id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0602084
|
Boris Ryabko
|
Boris Ryabko, Jaakko Astola
|
Universal Codes as a Basis for Time Series Testing
|
accepted for "Statistical Methodology" (Elsevier)
| null | null | null |
cs.IT math.IT
| null |
We suggest a new approach to hypothesis testing for ergodic and stationary
processes. In contrast to standard methods, the suggested approach gives a
possibility to make tests, based on any lossless data compression method even
if the distribution law of the codeword lengths is not known. We apply this
approach to the following four problems: goodness-of-fit testing (or identity
testing), testing for independence, testing of serial independence and
homogeneity testing and suggest nonparametric statistical tests for these
problems. It is important to note that practically used so-called archivers can
be used for suggested testing.
|
[
{
"version": "v1",
"created": "Sat, 25 Feb 2006 07:37:56 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ryabko",
"Boris",
""
],
[
"Astola",
"Jaakko",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602085
|
Michael Baer
|
Michael B. Baer
|
Twenty (or so) Questions: $D$-ary Length-Bounded Prefix Coding
|
12 pages, 4 figures, extended version of cs/0701012 (accepted to ISIT
2007), formerly "Twenty (or so) Questions: $D$-ary Bounded-Length Huffman
Coding"
| null | null | null |
cs.IT cs.DS math.IT
| null |
Efficient optimal prefix coding has long been accomplished via the Huffman
algorithm. However, there is still room for improvement and exploration
regarding variants of the Huffman problem. Length-limited Huffman coding,
useful for many practical applications, is one such variant, for which codes
are restricted to the set of codes in which none of the $n$ codewords is longer
than a given length, $l_{\max}$. Binary length-limited coding can be done in
$O(n l_{\max})$ time and O(n) space via the widely used Package-Merge algorithm
and with even smaller asymptotic complexity using a lesser-known algorithm. In
this paper these algorithms are generalized without increasing complexity in
order to introduce a minimum codeword length constraint $l_{\min}$, to allow
for objective functions other than the minimization of expected codeword
length, and to be applicable to both binary and nonbinary codes; nonbinary
codes were previously addressed using a slower dynamic programming approach.
These extensions have various applications -- including fast decompression and
a modified version of the game ``Twenty Questions'' -- and can be used to solve
the problem of finding an optimal code with limited fringe, that is, finding
the best code among codes with a maximum difference between the longest and
shortest codewords. The previously proposed method for solving this problem was
nonpolynomial time, whereas solving this using the novel linear-space algorithm
requires only $O(n (l_{\max}- l_{\min})^2)$ time, or even less if $l_{\max}-
l_{\min}$ is not $O(\log n)$.
|
[
{
"version": "v1",
"created": "Sat, 25 Feb 2006 19:09:11 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2006 01:20:41 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Apr 2006 05:39:00 GMT"
},
{
"version": "v4",
"created": "Wed, 20 Jun 2007 19:47:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602086
|
Pascal Vontobel
|
Ralf Koetter and Pascal O. Vontobel
|
On the Block Error Probability of LP Decoding of LDPC Codes
| null |
Proc. Inaugural Workshop of the Center for Information Theory and
its Applications, UC San Diego, San Diego, CA, USA, Feb. 6-10, 2006
| null | null |
cs.IT math.IT
| null |
In his thesis, Wiberg showed the existence of thresholds for families of
regular low-density parity-check codes under min-sum algorithm decoding. He
also derived analytic bounds on these thresholds. In this paper, we formulate
similar results for linear programming decoding of regular low-density
parity-check codes.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 00:43:13 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Koetter",
"Ralf",
""
],
[
"Vontobel",
"Pascal O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602087
|
Pascal Vontobel
|
Pascal O. Vontobel and Ralf Koetter
|
Bounds on the Threshold of Linear Programming Decoding
| null |
Proc. IEEE Information Theory Workshop (ITW 2006), Punta del Este,
Uruguay, March 13-17, 2006
| null | null |
cs.IT math.IT
| null |
Whereas many results are known about thresholds for ensembles of low-density
parity-check codes under message-passing iterative decoding, this is not the
case for linear programming decoding. Towards closing this knowledge gap, this
paper presents some bounds on the thresholds of low-density parity-check code
ensembles under linear programming decoding.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 00:59:25 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Vontobel",
"Pascal O.",
""
],
[
"Koetter",
"Ralf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602088
|
Pascal Vontobel
|
Pascal O. Vontobel and Ralf Koetter
|
Towards Low-Complexity Linear-Programming Decoding
| null |
Proc. 4th Int. Symposium on Turbo Codes and Related Topics,
Munich, Germany, April 3-7, 2006
| null | null |
cs.IT math.IT
| null |
We consider linear-programming (LP) decoding of low-density parity-check
(LDPC) codes. While it is clear that one can use any general-purpose LP solver
to solve the LP that appears in the decoding problem, we argue in this paper
that the LP at hand is equipped with a lot of structure that one should take
advantage of. Towards this goal, we study the dual LP and show how
