engineering design language.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 14:48:29 GMT" } ]
2011-11-10T00:00:00
[ [ "Chouali", "Samir", "", "LIFC" ], [ "Julliand", "Jacques", "", "LIFC" ], [ "Masson", "Pierre-Alain", "", "LIFC" ], [ "Bellegarde", "Françoise", "", "LIFC" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0602041
Radu Mihaescu
Radu Mihaescu, Dan Levy, Lior Pachter
Why neighbor-joining works
Revision 2
null
null
null
cs.DS cs.DM
null
We show that the neighbor-joining algorithm is a robust quartet method for constructing trees from distances. This leads to a new performance guarantee that contains Atteson's optimal radius bound as a special case and explains many cases where neighbor-joining is successful even when Atteson's criterion is not satisfied. We also provide a proof for Atteson's conjecture on the optimal edge radius of the neighbor-joining algorithm. The strong performance guarantees we provide also hold for the quadratic time fast neighbor-joining algorithm, thus providing a theoretical basis for inferring very large phylogenies with neighbor-joining.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 20:22:59 GMT" }, { "version": "v2", "created": "Mon, 25 Dec 2006 21:28:24 GMT" }, { "version": "v3", "created": "Sun, 17 Jun 2007 10:36:20 GMT" } ]
2007-06-17T00:00:00
[ [ "Mihaescu", "Radu", "" ], [ "Levy", "Dan", "" ], [ "Pachter", "Lior", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0602042
Wojciech Mazurczyk
Wojciech Mazurczyk, Zbigniew Kotulski
New security and control protocol for VoIP based on steganography and digital watermarking
8 pages, 4 figures, 1 table
Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360
null
null
cs.CR cs.MM
null
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic. Additionally this solution offers authentication and integrity, it is capable of exchanging and verifying QoS and security parameters. It is based on digital watermarking and steganography that is why it does not consume additional bandwidth and the data transmitted is inseparably bound to the voice content.
[ { "version": "v1", "created": "Fri, 10 Feb 2006 22:49:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Kotulski", "Zbigniew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0602043
Shanghua Teng
Xi Chen, Xiaotie Deng and Shang-Hua Teng
Computing Nash Equilibria: Approximation and Smoothed Complexity
null
null
null
null
cs.CC cs.GT
null
We show that the BIMATRIX game does not have a fully polynomial-time approximation scheme, unless PPAD is in P. In other words, no algorithm with time polynomial in n and 1/\epsilon can compute an \epsilon-approximate Nash equilibrium of an n by nbimatrix game, unless PPAD is in P. Instrumental to our proof, we introduce a new discrete fixed-point problem on a high-dimensional cube with a constant side-length, such as on an n-dimensional cube with side-length 7, and show that they are PPAD-complete. Furthermore, we prove, unless PPAD is in RP, that the smoothed complexity of the Lemke-Howson algorithm or any algorithm for computing a Nash equilibrium of a bimatrix game is polynomial in n and 1/\sigma under perturbations with magnitude \sigma. Our result answers a major open question in the smoothed analysis of algorithms and the approximation of Nash equilibria.
[ { "version": "v1", "created": "Sat, 11 Feb 2006 22:46:55 GMT" }, { "version": "v2", "created": "Wed, 22 Feb 2006 00:18:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Xi", "" ], [ "Deng", "Xiaotie", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0602044
Prasanta K. Panigrahi
Siddharth Arora, Jayadev Acharya, Amit Verma, Prasanta K. Panigrahi
Multilevel Thresholding for Image Segmentation through a Fast Statistical Recursive Algorithm
9 pages, 3 figures
null
null
null
cs.CV
null
A novel algorithm is proposed for segmenting an image into multiple levels using its mean and variance. Starting from the extreme pixel values at both ends of the histogram plot, the algorithm is applied recursively on sub-ranges computed from the previous step, so as to find a threshold level and a new sub-range for the next step, until no significant improvement in image quality can be achieved. The method makes use of the fact that a number of distributions tend towards Dirac delta function, peaking at the mean, in the limiting condition of vanishing variance. The procedure naturally provides for variable size segmentation with bigger blocks near the extreme pixel values and finer divisions around the mean or other chosen value for better visualization. Experiments on a variety of images show that the new algorithm effectively segments the image in computationally very less time.
[ { "version": "v1", "created": "Sun, 12 Feb 2006 18:22:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Arora", "Siddharth", "" ], [ "Acharya", "Jayadev", "" ], [ "Verma", "Amit", "" ], [ "Panigrahi", "Prasanta K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0602045
Russ Abbott
Russ Abbott
Emergence Explained
67 pages. Earlier versions presented at Lake ArrowHead conference on human complex systems (2005), GECCO 2005 workshop on Biological Applications of Genetic and Evolutionary Computation, and Symposium on Understanding Complex Systems (2005)
null
null
null
cs.MA cs.DC cs.GL
null
Emergence (macro-level effects from micro-level causes) is at the heart of the conflict between reductionism and functionalism. How can there be autonomous higher level laws of nature (the functionalist claim) if everything can be reduced to the fundamental forces of physics (the reductionist position)? We cut through this debate by applying a computer science lens to the way we view nature. We conclude (a) that what functionalism calls the special sciences (sciences other than physics) do indeed study autonomous laws and furthermore that those laws pertain to real higher level entities but (b) that interactions among such higher-level entities is epiphenomenal in that they can always be reduced to primitive physical forces. In other words, epiphenomena, which we will identify with emergent phenomena, do real higher-level work. The proposed perspective provides a framework for understanding many thorny issues including the nature of entities, stigmergy, the evolution of complexity, phase transitions, supervenience, and downward entailment. We also discuss some practical considerations pertaining to systems of systems and the limitations of modeling.
