id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0601119
|
Richard McClatchey
|
Haya El-Ghalayini, Mohammed Odeh, & Richard McClatchey
|
Engineering Conceptual Data Models from Domain Ontologies: A Critical
Evaluation
|
12 pages, 3 figures, presented at the 4th International Conference on
Computer Science and Information Technology (CSIT'06). Amman Jordan April
2006
| null | null | null |
cs.SE
| null |
This paper studies the differences and similarities between domain ontologies
and conceptual data models and the role that ontologies can play in
establishing conceptual data models during the process of information systems
development. A mapping algorithm has been proposed and embedded in a special
purpose Transformation Engine to generate a conceptual data model from a given
domain ontology. Both quantitative and qualitative methods have been adopted to
critically evaluate this new approach. In addition, this paper focuses on
evaluating the quality of the generated conceptual data model elements using
Bunge-Wand-Weber and OntoClean ontologies. The results of this evaluation
indicate that the generated conceptual data model provides a high degree of
accuracy in identifying the substantial domain entities along with their
attributes and relationships being derived from the consensual semantics of
domain knowledge. The results are encouraging and support the potential role
that this approach can take part in process of information system development.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2006 17:40:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0601120
|
Jacob Binia
|
Jacob Binia
|
On The Minimum Mean-Square Estimation Error of the Normalized Sum of
Independent Narrowband Waves in the Gaussian Channel
|
3 pages, Submitted to IEEE Symposium on Information Theory ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
The minimum mean-square error of the estimation of a signal where observed
from the additive white Gaussian noise (WGN) channel's output, is analyzed. It
is assumed that the channel input's signal is composed of a (normalized) sum of
N narrowband, mutually independent waves. It is shown that if N goes to
infinity, then for any fixed signal energy to noise energy ratio (no mater how
big) both the causal minimum mean-square error CMMSE and the non-causal minimum
mean-square error MMSE converge to the signal energy at a rate which is
proportional to 1/N.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2006 18:53:24 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Binia",
"Jacob",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0601121
|
Marko Antonio Rodriguez
|
Marko A. Rodriguez
|
A Multi-Relational Network to Support the Scholarly Communication
Process
|
keywords: digital libraries and scholarly communication
|
International Journal of Public Information Systems, volume 2007,
issue 1, pp. 13-29
| null |
LA-UR-06-2416
|
cs.DL cs.AI cs.IR
| null |
The general pupose of the scholarly communication process is to support the
creation and dissemination of ideas within the scientific community. At a finer
granularity, there exists multiple stages which, when confronted by a member of
the community, have different requirements and therefore different solutions.
In order to take a researcher's idea from an initial inspiration to a community
resource, the scholarly communication infrastructure may be required to 1)
provide a scientist initial seed ideas; 2) form a team of well suited
collaborators; 3) located the most appropriate venue to publish the formalized
idea; 4) determine the most appropriate peers to review the manuscript; and 5)
disseminate the end product to the most interested members of the community.
Through the various delinieations of this process, the requirements of each
stage are tied soley to the multi-functional resources of the community: its
researchers, its journals, and its manuscritps. It is within the collection of
these resources and their inherent relationships that the solutions to
scholarly communication are to be found. This paper describes an associative
network composed of multiple scholarly artifacts that can be used as a medium
for supporting the scholarly communication process.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2006 22:45:42 GMT"
},
{
"version": "v2",
"created": "Mon, 21 May 2007 13:35:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rodriguez",
"Marko A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0601122
|
Robert Brijder
|
Robert Brijder, Hendrik Jan Hoogeboom, Grzegorz Rozenberg
|
Reducibility of Gene Patterns in Ciliates using the Breakpoint Graph
|
30 pages, 13 figures
|
Theoretical Computer Science, v. 356, 26-45, 2006
|
10.1016/j.tcs.2006.01.041
| null |
cs.LO q-bio.GN
| null |
Gene assembly in ciliates is one of the most involved DNA processings going
on in any organism. This process transforms one nucleus (the micronucleus) into
another functionally different nucleus (the macronucleus). We continue the
development of the theoretical models of gene assembly, and in particular we
demonstrate the use of the concept of the breakpoint graph, known from another
branch of DNA transformation research. More specifically: (1) we characterize
the intermediate gene patterns that can occur during the transformation of a
given micronuclear gene pattern to its macronuclear form; (2) we determine the
number of applications of the loop recombination operation (the most basic of
the three molecular operations that accomplish gene assembly) needed in this
transformation; (3) we generalize previous results (and give elegant
alternatives for some proofs) concerning characterizations of the micronuclear
gene patterns that can be assembled using a specific subset of the three
molecular operations.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 20:20:36 GMT"
}
] | 2014-03-26T00:00:00 |
[
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
],
[
"Rozenberg",
"Grzegorz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
}
] |
cs/0601123
|
Martin Wainwright
|
Emin Martinian, Martin J. Wainwright
|
Low density codes achieve the rate-distortion bound
|
To be published in Proceedings of the Data Compression Conference;
Snowbird, Utah, March 2006; 10 pages total
| null | null | null |
cs.IT math.IT
| null |
We propose a new construction for low-density source codes with multiple
parameters that can be tuned to optimize the performance of the code. In
addition, we introduce a set of analysis techniques for deriving upper bounds
for the expected distortion of our construction, as well as more general
low-density constructions. We show that (with an optimal encoding algorithm)
our codes achieve the rate-distortion bound for a binary symmetric source and
Hamming distortion. Our methods also provide rigorous upper bounds on the
minimum distortion achievable by previously proposed low-density constructions.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 02:33:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Martinian",
"Emin",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0601124
|
Onur Kaya
|
Onur Kaya and Sennur Ulukus
|
Power Control for User Cooperation
|
Submitted to IEEE Transactions on Wireless Communications, October
2005
| null | null | null |
cs.IT math.IT
| null |
For a fading Gaussian multiple access channel with user cooperation, we
obtain the optimal power allocation policies that maximize the rates achievable
by block Markov superposition coding. The optimal policies result in a coding
scheme that is simpler than the one for a general multiple access channel with
generalized feedback. This simpler coding scheme also leads to the possibility
of formulating an otherwise non-concave optimization problem as a concave one.
Using the channel state information at the transmitters to adapt the powers, we
demonstrate significant gains over the achievable rates for existing
cooperative systems.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 12:21:25 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kaya",
"Onur",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0601125
|
Carl Lagoze
|
Carl Lagoze, Dean Krafft, Tim Cornwell, Naomi Dushay, Dean Eckstrom,
and John Saylor
|
Metadata aggregation and "automated digital libraries": A retrospective
on the NSDL experience
|
Submission to JCDL 2006
| null | null | null |
cs.DL
| null |
Over three years ago, the Core Integration team of the National Science
Digital Library (NSDL) implemented a digital library based on metadata
aggregation using Dublin Core and OAI-PMH. The initial expectation was that
such low-barrier technologies would be relatively easy to automate and
administer. While this architectural choice permitted rapid deployment of a
production NSDL, our three years of experience have contradicted our original
expectations of easy automation and low people cost. We have learned that
alleged "low-barrier" standards are often harder to deploy than expected. In
this paper we report on this experience and comment on the general cost, the
functionality, and the ultimate effectiveness of this architecture.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 12:26:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Dushay",
"Naomi",
""
],
[
"Eckstrom",
"Dean",
""
],
[
"Saylor",
"John",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0601126
|
Karunakaran Murali Krishnan
|
K. Murali Krishnan, Priti Shankar
|
Approximate Linear Time ML Decoding on Tail-Biting Trellises in Two
Rounds
| null |
Proc. ISIT 2006, pp.2245-2249
| null | null |
cs.IT math.IT
| null |
A linear time approximate maximum likelihood decoding algorithm on
tail-biting trellises is prsented, that requires exactly two rounds on the
trellis. This is an adaptation of an algorithm proposed earlier with the
advantage that it reduces the time complexity from O(mlogm) to O(m) where m is
the number of nodes in the tail-biting trellis. A necessary condition for the
output of the algorithm to differ from the output of the ideal ML decoder is
reduced and simulation results on an AWGN channel using tail-biting rrellises
for two rate 1/2 convoluational codes with memory 4 and 6 respectively are
reported
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 13:47:54 GMT"
}
] | 2008-02-07T00:00:00 |
[
[
"Krishnan",
"K. Murali",
""
],
[
"Shankar",
"Priti",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0601127
|
Manor Mendel
|
Amos Fiat, Manor Mendel
|
Truly Online Paging with Locality of Reference
|
37 pages. Preliminary version appeared in FOCS '97
|
38th Annual Symposium on Foundations of Computer Science (FOCS
'97), 1997, pp. 326
|
10.1109/SFCS.1997.646121
| null |
cs.DS
| null |
The competitive analysis fails to model locality of reference in the online
paging problem. To deal with it, Borodin et. al. introduced the access graph
model, which attempts to capture the locality of reference. However, the access
graph model has a number of troubling aspects. The access graph has to be known
in advance to the paging algorithm and the memory required to represent the
access graph itself may be very large.
In this paper we present truly online strongly competitive paging algorithms
in the access graph model that do not have any prior information on the access
sequence. We present both deterministic and randomized algorithms. The
algorithms need only O(k log n) bits of memory, where k is the number of page
slots available and n is the size of the virtual address space. I.e.,
asymptotically no more memory than needed to store the virtual address
translation table.
We also observe that our algorithms adapt themselves to temporal changes in
the locality of reference. We model temporal changes in the locality of
reference by extending the access graph model to the so called extended access
graph model, in which many vertices of the graph can correspond to the same
virtual page. We define a measure for the rate of change in the locality of
reference in G denoted by Delta(G). We then show our algorithms remain strongly
competitive as long as Delta(G) >= (1+ epsilon)k, and no truly online algorithm
can be strongly competitive on a class of extended access graphs that includes
all graphs G with Delta(G) >= k- o(k).
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 20:58:23 GMT"
}
] | 2009-03-23T00:00:00 |
[
[
"Fiat",
"Amos",
""
],
[
"Mendel",
"Manor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0601128
|
Pierre Dehornoy
|
Pierre Dehornoy (DMA)
|
On the 3-distortion of a path
| null |
European Journal of Combinatorics (2008)
http://www.elsevier.com/wps/find/journaldescription.cws_home/622824/description#description
|
10.1016/j.ejc.2006.11.002
| null |
cs.CG
| null |
We prove that, when a path of length n is embedded in R^2, the 3-distortion
is an Omega(n^{1/2}), and that, when embedded in R^d, the 3-distortion is an
O(n^{1/d-1}).
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 20:58:48 GMT"
},
{
"version": "v2",
"created": "Sun, 18 May 2008 18:12:45 GMT"
}
] | 2008-05-19T00:00:00 |
[
[
"Dehornoy",
"Pierre",
"",
"DMA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0601129
|
Abhilash Ponnath
|
Abhilash Ponnath
|
Instantaneously Trained Neural Networks
|
13 pages
| null | null | null |
cs.NE cs.AI
| null |
This paper presents a review of instantaneously trained neural networks
(ITNNs). These networks trade learning time for size and, in the basic model, a
new hidden node is created for each training sample. Various versions of the
corner-classification family of ITNNs, which have found applications in
artificial intelligence (AI), are described. Implementation issues are also
considered.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2006 22:02:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ponnath",
"Abhilash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0601130
|
Alexandros Dimakis
|
A. G. Dimakis, D. Petrovic, K. Ramchandran
|
From Dumb Wireless Sensors to Smart Networks using Network Coding
|
To be presented at the Inaugural Workshop of the Center for
Information Theory and Its Applications, University of California - San
Diego, La Jolla, CA, February 6 - 10, 2006
| null | null | null |
cs.IT cs.NI math.IT
| null |
The vision of wireless sensor networks is one of a smart collection of tiny,
dumb devices. These motes may be individually cheap, unintelligent, imprecise,
and unreliable. Yet they are able to derive strength from numbers, rendering
the whole to be strong, reliable and robust. Our approach is to adopt a
distributed and randomized mindset and rely on in network processing and
network coding. Our general abstraction is that nodes should act only locally
and independently, and the desired global behavior should arise as a collective
property of the network. We summarize our work and present how these ideas can
be applied for communication and storage in sensor networks.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 02:15:14 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dimakis",
"A. G.",
""
],
[
"Petrovic",
"D.",
""
],
[
"Ramchandran",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0601131
|
Joel Predd
|
Joel B. Predd, Sanjeev R. Kulkarni, Daniel N. Osherson, and H. Vincent
Poor
|
Scalable Algorithms for Aggregating Disparate Forecasts of Probability
|
To be presented at the Ninth International Conference on Information
Fusion, Florence, Italy, July 10-13, 2006
| null | null | null |
cs.AI cs.DC cs.IT math.IT
| null |
In this paper, computational aspects of the panel aggregation problem are
addressed. Motivated primarily by applications of risk assessment, an algorithm
is developed for aggregating large corpora of internally incoherent probability
assessments. The algorithm is characterized by a provable performance
guarantee, and is demonstrated to be orders of magnitude faster than existing
tools when tested on several real-world data-sets. In addition, unexpected
connections between research in risk assessment and wireless sensor networks
are exposed, as several key ideas are illustrated to be useful in both fields.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 03:01:35 GMT"
},
{
"version": "v2",
"created": "Mon, 1 May 2006 19:52:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Predd",
"Joel B.",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Osherson",
"Daniel N.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0601132
|
Reza Rastegar
|
R. Rastegar, M. R. Meybodi
|
A Study on the Global Convergence Time Complexity of Estimation of
Distribution Algorithms
|
Old paper with potential mistake
| null | null | null |
cs.AI cs.NE
| null |
The Estimation of Distribution Algorithm is a new class of population based
search methods in that a probabilistic model of individuals is estimated based
on the high quality individuals and used to generate the new individuals. In
this paper we compute 1) some upper bounds on the number of iterations required
for global convergence of EDA 2) the exact number of iterations needed for EDA
to converge to global optima.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 07:10:45 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Mar 2019 14:25:56 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Apr 2019 10:03:57 GMT"
}
] | 2019-04-03T00:00:00 |
[
[
"Rastegar",
"R.",
""
],
[
"Meybodi",
"M. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0601133
|
Jean-Guillaume Dumas
|
Jean-Guillaume Dumas (LJK), Pascal Giorgi (LIRMM), Cl\'ement Pernet
(INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble)
|
Dense Linear Algebra over Finite Fields: the FFLAS and FFPACK packages
| null |
ACM Transactions on Mathematical Software 35, 3 (2009) article 19
| null | null |
cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the past two decades, some major efforts have been made to reduce exact
(e.g. integer, rational, polynomial) linear algebra problems to matrix
multiplication in order to provide algorithms with optimal asymptotic
complexity. To provide efficient implementations of such algorithms one need to
be careful with the underlying arithmetic. It is well known that modular
techniques such as the Chinese remainder algorithm or the p-adic lifting allow
very good practical performance, especially when word size arithmetic are used.