coordinate-ascent methods lead to very simple update rules that are tightly
connected to the min-sum algorithm. Moreover, replacing minima in the formula
of the dual LP with soft-minima one obtains update rules that are tightly
connected to the sum-product algorithm. This shows that LP solvers with
complexity similar to the min-sum algorithm and the sum-product algorithm are
feasible. Finally, we also discuss some sub-gradient-based methods.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 01:20:51 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Vontobel",
"Pascal O.",
""
],
[
"Koetter",
"Ralf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602089
|
Pascal Vontobel
|
Roxana Smarandache and Pascal O. Vontobel
|
Pseudo-Codeword Analysis of Tanner Graphs from Projective and Euclidean
Planes
|
Submitted to IEEE Transactions on Information Theory, February 25,
2006
| null | null | null |
cs.IT cs.DM math.IT
| null |
In order to understand the performance of a code under maximum-likelihood
(ML) decoding, one studies the codewords, in particular the minimal codewords,
and their Hamming weights. In the context of linear programming (LP) decoding,
one's attention needs to be shifted to the pseudo-codewords, in particular to
the minimal pseudo-codewords, and their pseudo-weights. In this paper we
investigate some families of codes that have good properties under LP decoding,
namely certain families of low-density parity-check (LDPC) codes that are
derived from projective and Euclidean planes: we study the structure of their
minimal pseudo-codewords and give lower bounds on their pseudo-weight.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 01:33:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Smarandache",
"Roxana",
""
],
[
"Vontobel",
"Pascal O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602090
|
Shanghua Teng
|
Li-Sha Huang and Shang-Hua Teng
|
On the Approximation and Smoothed Complexity of Leontief Market
Equilibria
| null | null | null | null |
cs.GT cs.CC
| null |
We show that the problem of finding an \epsilon-approximate Nash equilibrium
of an n by n two-person games can be reduced to the computation of an
(\epsilon/n)^2-approximate market equilibrium of a Leontief economy. Together
with a recent result of Chen, Deng and Teng, this polynomial reduction implies
that the Leontief market exchange problem does not have a fully polynomial-time
approximation scheme, that is, there is no algorithm that can compute an
\epsilon-approximate market equilibrium in time polynomial in m, n, and
1/\epsilon, unless PPAD is not in P, We also extend the analysis of our
reduction to show, unless PPAD is not in RP, that the smoothed complexity of
the Scarf's general fixed-point approximation algorithm (when applying to solve
the approximate Leontief market exchange problem) or of any algorithm for
computing an approximate market equilibrium of Leontief economies is not
polynomial in n and 1/\sigma, under Gaussian or uniform perturbations with
magnitude \sigma.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 07:53:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Huang",
"Li-Sha",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0602091
|
Young-Han Kim
|
Young-Han Kim
|
Feedback Capacity of Stationary Gaussian Channels
|
64 pages, submitted to IEEE Trans. Inform. Theory
| null | null | null |
cs.IT math.IT
| null |
The feedback capacity of additive stationary Gaussian noise channels is
characterized as the solution to a variational problem. Toward this end, it is
proved that the optimal feedback coding scheme is stationary. When specialized
to the first-order autoregressive moving average noise spectrum, this
variational characterization yields a closed-form expression for the feedback
capacity. In particular, this result shows that the celebrated
Schalkwijk-Kailath coding scheme achieves the feedback capacity for the
first-order autoregressive moving average Gaussian channel, positively
answering a long-standing open problem studied by Butman, Schalkwijk-Tiernan,
Wolfowitz, Ozarow, Ordentlich, Yang-Kavcic-Tatikonda, and others. More
generally, it is shown that a k-dimensional generalization of the
Schalkwijk-Kailath coding scheme achieves the feedback capacity for any
autoregressive moving average noise spectrum of order k. Simply put, the
optimal transmitter iteratively refines the receiver's knowledge of the
intended message.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 08:11:33 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kim",
"Young-Han",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0602092
|
Martin Wainwright
|
Martin J. Wainwright
|
Inconsistent parameter estimation in Markov random fields: Benefits in
the computation-limited setting
|
UC Berkeley, Department of Statistics; Technical Report 690
| null | null | null |
cs.LG cs.IT math.IT math.ST stat.TH
| null |
Consider the problem of joint parameter estimation and prediction in a Markov
random field: i.e., the model parameters are estimated on the basis of an
initial set of data, and then the fitted model is used to perform prediction
(e.g., smoothing, denoising, interpolation) on a new noisy observation. Working
under the restriction of limited computation, we analyze a joint method in
which the \emph{same convex variational relaxation} is used to construct an
M-estimator for fitting parameters, and to perform approximate marginalization
for the prediction step. The key result of this paper is that in the
computation-limited setting, using an inconsistent parameter estimator (i.e.,