[ { "version": "v1", "created": "Sun, 12 Feb 2006 22:11:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
cs/0602046
Martin Wainwright
Emin Martinian, Martin J. Wainwright
Analysis of LDGM and compound codes for lossy compression and binning
5 pages; to appear in Workshop on Information Theory and its Applications, February 2006, San Diego
null
null
null
cs.IT math.IT
null
Recent work has suggested that low-density generator matrix (LDGM) codes are likely to be effective for lossy source coding problems. We derive rigorous upper bounds on the effective rate-distortion function of LDGM codes for the binary symmetric source, showing that they quickly approach the rate-distortion function as the degree increases. We also compare and contrast the standard LDGM construction with a compound LDPC/LDGM construction introduced in our previous work, which provably saturates the rate-distortion bound with finite degrees. Moreover, this compound construction can be used to generate nested codes that are simultaneously good as source and channel codes, and are hence well-suited to source/channel coding with side information. The sparse and high-girth graphical structure of our constructions render them well-suited to message-passing encoding.
[ { "version": "v1", "created": "Mon, 13 Feb 2006 03:07:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Martinian", "Emin", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602047
Fredrik Kuivinen
Peter Jonsson, Fredrik Kuivinen, Gustav Nordh
Approximability of Integer Programming with Generalised Constraints
Due to a flaw in a proof result 1 has changed. For maximal constraint languages we now prove a classification result for domains of size less than or equal to four. We also give a complete classification result for maximal constraint languages under the assumption that a conjecture due to Szczepara holds
null
null
null
cs.CC
null
We study a family of problems, called \prob{Maximum Solution}, where the objective is to maximise a linear goal function over the feasible integer assignments to a set of variables subject to a set of constraints. When the domain is Boolean (i.e. restricted to $\{0,1\}$), the maximum solution problem is identical to the well-studied \prob{Max Ones} problem, and the approximability is completely understood for all restrictions on the underlying constraints [Khanna et al., SIAM J. Comput., 30 (2001), pp. 1863-1920]. We continue this line of research by considering domains containing more than two elements. We present two main results: a complete classification for the approximability of all maximal constraint languages over domains of cardinality at most 4, and a complete classification of the approximability of the problem when the set of allowed constraints contains all permutation constraints. Under the assumption that a conjecture due to Szczepara holds, we give a complete classification for all maximal constraint languages. These classes of languages are well-studied in universal algebra and computer science; they have, for instance, been considered in connection with machine learning and constraint satisfaction. Our results are proved by using algebraic results from clone theory and the results indicates that this approach is very powerful for classifying the approximability of certain optimisation problems.
[ { "version": "v1", "created": "Mon, 13 Feb 2006 18:48:52 GMT" }, { "version": "v2", "created": "Mon, 2 Jul 2007 15:25:57 GMT" }, { "version": "v3", "created": "Fri, 11 Jan 2008 09:07:39 GMT" } ]
2011-11-10T00:00:00
[ [ "Jonsson", "Peter", "" ], [ "Kuivinen", "Fredrik", "" ], [ "Nordh", "Gustav", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0602048
Kambiz Azarian
Kambiz Azarian, Hesham El Gamal and Philip Schniter
On the Optimality of the ARQ-DDF Protocol
26 pages, 2 figures
null
null
null
cs.IT math.IT
null
The performance of the automatic repeat request-dynamic decode and forward (ARQ-DDF) cooperation protocol is analyzed in two distinct scenarios. The first scenario is the multiple access relay (MAR) channel where a single relay is dedicated to simultaneously help several multiple access users. For this setup, it is shown that the ARQ-DDF protocol achieves the optimal diversity multiplexing tradeoff (DMT) of the channel. The second scenario is the cooperative vector multiple access (CVMA) channel where the users cooperate in delivering their messages to a destination equipped with multiple receiving antennas. For this setup, we develop a new variant of the ARQ-DDF protocol where the users are purposefully instructed not to cooperate in the first round of transmission. Lower and upper bounds on the achievable DMT are then derived. These bounds are shown to converge to the optimal tradeoff as the number of transmission rounds increases.
[ { "version": "v1", "created": "Mon, 13 Feb 2006 18:53:06 GMT" } ]
2007-07-16T00:00:00
[ [ "Azarian", "Kambiz", "" ], [ "Gamal", "Hesham El", "" ], [ "Schniter", "Philip", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602049
Kambiz Azarian
Arul Murugan, Kambiz Azarian and Hesham El Gamal
Cooperative Lattice Coding and Decoding
25 pages, 8 figures
null
null
null
cs.IT math.IT
null
A novel lattice coding framework is proposed for outage-limited cooperative channels. This framework provides practical implementations for the optimal cooperation protocols proposed by Azarian et al. In particular, for the relay channel we implement a variant of the dynamic decode and forward protocol, which uses orthogonal constellations to reduce the channel seen by the destination to a single-input single-output time-selective one, while inheriting the same diversity-multiplexing tradeoff. This simplification allows for building the receiver using traditional belief propagation or tree search architectures. Our framework also generalizes the coding scheme of Yang and Belfiore in the context of amplify and forward cooperation. For the cooperative multiple access channel, a tree coding approach, matched to the optimal linear cooperation protocol of Azarain et al, is developed. For this scenario, the MMSE-DFE Fano decoder is shown to enjoy an excellent tradeoff between performance and complexity. Finally, the utility of the proposed schemes is established via a comprehensive simulation study.