Therefore, finite field arithmetic becomes an important core for efficient
exact linear algebra libraries. In this paper, we study high performance
implementations of basic linear algebra routines over word size prime fields:
specially the matrix multiplication; our goal being to provide an exact
alternate to the numerical BLAS library. We show that this is made possible by
a carefull combination of numerical computations and asymptotically faster
algorithms. Our kernel has several symbolic linear algebra applications enabled
by diverse matrix multiplication reductions: symbolic triangularization, system
solving, determinant and matrix inverse implementations are thus studied.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 09:54:41 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Dec 2007 10:03:32 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Jan 2009 16:30:28 GMT"
}
] | 2009-01-14T00:00:00 |
[
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Giorgi",
"Pascal",
"",
"LIRMM"
],
[
"Pernet",
"Clément",
"",
"INRIA Rhône-Alpes / LIG Laboratoire d'Informatique de Grenoble"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0601134
|
Jeremy Avigad
|
Jeremy Avigad and Harvey Friedman
|
Combining decision procedures for the reals
|
Will appear in Logical Methods in Computer Science
|
Logical Methods in Computer Science, Volume 2, Issue 4 (October
18, 2006) lmcs:2240
|
10.2168/LMCS-2(4:4)2006
| null |
cs.LO
| null |
<p>We address the general problem of determining the validity of boolean
combinations of equalities and inequalities between real-valued expressions. In
particular, we consider methods of establishing such assertions using only
restricted forms of distributivity. At the same time, we explore ways in which
"local" decision or heuristic procedures for fragments of the theory of the
reals can be amalgamated into global ones. </p> <p>Let <em>Tadd[Q]</em> be the
first-order theory of the real numbers in the language of ordered groups, with
negation, a constant <em>1</em>, and function symbols for multiplication by
rational constants. Let <em>Tmult[Q]</em> be the analogous theory for the
multiplicative structure, and let <em>T[Q]</em> be the union of the two. We
show that although <em>T[Q]</em> is undecidable, the universal fragment of
<em>T[Q]</em> is decidable. We also show that terms of <em>T[Q]</em>can
fruitfully be put in a normal form. We prove analogous results for theories in
which <em>Q</em> is replaced, more generally, by suitable subfields <em>F</em>
of the reals. Finally, we consider practical methods of establishing
quantifier-free validities that approximate our (impractical) decidability
results.</p>
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 14:48:05 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Feb 2006 14:39:44 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Sep 2006 13:58:53 GMT"
},
{
"version": "v4",
"created": "Wed, 18 Oct 2006 09:49:37 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Avigad",
"Jeremy",
""
],
[
"Friedman",
"Harvey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0601135
|
Robert Brijder
|
Robert Brijder, Hendrik Jan Hoogeboom, Michael Muskulus
|
Strategies of Loop Recombination in Ciliates
|
22 pages, 14 figures
|
Discrete Applied Mathematics, v. 156, 1736-1753, 2008
|
10.1016/j.dam.2007.08.032
|
LIACS Technical Report 2006-01
|
cs.LO q-bio.GN
| null |
Gene assembly in ciliates is an extremely involved DNA transformation
process, which transforms a nucleus, the micronucleus, to another functionally
different nucleus, the macronucleus. In this paper we characterize which loop
recombination operations (one of the three types of molecular operations that
accomplish gene assembly) can possibly be applied in the transformation of a
given gene from its micronuclear form to its macronuclear form. We also
characterize in which order these loop recombination operations are applicable.
This is done in the abstract and more general setting of so-called legal
strings.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 17:43:36 GMT"
}
] | 2014-03-26T00:00:00 |
[
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
],
[
"Muskulus",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
}
] |
cs/0602001
|
Lane A. Hemaspaandra
|
Lane A. Hemaspaandra and Mayur Thakur
|
Query-Monotonic Turing Reductions
| null | null | null |
URCS-TR-818
|
cs.CC
| null |
We study reductions that limit the extreme adaptivity of Turing reductions.
In particular, we study reductions that make a rapid, structured progression
through the set to which they are reducing: Each query is strictly longer
(shorter) than the previous one. We call these reductions query-increasing
(query-decreasing) Turing reductions. We also study query-nonincreasing
(query-nondecreasing) Turing reductions. These are Turing reductions in which
the sequence of query lengths is nonincreasing (nondecreasing). We ask whether
these restrictions in fact limit the power of reductions. We prove that
query-increasing and query-decreasing Turing reductions are incomparable with
(that is, are neither strictly stronger than nor strictly weaker than)
truth-table reductions and are strictly weaker than Turing reductions. In
addition, we prove that query-nonincreasing and query-nondecreasing Turing
reductions are strictly stronger than truth-table reductions and strictly
weaker than Turing reductions. Despite the fact that we prove query-increasing
and query-decreasing Turing reductions to in the general case be strictly
weaker than Turing reductions, we identify a broad class of sets A for which
any set that Turing reduces to A will also reduce to A via both
query-increasing and query-decreasing Turing reductions. In particular, this
holds for all tight paddable sets, where a set is said to be tight paddable
exactly if it is paddable via a function whose output length is bounded tightly
both from above and from below in the length of the input. We prove that many
natural NP-complete problems such as satisfiability, clique, and vertex cover
are tight paddable.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 22:02:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Thakur",
"Mayur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0602002
|
Marko Antonio Rodriguez
|
Marko A. Rodriguez and Johan Bollen
|
Simulating Network Influence Algorithms Using Particle-Swarms: PageRank
and PageRank-Priors
|
17 pages, currently in peer-review
| null | null | null |
cs.DS
| null |
A particle-swarm is a set of indivisible processing elements that traverse a
network in order to perform a distributed function. This paper will describe a
particular implementation of a particle-swarm that can simulate the behavior of
the popular PageRank algorithm in both its {\it global-rank} and {\it
relative-rank} incarnations. PageRank is compared against the particle-swarm
method on artificially generated scale-free networks of 1,000 nodes constructed
using a common gamma value, $\gamma = 2.5$. The running time of the
particle-swarm algorithm is $O(|P|+|P|t)$ where $|P|$ is the size of the
particle population and $t$ is the number of particle propagation iterations.
The particle-swarm method is shown to be useful due to its ease of extension
and running time.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 23:24:42 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Rodriguez",
"Marko A.",
""
],
[
"Bollen",
"Johan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0602003
|
Subhash Kak
|
Navneet Mandhani and Subhash Kak
|
Watermarking Using Decimal Sequences
|
8 pages, 9 figures
|
Cryptologia, vol. 29, pp. 50-58, 2005
| null | null |
cs.CR
| null |
This paper introduces the use of decimal sequences in a code division
multiple access (CDMA) based watermarking system to hide information for
authentication in black and white images. Matlab version 6.5 was used to
implement the algorithms discussed in this paper. The advantage of using
d-sequences over PN sequences is that one can choose from a variety of prime
numbers which provides a more flexible system.
|
[
{
"version": "v1",
"created": "Thu, 2 Feb 2006 19:43:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mandhani",
"Navneet",
""
],
[
"Kak",
"Subhash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0602004
|
Christoph Koch
|
Georg Gottlob, Christoph Koch, Klaus U. Schulz
|
Conjunctive Queries over Trees
|
36 pages, 12 figures, 2 tables, long version of PODS 2004 papers. To
appear in Journal of the ACM 53(2), March 2006
| null | null | null |
cs.DB cs.AI cs.CC cs.LO
| null |
We study the complexity and expressive power of conjunctive queries over
unranked labeled trees represented using a variety of structure relations such
as ``child'', ``descendant'', and ``following'' as well as unary relations for
node labels. We establish a framework for characterizing structures
representing trees for which conjunctive queries can be evaluated efficiently.
Then we completely chart the tractability frontier of the problem and establish
a dichotomy theorem for our axis relations, i.e., we find all subset-maximal
sets of axes for which query evaluation is in polynomial time and show that for
all other cases, query evaluation is NP-complete. All polynomial-time results
are obtained immediately using the proof techniques from our framework.
Finally, we study the expressiveness of conjunctive queries over trees and show
that for each conjunctive query, there is an equivalent acyclic positive query
(i.e., a set of acyclic conjunctive queries), but that in general this query is
not of polynomial size.
|
[
{
"version": "v1",
"created": "Thu, 2 Feb 2006 23:28:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gottlob",
"Georg",
""
],
[
"Koch",
"Christoph",
""
],
[
"Schulz",
"Klaus U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0602005
|
Marc Daumas
|
Francisco Ch\'aves (LIP), Marc Daumas (LIRMM, LP2A)
|
A library of Taylor models for PVS automatic proof checker
| null | null | null | null |
cs.MS
| null |
We present in this paper a library to compute with Taylor models, a technique
extending interval arithmetic to reduce decorrelation and to solve differential
equations. Numerical software usually produces only numerical results. Our
library can be used to produce both results and proofs. As seen during the
development of Fermat's last theorem reported by Aczel 1996, providing a proof
is not sufficient. Our library provides a proof that has been thoroughly
scrutinized by a trustworthy and tireless assistant. PVS is an automatic proof
assistant that has been fairly developed and used and that has no internal
connection with interval arithmetic or Taylor models. We built our library so
that PVS validates each result as it is produced. As producing and validating a
proof, is and will certainly remain a bigger task than just producing a
numerical result our library will never be a replacement to imperative
implementations of Taylor models such as Cosy Infinity. Our library should
mainly be used to validate small to medium size results that are involved in
safety or life critical applications.
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2006 18:29:52 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Cháves",
"Francisco",
"",
"LIP"
],
[
"Daumas",
"Marc",
"",
"LIRMM, LP2A"
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0602006
|
Christoph Koch
|
Christoph Koch
|
A Visual Query Language for Complex-Value Databases
|
12 pages, 6 figures, 1 table
| null | null | null |
cs.DB cs.HC
| null |
In this paper, a visual language, VCP, for queries on complex-value databases
is proposed. The main strength of the new language is that it is purely visual:
(i) It has no notion of variable, quantification, partiality, join, pattern
matching, regular expression, recursion, or any other construct proper to
logical, functional, or other database query languages and (ii) has a very
natural, strong, and intuitive design metaphor. The main operation is that of
copying and pasting in a schema tree.
We show that despite its simplicity, VCP precisely captures complex-value
algebra without powerset, or equivalently, monad algebra with union and
difference. Thus, its expressive power is precisely that of the language that
is usually considered to play the role of relational algebra for complex-value
databases.
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2006 19:22:28 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Koch",
"Christoph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0602007
|
Adam D. Smith
|
Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
|
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other
Noisy Data
|
47 pp., 3 figures. Prelim. version in Eurocrypt 2004, Springer LNCS
3027, pp. 523-540. Differences from version 3: minor edits for grammar,
clarity, and typos
|
SIAM Journal on Computing, 38(1):97-139, 2008
|
10.1137/060651380
| null |
cs.CR cs.IT math.IT
| null |
We provide formal definitions and efficient secure techniques for
- turning noisy information into keys usable for any cryptographic
application, and, in particular,
- reliably and securely authenticating biometric data.
Our techniques apply not just to biometric information, but to any keying
material that, unlike traditional cryptographic keys, is (1) not reproducible
precisely and (2) not distributed uniformly. We propose two primitives: a
"fuzzy extractor" reliably extracts nearly uniform randomness R from its input;
the extraction is error-tolerant in the sense that R will be the same even if
the input changes, as long as it remains reasonably close to the original.
Thus, R can be used as a key in a cryptographic application. A "secure sketch"
produces public information about its input w that does not reveal w, and yet
allows exact recovery of w given another value that is close to w. Thus, it can
be used to reliably reproduce error-prone biometric inputs without incurring
the security risk inherent in storing them.
We define the primitives to be both formally secure and versatile,
generalizing much prior work. In addition, we provide nearly optimal
constructions of both primitives for various measures of ``closeness'' of input
data, such as Hamming distance, edit distance, and set difference.
|
[
{
"version": "v1",
"created": "Sat, 4 Feb 2006 18:13:35 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2006 18:10:15 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Sep 2007 21:43:52 GMT"
},
{
"version": "v4",
"created": "Tue, 1 Apr 2008 17:50:49 GMT"
}
] | 2008-04-01T00:00:00 |
[
[
"Dodis",
"Yevgeniy",
""
],
[
"Ostrovsky",
"Rafail",
""
],
[
"Reyzin",
"Leonid",
""
],
[
"Smith",
"Adam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602008
|
Julio Mari\~no
|
Julio Marino, Angel Herranz and Juan Jose Moreno-Navarro
|
Demand Analysis with Partial Predicates
|
This is the extended version of a paper accepted for publication in a
forthcoming special issue of Theory and Practice of Logic Programming on
Multiparadigm and Constraint Programming (Falaschi and Maher, eds.)
Appendices are missing in the printed version
| null | null | null |
cs.PL cs.SC
| null |
In order to alleviate the inefficiencies caused by the interaction of the
logic and functional sides, integrated languages may take advantage of
\emph{demand} information -- i.e. knowing in advance which computations are
needed and, to which extent, in a particular context. This work studies
\emph{demand analysis} -- which is closely related to \emph{backwards
strictness analysis} -- in a semantic framework of \emph{partial predicates},
which in turn are constructive realizations of ideals in a domain. This will
allow us to give a concise, unified presentation of demand analysis, to relate
it to other analyses based on abstract interpretation or strictness logics,
some hints for the implementation, and, more important, to prove the soundness
of our analysis based on \emph{demand equations}. There are also some
innovative results. One of them is that a set constraint-based analysis has
been derived in a stepwise manner using ideas taken from the area of program
transformation. The other one is the possibility of using program
transformation itself to perform the analysis, specially in those domains of
properties where algorithms based on constraint solving are too weak.