an estimator that returns the ``wrong'' model even in the infinite data limit)
can be provably beneficial, since the resulting errors can partially compensate
for errors made by using an approximate prediction technique. En route to this
result, we analyze the asymptotic properties of M-estimators based on convex
variational relaxations, and establish a Lipschitz stability property that
holds for a broad class of variational methods. We show that joint
estimation/prediction based on the reweighted sum-product algorithm
substantially outperforms a commonly used heuristic based on ordinary
sum-product.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2006 05:22:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wainwright",
"Martin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0602093
|
Francois Denis
|
Fran\c{c}ois Denis (LIF), Yann Esposito (LIF)
|
Rational stochastic languages
|
35 pages
| null | null | null |
cs.LG cs.CL
| null |
The goal of the present paper is to provide a systematic and comprehensive
study of rational stochastic languages over a semiring K \in {Q, Q +, R, R+}. A
rational stochastic language is a probability distribution over a free monoid
\Sigma^* which is rational over K, that is which can be generated by a
multiplicity automata with parameters in K. We study the relations between the
classes of rational stochastic languages S rat K (\Sigma). We define the notion
of residual of a stochastic language and we use it to investigate properties of
several subclasses of rational stochastic languages. Lastly, we study the
representation of rational stochastic languages by means of multiplicity
automata.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2006 10:08:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Denis",
"François",
"",
"LIF"
],
[
"Esposito",
"Yann",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0602094
|
Altyeb Taha mr
|
Altyeb Altaher
|
Effect of CSMA/CD on Self-Similarity of Network Traffic
|
4 pages, 2 figures
| null | null | null |
cs.NI
| null |
It is now well known that Internet traffic exhibits self-similarity, which
cannot be described by traditional Markovian models such as the Poisson
process. The causes of self-similarity of network traffic must be identified
because understanding the nature of network traffic is critical in order to
properly design and implement computer networks and network services like the
World Wide Web. While some researchers have argued self similarity is generated
by the typical applications or caused by Transport layer Protocols, it is also
possible that the CSMA/CD protocol may cause or at least contribute to this
phenomenon. In this paper, we use NS simulator to study the effect of CSMA/CD
Exponential Backoff retransmission algorithm on Traffic Self similarity.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2006 12:37:34 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Mar 2006 09:06:06 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Altaher",
"Altyeb",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0602095
|
Joseph O'Rourke
|
Mirela Damian, Robin Flatland, Joseph O'Rourke
|
Epsilon-Unfolding Orthogonal Polyhedra
|
23 pages, 20 figures, 7 references. Revised version improves language
and figures, updates references, and sharpens the conclusion
| null | null | null |
cs.CG
| null |
An unfolding of a polyhedron is produced by cutting the surface and
flattening to a single, connected, planar piece without overlap (except
possibly at boundary points). It is a long unsolved problem to determine
whether every polyhedron may be unfolded. Here we prove, via an algorithm, that
every orthogonal polyhedron (one whose faces meet at right angles) of genus
zero may be unfolded. Our cuts are not necessarily along edges of the
polyhedron, but they are always parallel to polyhedron edges. For a polyhedron
of n vertices, portions of the unfolding will be rectangular strips which, in
the worst case, may need to be as thin as epsilon = 1/2^{Omega(n)}.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2006 17:03:19 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2006 14:11:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Damian",
"Mirela",
""
],
[
"Flatland",
"Robin",
""
],
[
"O'Rourke",
"Joseph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0602096
|
Abhilash Ponnath
|
Abhilash Ponnath
|
Difficulties in the Implementation of Quantum Computers
|
6 pages
| null | null | null |
cs.AR
| null |
This paper reviews various engineering hurdles facing the field of quantum
computing. Specifically, problems related to decoherence, state preparation,
error correction, and implementability of gates are considered.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2006 18:59:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ponnath",
"Abhilash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0602097
|
Subhash Kak
|
Subhash Kak
|
The Cubic Public-Key Transformation
|
9 pages; typographical errors corrected
|
Circuits Systems and Signal Processing, vol 26, pp. 353-359, 2007
| null | null |
cs.CR
| null |
We propose the use of the cubic transformation for public-key applications
and digital signatures. Transformations modulo a prime p or a composite n=pq,
where p and q are primes, are used in such a fashion that each transformed
value has only 3 roots that makes it a more efficient transformation than the
squaring transformation of Rabin, which has 4 roots. Such a transformation,
together with additional tag information, makes it possible to uniquely invert
each transformed value. The method may be used for other exponents as well.