[ { "version": "v1", "created": "Mon, 13 Feb 2006 19:29:12 GMT" }, { "version": "v2", "created": "Thu, 16 Feb 2006 01:11:00 GMT" } ]
2007-07-16T00:00:00
[ [ "Murugan", "Arul", "" ], [ "Azarian", "Kambiz", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602050
Amir Avestimehr
Salman Avestimehr and David N.C. Tse
Outage Capacity of the Fading Relay Channel in the Low SNR Regime
null
null
null
null
cs.IT math.IT
null
In slow fading scenarios, cooperation between nodes can increase the amount of diversity for communication. We study the performance limit in such scenarios by analyzing the outage capacity of slow fading relay channels. Our focus is on the low SNR and low outage probability regime, where the adverse impact of fading is greatest but so are the potential gains from cooperation. We showed that while the standard Amplify-Forward protocol performs very poorly in this regime, a modified version we called the Bursty Amplify-Forward protocol is optimal and achieves the outage capacity of the network. Moreover, this performance can be achieved without a priori channel knowledge at the receivers. In contrast, the Decode-Forward protocol is strictly sub-optimal in this regime. Our results directly yield the outage capacity per unit energy of fading relay channels.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 00:37:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Avestimehr", "Salman", "" ], [ "Tse", "David N. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602051
Fernando Lobo
Fernando G. Lobo, Claudio F. Lima
On the utility of the multimodal problem generator for assessing the performance of Evolutionary Algorithms
Also UALG-ILAB Report No. 200601
null
null
null
cs.NE
null
This paper looks in detail at how an evolutionary algorithm attempts to solve instances from the multimodal problem generator. The paper shows that in order to consistently reach the global optimum, an evolutionary algorithm requires a population size that should grow at least linearly with the number of peaks. It is also shown a close relationship between the supply and decision making issues that have been identified previously in the context of population sizing models for additively decomposable problems. The most important result of the paper, however, is that solving an instance of the multimodal problem generator is like solving a peak-in-a-haystack, and it is argued that evolutionary algorithms are not the best algorithms for such a task. Finally, and as opposed to what several researchers have been doing, it is our strong belief that the multimodal problem generator is not adequate for assessing the performance of evolutionary algorithms.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 10:30:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Fernando G.", "" ], [ "Lima", "Claudio F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0602052
Grigoriev Evgeniy
Evgeniy Grigoriev
The OverRelational Manifesto
34 pages
null
null
null
cs.DB cs.DS
null
The OverRelational Manifesto (below ORM) proposes a possible approach to creation of data storage systems of the next generation. ORM starts from the requirement that information in a relational database is represented by a set of relation values. Accordingly, it is assumed that the information about any entity of an enterprise must also be represented as a set of relation values (the ORM main requirement). A system of types is introduced, which allows one to fulfill the main requirement. The data are represented in the form of complex objects, and the state of any object is described as a set of relation values. Emphasize that the types describing the objects are encapsulated, inherited, and polymorphic. Then, it is shown that the data represented as a set of such objects may also be represented as a set of relational values defined on the set of scalar domains (dual data representation). In the general case, any class is associated with a set of relation variables (R-variables) each one containing some data about all objects of this class existing in the system. One of the key points is the fact that the usage of complex (from the user's viewpoint) refined names of R-variables and their attributes makes it possible to preserve the semantics of complex data structures represented in the form of a set of relation values. The most important part of the data storage system created on the approach proposed is an object-oriented translator operating over a relational DBMS. The expressiveness of such a system is comparable with that of OO programming languages.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 12:19:08 GMT" }, { "version": "v2", "created": "Wed, 15 Feb 2006 10:28:24 GMT" }, { "version": "v3", "created": "Fri, 17 Mar 2006 09:57:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Grigoriev", "Evgeniy", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0602053
Thomas Hayes
Varsha Dani and Thomas P. Hayes
How to Beat the Adaptive Multi-Armed Bandit
null
null
null
null
cs.DS cs.LG
null
The multi-armed bandit is a concise model for the problem of iterated decision-making under uncertainty. In each round, a gambler must pull one of $K$ arms of a slot machine, without any foreknowledge of their payouts, except that they are uniformly bounded. A standard objective is to minimize the gambler's regret, defined as the gambler's total payout minus the largest payout which would have been achieved by any fixed arm, in hindsight. Note that the gambler is only told the payout for the arm actually chosen, not for the unchosen arms. Almost all previous work on this problem assumed the payouts to be non-adaptive, in the sense that the distribution of the payout of arm $j$ in round $i$ is completely independent of the choices made by the gambler on rounds $1, \dots, i-1$. In the more general model of adaptive payouts, the payouts in round $i$ may depend arbitrarily on the history of past choices made by the algorithm. We present a new algorithm for this problem, and prove nearly optimal guarantees for the regret against both non-adaptive and adaptive adversaries. After $T$ rounds, our algorithm has regret $O(\sqrt{T})$ with high probability (the tail probability decays exponentially). This dependence on $T$ is best possible, and matches that of the full-information version of the problem, in which the gambler is told the payouts for all $K$ arms after each round. Previously, even for non-adaptive payouts, the best high-probability bounds known were $O(T^{2/3})$, due to Auer, Cesa-Bianchi, Freund and Schapire. The expected regret of their algorithm is $O(T^{1/2}) for non-adaptive payouts, but as we show, $\Omega(T^{2/3})$ for adaptive payouts.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 23:57:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Dani", "Varsha", "" ], [ "Hayes", "Thomas P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0602054
Petros Elia
Petros Elia, K. Raj Kumar, Sameer A. Pawar, P. Vijay Kumar and Hsiao-feng Lu
Explicit Space-Time Codes Achieving The Diversity-Multiplexing Gain Tradeoff
Revised submission to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A recent result of Zheng and Tse states that over a quasi-static channel, there exists a fundamental tradeoff, referred to as the diversity-multiplexing gain (D-MG) tradeoff, between the spatial multiplexing gain and the diversity gain that can be simultaneously achieved by a space-time (ST) block code. This tradeoff is precisely known in the case of i.i.d. Rayleigh-fading, for T>= n_t+n_r-1 where T is the number of time slots over which coding takes place and n_t,n_r are the number of transmit and receive antennas respectively. For T < n_t+n_r-1, only upper and lower bounds on the D-MG tradeoff are available. In this paper, we present a complete solution to the problem of explicitly constructing D-MG optimal ST codes, i.e., codes that achieve the D-MG tradeoff for any number of receive antennas. We do this by showing that for the square minimum-delay case when T=n_t=n, cyclic-division-algebra (CDA) based ST codes having the non-vanishing determinant property are D-MG optimal. While constructions of such codes were previously known for restricted values of n, we provide here a construction for such codes that is valid for all n. For the rectangular, T > n_t case, we present two general techniques for building D-MG-optimal rectangular ST codes from their square counterparts. A byproduct of our results establishes that the D-MG tradeoff for all T>= n_t is the same as that previously known to hold for T >= n_t + n_r -1.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 00:19:51 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Kumar", "K. Raj", "" ], [ "Pawar", "Sameer A.", "" ], [ "Kumar", "P. Vijay", "" ], [ "Lu", "Hsiao-feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602055
Fernando Lobo
Fernando G. Lobo, Claudio F. Lima
Revisiting Evolutionary Algorithms with On-the-Fly Population Size Adjustment
Also UALG-ILAB Report No. 200602
null
null
null
cs.NE
null
In an evolutionary algorithm, the population has a very important role as its size has direct implications regarding solution quality, speed, and reliability. Theoretical studies have been done in the past to investigate the role of population sizing in evolutionary algorithms. In addition to those studies, several self-adjusting population sizing mechanisms have been proposed in the literature. This paper revisits the latter topic and pays special attention to the genetic algorithm with adaptive population size (APGA), for which several researchers have claimed to be very effective at autonomously (re)sizing the population. As opposed to those previous claims, this paper suggests a complete opposite view. Specifically, it shows that APGA is not capable of adapting the population size at all. This claim is supported on theoretical grounds and confirmed by computer simulations.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 13:48:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Lobo", "Fernando G.", "" ], [ "Lima", "Claudio F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0602056
Domenico Camarda Dr.