|
[
{
"version": "v1",
"created": "Sat, 4 Feb 2006 20:22:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Marino",
"Julio",
""
],
[
"Herranz",
"Angel",
""
],
[
"Moreno-Navarro",
"Juan Jose",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0602009
|
Endre Cs\'oka
|
Endre Cs\'oka
|
Efficient Teamwork
|
51 pages. It contains some colored figures on the first few pages,
but these are readable in black and white
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our goal is to solve both problems of adverse selection and moral hazard for
multi-agent projects. In our model, each selected agent can work according to
his private "capability tree". This means a process involving hidden actions,
hidden chance events and hidden costs in a dynamic manner, and providing
contractible consequences which are affecting each other's working process and
the outcome of the project. We will construct a mechanism that induces truthful
revelation of the agents' capability trees and chance events and to follow the
instructions about their hidden decisions. This enables the planner to select
the optimal subset of agents and obtain the efficient joint execution. We will
construct another mechanism that is collusion-resistant but implements an only
approximately efficient outcome. The latter mechanism is widely applicable, and
the major application details will be elaborated.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 19:25:54 GMT"
},
{
"version": "v10",
"created": "Sat, 29 Apr 2006 21:20:46 GMT"
},
{
"version": "v100",
"created": "Mon, 8 Feb 2016 15:56:25 GMT"
},
{
"version": "v101",
"created": "Thu, 14 Apr 2016 07:41:36 GMT"
},
{
"version": "v102",
"created": "Mon, 9 Jan 2017 17:23:44 GMT"
},
{
"version": "v103",
"created": "Wed, 10 Jan 2018 16:53:03 GMT"
},
{
"version": "v11",
"created": "Sat, 10 Jun 2006 10:46:08 GMT"
},
{
"version": "v12",
"created": "Wed, 14 Jun 2006 13:15:56 GMT"
},
{
"version": "v13",
"created": "Fri, 16 Jun 2006 23:59:22 GMT"
},
{
"version": "v14",
"created": "Tue, 20 Jun 2006 19:32:43 GMT"
},
{
"version": "v15",
"created": "Thu, 22 Jun 2006 19:21:49 GMT"
},
{
"version": "v16",
"created": "Tue, 11 Jul 2006 09:23:46 GMT"
},
{
"version": "v17",
"created": "Wed, 12 Jul 2006 14:09:26 GMT"
},
{
"version": "v18",
"created": "Sat, 15 Jul 2006 19:11:20 GMT"
},
{
"version": "v19",
"created": "Thu, 3 Aug 2006 19:47:18 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Feb 2006 20:56:15 GMT"
},
{
"version": "v20",
"created": "Fri, 4 Aug 2006 21:55:34 GMT"
},
{
"version": "v21",
"created": "Wed, 9 Aug 2006 23:43:04 GMT"
},
{
"version": "v22",
"created": "Wed, 30 Aug 2006 21:45:26 GMT"
},
{
"version": "v23",
"created": "Sat, 9 Sep 2006 15:54:42 GMT"
},
{
"version": "v24",
"created": "Wed, 20 Sep 2006 15:26:08 GMT"
},
{
"version": "v25",
"created": "Wed, 20 Sep 2006 22:19:54 GMT"
},
{
"version": "v26",
"created": "Sun, 24 Sep 2006 21:34:44 GMT"
},
{
"version": "v27",
"created": "Mon, 25 Sep 2006 21:37:29 GMT"
},
{
"version": "v28",
"created": "Wed, 27 Sep 2006 11:03:46 GMT"
},
{
"version": "v29",
"created": "Thu, 28 Sep 2006 19:38:37 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Feb 2006 20:55:09 GMT"
},
{
"version": "v30",
"created": "Sat, 30 Sep 2006 15:52:38 GMT"
},
{
"version": "v31",
"created": "Tue, 3 Oct 2006 18:19:48 GMT"
},
{
"version": "v32",
"created": "Thu, 5 Oct 2006 21:33:47 GMT"
},
{
"version": "v33",
"created": "Sun, 8 Oct 2006 20:40:44 GMT"
},
{
"version": "v34",
"created": "Tue, 10 Oct 2006 23:55:21 GMT"
},
{
"version": "v35",
"created": "Thu, 12 Oct 2006 01:07:50 GMT"
},
{
"version": "v36",
"created": "Sun, 15 Oct 2006 21:25:58 GMT"
},
{
"version": "v37",
"created": "Wed, 18 Oct 2006 10:57:56 GMT"
},
{
"version": "v38",
"created": "Tue, 24 Oct 2006 22:32:08 GMT"
},
{
"version": "v39",
"created": "Fri, 27 Oct 2006 22:20:55 GMT"
},
{
"version": "v4",
"created": "Tue, 14 Feb 2006 17:46:10 GMT"
},
{
"version": "v40",
"created": "Tue, 31 Oct 2006 20:29:05 GMT"
},
{
"version": "v41",
"created": "Wed, 1 Nov 2006 00:01:07 GMT"
},
{
"version": "v42",
"created": "Tue, 7 Nov 2006 20:31:09 GMT"
},
{
"version": "v43",
"created": "Wed, 8 Nov 2006 00:20:12 GMT"
},
{
"version": "v44",
"created": "Mon, 13 Nov 2006 00:55:18 GMT"
},
{
"version": "v45",
"created": "Wed, 3 Jan 2007 20:50:35 GMT"
},
{
"version": "v46",
"created": "Fri, 16 Feb 2007 08:20:34 GMT"
},
{
"version": "v47",
"created": "Tue, 20 Feb 2007 00:19:00 GMT"
},
{
"version": "v48",
"created": "Thu, 12 Apr 2007 21:35:54 GMT"
},
{
"version": "v49",
"created": "Wed, 18 Apr 2007 19:38:31 GMT"
},
{
"version": "v5",
"created": "Fri, 24 Feb 2006 02:08:27 GMT"
},
{
"version": "v50",
"created": "Thu, 19 Apr 2007 18:11:23 GMT"
},
{
"version": "v51",
"created": "Sun, 15 Jul 2007 22:20:10 GMT"
},
{
"version": "v52",
"created": "Tue, 17 Jul 2007 23:44:56 GMT"
},
{
"version": "v53",
"created": "Wed, 18 Jul 2007 23:29:31 GMT"
},
{
"version": "v54",
"created": "Mon, 23 Jul 2007 00:31:18 GMT"
},
{
"version": "v55",
"created": "Thu, 2 Aug 2007 20:47:04 GMT"
},
{
"version": "v56",
"created": "Fri, 10 Aug 2007 15:37:39 GMT"
},
{
"version": "v57",
"created": "Mon, 13 Aug 2007 16:29:04 GMT"
},
{
"version": "v58",
"created": "Wed, 15 Aug 2007 00:01:09 GMT"
},
{
"version": "v59",
"created": "Tue, 21 Aug 2007 21:12:23 GMT"
},
{
"version": "v6",
"created": "Mon, 27 Feb 2006 20:57:49 GMT"
},
{
"version": "v60",
"created": "Tue, 28 Aug 2007 23:47:47 GMT"
},
{
"version": "v61",
"created": "Wed, 29 Aug 2007 22:45:42 GMT"
},
{
"version": "v62",
"created": "Tue, 11 Sep 2007 21:47:44 GMT"
},
{
"version": "v63",
"created": "Sun, 30 Sep 2007 19:50:40 GMT"
},
{
"version": "v64",
"created": "Mon, 15 Oct 2007 00:38:26 GMT"
},
{
"version": "v65",
"created": "Wed, 31 Oct 2007 15:46:57 GMT"
},
{
"version": "v66",
"created": "Mon, 19 Nov 2007 01:11:17 GMT"
},
{
"version": "v67",
"created": "Tue, 20 Nov 2007 23:39:20 GMT"
},
{
"version": "v68",
"created": "Thu, 22 Nov 2007 10:19:39 GMT"
},
{
"version": "v69",
"created": "Sun, 25 Nov 2007 12:18:00 GMT"
},
{
"version": "v7",
"created": "Tue, 28 Feb 2006 20:43:46 GMT"
},
{
"version": "v70",
"created": "Thu, 29 Nov 2007 20:25:52 GMT"
},
{
"version": "v71",
"created": "Thu, 29 Nov 2007 23:49:34 GMT"
},
{
"version": "v72",
"created": "Tue, 15 Jan 2008 20:55:07 GMT"
},
{
"version": "v73",
"created": "Fri, 18 Jan 2008 20:59:47 GMT"
},
{
"version": "v74",
"created": "Tue, 22 Jan 2008 20:59:13 GMT"
},
{
"version": "v75",
"created": "Sat, 26 Jan 2008 20:56:52 GMT"
},
{
"version": "v76",
"created": "Wed, 30 Jan 2008 22:39:02 GMT"
},
{
"version": "v77",
"created": "Wed, 13 Feb 2008 08:46:28 GMT"
},
{
"version": "v78",
"created": "Tue, 18 Mar 2008 17:28:14 GMT"
},
{
"version": "v79",
"created": "Tue, 18 Mar 2008 20:48:42 GMT"
},
{
"version": "v8",
"created": "Tue, 21 Mar 2006 00:37:12 GMT"
},
{
"version": "v80",
"created": "Tue, 8 Apr 2008 19:57:57 GMT"
},
{
"version": "v81",
"created": "Tue, 15 Apr 2008 11:23:11 GMT"
},
{
"version": "v82",
"created": "Wed, 16 Apr 2008 22:46:53 GMT"
},
{
"version": "v83",
"created": "Tue, 29 Apr 2008 11:29:42 GMT"
},
{
"version": "v84",
"created": "Tue, 13 May 2008 19:11:53 GMT"
},
{
"version": "v85",
"created": "Mon, 9 Jun 2008 23:19:02 GMT"
},
{
"version": "v86",
"created": "Wed, 24 Sep 2008 12:38:05 GMT"
},
{
"version": "v87",
"created": "Thu, 25 Sep 2008 23:18:29 GMT"
},
{
"version": "v88",
"created": "Sun, 28 Sep 2008 14:34:31 GMT"
},
{
"version": "v89",
"created": "Mon, 6 Oct 2008 09:54:17 GMT"
},
{
"version": "v9",
"created": "Wed, 22 Mar 2006 18:54:34 GMT"
},
{
"version": "v90",
"created": "Sun, 19 Apr 2009 15:09:15 GMT"
},
{
"version": "v91",
"created": "Wed, 22 Apr 2009 05:43:24 GMT"
},
{
"version": "v92",
"created": "Wed, 13 May 2009 21:42:43 GMT"
},
{
"version": "v93",
"created": "Thu, 2 Jun 2011 22:00:45 GMT"
},
{
"version": "v94",
"created": "Sat, 8 Sep 2012 06:29:43 GMT"
},
{
"version": "v95",
"created": "Mon, 11 Feb 2013 03:11:58 GMT"
},
{
"version": "v96",
"created": "Mon, 24 Jun 2013 12:29:57 GMT"
},
{
"version": "v97",
"created": "Sat, 22 Feb 2014 14:34:58 GMT"
},
{
"version": "v98",
"created": "Fri, 5 Jun 2015 03:43:04 GMT"
},
{
"version": "v99",
"created": "Thu, 20 Aug 2015 00:00:42 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Csóka",
"Endre",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0602010
|
Robert Schweller
|
Ming-Yang Kao, Robert Schweller
|
Reducing Tile Complexity for Self-Assembly Through Temperature
Programming
|
A preliminary version of this paper appeared in Proceedings of the
17th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA 2006), Miami,
Florida, Jan. 2006
| null | null | null |
cs.CC
| null |
We consider the tile self-assembly model and how tile complexity can be
eliminated by permitting the temperature of the self-assembly system to be
adjusted throughout the assembly process. To do this, we propose novel
techniques for designing tile sets that permit an arbitrary length $m$ binary
number to be encoded into a sequence of $O(m)$ temperature changes such that
the tile set uniquely assembles a supertile that precisely encodes the
corresponding binary number. As an application, we show how this provides a
general tile set of size O(1) that is capable of uniquely assembling
essentially any $n\times n$ square, where the assembled square is determined by
a temperature sequence of length $O(\log n)$ that encodes a binary description
of $n$. This yields an important decrease in tile complexity from the required
$\Omega(\frac{\log n}{\log\log n})$ for almost all $n$ when the temperature of
the system is fixed. We further show that for almost all $n$, no tile system
can simultaneously achieve both $o(\log n)$ temperature complexity and
$o(\frac{\log n}{\log\log n})$ tile complexity, showing that both versions of
an optimal square building scheme have been discovered. This work suggests that
temperature change can constitute a natural, dynamic method for providing input
to self-assembly systems that is potentially superior to the current technique
of designing large tile sets with specific inputs hardwired into the tileset.
|
[
{
"version": "v1",
"created": "Sun, 5 Feb 2006 01:00:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kao",
"Ming-Yang",
""
],
[
"Schweller",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0602011
|
Giorgi Japaridze
|
Giorgi Japaridze
|
The intuitionistic fragment of computability logic at the propositional
level
| null |
Annals of Pure and Applied Logic 147 (2007), pp. 187-227
|
10.1016/j.apal.2007.05.001
| null |
cs.LO cs.AI math.LO
| null |
This paper presents a soundness and completeness proof for propositional
intuitionistic calculus with respect to the semantics of computability logic.
The latter interprets formulas as interactive computational problems,
formalized as games between a machine and its environment. Intuitionistic
implication is understood as algorithmic reduction in the weakest possible --
and hence most natural -- sense, disjunction and conjunction as
deterministic-choice combinations of problems (disjunction = machine's choice,
conjunction = environment's choice), and "absurd" as a computational problem of
universal strength. See http://www.cis.upenn.edu/~giorgi/cl.html for a
comprehensive online source on computability logic.
|
[
{
"version": "v1",
"created": "Sun, 5 Feb 2006 12:55:17 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Feb 2006 16:02:41 GMT"
}
] | 2011-04-15T00:00:00 |
[
[
"Japaridze",
"Giorgi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
cs/0602012
|
Vladimir Anashin
|
Vladimir Anashin
|
Wreath Products in Stream Cipher Design
|
18 pages, 2 figures. To be published in Proceedings of the Int'l
Conference `Mathematics and Secure Information Technologies' (Moscow, 2005).
The paper is mainly based on the preprint http://arxiv.org/abs/cs.CR/0401030,
yet contains some new results and no proofs
|
"Applied Algebraic Dynamics", volume 49 of de Gruyter Expositions
in Mathematics, 2009, 269-304
| null | null |
cs.CR
| null |
The paper develops a novel approach to stream cipher design: Both the state
update function and the output function of the corresponding pseudorandom
generators are compositions of arithmetic and bitwise logical operations, which
are standard instructions of modern microprocessors. Moreover, both the state
update function and the output function are being modified dynamically during
the encryption. Also, these compositions could be keyed, so the only
information available to an attacker is that these functions belong to some
exponentially large class.
The paper shows that under rather loose conditions the output sequence is
uniformly distributed, achieves maximum period length and has high linear
complexity and high $\ell$-error linear complexity. Ciphers of this kind are
flexible: One could choose a suitable combination of instructions to obtain due
performance without affecting the quality of the output sequence. Finally, some
evidence is given that a key recovery problem for (reasonably designed) stream
ciphers of this kind is intractable up to plausible conjectures.
|
[
{
"version": "v1",
"created": "Sun, 5 Feb 2006 13:45:19 GMT"
}
] | 2011-11-15T00:00:00 |
[
[
"Anashin",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0602013
|
David Pritchard
|
David Pritchard
|
An Optimal Distributed Edge-Biconnectivity Algorithm
|
Submitted to PODC 2006. Contains a pstricks figure
| null | null | null |
cs.DC
| null |
We describe a synchronous distributed algorithm which identifies the
edge-biconnected components of a connected network. It requires a leader, and
uses messages of size O(log |V|). The main idea is to preorder a BFS spanning
tree, and then to efficiently compute least common ancestors so as to mark
cycle edges. This algorithm takes O(Diam) time and uses O(|E|) messages.