|
[
{
"version": "v1",
"created": "Tue, 28 Feb 2006 00:12:07 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jun 2006 19:26:59 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Kak",
"Subhash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0602098
|
M. H. van Emden
|
M.H. van Emden
|
Compositional Semantics for the Procedural Interpretation of Logic
|
17 pages; no figures
| null | null |
DCS-307-IR
|
cs.PL
| null |
Semantics of logic programs has been given by proof theory, model theory and
by fixpoint of the immediate-consequence operator. If clausal logic is a
programming language, then it should also have a compositional semantics.
Compositional semantics for programming languages follows the abstract syntax
of programs, composing the meaning of a unit by a mathematical operation on the
meanings of its constituent units. The procedural interpretation of logic has
only yielded an incomplete abstract syntax for logic programs. We complete it
and use the result as basis of a compositional semantics. We present for
comparison Tarski's algebraization of first-order predicate logic, which is in
substance the compositional semantics for his choice of syntax. We characterize
our semantics by equivalence with the immediate-consequence operator.
|
[
{
"version": "v1",
"created": "Tue, 28 Feb 2006 19:28:31 GMT"
},
{
"version": "v2",
"created": "Sun, 7 May 2006 17:41:17 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"van Emden",
"M. H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0602099
|
M. H. van Emden
|
H. Ibrahim and M.H. van Emden
|
Towards Applicative Relational Programming
|
10 pages; no figures
| null | null | null |
cs.PL
| null |
Functional programming comes in two flavours: one where ``functions are
first-class citizens'' (we call this applicative) and one which is based on
equations (we call this declarative). In relational programming clauses play
the role of equations. Hence Prolog is declarative. The purpose of this paper
is to provide in relational programming a mathematical basis for the relational
analog of applicative functional programming. We use the cylindric semantics of
first-order logic due to Tarski and provide a new notation for the required
cylinders that we call tables. We define the Table/Relation Algebra with
operators sufficient to translate Horn clauses into algebraic form. We
establish basic mathematical properties of these operators. We show how
relations can be first-class citizens, and devise mechanisms for modularity,
for local scoping of predicates, and for exporting/importing relations between
programs.
|
[
{
"version": "v1",
"created": "Tue, 28 Feb 2006 19:53:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ibrahim",
"H.",
""
],
[
"van Emden",
"M. H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603001
|
Alois Schl\"ogl
|
Alois Schl\"ogl
|
BioSig - An application of Octave
|
6 pages, submission for the Octave 2006 meeting
| null | null |
Octave2006/16
|
cs.MS
| null |
BioSig is an open source software library for biomedical signal processing.
Most users in the field are using Matlab; however, significant effort was
undertaken to provide compatibility to Octave, too. This effort has been widely
successful, only some non-critical components relying on a graphical user
interface are missing. Now, installing BioSig on Octave is as easy as on
Matlab. Moreover, a benchmark test based on BioSig has been developed and the
benchmark results of several platforms are presented.
|
[
{
"version": "v1",
"created": "Wed, 1 Mar 2006 15:45:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schlögl",
"Alois",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0603002
|
Cheng Qi
|
Qi Cheng
|
On comparing sums of square roots of small integers
| null | null | null | null |
cs.CG
| null |
Let $k$ and $n$ be positive integers, $n>k$. Define $r(n,k)$ to be the
minimum positive value of $$ |\sqrt{a_1} + ... + \sqrt{a_k} - \sqrt{b_1} - >...