Dino Borri, Domenico Camarda
Building Scenarios for Environmental Management and Planning: An IT-Based Approach
null
null
null
null
cs.MA
null
Oftentimes, the need to build multidiscipline knowledge bases, oriented to policy scenarios, entails the involvement of stakeholders in manifold domains, with a juxtaposition of different languages whose semantics can hardly allow inter-domain transfers. A useful support for planning is the building up of durable IT based interactive platforms, where it is possible to modify initial positions toward a semantic convergence. The present paper shows an area-based application of these tools, for the integrated distance-management of different forms of knowledge expressed by selected stakeholders about environmental planning issues, in order to build alternative development scenarios. Keywords: Environmental planning, Scenario building, Multi-source knowledge, IT-based
[ { "version": "v1", "created": "Wed, 15 Feb 2006 14:46:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Borri", "Dino", "" ], [ "Camarda", "Domenico", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0602057
Christopher Homan
Melanie J. Agnew and Christopher M. Homan
Plane Decompositions as Tools for Approximation
null
null
null
null
cs.DS
null
Tree decompositions were developed by Robertson and Seymour. Since then algorithms have been developed to solve intractable problems efficiently for graphs of bounded treewidth. In this paper we extend tree decompositions to allow cycles to exist in the decomposition graph; we call these new decompositions plane decompositions because we require that the decomposition graph be planar. First, we give some background material about tree decompositions and an overview of algorithms both for decompositions and for approximations of planar graphs. Then, we give our plane decomposition definition and an algorithm that uses this decomposition to approximate the size of the maximum independent set of the underlying graph in polynomial time.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 19:09:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Agnew", "Melanie J.", "" ], [ "Homan", "Christopher M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0602058
Ruoheng Liu
Ruoheng Liu, Predrag Spasojevic, and Emina Soljanin
Incremental Redundancy Cooperative Coding for Wireless Networks: Cooperative Diversity, Coding, and Transmission Energy Gain
revised version
null
null
null
cs.IT math.IT
null
We study an incremental redundancy (IR) cooperative coding scheme for wireless networks. To exploit the spatial diversity benefit we propose a cluster-based collaborating strategy for a quasi-static Rayleigh fading channel model and based on a network geometric distance profile. Our scheme enhances the network performance by embedding an IR cooperative coding scheme into an existing noncooperative route. More precisely, for each hop, we form a collaborating cluster of M-1 nodes between the (hop) sender and the (hop) destination. The transmitted message is encoded using a mother code and partitioned into M blocks corresponding to the each of M slots. In the first slot, the (hop) sender broadcasts its information by transmitting the first block, and its helpers attempt to relay this message. In the remaining slots, the each of left-over M-1 blocks is sent either through a helper which has successfully decoded the message or directly by the (hop) sender where a dynamic schedule is based on the ACK-based feedback from the cluster. By employing powerful good codes (e.g., turbo codes, LDPC codes, and raptor codes) whose performance is characterized by a threshold behavior, our approach improves the reliability of a multi-hop routing through not only cooperation diversity benefit but also a coding advantage. The study of the diversity and the coding gain of the proposed scheme is based on a new simple threshold bound on the frame-error rate (FER) of maximum likelihood decoding. A average FER upper bound and its asymptotic (in large SNR) version are derived as a function of the average fading channel SNRs and the code threshold.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 20:55:30 GMT" }, { "version": "v2", "created": "Sat, 17 Feb 2007 20:44:50 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Spasojevic", "Predrag", "" ], [ "Soljanin", "Emina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602059
Suchitra Manepalli
Suchitra Manepalli, Giridhar Manepalli, Michael L. Nelson
D2D: Digital Archive to MPEG-21 DIDL
28 pages, 8 figures
null
null
null
cs.DL
null
Digital Archive to MPEG-21 DIDL (D2D) analyzes the contents of the digital archive and produces an MPEG-21 Digital Item Declaration Language (DIDL) encapsulating the analysis results. DIDL is an extensible XML-based language that aggregates resources and the metadata. We provide a brief report on several analysis techniques applied on the digital archive by the D2D and provide an evaluation of its run-time performance.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 22:18:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Manepalli", "Suchitra", "" ], [ "Manepalli", "Giridhar", "" ], [ "Nelson", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0602060
Philip Davis
Philip M. Davis, Jason S. Price
eJournal interface can influence usage statistics: implications for libraries, publishers, and Project COUNTER
22 pages, 5 figures. JASIST (in press, 2006)
JASIST v57 n9 (2006):1243-1248
10.1002/asi.20405
null
cs.IR cs.DL
null
The design of a publisher's electronic interface can have a measurable effect on electronic journal usage statistics. A study of journal usage from six COUNTER-compliant publishers at thirty-two research institutions in the United States, the United Kingdom and Sweden indicates that the ratio of PDF to HTML views is not consistent across publisher interfaces, even after controlling for differences in publisher content. The number of fulltext downloads may be artificially inflated when publishers require users to view HTML versions before accessing PDF versions or when linking mechanisms, such as CrossRef, direct users to the full text, rather than the abstract, of each article. These results suggest that usage reports from COUNTER-compliant publishers are not directly comparable in their current form. One solution may be to modify publisher numbers with adjustment factors deemed to be representative of the benefit or disadvantage due to its interface. Standardization of some interface and linking protocols may obviate these differences and allow for more accurate cross-publisher comparisons.