Furthermore, we show that no correct singly-initiated edge-biconnectivity
algorithm can beat either bound on any graph by more than a constant factor. We
also describe a near-optimal local algorithm for edge-biconnectivity.
|
[
{
"version": "v1",
"created": "Sun, 5 Feb 2006 20:47:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pritchard",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0602014
|
Amir Leshem
|
Amir Laufer, Amir Leshem, Hagit Messer
|
Game theoretic aspects of distributed spectral coordination with
application to DSL networks
| null | null | null | null |
cs.IT math.IT
| null |
In this paper we use game theoretic techniques to study the value of
cooperation in distributed spectrum management problems. We show that the
celebrated iterative water-filling algorithm is subject to the prisoner's
dilemma and therefore can lead to severe degradation of the achievable rate
region in an interference channel environment. We also provide thorough
analysis of a simple two bands near-far situation where we are able to provide
closed form tight bounds on the rate region of both fixed margin iterative
water filling (FM-IWF) and dynamic frequency division multiplexing (DFDM)
methods. This is the only case where such analytic expressions are known and
all previous studies included only simulated results of the rate region. We
then propose an alternative algorithm that alleviates some of the drawbacks of
the IWF algorithm in near-far scenarios relevant to DSL access networks. We
also provide experimental analysis based on measured DSL channels of both
algorithms as well as the centralized optimum spectrum management.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 00:14:24 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Laufer",
"Amir",
""
],
[
"Leshem",
"Amir",
""
],
[
"Messer",
"Hagit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602015
|
Ahmad Khoshnevis
|
Ahmad Khoshnevis and Ashutosh Sabharwal
|
On the Asymptotic Performance of Multiple Antenna Channels with Fast
Channel Feedback
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
In this paper, we analyze the asymptotic performance of multiple antenna
channels where the transmitter has either perfect or finite bit channel state
information. Using the diversity-multiplexing tradeoff to characterize the
system performance, we demonstrate that channel feedback can fundamentally
change the system behavior. Even one-bit of information can increase the
diversity order of the system compared to the system with no transmitter
information. In addition, as the amount of channel information at the
transmitter increases, the diversity order for each multiplexing gain increases
and goes to infinity for perfect transmitter information. The major reason for
diversity order gain is a "location-dependent" temporal power control, which
adapts the power control strategy based on the average channel conditions of
the channel.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 07:29:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Khoshnevis",
"Ahmad",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602016
|
Christoph D\"urr
|
Christoph Durr and Mathilde Hurand
|
Finding total unimodularity in optimization problems solved by linear
programs
| null | null | null | null |
cs.DS cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A popular approach in combinatorial optimization is to model problems as
integer linear programs. Ideally, the relaxed linear program would have only
integer solutions, which happens for instance when the constraint matrix is
totally unimodular. Still, sometimes it is possible to build an integer
solution with the same cost from the fractional solution. Examples are two
scheduling problems and the single disk prefetching/caching problem. We show
that problems such as the three previously mentioned can be separated into two
subproblems: (1) finding an optimal feasible set of slots, and (2) assigning
the jobs or pages to the slots. It is straigthforward to show that the latter
can be solved greedily. We are able to solve the former with a totally
unimodular linear program, from which we obtain simple combinatorial algorithms
with improved worst case running time.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 09:09:03 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Jun 2006 13:58:41 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Apr 2009 06:25:26 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Durr",
"Christoph",
""
],
[
"Hurand",
"Mathilde",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0602017
|
Julio Ortiz
|
J. S. Espinoza Ortiz, Gilson A. Giraldi, E.A. de Souza Neto, Raul A.
Feij\'oo
|
Quasi-Linear Soft Tissue Models Revisited
|
11 pages, 8figures
| null | null | null |
cs.OH
| null |
Incompressibility, nonlinear deformation under stress and viscoelasticity are
the fingerprint of soft tissue mechanical behavior. In order to model soft
tissues appropriately, we must pursue to complete these requirements. In this
work we revisited different soft tissue quasi-linear model possibilities in
trying to achieve for this commitment.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 13:01:24 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Ortiz",
"J. S. Espinoza",
""
],
[
"Giraldi",
"Gilson A.",
""
],
[
"Neto",
"E. A. de Souza",
""
],
[
"Feijóo",
"Raul A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0602018
|
Jiyou Jia Dr.
|
Jiyou Jia, Shufen Hou, Weichao Chen
|
Improving the CSIEC Project and Adapting It to the English Teaching and
Learning in China
| null | null | null | null |
cs.CY cs.AI cs.CL cs.HC cs.MA
| null |
In this paper after short review of the CSIEC project initialized by us in
2003 we present the continuing development and improvement of the CSIEC project
in details, including the design of five new Microsoft agent characters
representing different virtual chatting partners and the limitation of
simulated dialogs in specific practical scenarios like graduate job application
interview, then briefly analyze the actual conditions and features of its
application field: web-based English education in China. Finally we introduce
our efforts to adapt this system to the requirements of English teaching and
learning in China and point out the work next to do.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 15:17:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jia",
"Jiyou",
""
],
[
"Hou",
"Shufen",
""
],
[
"Chen",
"Weichao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0602019
|
Nie Nie
|
Nie Nie and Cristina Comaniciu
|
Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio
Networks
|
ACM MONET (Mobile Networks and Applications), special issue on
"Reconfigurable Radio Technologies in Support of Ubiquitous Seamless
Computing"
| null | null | null |
cs.GT
| null |
In this work, we propose a game theoretic framework to analyze the behavior
of cognitive radios for distributed adaptive channel allocation. We define two
different objective functions for the spectrum sharing games, which capture the
utility of selfish users and cooperative users, respectively. Based on the
utility definition for cooperative users, we show that the channel allocation
problem can be formulated as a potential game, and thus converges to a
deterministic channel allocation Nash equilibrium point. Alternatively, a
no-regret learning implementation is proposed for both scenarios and it is
shown to have similar performance with the potential game when cooperation is
enforced, but with a higher variability across users. The no-regret learning
formulation is particularly useful to accommodate selfish users.
Non-cooperative learning games have the advantage of a very low overhead for
information exchange in the network.
We show that cooperation based spectrum sharing etiquette improves the
overall network performance at the expense of an increased overhead required
for information exchange.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 00:25:17 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Nie",
"Nie",
""
],
[
"Comaniciu",
"Cristina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0602020
|
Yan-Xiu Zheng
|
Yan-Xiu Zheng and Yu T. Su
|
Inter-Block Permuted Turbo Codes
|
44 pages, 17 figures
| null | null | null |
cs.IT math.IT
| null |
The structure and size of the interleaver used in a turbo code critically
affect the distance spectrum and the covariance property of a component
decoder's information input and soft output. This paper introduces a new class
of interleavers, the inter-block permutation (IBP) interleavers, that can be
build on any existing "good" block-wise interleaver by simply adding an IBP
stage. The IBP interleavers reduce the above-mentioned correlation and increase
the effective interleaving size. The increased effective interleaving size
improves the distance spectrum while the reduced covariance enhances the
iterative decoder's performance. Moreover, the structure of the
IBP(-interleaved) turbo codes (IBPTC) is naturally fit for high rate
applications that necessitate parallel decoding.
We present some useful bounds and constraints associated with the IBPTC that
can be used as design guidelines. The corresponding codeword weight upper
bounds for weight-2 and weight-4 input sequences are derived. Based on some of
the design guidelines, we propose a simple IBP algorithm and show that the
associated IBPTC yields 0.3 to 1.2 dB performance gain, or equivalently, an
IBPTC renders the same performance with a much reduced interleaving delay. The
EXIT and covariance behaviors provide another numerical proof of the
superiority of the proposed IBPTC.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 06:36:09 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Zheng",
"Yan-Xiu",
""
],
[
"Su",
"Yu T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602021
|
Marc Schoenauer
|
Marc Schoenauer, Mich\`ele Sebag (LMS)
|
Using Domain Knowledge in Evolutionary System Identification
| null | null | null | null |
cs.AI math.AP
| null |
Two example of Evolutionary System Identification are presented to highlight
the importance of incorporating Domain Knowledge: the discovery of an
analytical indentation law in Structural Mechanics using constrained Genetic
Programming, and the identification of the repartition of underground
velocities in Seismic Prospection. Critical issues for sucessful ESI are
discussed in the light of these results.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 07:45:26 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Schoenauer",
"Marc",
"",
"LMS"
],
[
"Sebag",
"Michèle",
"",
"LMS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
}
] |
cs/0602022
|
Marc Schoenauer
|
Alain Ratle (LMS), Mich\`ele Sebag (LMS)
|
Avoiding the Bloat with Stochastic Grammar-based Genetic Programming
| null | null | null | null |
cs.AI
| null |
The application of Genetic Programming to the discovery of empirical laws is
often impaired by the huge size of the search space, and consequently by the
computer resources needed. In many cases, the extreme demand for memory and CPU
is due to the massive growth of non-coding segments, the introns. The paper
presents a new program evolution framework which combines distribution-based
evolution in the PBIL spirit, with grammar-based genetic programming; the
information is stored as a probability distribution on the gra mmar rules,
rather than in a population. Experiments on a real-world like problem show that
this approach gives a practical solution to the problem of intron growth.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 07:48:27 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Ratle",
"Alain",
"",
"LMS"
],
[
"Sebag",
"Michèle",
"",
"LMS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0602023
|
Oded Kafri
|
Oded Kafri
|
Information theory and Thermodynamics
|
16 pages and 5 figures. The paper was submitted to IEEE Transaction
on Information theory
| null | null | null |
cs.IT math.IT
| null |
A communication theory for a transmitter broadcasting to many receivers is
presented. In this case energetic considerations cannot be neglected as in
Shannon theory. It is shown that, when energy is assigned to the information
bit, information theory complies with classical thermodynamic and is part of
it. To provide a thermodynamic theory of communication it is necessary to
define equilibrium for informatics systems that are not in thermal equilibrium
and to calculate temperature, heat, and entropy with accordance to Clausius
inequality. It is shown that for a binary file the temperature is proportional
to the bit energy and that information is thermodynamic entropy. Equilibrium
exists in random files that cannot be compressed. Thermodynamic bounds on the
computing power of a physical device, and the maximum information that an
antenna can broadcast are calculated.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 07:53:37 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Kafri",
"Oded",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602024
|
Valentin Goranko
|
Willem Conradie, Valentin Goranko and Dimiter Vakarelov
|
Algorithmic correspondence and completeness in modal logic. I. The core
algorithm SQEMA
|
26 pages, no figures, to appear in the Logical Methods in Computer
Science
|
Logical Methods in Computer Science, Volume 2, Issue 1 (March 7,
2006) lmcs:2259
|
10.2168/LMCS-2(1:5)2006
| null |
cs.LO
| null |
Modal formulae express monadic second-order properties on Kripke frames, but
in many important cases these have first-order equivalents. Computing such
equivalents is important for both logical and computational reasons. On the
other hand, canonicity of modal formulae is important, too, because it implies
frame-completeness of logics axiomatized with canonical formulae.
Computing a first-order equivalent of a modal formula amounts to elimination
of second-order quantifiers. Two algorithms have been developed for
second-order quantifier elimination: SCAN, based on constraint resolution, and
DLS, based on a logical equivalence established by Ackermann.
In this paper we introduce a new algorithm, SQEMA, for computing first-order
equivalents (using a modal version of Ackermann's lemma) and, moreover, for
proving canonicity of modal formulae. Unlike SCAN and DLS, it works directly on
modal formulae, thus avoiding Skolemization and the subsequent problem of
unskolemization. We present the core algorithm and illustrate it with some
examples. We then prove its correctness and the canonicity of all formulae on
which the algorithm succeeds. We show that it succeeds not only on all
Sahlqvist formulae, but also on the larger class of inductive formulae,
introduced in our earlier papers. Thus, we develop a purely algorithmic
approach to proving canonical completeness in modal logic and, in particular,
establish one of the most general completeness results in modal logic so far.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 10:10:12 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Mar 2006 14:10:44 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Mar 2006 15:46:14 GMT"
},
{
"version": "v4",
"created": "Wed, 8 Mar 2006 15:42:17 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Conradie",
"Willem",
""
],
[
"Goranko",
"Valentin",
""
],
[
"Vakarelov",
"Dimiter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0602025
|
Gianluca Argentini
|
Gianluca Argentini
|
On local symbolic approximation and resolution of ODEs using Implicit
Function Theorem
|
12 pages, 2 figures; keywords: ordinary differential equations,
implicit function theorem, local solutions, symbolic solutions, cavitation
| null | null | null |
cs.NA math.CA physics.comp-ph
| null |
In this work the implicit function theorem is used for searching local
symbolic resolution of differential equations. General results of existence for
first order equations are proven and some examples, one relative to cavitation
in a fluid, are developed. These examples seem to show that local approximation
of non linear differential equations can give useful informations about
symbolic form of possible solutions, and in the case a global solution is
known, locally the accuracy of approximation can be good.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 11:44:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Argentini",
"Gianluca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
] |
cs/0602026
|
Richard McClatchey
|
Ashiq Anjum, Richard McClatchey, Arshad Ali & Ian Willers
|
Bulk Scheduling with DIANA Scheduler
|
4 pages, 5 figures. Accepted by the Computing for High Energy Physics
Conference. Mumbai, Indai. February 2006
| null | null | null |
cs.DC
| null |
Results from and progress on the development of a Data Intensive and Network
Aware (DIANA) Scheduling engine, primarily for data intensive sciences such as
physics analysis, are described. Scientific analysis tasks can involve
thousands of computing, data handling, and network resources and the size of
the input and output files and the amount of overall storage space allocated to
a user necessarily can have significant bearing on the scheduling of data
intensive applications. If the input or output files must be retrieved from a
remote location, then the time required transferring the files must also be
taken into consideration when scheduling compute resources for the given
application. The central problem in this study is the coordinated management of
computation and data at multiple locations and not simply data movement.
However, this can be a very costly operation and efficient scheduling can be a
challenge if compute and data resources are mapped without network cost. We
have implemented an adaptive algorithm within the DIANA Scheduler which takes
into account data location and size, network performance and computation
capability to make efficient global scheduling decisions. DIANA is a
performance-aware as well as an economy-guided Meta Scheduler. It iteratively
allocates each job to the site that is likely to produce the best performance
as well as optimizing the global queue for any remaining pending jobs.
Therefore it is equally suitable whether a single job is being submitted or
bulk scheduling is being performed. Results suggest that considerable
performance improvements are to be gained by adopting the DIANA scheduling
approach.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 16:47:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Anjum",
"Ashiq",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Ali",
"Arshad",
""
],
[
"Willers",
"Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0602027
|
Krzysztof R. Apt
|
Krzysztof R. Apt
|
Explaining Constraint Programming
|
15 pages, appeared in "Processes, Terms and Cycles: Steps on the Road
to Infinity", (A. Middeldorp, V. van Oostrom, F. van Raamsdonk, R. de Vrijer,
eds.), LNCS 3838, pp. 55-69. (2005)
| null | null | null |
cs.PL cs.AI
| null |
We discuss here constraint programming (CP) by using a proof-theoretic
perspective. To this end we identify three levels of abstraction. Each level
sheds light on the essence of CP.
In particular, the highest level allows us to bring CP closer to the
computation as deduction paradigm. At the middle level we can explain various
constraint propagation algorithms. Finally, at the lowest level we can address
the issue of automatic generation and optimization of the constraint
propagation algorithms.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 15:19:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0602028
|
Andrea Montanari
|
Andrea Montanari and David Tse
|
Analysis of Belief Propagation for Non-Linear Problems: The Example of
CDMA (or: How to Prove Tanaka's Formula)
|
5 pages, 3 eps figures, IEEE Information Theory Workshop, Punta del
Este, Uruguay, March 13-17, 2006 (invited)
| null | null | null |
cs.IT math.IT
| null |
We consider the CDMA (code-division multiple-access) multi-user detection
problem for binary signals and additive white gaussian noise. We propose a
spreading sequences scheme based on random sparse signatures, and a detection
algorithm based on belief propagation (BP) with linear time complexity. In the
new scheme, each user conveys its power onto a finite number of chips l, in the
large system limit.