-\sqrt{b_k} | $$ where $ a_1, a_2, ..., a_k, b_1, b_2, ..., b_k $ are positive
integers no larger than $n$. It is an important problem in computational
geometry to determine a good upper bound of $-\log r(n,k)$. In this paper we
prove an upper bound of $ 2^{O(n/\log n)} \log n$, which is better than the
best known result $O(2^{2k} \log n)$ whenever $ n \leq ck\log k$ for some
constant $c$. In particular, our result implies a {\em subexponential}
algorithm to compare two sums of square roots of integers of size $o(k\log k)$.
|
[
{
"version": "v1",
"created": "Tue, 28 Feb 2006 22:35:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cheng",
"Qi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0603003
|
Michel Fliess
|
Michel Fliess (LIX, INRIA Futurs)
|
Analyse non standard du bruit
| null | null | null | null |
cs.CE math.LO math.OC math.PR quant-ph
| null |
Thanks to the nonstandard formalization of fast oscillating functions, due to
P. Cartier and Y. Perrin, an appropriate mathematical framework is derived for
new non-asymptotic estimation techniques, which do not necessitate any
statistical analysis of the noises corrupting any sensor. Various applications
are deduced for multiplicative noises, for the length of the parametric
estimation windows, and for burst errors.
|
[
{
"version": "v1",
"created": "Wed, 1 Mar 2006 11:26:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fliess",
"Michel",
"",
"LIX, INRIA Futurs"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0603004
|
Juan J. Merelo Pr.
|
P.A. Castillo, M.G. Arenas, J.G. Castellano, J.J. Merelo, A. Prieto,
V. Rivas and G. Romero
|
Lamarckian Evolution and the Baldwin Effect in Evolutionary Neural
Networks
|
Presented in a Spanish conference, MAEB
| null | null | null |
cs.NE
| null |
Hybrid neuro-evolutionary algorithms may be inspired on Darwinian or
Lamarckian evolu- tion. In the case of Darwinian evolution, the Baldwin effect,
that is, the progressive incorporation of learned characteristics to the
genotypes, can be observed and leveraged to improve the search. The purpose of
this paper is to carry out an exper- imental study into how learning can
improve G-Prop genetic search. Two ways of combining learning and genetic
search are explored: one exploits the Baldwin effect, while the other uses a
Lamarckian strategy. Our experiments show that using a Lamarckian op- erator
makes the algorithm find networks with a low error rate, and the smallest size,
while using the Bald- win effect obtains MLPs with the smallest error rate, and
a larger size, taking longer to reach a solution. Both approaches obtain a
lower average error than other BP-based algorithms like RPROP, other evolu-
tionary methods and fuzzy logic based methods
|
[
{
"version": "v1",
"created": "Wed, 1 Mar 2006 12:26:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Castillo",
"P. A.",
""
],
[
"Arenas",
"M. G.",
""
],
[
"Castellano",
"J. G.",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Prieto",
"A.",
""
],
[
"Rivas",
"V.",
""
],
[
"Romero",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0603005
|
Santanu Maiti Kumar
|
Santanu K. Maiti
|
A Basic Introduction on Math-Link in Mathematica
|
14 pages, 2 figures
| null | null | null |
cs.MS cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Starting from the basic ideas of mathematica, we give a detailed description
about the way of linking of external programs with mathematica through proper
mathlink commands. This article may be quite helpful for the beginners to start
with and write programs in mathematica.
In the first part, we illustrate how to use a mathemtica notebook and write a
complete program in the notebook. Following with this, we also mention
elaborately about the utility of the local and global variables those are very
essential for writing a program in mathematica. All the commands needed for
doing different mathematical operations can be found with some proper examples
in the mathematica book written by Stephen Wolfram \cite{wolfram}.