[ { "version": "v1", "created": "Thu, 16 Feb 2006 20:29:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Davis", "Philip M.", "" ], [ "Price", "Jason S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0602061
David Anderson
David P. Anderson, Gilles Fedak
The Computational and Storage Potential of Volunteer Computing
8 pages. To appear in CCGrid 2006
null
null
null
cs.DC cs.PF
null
"Volunteer computing" uses Internet-connected computers, volunteered by their owners, as a source of computing power and storage. This paper studies the potential capacity of volunteer computing. We analyzed measurements of over 330,000 hosts participating in a volunteer computing project. These measurements include processing power, memory, disk space, network throughput, host availability, user-specified limits on resource usage, and host churn. We show that volunteer computing can support applications that are significantly more data-intensive, or have larger memory and storage requirements, than those in current projects.
[ { "version": "v1", "created": "Thu, 16 Feb 2006 22:33:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Anderson", "David P.", "" ], [ "Fedak", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0602062
Francois Denis
Fran\c{c}ois Denis (LIF), Yann Esposito (LIF), Amaury Habrard (LIF)
Learning rational stochastic languages
15 pages
null
null
null
cs.LG
null
Given a finite set of words w1,...,wn independently drawn according to a fixed unknown distribution law P called a stochastic language, an usual goal in Grammatical Inference is to infer an estimate of P in some class of probabilistic models, such as Probabilistic Automata (PA). Here, we study the class of rational stochastic languages, which consists in stochastic languages that can be generated by Multiplicity Automata (MA) and which strictly includes the class of stochastic languages generated by PA. Rational stochastic languages have minimal normal representation which may be very concise, and whose parameters can be efficiently estimated from stochastic samples. We design an efficient inference algorithm DEES which aims at building a minimal normal representation of the target. Despite the fact that no recursively enumerable class of MA computes exactly the set of rational stochastic languages over Q, we show that DEES strongly identifies tis set in the limit. We study the intermediary MA output by DEES and show that they compute rational series which converge absolutely to one and which can be used to provide stochastic languages which closely estimate the target.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 08:57:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Denis", "François", "", "LIF" ], [ "Esposito", "Yann", "", "LIF" ], [ "Habrard", "Amaury", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0602063
Tony Thomas
Tony Thomas, Arbind Kumar Lal
Group Signature Schemes Using Braid Groups
null
null
null
null
cs.CR
null
Artin's braid groups have been recently suggested as a new source for public-key cryptography. In this paper we propose the first group signature schemes based on the conjugacy problem, decomposition problem and root problem in the braid groups which are believed to be hard problems.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 10:32:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Thomas", "Tony", "" ], [ "Lal", "Arbind Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0602064
Ana Romero
A. Romero, J. Rubio, F. Sergeraert
Computing spectral sequences
null
null
null
null
cs.SC
null
In this paper, a set of programs enhancing the Kenzo system is presented. Kenzo is a Common Lisp program designed for computing in Algebraic Topology, in particular it allows the user to calculate homology and homotopy groups of complicated spaces. The new programs presented here entirely compute Serre and Eilenberg-Moore spectral sequences, in particular the groups and differential maps for arbitrary r. They also determine when the spectral sequence has converged and describe the filtration of the target homology groups induced by the spectral sequence.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 12:29:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Romero", "A.", "" ], [ "Rubio", "J.", "" ], [ "Sergeraert", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0602065
Paul Vitanyi
Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of Amsterdam)
Similarity of Objects and the Meaning of Words
LaTeX, 25 pages, 7 figures. Proc. 3rd Conf. Theory and Applications of Models of Computation (TAMC), 15-20 May, 2006, Beijing, China (Invited paper) This is an extended version of the 5-page abstract cs.IR/0504089
null
null
null
cs.CV cs.IR
null
We survey the emerging area of compression-based, parameter-free, similarity distance measures useful in data-mining, pattern recognition, learning and automatic semantics extraction. Given a family of distances on a set of objects, a distance is universal up to a certain precision for that family if it minorizes every distance in the family between every two objects in the set, up to the stated precision (we do not require the universal distance to be an element of the family). We consider similarity distances for two types of objects: literal objects that as such contain all of their meaning, like genomes or books, and names for objects. The latter may have literal embodyments like the first type, but may also be abstract like ``red'' or ``christianity.'' For the first type we consider a family of computable distance measures corresponding to parameters expressing similarity according to particular featuresdistances generated by web users corresponding to particular semantic relations between the (names for) the designated objects. For both families we give universal similarity distance measures, incorporating all particular distance measures in the family. In the first case the universal distance is based on compression and in the second case it is based on Google page counts related to search terms. In both cases experiments on a massive scale give evidence of the viability of the approaches. between pairs of literal objects. For the second type we consider similarity
[ { "version": "v1", "created": "Fri, 17 Feb 2006 16:15:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Cilibrasi", "Rudi", "", "CWI" ], [ "Vitanyi", "Paul", "", "CWI and University of\n Amsterdam" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0602066
Louis Mello
Louis Mello
Natural Economics
null
null
null
null
cs.OH
null
A few considerations on the nature of Economics and its relationship to human communities through the prism of Self-Organizing-Systems.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 17:01:00 GMT" } ]
2011-11-10T00:00:00
[ [ "Mello", "Louis", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0602067
Michael Baer
Michael B. Baer
Renyi to Renyi -- Source Coding under Siege
5 pages, 1 figure, accepted to ISIT 2006
null
null
null
cs.IT cs.DS math.IT
null
A novel lossless source coding paradigm applies to problems of unreliable lossless channels with low bit rates, in which a vital message needs to be transmitted prior to termination of communications. This paradigm can be applied to Alfred Renyi's secondhand account of an ancient siege in which a spy was sent to scout the enemy but was captured. After escaping, the spy returned to his base in no condition to speak and unable to write. His commander asked him questions that he could answer by nodding or shaking his head, and the fortress was defended with this information. Renyi told this story with reference to prefix coding, but maximizing probability of survival in the siege scenario is distinct from yet related to the traditional source coding objective of minimizing expected codeword length. Rather than finding a code minimizing expected codeword length $\sum_{i=1}^n p(i) l(i)$, the siege problem involves maximizing $\sum_{i=1}^n p(i) \theta^{l(i)}$ for a known $\theta \in (0,1)$. When there are no restrictions on codewords, this problem can be solve using a known generalization of Huffman coding. The optimal solution has coding bounds which are functions of Renyi entropy; in addition to known bounds, new bounds are derived here. The alphabetically constrained version of this problem has applications in search trees and diagnostic testing. A novel dynamic programming algorithm -- based upon the oldest known algorithm for the traditional alphabetic problem -- optimizes this problem in $O(n^3)$ time and $O(n^2)$ space, whereas two novel approximation algorithms can find a suboptimal solution faster: one in linear time, the other in $O(n \log n)$. Coding bounds for the alphabetic version of this problem are also presented.