We analyze the performances of BP detection and prove that they coincide with
the ones of optimal (symbol MAP) detection in the l->\infty limit. In the same
limit, we prove that the information capacity of the system converges to
Tanaka's formula for random `dense' signatures, thus providing the first
rigorous justification of this formula. Apart from being computationally
convenient, the new scheme allows for optimization in close analogy with
irregular low density parity check code ensembles.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 18:56:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Montanari",
"Andrea",
""
],
[
"Tse",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602029
|
Kevin Wortman
|
John Augustine and David Eppstein and Kevin A. Wortman
|
Approximate Weighted Farthest Neighbors and Minimum Dilation Stars
|
12 pages, 2 figures
| null | null | null |
cs.CG cs.DS
| null |
We provide an efficient reduction from the problem of querying approximate
multiplicatively weighted farthest neighbors in a metric space to the
unweighted problem. Combining our techniques with core-sets for approximate
unweighted farthest neighbors, we show how to find (1+epsilon)-approximate
farthest neighbors in time O(log n) per query in D-dimensional Euclidean space
for any constants D and epsilon. As an application, we find an O(n log n)
expected time algorithm for choosing the center of a star topology network
connecting a given set of points, so as to approximately minimize the maximum
dilation between any pair of points.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 21:09:11 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Augustine",
"John",
""
],
[
"Eppstein",
"David",
""
],
[
"Wortman",
"Kevin A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0602030
|
Mohammed Khan Zafar
|
Md. Zafar ALi Khan and B. Sundar Rajan
|
Single-Symbol Maximum Likelihood Decodable Linear STBCs
|
38 pages, 9 Figures, accepted for publication in IEEE Trans.
Information Theory, 2006
| null | null | null |
cs.IT math.IT
| null |
Space-Time block codes (STBC) from Orthogonal Designs (OD) and Co-ordinate
Interleaved Orthogonal Designs (CIOD) have been attracting wider attention due
to their amenability for fast (single-symbol) ML decoding, and full-rate with
full-rank over quasi-static fading channels. However, these codes are instances
of single-symbol decodable codes and it is natural to ask, if there exist codes
other than STBCs form ODs and CIODs that allow single-symbol coding?
In this paper, the above question is answered in the affirmative by
characterizing all linear STBCs, that allow single-symbol ML decoding (not
necessarily full-diversity) over quasi-static fading channels-calling them
single-symbol decodable designs (SDD). The class SDD includes ODs and CIODs as
proper subclasses. Further, among the SDD, a class of those that offer
full-diversity, called Full-rank SDD (FSDD) are characterized and classified.
|
[
{
"version": "v1",
"created": "Wed, 8 Feb 2006 08:46:34 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Khan",
"Md. Zafar ALi",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602031
|
Wit Jakuczun
|
Wit Jakuczun
|
Classifying Signals with Local Classifiers
| null | null | null | null |
cs.AI
| null |
This paper deals with the problem of classifying signals. The new method for
building so called local classifiers and local features is presented. The
method is a combination of the lifting scheme and the support vector machines.
Its main aim is to produce effective and yet comprehensible classifiers that
would help in understanding processes hidden behind classified signals. To
illustrate the method we present the results obtained on an artificial and a
real dataset.
|
[
{
"version": "v1",
"created": "Wed, 8 Feb 2006 11:38:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jakuczun",
"Wit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0602032
|
David Doty
|
David Doty, Jack H. Lutz, Satyadev Nandakumar
|
Finite-State Dimension and Real Arithmetic
|
15 pages
| null | null | null |
cs.CC cs.IT math.IT
| null |
We use entropy rates and Schur concavity to prove that, for every integer k
>= 2, every nonzero rational number q, and every real number alpha, the base-k
expansions of alpha, q+alpha, and q*alpha all have the same finite-state
dimension and the same finite-state strong dimension. This extends, and gives a
new proof of, Wall's 1949 theorem stating that the sum or product of a nonzero
rational number and a Borel normal number is always Borel normal.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2006 00:20:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Doty",
"David",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Nandakumar",
"Satyadev",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602033
|
Leonid A. Levin
|
Leonid A. Levin
|
Self-stabilization of Circular Arrays of Automata
|
2 pages
|
Theoretical Computer Science, 235(1):143-144, 2000
| null | null |
cs.DC cs.DM
| null |
[Gacs, Kurdiumov, Levin, 78] proposed simple one-dimensional cellular
automata with 2 states. In an infinite array they are self-stabilizing: if all
but a finite minority of automata are in the same state, the minority states
disappear. Implicit in the paper was a stronger result that a sufficiently
small minority of states vanish even in a finite circular array. The following
note makes this strengthening explicit.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2006 02:07:52 GMT"
}
] | 2018-12-03T00:00:00 |
[
[
"Levin",
"Leonid A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0602034
|
Yuchun Guo
|
Yuchun Guo, Changjia Chen and Shi Zhou
|
A topology visualisation tool for large-scale communications networks
|
9 pages, 2 figures. Published
|
ELECTRONICS LETTERS, Vol. 43, No. 10, PP. 597-598, May 2007.
| null | null |
cs.NI
| null |
A visualisation tool is presented to facilitate the study on large-scale
communications networks. This tool provides a simple and effective way to
summarise the topology of a complex network at a coarse level.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2006 03:25:21 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Nov 2006 16:54:07 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Aug 2007 13:08:51 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Guo",
"Yuchun",
""
],
[
"Chen",
"Changjia",
""
],
[
"Zhou",
"Shi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0602035
|
Jan Ostergaard
|
Jan Ostergaard, Jesper Jensen, and Richard Heusdens
|
n-Channel Entropy-Constrained Multiple-Description Lattice Vector
Quantization
|
17 Pages, two-columns. Accepted for publication in IEEE Trans. on
Inform. Th
| null |
10.1109/TIT.2006.872847
| null |
cs.IT math.IT
| null |
In this paper we derive analytical expressions for the central and side
quantizers which, under high-resolutions assumptions, minimize the expected
distortion of a symmetric multiple-description lattice vector quantization
(MD-LVQ) system subject to entropy constraints on the side descriptions for
given packet-loss probabilities.
We consider a special case of the general n-channel symmetric
multiple-description problem where only a single parameter controls the
redundancy tradeoffs between the central and the side distortions. Previous
work on two-channel MD-LVQ showed that the distortions of the side quantizers
can be expressed through the normalized second moment of a sphere. We show here
that this is also the case for three-channel MD-LVQ. Furthermore, we conjecture
that this is true for the general n-channel MD-LVQ.
For given source, target rate and packet-loss probabilities we find the
optimal number of descriptions and construct the MD-LVQ system that minimizes
the expected distortion. We verify theoretical expressions by numerical
simulations and show in a practical setup that significant performance
improvements can be achieved over state-of-the-art two-channel MD-LVQ by using
three-channel MD-LVQ.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2006 08:51:57 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Ostergaard",
"Jan",
""
],
[
"Jensen",
"Jesper",
""
],
[
"Heusdens",
"Richard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602036
|
Rene Ndoundam
|
Ren\'e Ndoundam, Maurice Tchuente
|
R\'{e}seaux d'Automates de Caianiello Revisit\'{e}
|
39 pages
| null | null | null |
cs.NE
| null |
We exhibit a family of neural networks of McCulloch and Pitts of size $2nk+2$
which can be simulated by a neural networks of Caianiello of size $2n+2$ and
memory length $k$. This simulation allows us to find again one of the result of
the following article: [Cycles exponentiels des r\'{e}seaux de Caianiello et
compteurs en arithm\'{e}tique redondante, Technique et Science Informatiques
Vol. 19, pages 985-1008] on the existence of neural networks of Caianiello of
size $2n+2$ and memory length $k$ which describes a cycle of length $k \times
2^{nk}$.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2006 06:32:29 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Ndoundam",
"René",
""
],
[
"Tchuente",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0602037
|
Elisa Gorla
|
J. J. Climent, E. Gorla, J. Rosenthal
|
Cryptanalysis of the CFVZ cryptosystem
|
12 pages
| null | null | null |
cs.CR
| null |
The paper analyzes a new public key cryptosystem whose security is based on a
matrix version of the discrete logarithm problem over an elliptic curve. It is
shown that the complexity of solving the underlying problem for the proposed
system is dominated by the complexity of solving a fixed number of discrete
logarithm problems in the group of an elliptic curve. Using an adapted Pollard
rho algorithm it is shown that this problem is essentially as hard as solving
one discrete logarithm problem in the group of an elliptic curve.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2006 08:40:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Climent",
"J. J.",
""
],
[
"Gorla",
"E.",
""
],
[
"Rosenthal",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0602038
|
Gregory Gutin
|
G. Gutin, P. Hell, A. Rafiey, A. Yeo
|
Minimum Cost Homomorphisms to Proper Interval Graphs and Bigraphs
| null | null | null | null |
cs.DM cs.AI
| null |
For graphs $G$ and $H$, a mapping $f: V(G)\dom V(H)$ is a homomorphism of $G$
to $H$ if $uv\in E(G)$ implies $f(u)f(v)\in E(H).$ If, moreover, each vertex $u
\in V(G)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the
homomorphism $f$ is $\sum_{u\in V(G)}c_{f(u)}(u)$. For each fixed graph $H$, we
have the {\em minimum cost homomorphism problem}, written as MinHOM($H)$. The
problem is to decide, for an input graph $G$ with costs $c_i(u),$ $u \in V(G),
i\in V(H)$, whether there exists a homomorphism of $G$ to $H$ and, if one
exists, to find one of minimum cost. Minimum cost homomorphism problems
encompass (or are related to) many well studied optimization problems. We
describe a dichotomy of the minimum cost homomorphism problems for graphs $H$,
with loops allowed. When each connected component of $H$ is either a reflexive
proper interval graph or an irreflexive proper interval bigraph, the problem
MinHOM($H)$ is polynomial time solvable. In all other cases the problem
MinHOM($H)$ is NP-hard. This solves an open problem from an earlier paper.
Along the way, we prove a new characterization of the class of proper interval
bigraphs.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2006 09:39:36 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Feb 2006 15:36:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gutin",
"G.",
""
],
[
"Hell",
"P.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0602039
|
Andrei Arion
|
Andrei Arion (INRIA Futurs), Angela Bonifati, Ioana Manolescu (INRIA
Futurs), Andrea Pugliese
|
Path Summaries and Path Partitioning in Modern XML Databases
| null | null | null | null |
cs.DB
| null |
We study the applicability of XML path summaries in the context of
current-day XML databases. We find that summaries provide an excellent basis
for optimizing data access methods, which furthermore mixes very well with
path-partitioned stores. We provide practical algorithms for building and
exploiting summaries, and prove its benefits through extensive experiments.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2006 12:21:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Arion",
"Andrei",
"",
"INRIA Futurs"
],
[
"Bonifati",
"Angela",
"",
"INRIA\n Futurs"
],
[
"Manolescu",
"Ioana",
"",
"INRIA\n Futurs"
],
[
"Pugliese",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0602040
|
Pierre-Alain Masson
|
Samir Chouali (LIFC), Jacques Julliand (LIFC), Pierre-Alain Masson
(LIFC), Fran\c{c}oise Bellegarde (LIFC)
|
PLTL Partitioned Model Checking for Reactive Systems under Fairness
Assumptions
| null |
ACM Transactions on Embedded Computing Systems 4(2) (2005) 267-301
|
10.1145/1067915.1067918
| null |
cs.LO
| null |
We are interested in verifying dynamic properties of finite state reactive
systems under fairness assumptions by model checking. The systems we want to
verify are specified through a top-down refinement process. In order to deal
with the state explosion problem, we have proposed in previous works to
partition the reachability graph, and to perform the verification on each part
separately. Moreover, we have defined a class, called Bmod, of dynamic
properties that are verifiable by parts, whatever the partition. We decide if a
property P belongs to Bmod by looking at the form of the Buchi automaton that
accepts the negation of P. However, when a property P belongs to Bmod, the
property f => P, where f is a fairness assumption, does not necessarily belong
to Bmod. In this paper, we propose to use the refinement process in order to
build the parts on which the verification has to be performed. We then show
that with such a partition, if a property P is verifiable by parts and if f is
the expression of the fairness assumptions on a system, then the property f =>
P is still verifiable by parts. This approach is illustrated by its application
to the chip card protocol T=1 using the B engineering design language.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2006 14:48:29 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Chouali",
"Samir",
"",
"LIFC"
],
[
"Julliand",
"Jacques",
"",
"LIFC"
],
[
"Masson",
"Pierre-Alain",
"",
"LIFC"
],
[
"Bellegarde",
"Françoise",
"",
"LIFC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0602041
|
Radu Mihaescu
|
Radu Mihaescu, Dan Levy, Lior Pachter
|
Why neighbor-joining works
|
Revision 2
| null | null | null |
cs.DS cs.DM
| null |
We show that the neighbor-joining algorithm is a robust quartet method for
constructing trees from distances. This leads to a new performance guarantee
that contains Atteson's optimal radius bound as a special case and explains
many cases where neighbor-joining is successful even when Atteson's criterion
is not satisfied. We also provide a proof for Atteson's conjecture on the
optimal edge radius of the neighbor-joining algorithm. The strong performance
guarantees we provide also hold for the quadratic time fast neighbor-joining
algorithm, thus providing a theoretical basis for inferring very large
phylogenies with neighbor-joining.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2006 20:22:59 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Dec 2006 21:28:24 GMT"
},
{
"version": "v3",
"created": "Sun, 17 Jun 2007 10:36:20 GMT"
}
] | 2007-06-17T00:00:00 |
[
[
"Mihaescu",
"Radu",
""
],
[
"Levy",
"Dan",
""
],
[
"Pachter",
"Lior",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0602042
|
Wojciech Mazurczyk
|
Wojciech Mazurczyk, Zbigniew Kotulski
|
New security and control protocol for VoIP based on steganography and
digital watermarking
|
8 pages, 4 figures, 1 table
|
Annales UMCS, Informatica, AI 4 (2006), ISNN 1732-1360
| null | null |
cs.CR cs.MM
| null |
In this paper new security and control protocol for Voice over Internet
Protocol (VoIP) service is presented. It is the alternative for the IETF's
(Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for
real-time application's traffic. Additionally this solution offers
authentication and integrity, it is capable of exchanging and verifying QoS and
security parameters. It is based on digital watermarking and steganography that
is why it does not consume additional bandwidth and the data transmitted is
inseparably bound to the voice content.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2006 22:49:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mazurczyk",
"Wojciech",
""
],
[
"Kotulski",
"Zbigniew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0602043
|
Shanghua Teng
|
Xi Chen, Xiaotie Deng and Shang-Hua Teng
|
Computing Nash Equilibria: Approximation and Smoothed Complexity
| null | null | null | null |
cs.CC cs.GT
| null |
We show that the BIMATRIX game does not have a fully polynomial-time
approximation scheme, unless PPAD is in P. In other words, no algorithm with
time polynomial in n and 1/\epsilon can compute an \epsilon-approximate Nash
equilibrium of an n by nbimatrix game, unless PPAD is in P. Instrumental to our
proof, we introduce a new discrete fixed-point problem on a high-dimensional
cube with a constant side-length, such as on an n-dimensional cube with
side-length 7, and show that they are PPAD-complete. Furthermore, we prove,
unless PPAD is in RP, that the smoothed complexity of the Lemke-Howson
algorithm or any algorithm for computing a Nash equilibrium of a bimatrix game
is polynomial in n and 1/\sigma under perturbations with magnitude \sigma. Our
result answers a major open question in the smoothed analysis of algorithms and
the approximation of Nash equilibria.
|
[
{
"version": "v1",
"created": "Sat, 11 Feb 2006 22:46:55 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Feb 2006 00:18:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chen",
"Xi",
""
],
[
"Deng",
"Xiaotie",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0602044
|
Prasanta K. Panigrahi
|
Siddharth Arora, Jayadev Acharya, Amit Verma, Prasanta K. Panigrahi
|
Multilevel Thresholding for Image Segmentation through a Fast
Statistical Recursive Algorithm
|
9 pages, 3 figures
| null | null | null |
cs.CV
| null |
A novel algorithm is proposed for segmenting an image into multiple levels
using its mean and variance. Starting from the extreme pixel values at both
ends of the histogram plot, the algorithm is applied recursively on sub-ranges
computed from the previous step, so as to find a threshold level and a new
sub-range for the next step, until no significant improvement in image quality
can be achieved. The method makes use of the fact that a number of
distributions tend towards Dirac delta function, peaking at the mean, in the
limiting condition of vanishing variance. The procedure naturally provides for
variable size segmentation with bigger blocks near the extreme pixel values and
finer divisions around the mean or other chosen value for better visualization.
Experiments on a variety of images show that the new algorithm effectively
segments the image in computationally very less time.
|
[
{
"version": "v1",
"created": "Sun, 12 Feb 2006 18:22:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Arora",
"Siddharth",
""
],
[
"Acharya",
"Jayadev",
""
],
[
"Verma",
"Amit",
""
],
[
"Panigrahi",
"Prasanta K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0602045
|
Russ Abbott
|
Russ Abbott
|
Emergence Explained
|
67 pages. Earlier versions presented at Lake ArrowHead conference on
human complex systems (2005), GECCO 2005 workshop on Biological Applications
of Genetic and Evolutionary Computation, and Symposium on Understanding
Complex Systems (2005)
| null | null | null |
cs.MA cs.DC cs.GL
| null |
Emergence (macro-level effects from micro-level causes) is at the heart of
the conflict between reductionism and functionalism. How can there be
autonomous higher level laws of nature (the functionalist claim) if everything
can be reduced to the fundamental forces of physics (the reductionist
position)? We cut through this debate by applying a computer science lens to
the way we view nature. We conclude (a) that what functionalism calls the
special sciences (sciences other than physics) do indeed study autonomous laws
and furthermore that those laws pertain to real higher level entities but (b)
that interactions among such higher-level entities is epiphenomenal in that
they can always be reduced to primitive physical forces. In other words,
epiphenomena, which we will identify with emergent phenomena, do real
higher-level work. The proposed perspective provides a framework for
understanding many thorny issues including the nature of entities, stigmergy,
the evolution of complexity, phase transitions, supervenience, and downward
entailment. We also discuss some practical considerations pertaining to systems
of systems and the limitations of modeling.
|
[
{
"version": "v1",
"created": "Sun, 12 Feb 2006 22:11:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Abbott",
"Russ",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0602046
|
Martin Wainwright
|
Emin Martinian, Martin J. Wainwright
|
Analysis of LDGM and compound codes for lossy compression and binning
|
5 pages; to appear in Workshop on Information Theory and its
Applications, February 2006, San Diego
| null | null | null |
cs.IT math.IT
| null |
Recent work has suggested that low-density generator matrix (LDGM) codes are
likely to be effective for lossy source coding problems. We derive rigorous
upper bounds on the effective rate-distortion function of LDGM codes for the
binary symmetric source, showing that they quickly approach the rate-distortion
function as the degree increases. We also compare and contrast the standard
LDGM construction with a compound LDPC/LDGM construction introduced in our
previous work, which provably saturates the rate-distortion bound with finite
degrees. Moreover, this compound construction can be used to generate nested
codes that are simultaneously good as source and channel codes, and are hence
well-suited to source/channel coding with side information. The sparse and
high-girth graphical structure of our constructions render them well-suited to
message-passing encoding.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2006 03:07:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Martinian",
"Emin",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602047
|
Fredrik Kuivinen
|
Peter Jonsson, Fredrik Kuivinen, Gustav Nordh
|
Approximability of Integer Programming with Generalised Constraints
|
Due to a flaw in a proof result 1 has changed. For maximal constraint
languages we now prove a classification result for domains of size less than
or equal to four. We also give a complete classification result for maximal
constraint languages under the assumption that a conjecture due to Szczepara
holds
| null | null | null |
cs.CC
| null |
We study a family of problems, called \prob{Maximum Solution}, where the
objective is to maximise a linear goal function over the feasible integer
assignments to a set of variables subject to a set of constraints. When the
domain is Boolean (i.e. restricted to $\{0,1\}$), the maximum solution problem
is identical to the well-studied \prob{Max Ones} problem, and the
approximability is completely understood for all restrictions on the underlying
constraints [Khanna et al., SIAM J. Comput., 30 (2001), pp. 1863-1920]. We
continue this line of research by considering domains containing more than two
elements. We present two main results: a complete classification for the
approximability of all maximal constraint languages over domains of cardinality
at most 4, and a complete classification of the approximability of the problem
when the set of allowed constraints contains all permutation constraints. Under
the assumption that a conjecture due to Szczepara holds, we give a complete
classification for all maximal constraint languages. These classes of languages
are well-studied in universal algebra and computer science; they have, for
instance, been considered in connection with machine learning and constraint
satisfaction. Our results are proved by using algebraic results from clone
theory and the results indicates that this approach is very powerful for
classifying the approximability of certain optimisation problems.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2006 18:48:52 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jul 2007 15:25:57 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Jan 2008 09:07:39 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Jonsson",
"Peter",
""
],
[
"Kuivinen",
"Fredrik",
""
],
[
"Nordh",
"Gustav",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0602048
|
Kambiz Azarian
|
Kambiz Azarian, Hesham El Gamal and Philip Schniter
|
On the Optimality of the ARQ-DDF Protocol
|
26 pages, 2 figures
| null | null | null |
cs.IT math.IT
| null |
The performance of the automatic repeat request-dynamic decode and forward
(ARQ-DDF) cooperation protocol is analyzed in two distinct scenarios. The first
scenario is the multiple access relay (MAR) channel where a single relay is
dedicated to simultaneously help several multiple access users. For this setup,
it is shown that the ARQ-DDF protocol achieves the optimal diversity
multiplexing tradeoff (DMT) of the channel. The second scenario is the
cooperative vector multiple access (CVMA) channel where the users cooperate in
delivering their messages to a destination equipped with multiple receiving
antennas. For this setup, we develop a new variant of the ARQ-DDF protocol
where the users are purposefully instructed not to cooperate in the first round
of transmission. Lower and upper bounds on the achievable DMT are then derived.
These bounds are shown to converge to the optimal tradeoff as the number of
transmission rounds increases.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2006 18:53:06 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Azarian",
"Kambiz",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Schniter",
"Philip",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602049
|
Kambiz Azarian
|
Arul Murugan, Kambiz Azarian and Hesham El Gamal
|
Cooperative Lattice Coding and Decoding
|
25 pages, 8 figures
| null | null | null |
cs.IT math.IT
| null |
A novel lattice coding framework is proposed for outage-limited cooperative
channels. This framework provides practical implementations for the optimal
cooperation protocols proposed by Azarian et al. In particular, for the relay
channel we implement a variant of the dynamic decode and forward protocol,
which uses orthogonal constellations to reduce the channel seen by the
destination to a single-input single-output time-selective one, while
inheriting the same diversity-multiplexing tradeoff. This simplification allows
for building the receiver using traditional belief propagation or tree search
architectures. Our framework also generalizes the coding scheme of Yang and
Belfiore in the context of amplify and forward cooperation. For the cooperative
multiple access channel, a tree coding approach, matched to the optimal linear
cooperation protocol of Azarain et al, is developed. For this scenario, the
MMSE-DFE Fano decoder is shown to enjoy an excellent tradeoff between
performance and complexity. Finally, the utility of the proposed schemes is
established via a comprehensive simulation study.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2006 19:29:12 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Feb 2006 01:11:00 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Murugan",
"Arul",
""
],
[
"Azarian",
"Kambiz",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602050
|
Amir Avestimehr
|
Salman Avestimehr and David N.C. Tse
|
Outage Capacity of the Fading Relay Channel in the Low SNR Regime
| null | null | null | null |
cs.IT math.IT
| null |
In slow fading scenarios, cooperation between nodes can increase the amount
of diversity for communication. We study the performance limit in such
scenarios by analyzing the outage capacity of slow fading relay channels. Our
focus is on the low SNR and low outage probability regime, where the adverse
impact of fading is greatest but so are the potential gains from cooperation.
We showed that while the standard Amplify-Forward protocol performs very poorly
in this regime, a modified version we called the Bursty Amplify-Forward
protocol is optimal and achieves the outage capacity of the network. Moreover,
this performance can be achieved without a priori channel knowledge at the
receivers. In contrast, the Decode-Forward protocol is strictly sub-optimal in
this regime. Our results directly yield the outage capacity per unit energy of
fading relay channels.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2006 00:37:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Avestimehr",
"Salman",
""
],
[
"Tse",
"David N. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602051
|
Fernando Lobo
|
Fernando G. Lobo, Claudio F. Lima
|
On the utility of the multimodal problem generator for assessing the
performance of Evolutionary Algorithms
|
Also UALG-ILAB Report No. 200601
| null | null | null |
cs.NE
| null |
This paper looks in detail at how an evolutionary algorithm attempts to solve
instances from the multimodal problem generator. The paper shows that in order
to consistently reach the global optimum, an evolutionary algorithm requires a
population size that should grow at least linearly with the number of peaks. It
is also shown a close relationship between the supply and decision making
issues that have been identified previously in the context of population sizing
models for additively decomposable problems.
The most important result of the paper, however, is that solving an instance
of the multimodal problem generator is like solving a peak-in-a-haystack, and
it is argued that evolutionary algorithms are not the best algorithms for such
a task. Finally, and as opposed to what several researchers have been doing, it
is our strong belief that the multimodal problem generator is not adequate for
assessing the performance of evolutionary algorithms.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2006 10:30:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lobo",
"Fernando G.",
""
],
[
"Lima",
"Claudio F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0602052
|
Grigoriev Evgeniy
|
Evgeniy Grigoriev
|
The OverRelational Manifesto
|
34 pages
| null | null | null |
cs.DB cs.DS
| null |
The OverRelational Manifesto (below ORM) proposes a possible approach to
creation of data storage systems of the next generation. ORM starts from the
requirement that information in a relational database is represented by a set
of relation values. Accordingly, it is assumed that the information about any
entity of an enterprise must also be represented as a set of relation values
(the ORM main requirement). A system of types is introduced, which allows one
to fulfill the main requirement. The data are represented in the form of
complex objects, and the state of any object is described as a set of relation
values. Emphasize that the types describing the objects are encapsulated,
inherited, and polymorphic. Then, it is shown that the data represented as a
set of such objects may also be represented as a set of relational values
defined on the set of scalar domains (dual data representation). In the general
case, any class is associated with a set of relation variables (R-variables)
each one containing some data about all objects of this class existing in the
system. One of the key points is the fact that the usage of complex (from the
user's viewpoint) refined names of R-variables and their attributes makes it
possible to preserve the semantics of complex data structures represented in
the form of a set of relation values. The most important part of the data
storage system created on the approach proposed is an object-oriented
translator operating over a relational DBMS. The expressiveness of such a
system is comparable with that of OO programming languages.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2006 12:19:08 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2006 10:28:24 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Mar 2006 09:57:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grigoriev",
"Evgeniy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0602053
|
Thomas Hayes
|
Varsha Dani and Thomas P. Hayes
|
How to Beat the Adaptive Multi-Armed Bandit
| null | null | null | null |
cs.DS cs.LG
| null |
The multi-armed bandit is a concise model for the problem of iterated
decision-making under uncertainty. In each round, a gambler must pull one of
$K$ arms of a slot machine, without any foreknowledge of their payouts, except
that they are uniformly bounded. A standard objective is to minimize the
gambler's regret, defined as the gambler's total payout minus the largest
payout which would have been achieved by any fixed arm, in hindsight. Note that
the gambler is only told the payout for the arm actually chosen, not for the
unchosen arms.
Almost all previous work on this problem assumed the payouts to be
non-adaptive, in the sense that the distribution of the payout of arm $j$ in
round $i$ is completely independent of the choices made by the gambler on
rounds $1, \dots, i-1$. In the more general model of adaptive payouts, the
payouts in round $i$ may depend arbitrarily on the history of past choices made
by the algorithm.
We present a new algorithm for this problem, and prove nearly optimal
guarantees for the regret against both non-adaptive and adaptive adversaries.
After $T$ rounds, our algorithm has regret $O(\sqrt{T})$ with high probability
(the tail probability decays exponentially). This dependence on $T$ is best
possible, and matches that of the full-information version of the problem, in
which the gambler is told the payouts for all $K$ arms after each round.
Previously, even for non-adaptive payouts, the best high-probability bounds
known were $O(T^{2/3})$, due to Auer, Cesa-Bianchi, Freund and Schapire. The
expected regret of their algorithm is $O(T^{1/2}) for non-adaptive payouts, but
as we show, $\Omega(T^{2/3})$ for adaptive payouts.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2006 23:57:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dani",
"Varsha",
""
],
[
"Hayes",
"Thomas P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0602054
|
Petros Elia
|
Petros Elia, K. Raj Kumar, Sameer A. Pawar, P. Vijay Kumar and
Hsiao-feng Lu
|
Explicit Space-Time Codes Achieving The Diversity-Multiplexing Gain
Tradeoff
|
Revised submission to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
A recent result of Zheng and Tse states that over a quasi-static channel,
there exists a fundamental tradeoff, referred to as the diversity-multiplexing
gain (D-MG) tradeoff, between the spatial multiplexing gain and the diversity
gain that can be simultaneously achieved by a space-time (ST) block code. This
tradeoff is precisely known in the case of i.i.d. Rayleigh-fading, for T>=
n_t+n_r-1 where T is the number of time slots over which coding takes place and
n_t,n_r are the number of transmit and receive antennas respectively. For T <
n_t+n_r-1, only upper and lower bounds on the D-MG tradeoff are available.
In this paper, we present a complete solution to the problem of explicitly
constructing D-MG optimal ST codes, i.e., codes that achieve the D-MG tradeoff
for any number of receive antennas. We do this by showing that for the square
minimum-delay case when T=n_t=n, cyclic-division-algebra (CDA) based ST codes
having the non-vanishing determinant property are D-MG optimal. While
constructions of such codes were previously known for restricted values of n,
we provide here a construction for such codes that is valid for all n.
For the rectangular, T > n_t case, we present two general techniques for
building D-MG-optimal rectangular ST codes from their square counterparts. A
byproduct of our results establishes that the D-MG tradeoff for all T>= n_t is
the same as that previously known to hold for T >= n_t + n_r -1.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 00:19:51 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Elia",
"Petros",
""
],
[
"Kumar",
"K. Raj",
""
],
[
"Pawar",
"Sameer A.",
""
],
[
"Kumar",
"P. Vijay",
""
],
[
"Lu",
"Hsiao-feng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602055
|
Fernando Lobo
|
Fernando G. Lobo, Claudio F. Lima
|
Revisiting Evolutionary Algorithms with On-the-Fly Population Size
Adjustment
|
Also UALG-ILAB Report No. 200602
| null | null | null |
cs.NE
| null |
In an evolutionary algorithm, the population has a very important role as its
size has direct implications regarding solution quality, speed, and
reliability. Theoretical studies have been done in the past to investigate the
role of population sizing in evolutionary algorithms. In addition to those
studies, several self-adjusting population sizing mechanisms have been proposed
in the literature. This paper revisits the latter topic and pays special
attention to the genetic algorithm with adaptive population size (APGA), for
which several researchers have claimed to be very effective at autonomously
(re)sizing the population.