[ { "version": "v1", "created": "Fri, 17 Feb 2006 23:40:26 GMT" }, { "version": "v2", "created": "Mon, 22 May 2006 20:32:04 GMT" } ]
2007-07-16T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602068
Kenneth Koehler
K. R. Koehler
Parallel Symbolic Computation of Curvature Invariants in General Relativity
9 pages, submitted to Journal of Computational Physics
null
null
null
cs.DC cs.SC gr-qc
null
We present a practical application of parallel symbolic computation in General Relativity: the calculation of curvature invariants for large dimension. We discuss the structure of the calculations, an implementation of the technique and scaling of the computation with spacetime dimension for various invariants.
[ { "version": "v1", "created": "Sun, 19 Feb 2006 19:28:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Koehler", "K. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" } ]
cs/0602069
Vicky Choi
Vicky Choi
Faster Algorithms for Constructing a Concept (Galois) Lattice
15 pages, 3 figures
null
null
null
cs.DM cs.DS
null
In this paper, we present a fast algorithm for constructing a concept (Galois) lattice of a binary relation, including computing all concepts and their lattice order. We also present two efficient variants of the algorithm, one for computing all concepts only, and one for constructing a frequent closed itemset lattice. The running time of our algorithms depends on the lattice structure and is faster than all other existing algorithms for these problems.
[ { "version": "v1", "created": "Sun, 19 Feb 2006 19:47:56 GMT" }, { "version": "v2", "created": "Thu, 1 Jun 2006 19:03:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Choi", "Vicky", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0602070
Nathan Boeger
Nathan Boeger
Methods for scaling a large member base
12 pages
null
null
null
cs.GL
null
The technical challenges of scaling websites with large and growing member bases, like social networking sites, are numerous. One of these challenges is how to evenly distribute the growing member base across all available resources. This paper will explore various methods that address this issue. The techniques used in this paper can be generalized and applied to various other problems that need to distribute data evenly amongst a finite amount of resources.
[ { "version": "v1", "created": "Mon, 20 Feb 2006 18:08:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Boeger", "Nathan", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
cs/0602071
Martin Wainwright
Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright
Geographic Gossip: Efficient Aggregation for Sensor Networks
8 pages total; to appear in Information Processing in Sensor Networks (IPSN) 2006
null
null
null
cs.IT math.IT
null
Gossip algorithms for aggregation have recently received significant attention for sensor network applications because of their simplicity and robustness in noisy and uncertain environments. However, gossip algorithms can waste significant energy by essentially passing around redundant information multiple times. For realistic sensor network model topologies like grids and random geometric graphs, the inefficiency of gossip schemes is caused by slow mixing times of random walks on those graphs. We propose and analyze an alternative gossiping scheme that exploits geographic information. By utilizing a simple resampling method, we can demonstrate substantial gains over previously proposed gossip protocols. In particular, for random geometric graphs, our algorithm computes the true average to accuracy $1/n^a$ using $O(n^{1.5}\sqrt{\log n})$ radio transmissions, which reduces the energy consumption by a $\sqrt{\frac{n}{\log n}}$ factor over standard gossip algorithms.
[ { "version": "v1", "created": "Mon, 20 Feb 2006 03:52:57 GMT" } ]
2007-07-13T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Sarwate", "Anand D.", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602072
Eirik Rosnes
Eirik Rosnes and {\O}yvind Ytrehus
Turbo Decoding on the Binary Erasure Channel: Finite-Length Analysis and Turbo Stopping Sets
28 pages, 5 figures, submitted to IEEE Transactions on Information Theory
IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4059-4075, Nov. 2007
null
null
cs.IT math.IT
null
This paper is devoted to the finite-length analysis of turbo decoding over the binary erasure channel (BEC). The performance of iterative belief-propagation (BP) decoding of low-density parity-check (LDPC) codes over the BEC can be characterized in terms of stopping sets. We describe turbo decoding on the BEC which is simpler than turbo decoding on other channels. We then adapt the concept of stopping sets to turbo decoding and state an exact condition for decoding failure. Apply turbo decoding until the transmitted codeword has been recovered, or the decoder fails to progress further. Then the set of erased positions that will remain when the decoder stops is equal to the unique maximum-size turbo stopping set which is also a subset of the set of erased positions. Furthermore, we present some improvements of the basic turbo decoding algorithm on the BEC. The proposed improved turbo decoding algorithm has substantially better error performance as illustrated by the given simulation results. Finally, we give an expression for the turbo stopping set size enumerating function under the uniform interleaver assumption, and an efficient enumeration algorithm of small-size turbo stopping sets for a particular interleaver. The solution is based on the algorithm proposed by Garello et al. in 2001 to compute an exhaustive list of all low-weight codewords in a turbo code.