As opposed to those previous claims, this paper suggests a complete opposite
view. Specifically, it shows that APGA is not capable of adapting the
population size at all. This claim is supported on theoretical grounds and
confirmed by computer simulations.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 13:48:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lobo",
"Fernando G.",
""
],
[
"Lima",
"Claudio F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0602056
|
Domenico Camarda Dr.
|
Dino Borri, Domenico Camarda
|
Building Scenarios for Environmental Management and Planning: An
IT-Based Approach
| null | null | null | null |
cs.MA
| null |
Oftentimes, the need to build multidiscipline knowledge bases, oriented to
policy scenarios, entails the involvement of stakeholders in manifold domains,
with a juxtaposition of different languages whose semantics can hardly allow
inter-domain transfers. A useful support for planning is the building up of
durable IT based interactive platforms, where it is possible to modify initial
positions toward a semantic convergence. The present paper shows an area-based
application of these tools, for the integrated distance-management of different
forms of knowledge expressed by selected stakeholders about environmental
planning issues, in order to build alternative development scenarios.
Keywords: Environmental planning, Scenario building, Multi-source knowledge,
IT-based
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 14:46:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Borri",
"Dino",
""
],
[
"Camarda",
"Domenico",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0602057
|
Christopher Homan
|
Melanie J. Agnew and Christopher M. Homan
|
Plane Decompositions as Tools for Approximation
| null | null | null | null |
cs.DS
| null |
Tree decompositions were developed by Robertson and Seymour. Since then
algorithms have been developed to solve intractable problems efficiently for
graphs of bounded treewidth. In this paper we extend tree decompositions to
allow cycles to exist in the decomposition graph; we call these new
decompositions plane decompositions because we require that the decomposition
graph be planar. First, we give some background material about tree
decompositions and an overview of algorithms both for decompositions and for
approximations of planar graphs. Then, we give our plane decomposition
definition and an algorithm that uses this decomposition to approximate the
size of the maximum independent set of the underlying graph in polynomial time.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 19:09:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Agnew",
"Melanie J.",
""
],
[
"Homan",
"Christopher M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0602058
|
Ruoheng Liu
|
Ruoheng Liu, Predrag Spasojevic, and Emina Soljanin
|
Incremental Redundancy Cooperative Coding for Wireless Networks:
Cooperative Diversity, Coding, and Transmission Energy Gain
|
revised version
| null | null | null |
cs.IT math.IT
| null |
We study an incremental redundancy (IR) cooperative coding scheme for
wireless networks. To exploit the spatial diversity benefit we propose a
cluster-based collaborating strategy for a quasi-static Rayleigh fading channel
model and based on a network geometric distance profile. Our scheme enhances
the network performance by embedding an IR cooperative coding scheme into an
existing noncooperative route. More precisely, for each hop, we form a
collaborating cluster of M-1 nodes between the (hop) sender and the (hop)
destination. The transmitted message is encoded using a mother code and
partitioned into M blocks corresponding to the each of M slots. In the first
slot, the (hop) sender broadcasts its information by transmitting the first
block, and its helpers attempt to relay this message. In the remaining slots,
the each of left-over M-1 blocks is sent either through a helper which has
successfully decoded the message or directly by the (hop) sender where a
dynamic schedule is based on the ACK-based feedback from the cluster. By
employing powerful good codes (e.g., turbo codes, LDPC codes, and raptor codes)
whose performance is characterized by a threshold behavior, our approach
improves the reliability of a multi-hop routing through not only cooperation
diversity benefit but also a coding advantage. The study of the diversity and
the coding gain of the proposed scheme is based on a new simple threshold bound
on the frame-error rate (FER) of maximum likelihood decoding. A average FER
upper bound and its asymptotic (in large SNR) version are derived as a function
of the average fading channel SNRs and the code threshold.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 20:55:30 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Feb 2007 20:44:50 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Ruoheng",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Soljanin",
"Emina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602059
|
Suchitra Manepalli
|
Suchitra Manepalli, Giridhar Manepalli, Michael L. Nelson
|
D2D: Digital Archive to MPEG-21 DIDL
|
28 pages, 8 figures
| null | null | null |
cs.DL
| null |
Digital Archive to MPEG-21 DIDL (D2D) analyzes the contents of the digital
archive and produces an MPEG-21 Digital Item Declaration Language (DIDL)
encapsulating the analysis results. DIDL is an extensible XML-based language
that aggregates resources and the metadata. We provide a brief report on
several analysis techniques applied on the digital archive by the D2D and
provide an evaluation of its run-time performance.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 22:18:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Manepalli",
"Suchitra",
""
],
[
"Manepalli",
"Giridhar",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0602060
|
Philip Davis
|
Philip M. Davis, Jason S. Price
|
eJournal interface can influence usage statistics: implications for
libraries, publishers, and Project COUNTER
|
22 pages, 5 figures. JASIST (in press, 2006)
|
JASIST v57 n9 (2006):1243-1248
|
10.1002/asi.20405
| null |
cs.IR cs.DL
| null |
The design of a publisher's electronic interface can have a measurable effect
on electronic journal usage statistics. A study of journal usage from six
COUNTER-compliant publishers at thirty-two research institutions in the United
States, the United Kingdom and Sweden indicates that the ratio of PDF to HTML
views is not consistent across publisher interfaces, even after controlling for
differences in publisher content. The number of fulltext downloads may be
artificially inflated when publishers require users to view HTML versions
before accessing PDF versions or when linking mechanisms, such as CrossRef,
direct users to the full text, rather than the abstract, of each article. These
results suggest that usage reports from COUNTER-compliant publishers are not
directly comparable in their current form. One solution may be to modify
publisher numbers with adjustment factors deemed to be representative of the
benefit or disadvantage due to its interface. Standardization of some interface
and linking protocols may obviate these differences and allow for more accurate
cross-publisher comparisons.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2006 20:29:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Davis",
"Philip M.",
""
],
[
"Price",
"Jason S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0602061
|
David Anderson
|
David P. Anderson, Gilles Fedak
|
The Computational and Storage Potential of Volunteer Computing
|
8 pages. To appear in CCGrid 2006
| null | null | null |
cs.DC cs.PF
| null |
"Volunteer computing" uses Internet-connected computers, volunteered by their
owners, as a source of computing power and storage. This paper studies the
potential capacity of volunteer computing. We analyzed measurements of over
330,000 hosts participating in a volunteer computing project. These
measurements include processing power, memory, disk space, network throughput,
host availability, user-specified limits on resource usage, and host churn. We
show that volunteer computing can support applications that are significantly
more data-intensive, or have larger memory and storage requirements, than those
in current projects.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2006 22:33:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Anderson",
"David P.",
""
],
[
"Fedak",
"Gilles",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0602062
|
Francois Denis
|
Fran\c{c}ois Denis (LIF), Yann Esposito (LIF), Amaury Habrard (LIF)
|
Learning rational stochastic languages
|
15 pages
| null | null | null |
cs.LG
| null |
Given a finite set of words w1,...,wn independently drawn according to a
fixed unknown distribution law P called a stochastic language, an usual goal in
Grammatical Inference is to infer an estimate of P in some class of
probabilistic models, such as Probabilistic Automata (PA). Here, we study the
class of rational stochastic languages, which consists in stochastic languages
that can be generated by Multiplicity Automata (MA) and which strictly includes
the class of stochastic languages generated by PA. Rational stochastic
languages have minimal normal representation which may be very concise, and
whose parameters can be efficiently estimated from stochastic samples. We
design an efficient inference algorithm DEES which aims at building a minimal
normal representation of the target. Despite the fact that no recursively
enumerable class of MA computes exactly the set of rational stochastic
languages over Q, we show that DEES strongly identifies tis set in the limit.
We study the intermediary MA output by DEES and show that they compute rational
series which converge absolutely to one and which can be used to provide
stochastic languages which closely estimate the target.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2006 08:57:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Denis",
"François",
"",
"LIF"
],
[
"Esposito",
"Yann",
"",
"LIF"
],
[
"Habrard",
"Amaury",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0602063
|
Tony Thomas
|
Tony Thomas, Arbind Kumar Lal
|
Group Signature Schemes Using Braid Groups
| null | null | null | null |
cs.CR
| null |
Artin's braid groups have been recently suggested as a new source for
public-key cryptography. In this paper we propose the first group signature
schemes based on the conjugacy problem, decomposition problem and root problem
in the braid groups which are believed to be hard problems.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2006 10:32:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thomas",
"Tony",
""
],
[
"Lal",
"Arbind Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0602064
|
Ana Romero
|
A. Romero, J. Rubio, F. Sergeraert
|
Computing spectral sequences
| null | null | null | null |
cs.SC
| null |
In this paper, a set of programs enhancing the Kenzo system is presented.
Kenzo is a Common Lisp program designed for computing in Algebraic Topology, in
particular it allows the user to calculate homology and homotopy groups of
complicated spaces. The new programs presented here entirely compute Serre and
Eilenberg-Moore spectral sequences, in particular the groups and differential
maps for arbitrary r. They also determine when the spectral sequence has
converged and describe the filtration of the target homology groups induced by
the spectral sequence.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2006 12:29:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Romero",
"A.",
""
],
[
"Rubio",
"J.",
""
],
[
"Sergeraert",
"F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0602065
|
Paul Vitanyi
|
Rudi Cilibrasi (CWI) and Paul Vitanyi (CWI and University of
Amsterdam)
|
Similarity of Objects and the Meaning of Words
|
LaTeX, 25 pages, 7 figures. Proc. 3rd Conf. Theory and Applications
of Models of Computation (TAMC), 15-20 May, 2006, Beijing, China (Invited
paper) This is an extended version of the 5-page abstract cs.IR/0504089
| null | null | null |
cs.CV cs.IR
| null |
We survey the emerging area of compression-based, parameter-free, similarity
distance measures useful in data-mining, pattern recognition, learning and
automatic semantics extraction. Given a family of distances on a set of
objects, a distance is universal up to a certain precision for that family if
it minorizes every distance in the family between every two objects in the set,
up to the stated precision (we do not require the universal distance to be an
element of the family). We consider similarity distances for two types of
objects: literal objects that as such contain all of their meaning, like
genomes or books, and names for objects. The latter may have literal
embodyments like the first type, but may also be abstract like ``red'' or
``christianity.'' For the first type we consider a family of computable
distance measures corresponding to parameters expressing similarity according
to particular featuresdistances generated by web users corresponding to
particular semantic relations between the (names for) the designated objects.
For both families we give universal similarity distance measures, incorporating
all particular distance measures in the family. In the first case the universal
distance is based on compression and in the second case it is based on Google
page counts related to search terms. In both cases experiments on a massive
scale give evidence of the viability of the approaches. between pairs of
literal objects. For the second type we consider similarity
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2006 16:15:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cilibrasi",
"Rudi",
"",
"CWI"
],
[
"Vitanyi",
"Paul",
"",
"CWI and University of\n Amsterdam"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0602066
|
Louis Mello
|
Louis Mello
|
Natural Economics
| null | null | null | null |
cs.OH
| null |
A few considerations on the nature of Economics and its relationship to human
communities through the prism of Self-Organizing-Systems.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2006 17:01:00 GMT"
}
] | 2011-11-10T00:00:00 |
[
[
"Mello",
"Louis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0602067
|
Michael Baer
|
Michael B. Baer
|
Renyi to Renyi -- Source Coding under Siege
|
5 pages, 1 figure, accepted to ISIT 2006
| null | null | null |
cs.IT cs.DS math.IT
| null |
A novel lossless source coding paradigm applies to problems of unreliable
lossless channels with low bit rates, in which a vital message needs to be
transmitted prior to termination of communications. This paradigm can be
applied to Alfred Renyi's secondhand account of an ancient siege in which a spy
was sent to scout the enemy but was captured. After escaping, the spy returned
to his base in no condition to speak and unable to write. His commander asked
him questions that he could answer by nodding or shaking his head, and the
fortress was defended with this information. Renyi told this story with
reference to prefix coding, but maximizing probability of survival in the siege
scenario is distinct from yet related to the traditional source coding
objective of minimizing expected codeword length. Rather than finding a code
minimizing expected codeword length $\sum_{i=1}^n p(i) l(i)$, the siege problem
involves maximizing $\sum_{i=1}^n p(i) \theta^{l(i)}$ for a known $\theta \in
(0,1)$. When there are no restrictions on codewords, this problem can be solve
using a known generalization of Huffman coding. The optimal solution has coding
bounds which are functions of Renyi entropy; in addition to known bounds, new
bounds are derived here. The alphabetically constrained version of this problem
has applications in search trees and diagnostic testing. A novel dynamic
programming algorithm -- based upon the oldest known algorithm for the
traditional alphabetic problem -- optimizes this problem in $O(n^3)$ time and
$O(n^2)$ space, whereas two novel approximation algorithms can find a
suboptimal solution faster: one in linear time, the other in $O(n \log n)$.
Coding bounds for the alphabetic version of this problem are also presented.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2006 23:40:26 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 20:32:04 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602068
|
Kenneth Koehler
|
K. R. Koehler
|
Parallel Symbolic Computation of Curvature Invariants in General
Relativity
|
9 pages, submitted to Journal of Computational Physics
| null | null | null |
cs.DC cs.SC gr-qc
| null |
We present a practical application of parallel symbolic computation in
General Relativity: the calculation of curvature invariants for large
dimension. We discuss the structure of the calculations, an implementation of
the technique and scaling of the computation with spacetime dimension for
various invariants.
|
[
{
"version": "v1",
"created": "Sun, 19 Feb 2006 19:28:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Koehler",
"K. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
}
] |
cs/0602069
|
Vicky Choi
|
Vicky Choi
|
Faster Algorithms for Constructing a Concept (Galois) Lattice
|
15 pages, 3 figures
| null | null | null |
cs.DM cs.DS
| null |
In this paper, we present a fast algorithm for constructing a concept
(Galois) lattice of a binary relation, including computing all concepts and
their lattice order. We also present two efficient variants of the algorithm,
one for computing all concepts only, and one for constructing a frequent closed
itemset lattice. The running time of our algorithms depends on the lattice
structure and is faster than all other existing algorithms for these problems.
|
[
{
"version": "v1",
"created": "Sun, 19 Feb 2006 19:47:56 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Jun 2006 19:03:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Choi",
"Vicky",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0602070
|
Nathan Boeger
|
Nathan Boeger
|
Methods for scaling a large member base
|
12 pages
| null | null | null |
cs.GL
| null |
The technical challenges of scaling websites with large and growing member
bases, like social networking sites, are numerous. One of these challenges is
how to evenly distribute the growing member base across all available
resources. This paper will explore various methods that address this issue. The
techniques used in this paper can be generalized and applied to various other
problems that need to distribute data evenly amongst a finite amount of
resources.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2006 18:08:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Boeger",
"Nathan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0602071
|
Martin Wainwright
|
Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright
|
Geographic Gossip: Efficient Aggregation for Sensor Networks
|
8 pages total; to appear in Information Processing in Sensor Networks
(IPSN) 2006
| null | null | null |
cs.IT math.IT
| null |
Gossip algorithms for aggregation have recently received significant
attention for sensor network applications because of their simplicity and
robustness in noisy and uncertain environments. However, gossip algorithms can
waste significant energy by essentially passing around redundant information
multiple times. For realistic sensor network model topologies like grids and
random geometric graphs, the inefficiency of gossip schemes is caused by slow
mixing times of random walks on those graphs. We propose and analyze an
alternative gossiping scheme that exploits geographic information. By utilizing
a simple resampling method, we can demonstrate substantial gains over
previously proposed gossip protocols. In particular, for random geometric
graphs, our algorithm computes the true average to accuracy $1/n^a$ using
$O(n^{1.5}\sqrt{\log n})$ radio transmissions, which reduces the energy
consumption by a $\sqrt{\frac{n}{\log n}}$ factor over standard gossip
algorithms.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2006 03:52:57 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dimakis",
"Alexandros G.",
""
],
[
"Sarwate",
"Anand D.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602072
|
Eirik Rosnes
|
Eirik Rosnes and {\O}yvind Ytrehus
|
Turbo Decoding on the Binary Erasure Channel: Finite-Length Analysis and
Turbo Stopping Sets
|
28 pages, 5 figures, submitted to IEEE Transactions on Information
Theory
|
IEEE Trans. Inf. Theory, vol. 53, no. 11, pp. 4059-4075, Nov. 2007
| null | null |
cs.IT math.IT
| null |
This paper is devoted to the finite-length analysis of turbo decoding over
the binary erasure channel (BEC). The performance of iterative
belief-propagation (BP) decoding of low-density parity-check (LDPC) codes over
the BEC can be characterized in terms of stopping sets. We describe turbo
decoding on the BEC which is simpler than turbo decoding on other channels. We
then adapt the concept of stopping sets to turbo decoding and state an exact
condition for decoding failure. Apply turbo decoding until the transmitted
codeword has been recovered, or the decoder fails to progress further. Then the
set of erased positions that will remain when the decoder stops is equal to the
unique maximum-size turbo stopping set which is also a subset of the set of
erased positions. Furthermore, we present some improvements of the basic turbo
decoding algorithm on the BEC. The proposed improved turbo decoding algorithm
has substantially better error performance as illustrated by the given
simulation results. Finally, we give an expression for the turbo stopping set
size enumerating function under the uniform interleaver assumption, and an
efficient enumeration algorithm of small-size turbo stopping sets for a
particular interleaver. The solution is based on the algorithm proposed by
Garello et al. in 2001 to compute an exhaustive list of all low-weight
codewords in a turbo code.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2006 14:55:48 GMT"
}
] | 2011-05-31T00:00:00 |
[
[
"Rosnes",
"Eirik",
""
],
[
"Ytrehus",
"Øyvind",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602073
|
Tobias Friedrich
|
Deepak Ajwani, Tobias Friedrich and Ulrich Meyer
|
An O(n^{2.75}) algorithm for online topological ordering
|
20 pages, long version of SWAT'06 paper
| null | null | null |
cs.DS
| null |
We present a simple algorithm which maintains the topological order of a
directed acyclic graph with n nodes under an online edge insertion sequence in
O(n^{2.75}) time, independent of the number of edges m inserted. For dense
DAGs, this is an improvement over the previous best result of O(min(m^{3/2}
log(n), m^{3/2} + n^2 log(n)) by Katriel and Bodlaender. We also provide an
empirical comparison of our algorithm with other algorithms for online
topological sorting. Our implementation outperforms them on certain hard
instances while it is still competitive on random edge insertion sequences
leading to complete DAGs.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2006 10:32:15 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Apr 2006 16:31:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ajwani",
"Deepak",
""
],
[
"Friedrich",
"Tobias",
""
],
[
"Meyer",
"Ulrich",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0602074
|
Pavel Chigansky
|
Pavel Chigansky
|
The entropy rate of the binary symmetric channel in the rare transitions
regime
|
This paper has been withdrawn
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This note has been withdrawn by the author as the more complete result was
recently proved by A.Quas and Y.Peres
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2006 11:32:43 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Aug 2008 13:21:49 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Jan 2009 10:44:08 GMT"
}
] | 2009-01-30T00:00:00 |
[
[
"Chigansky",
"Pavel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602075
|
Peter Jonsson
|
Vladimir Deineko, Peter Jonsson, Mikael Klasson, and Andrei Krokhin
|
The approximability of MAX CSP with fixed-value constraints
| null | null | null | null |
cs.CC
| null |
In the maximum constraint satisfaction problem (MAX CSP), one is given a
finite collection of (possibly weighted) constraints on overlapping sets of
variables, and the goal is to assign values from a given finite domain to the
variables so as to maximize the number (or the total weight, for the weighted
case) of satisfied constraints. This problem is NP-hard in general, and,
therefore, it is natural to study how restricting the allowed types of
constraints affects the approximability of the problem. In this paper, we show
that any MAX CSP problem with a finite set of allowed constraint types, which
includes all fixed-value constraints (i.e., constraints of the form x=a), is
either solvable exactly in polynomial-time or else is APX-complete, even if the
number of occurrences of variables in instances are bounded. Moreover, we
present a simple description of all polynomial-time solvable cases of our
problem. This description relies on the well-known algebraic combinatorial
property of supermodularity.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2006 14:13:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Deineko",
"Vladimir",
""
],
[
"Jonsson",
"Peter",
""
],
[
"Klasson",
"Mikael",
""
],
[
"Krokhin",
"Andrei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0602076
|
Ioannis Antonellis
|
Ioannis Antonellis and Efstratios Gallopoulos
|
Exploring term-document matrices from matrix models in text mining
|
SIAM Text Mining Workshop, SIAM Conference Data Mining, 2006
| null | null |
03/02-06
|
cs.IR cs.DB cs.DL
| null |
We explore a matrix-space model, that is a natural extension to the vector
space model for Information Retrieval. Each document can be represented by a
matrix that is based on document extracts (e.g. sentences, paragraphs,
sections). We focus on the performance of this model for the specific case in
which documents are originally represented as term-by-sentence matrices. We use
the singular value decomposition to approximate the term-by-sentence matrices
and assemble these results to form the pseudo-``term-document'' matrix that
forms the basis of a text mining method alternative to traditional VSM and LSI.
We investigate the singular values of this matrix and provide experimental
evidence suggesting that the method can be particularly effective in terms of
accuracy for text collections with multi-topic documents, such as web pages
with news.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2006 16:14:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Antonellis",
"Ioannis",
""
],
[
"Gallopoulos",
"Efstratios",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0602077
|
Vincent Schmitt RR
|
Vincent Schmitt and Krzysztof Worytkiewicz
|
Bisimulations of enrichments
| null | null | null | null |
cs.LO
| null |
In this paper we show that classical notions from automata theory such as
simulation and bisimulation can be lifted to the context of enriched
categories. The usual properties of bisimulation are nearly all preserved in
this new context. The class of enriched functors that correspond to functionnal
bisimulations surjective on objects is investigated and appears "nearly" open
in the sense of Joyal and Moerdijk. Seeing the change of base techniques as a
convenient means to define process refinement/abstractions, we give sufficient
conditions for the change of base categories to preserve bisimularity. We apply
these concepts to Betti's generalized automata, categorical transition systems,
and other exotic categories.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2006 17:27:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schmitt",
"Vincent",
""
],
[
"Worytkiewicz",
"Krzysztof",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0602078
|
Robert Burger PhD
|
John Robert Burger
|
Associative Memory For Reversible Programming and Charge Recovery
| null | null | null | null |
cs.AR cs.DC
| null |
Presented below is an interesting type of associative memory called toggle
memory based on the concept of T flip flops, as opposed to D flip flops. Toggle
memory supports both reversible programming and charge recovery. Circuits
designed using the principles delineated below permit matchlines to charge and
discharge with near zero energy dissipation. The resulting lethargy is
compensated by the massive parallelism of associative memory. Simulation
indicates over 33x reduction in energy dissipation using a sinusoidal power
supply at 2 MHz, assuming realistic 50 nm MOSFET models.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2006 21:58:06 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Feb 2006 23:59:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Burger",
"John Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0602079
|
Dumitru Mihai Ionescu Dr.
|
Dumitru Mihai Ionescu, Haidong Zhu
|
SISO APP Searches in Lattices with Tanner Graphs
|
15 pages, 6 figures, 2 tables, uses IEEEtran.cls
|
IEEE Trans. Inf. Theory, pp. 2672-2688, vol. 58, May 2012
|
10.1109/TIT.2011.2178130
| null |
cs.IT cs.DS math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An efficient, low-complexity, soft-output detector for general lattices is
presented, based on their Tanner graph (TG) representations. Closest-point
searches in lattices can be performed as non-binary belief propagation on
associated TGs; soft-information output is naturally generated in the process;
the algorithm requires no backtrack (cf. classic sphere decoding), and extracts
extrinsic information. A lattice's coding gain enables equivalence relations
between lattice points, which can be thereby partitioned in cosets. Total and
extrinsic a posteriori probabilities at the detector's output further enable
the use of soft detection information in iterative schemes. The algorithm is
illustrated via two scenarios that transmit a 32-point, uncoded
super-orthogonal (SO) constellation for multiple-input multiple-output (MIMO)
channels, carved from an 8-dimensional non-orthogonal lattice (a direct sum of
two 4-dimensional checkerboard lattice): it achieves maximum likelihood
performance in quasistatic fading; and, performs close to interference-free
transmission, and identically to list sphere decoding, in independent fading
with coordinate interleaving and iterative equalization and detection. Latter
scenario outperforms former despite the absence of forward error correction
coding---because the inherent lattice coding gain allows for the refining of
extrinsic information. The lattice constellation is the same as the one
employed in the SO space-time trellis codes first introduced for 2-by-2 MIMO by
Ionescu et al., then independently by Jafarkhani and Seshadri. Complexity is
log-linear in lattice dimensionality, vs. cubic in sphere decoders.
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2006 03:28:46 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Sep 2011 21:45:19 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Sep 2011 17:43:48 GMT"
}
] | 2012-05-29T00:00:00 |
[
[
"Ionescu",
"Dumitru Mihai",
""
],
[
"Zhu",
"Haidong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602080
|
Shripad Thite
|
Sheung-Hung Poon (1) and Shripad Thite (1) ((1) Department of
Mathematics and Computer Science, Technische Universiteit Eindhoven, The
Netherlands)
|
Pants Decomposition of the Punctured Plane
|
5 pages, 1 grayscale figure
| null | null | null |
cs.CG
| null |
A pants decomposition of an orientable surface S is a collection of simple
cycles that partition S into pants, i.e., surfaces of genus zero with three
boundary cycles. Given a set P of n points in the plane, we consider the
problem of computing a pants decomposition of the surface S which is the plane
minus P, of minimum total length. We give a polynomial-time approximation
scheme using Mitchell's guillotine rectilinear subdivisions. We give a
quartic-time algorithm to compute the shortest pants decomposition of S when
the cycles are restricted to be axis-aligned boxes, and a quadratic-time
algorithm when all the points lie on a line; both exact algorithms use dynamic
programming with Yao's speedup.
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2006 19:08:48 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Poon",
"Sheung-Hung",
""
],
[
"Thite",
"Shripad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0602081
|
Xudong Ma
|
Xudong Ma, En-hui Yang
|
Low-Density Parity-Check Code with Fast Decoding Speed
|
Will be submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Low-Density Parity-Check (LDPC) codes received much attention recently due to
their capacity-approaching performance. The iterative message-passing algorithm
is a widely adopted decoding algorithm for LDPC codes \cite{Kschischang01}. An
important design issue for LDPC codes is designing codes with fast decoding
speed while maintaining capacity-approaching performance. In another words, it
is desirable that the code can be successfully decoded in few number of
decoding iterations, at the same time, achieves a significant portion of the
channel capacity. Despite of its importance, this design issue received little
attention so far. In this paper, we address this design issue for the case of
binary erasure channel.
We prove that density-efficient capacity-approaching LDPC codes satisfy a so
called "flatness condition". We show an asymptotic approximation to the number
of decoding iterations. Based on these facts, we propose an approximated
optimization approach to finding the codes with good decoding speed. We further
show that the optimal codes in the sense of decoding speed are
"right-concentrated". That is, the degrees of check nodes concentrate around
the average right degree.
|
[
{
"version": "v1",
"created": "Thu, 23 Feb 2006 20:14:12 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Ma",
"Xudong",
""
],
[
"Yang",
"En-hui",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602082
|
Richard McClatchey
|
Zaheer Abbas Khan, Mohammed Odeh, Richard McClatchey
|
Digital Libraries: From Process Modelling to Grid-based Service Oriented
Architecture
|
6 pages, 5 figures, 1 table. The 2nd international conference on
Information and Communication Technologies from Theory to Application
(ICTTA06
| null | null | null |
cs.DL cs.SE
| null |
Graphical Business Process Modelling Languages (BPML) like Role Activity
Diagrams (RAD) provide ease and flexibility for modelling business behaviour.
However, these languages show limited applicability in terms of enactment over
distributed systems paradigms like Service Oriented Architecture (SOA) based
grid computing. This paper investigates RAD modelling of a Scientific
Publishing Process (SPP) for Digital Libraries (DL) and tries to determine the
suitability of Pi-Calculus based formal approaches to enact SOA based grid
computing. In order to achieve this purpose, the Pi-Calculus based formal
transformation from a RAD model of SPP for DL draws attention towards a number
of challenging issues including issues that require particular design
considerations for appropriate enactment in a SOA based grid system.
|
[
{
"version": "v1",
"created": "Thu, 23 Feb 2006 23:12:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Khan",
"Zaheer Abbas",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0602083
|
Marco Frailis
|
Marco Frailis, Oriana Mansutti, Praveen Boinee, Giuseppe Cabras,
Alessandro De Angelis, Barbara De Lotto, Alberto Forti, Mauro Dell'Orso,
Riccardo Paoletti, Angelo Scribano, Nicola Turini, Mose' Mariotti, Luigi
Peruzzo, Antonio Saggion
|
A third level trigger programmable on FPGA for the gamma/hadron
separation in a Cherenkov telescope using pseudo-Zernike moments and the SVM
classifier
| null | null |
10.1142/9789812773548_0024
| null |
cs.CV cs.AI
| null |
We studied the application of the Pseudo-Zernike features as image parameters
(instead of the Hillas parameters) for the discrimination between the images
produced by atmospheric electromagnetic showers caused by gamma-rays and the
ones produced by atmospheric electromagnetic showers caused by hadrons in the
MAGIC Experiment. We used a Support Vector Machine as classification algorithm
with the computed Pseudo-Zernike features as classification parameters. We
implemented on a FPGA board a kernel function of the SVM and the Pseudo-Zernike
features to build a third level trigger for the gamma-hadron separation task of
the MAGIC Experiment.
|
[
{
"version": "v1",
"created": "Fri, 24 Feb 2006 17:29:08 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Frailis",
"Marco",
""
],
[
"Mansutti",
"Oriana",
""
],
[
"Boinee",
"Praveen",
""
],
[
"Cabras",
"Giuseppe",
""
],
[
"De Angelis",
"Alessandro",
""
],
[
"De Lotto",
"Barbara",
""
],
[
"Forti",
"Alberto",
""
],
[
"Dell'Orso",
"Mauro",
""
],
[
"Paoletti",
"Riccardo",
""
],
[
"Scribano",
"Angelo",
""
],
[
"Turini",
"Nicola",
""
],
[
"Mariotti",
"Mose'",
""
],
[
"Peruzzo",
"Luigi",
""
],
[
"Saggion",
"Antonio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.