[ { "version": "v1", "created": "Mon, 20 Feb 2006 14:55:48 GMT" } ]
2011-05-31T00:00:00
[ [ "Rosnes", "Eirik", "" ], [ "Ytrehus", "Øyvind", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602073
Tobias Friedrich
Deepak Ajwani, Tobias Friedrich and Ulrich Meyer
An O(n^{2.75}) algorithm for online topological ordering
20 pages, long version of SWAT'06 paper
null
null
null
cs.DS
null
We present a simple algorithm which maintains the topological order of a directed acyclic graph with n nodes under an online edge insertion sequence in O(n^{2.75}) time, independent of the number of edges m inserted. For dense DAGs, this is an improvement over the previous best result of O(min(m^{3/2} log(n), m^{3/2} + n^2 log(n)) by Katriel and Bodlaender. We also provide an empirical comparison of our algorithm with other algorithms for online topological sorting. Our implementation outperforms them on certain hard instances while it is still competitive on random edge insertion sequences leading to complete DAGs.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 10:32:15 GMT" }, { "version": "v2", "created": "Thu, 20 Apr 2006 16:31:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Ajwani", "Deepak", "" ], [ "Friedrich", "Tobias", "" ], [ "Meyer", "Ulrich", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0602074
Pavel Chigansky
Pavel Chigansky
The entropy rate of the binary symmetric channel in the rare transitions regime
This paper has been withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This note has been withdrawn by the author as the more complete result was recently proved by A.Quas and Y.Peres
[ { "version": "v1", "created": "Tue, 21 Feb 2006 11:32:43 GMT" }, { "version": "v2", "created": "Thu, 7 Aug 2008 13:21:49 GMT" }, { "version": "v3", "created": "Fri, 30 Jan 2009 10:44:08 GMT" } ]
2009-01-30T00:00:00
[ [ "Chigansky", "Pavel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602075
Peter Jonsson
Vladimir Deineko, Peter Jonsson, Mikael Klasson, and Andrei Krokhin
The approximability of MAX CSP with fixed-value constraints
null
null
null
null
cs.CC
null
In the maximum constraint satisfaction problem (MAX CSP), one is given a finite collection of (possibly weighted) constraints on overlapping sets of variables, and the goal is to assign values from a given finite domain to the variables so as to maximize the number (or the total weight, for the weighted case) of satisfied constraints. This problem is NP-hard in general, and, therefore, it is natural to study how restricting the allowed types of constraints affects the approximability of the problem. In this paper, we show that any MAX CSP problem with a finite set of allowed constraint types, which includes all fixed-value constraints (i.e., constraints of the form x=a), is either solvable exactly in polynomial-time or else is APX-complete, even if the number of occurrences of variables in instances are bounded. Moreover, we present a simple description of all polynomial-time solvable cases of our problem. This description relies on the well-known algebraic combinatorial property of supermodularity.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 14:13:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Deineko", "Vladimir", "" ], [ "Jonsson", "Peter", "" ], [ "Klasson", "Mikael", "" ], [ "Krokhin", "Andrei", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0602076
Ioannis Antonellis
Ioannis Antonellis and Efstratios Gallopoulos
Exploring term-document matrices from matrix models in text mining
SIAM Text Mining Workshop, SIAM Conference Data Mining, 2006
null
null
03/02-06
cs.IR cs.DB cs.DL
null
We explore a matrix-space model, that is a natural extension to the vector space model for Information Retrieval. Each document can be represented by a matrix that is based on document extracts (e.g. sentences, paragraphs, sections). We focus on the performance of this model for the specific case in which documents are originally represented as term-by-sentence matrices. We use the singular value decomposition to approximate the term-by-sentence matrices and assemble these results to form the pseudo-``term-document'' matrix that forms the basis of a text mining method alternative to traditional VSM and LSI. We investigate the singular values of this matrix and provide experimental evidence suggesting that the method can be particularly effective in terms of accuracy for text collections with multi-topic documents, such as web pages with news.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 16:14:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Antonellis", "Ioannis", "" ], [ "Gallopoulos", "Efstratios", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0602077
Vincent Schmitt RR
Vincent Schmitt and Krzysztof Worytkiewicz
Bisimulations of enrichments
null
null
null
null
cs.LO
null
In this paper we show that classical notions from automata theory such as simulation and bisimulation can be lifted to the context of enriched categories. The usual properties of bisimulation are nearly all preserved in this new context. The class of enriched functors that correspond to functionnal bisimulations surjective on objects is investigated and appears "nearly" open in the sense of Joyal and Moerdijk. Seeing the change of base techniques as a convenient means to define process refinement/abstractions, we give sufficient conditions for the change of base categories to preserve bisimularity. We apply these concepts to Betti's generalized automata, categorical transition systems, and other exotic categories.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 17:27:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Schmitt", "Vincent", "" ], [ "Worytkiewicz", "Krzysztof", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0602078
Robert Burger PhD
John Robert Burger
Associative Memory For Reversible Programming and Charge Recovery
null
null
null
null
cs.AR cs.DC
null
Presented below is an interesting type of associative memory called toggle memory based on the concept of T flip flops, as opposed to D flip flops. Toggle memory supports both reversible programming and charge recovery. Circuits designed using the principles delineated below permit matchlines to charge and discharge with near zero energy dissipation. The resulting lethargy is compensated by the massive parallelism of associative memory. Simulation indicates over 33x reduction in energy dissipation using a sinusoidal power supply at 2 MHz, assuming realistic 50 nm MOSFET models.
[ { "version": "v1", "created": "Tue, 21 Feb 2006 21:58:06 GMT" }, { "version": "v2", "created": "Thu, 23 Feb 2006 23:59:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Burger", "John Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0602079
Dumitru Mihai Ionescu Dr.
Dumitru Mihai Ionescu, Haidong Zhu
SISO APP Searches in Lattices with Tanner Graphs
15 pages, 6 figures, 2 tables, uses IEEEtran.cls
IEEE Trans. Inf. Theory, pp. 2672-2688, vol. 58, May 2012
10.1109/TIT.2011.2178130
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An efficient, low-complexity, soft-output detector for general lattices is presented, based on their Tanner graph (TG) representations. Closest-point searches in lattices can be performed as non-binary belief propagation on associated TGs; soft-information output is naturally generated in the process; the algorithm requires no backtrack (cf. classic sphere decoding), and extracts extrinsic information. A lattice's coding gain enables equivalence relations between lattice points, which can be thereby partitioned in cosets. Total and extrinsic a posteriori probabilities at the detector's output further enable the use of soft detection information in iterative schemes. The algorithm is illustrated via two scenarios that transmit a 32-point, uncoded super-orthogonal (SO) constellation for multiple-input multiple-output (MIMO) channels, carved from an 8-dimensional non-orthogonal lattice (a direct sum of two 4-dimensional checkerboard lattice): it achieves maximum likelihood performance in quasistatic fading; and, performs close to interference-free transmission, and identically to list sphere decoding, in independent fading with coordinate interleaving and iterative equalization and detection. Latter scenario outperforms former despite the absence of forward error correction coding---because the inherent lattice coding gain allows for the refining of extrinsic information. The lattice constellation is the same as the one employed in the SO space-time trellis codes first introduced for 2-by-2 MIMO by Ionescu et al., then independently by Jafarkhani and Seshadri. Complexity is log-linear in lattice dimensionality, vs. cubic in sphere decoders.
[ { "version": "v1", "created": "Wed, 22 Feb 2006 03:28:46 GMT" }, { "version": "v2", "created": "Mon, 5 Sep 2011 21:45:19 GMT" }, { "version": "v3", "created": "Thu, 22 Sep 2011 17:43:48 GMT" } ]
2012-05-29T00:00:00
[ [ "Ionescu", "Dumitru Mihai", "" ], [ "Zhu", "Haidong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602080
Shripad Thite
Sheung-Hung Poon (1) and Shripad Thite (1) ((1) Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, The Netherlands)
Pants Decomposition of the Punctured Plane
5 pages, 1 grayscale figure
null
null
null
cs.CG
null
A pants decomposition of an orientable surface S is a collection of simple cycles that partition S into pants, i.e., surfaces of genus zero with three boundary cycles. Given a set P of n points in the plane, we consider the problem of computing a pants decomposition of the surface S which is the plane minus P, of minimum total length. We give a polynomial-time approximation scheme using Mitchell's guillotine rectilinear subdivisions. We give a quartic-time algorithm to compute the shortest pants decomposition of S when the cycles are restricted to be axis-aligned boxes, and a quadratic-time algorithm when all the points lie on a line; both exact algorithms use dynamic programming with Yao's speedup.
[ { "version": "v1", "created": "Wed, 22 Feb 2006 19:08:48 GMT" } ]
2009-09-29T00:00:00
[ [ "Poon", "Sheung-Hung", "" ], [ "Thite", "Shripad", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0602081
Xudong Ma
Xudong Ma, En-hui Yang
Low-Density Parity-Check Code with Fast Decoding Speed
Will be submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Low-Density Parity-Check (LDPC) codes received much attention recently due to their capacity-approaching performance. The iterative message-passing algorithm is a widely adopted decoding algorithm for LDPC codes \cite{Kschischang01}. An important design issue for LDPC codes is designing codes with fast decoding speed while maintaining capacity-approaching performance. In another words, it is desirable that the code can be successfully decoded in few number of decoding iterations, at the same time, achieves a significant portion of the channel capacity. Despite of its importance, this design issue received little attention so far. In this paper, we address this design issue for the case of binary erasure channel. We prove that density-efficient capacity-approaching LDPC codes satisfy a so called "flatness condition". We show an asymptotic approximation to the number of decoding iterations. Based on these facts, we propose an approximated optimization approach to finding the codes with good decoding speed. We further show that the optimal codes in the sense of decoding speed are "right-concentrated". That is, the degrees of check nodes concentrate around the average right degree.
[ { "version": "v1", "created": "Thu, 23 Feb 2006 20:14:12 GMT" } ]
2009-08-27T00:00:00
[ [ "Ma", "Xudong", "" ], [ "Yang", "En-hui", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0602082
Richard McClatchey
Zaheer Abbas Khan, Mohammed Odeh, Richard McClatchey
Digital Libraries: From Process Modelling to Grid-based Service Oriented Architecture
6 pages, 5 figures, 1 table. The 2nd international conference on Information and Communication Technologies from Theory to Application (ICTTA06
null
null
null
cs.DL cs.SE
null
Graphical Business Process Modelling Languages (BPML) like Role Activity Diagrams (RAD) provide ease and flexibility for modelling business behaviour. However, these languages show limited applicability in terms of enactment over distributed systems paradigms like Service Oriented Architecture (SOA) based grid computing. This paper investigates RAD modelling of a Scientific Publishing Process (SPP) for Digital Libraries (DL) and tries to determine the suitability of Pi-Calculus based formal approaches to enact SOA based grid computing. In order to achieve this purpose, the Pi-Calculus based formal transformation from a RAD model of SPP for DL draws attention towards a number of challenging issues including issues that require particular design considerations for appropriate enactment in a SOA based grid system.
[ { "version": "v1", "created": "Thu, 23 Feb 2006 23:12:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Khan", "Zaheer Abbas", "" ], [ "Odeh", "Mohammed", "" ], [ "McClatchey", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0602083
Marco Frailis
Marco Frailis, Oriana Mansutti, Praveen Boinee, Giuseppe Cabras, Alessandro De Angelis, Barbara De Lotto, Alberto Forti, Mauro Dell'Orso, Riccardo Paoletti, Angelo Scribano, Nicola Turini, Mose' Mariotti, Luigi Peruzzo, Antonio Saggion
A third level trigger programmable on FPGA for the gamma/hadron separation in a Cherenkov telescope using pseudo-Zernike moments and the SVM classifier
null
null
10.1142/9789812773548_0024
null
cs.CV cs.AI
null
We studied the application of the Pseudo-Zernike features as image parameters (instead of the Hillas parameters) for the discrimination between the images produced by atmospheric electromagnetic showers caused by gamma-rays and the ones produced by atmospheric electromagnetic showers caused by hadrons in the MAGIC Experiment. We used a Support Vector Machine as classification algorithm with the computed Pseudo-Zernike features as classification parameters. We implemented on a FPGA board a kernel function of the SVM and the Pseudo-Zernike features to build a third level trigger for the gamma-hadron separation task of the MAGIC Experiment.
[ { "version": "v1", "created": "Fri, 24 Feb 2006 17:29:08 GMT" } ]
2017-08-23T00:00:00
[ [ "Frailis", "Marco", "" ], [ "Mansutti", "Oriana", "" ], [ "Boinee", "Praveen", "" ], [ "Cabras", "Giuseppe", "" ], [ "De Angelis", "Alessandro", "" ], [ "De Lotto", "Barbara", "" ], [ "Forti", "Alberto", "" ], [ "Dell'Orso", "Mauro", "" ], [ "Paoletti", "Riccardo", "" ], [ "Scribano", "Angelo", "" ], [ "Turini", "Nicola", "" ], [ "Mariotti", "Mose'", "" ], [ "Peruzzo", "Luigi", "" ], [ "Saggion", "Antonio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]