In the rest of this article, we concentrate our study on the most significant
issue which is the process of linking of {\em external programs} with
mathematica, so-called the mathlink operation. By using proper mathlink
commands one can run very tedious jobs efficiently and the operations become
extremely fast.
|
[
{
"version": "v1",
"created": "Wed, 1 Mar 2006 14:29:19 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Sep 2008 06:41:22 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Oct 2008 05:39:49 GMT"
},
{
"version": "v4",
"created": "Mon, 20 Oct 2008 04:52:26 GMT"
}
] | 2008-10-20T00:00:00 |
[
[
"Maiti",
"Santanu K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603006
|
Jonathan Ben-Naim
|
Jonathan Ben-Naim (LIF)
|
Pivotal and Pivotal-discriminative Consequence Relations
| null |
Journal of Logic and Computation Volume 15, number 5 (2005)
679-700
|
10.1093/logcom/exi030
| null |
cs.LO
| null |
In the present paper, we investigate consequence relations that are both
paraconsistent and plausible (but still monotonic). More precisely, we put the
focus on pivotal consequence relations, i.e. those relations that can be
defined by a pivot (in the style of e.g. D. Makinson). A pivot is a fixed
subset of valuations which are considered to be the important ones in the
absolute sense. We worked with a general notion of valuation that covers e.g.
the classical valuations as well as certain kinds of many-valued valuations. In
the many-valued cases, pivotal consequence relations are paraconsistant (in
addition to be plausible), i.e. they are capable of drawing reasonable
conclusions which contain contradictions. We will provide in our general
framework syntactic characterizations of several families of pivotal relations.
In addition, we will provide, again in our general framework, characterizations
of several families of pivotal discriminative consequence relations. The latter
are defined exactly as the plain version, but contradictory conclusions are
rejected. We will also answer negatively a representation problem that was left
open by Makinson. Finally, we will put in evidence a connexion with X-logics
from Forget, Risch, and Siegel. The motivations and the framework of the
present paper are very close to those of a previous paper of the author which
is about preferential consequence relations.
|
[
{
"version": "v1",
"created": "Wed, 1 Mar 2006 15:15:46 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jun 2006 08:16:43 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Apr 2007 14:53:14 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Apr 2007 15:04:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0603007
|
Khaled Abdel-Ghaffar
|
Khaled A. S. Abdel-Ghaffar and Jos H. Weber
|
Complete Enumeration of Stopping Sets of Full-Rank Parity-Check Matrices
of Hamming Codes
|
7 pages, submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Stopping sets, and in particular their numbers and sizes, play an important
role in determining the performance of iterative decoders of linear codes over
binary erasure channels. In the 2004 Shannon Lecture, McEliece presented an
expression for the number of stopping sets of size three for a full-rank
parity-check matrix of the Hamming code. In this correspondence, we derive an
expression for the number of stopping sets of any given size for the same
parity-check matrix.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 06:06:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Abdel-Ghaffar",
"Khaled A. S.",
""
],
[
"Weber",
"Jos H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603008
|
Hao Chen
|
Hao Chen
|
Linear Secret Sharing from Algebraic-Geometric Codes
|
11 pages, note added in the new version
| null | null | null |
cs.CR cs.IT math.IT
| null |
It is well-known that the linear secret-sharing scheme (LSSS) can be
constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and
D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from
algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa
code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut,
and Zink(see [17], [18] and [19]). In this paper the linear secret-sharing
scheme from algebraic-geometric codes, which are non-threshold scheme for
curves of genus greater than 0, are presented . We analysis the minimal access
structure, $d_{min}$ and $d_{cheat}$([8]), (strongly) multiplicativity and the
applications in verifiable secret-sharing (VSS) scheme and secure multi-party
computation (MPC) of this construction([3] and [10-11]). Our construction also
offers many examples of the self-dually $GF(q)$-representable matroids and many
examples of new ideal linear secret-sharing schemes addressing to the problem
of the characterization of the access structures for ideal secret-sharing
schemes([3] and [9]). The access structures of the linear secret-sharing
schemes from the codes on elliptic curves are given explicitly. From the work
in this paper we can see that the algebraic-geometric structure of the
underlying algebraic curves is an important resource for secret-sharing,
matroid theory, verifiable secret-sharing and secure multi-party computation.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 02:58:07 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Mar 2006 06:24:55 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Mar 2006 02:07:03 GMT"
},
{
"version": "v4",
"created": "Fri, 10 Mar 2006 09:12:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Hao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603009
|
Sergio Servetto
|
Ron Dabora and Sergio D. Servetto (Cornell University)
|
An Achievability Result for the General Relay Channel
|
This correspondence article has been folded into the revision of
another paper of ours, cs.IT/0605135. This replacement paper explains why
| null | null | null |
cs.IT math.IT
| null |
See cs.IT/0605135: R. Dabora, S. D. Servetto; On the Role of
Estimate-and-Forward with Time-Sharing in Cooperative Communications.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 03:54:10 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Nov 2006 07:35:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dabora",
"Ron",
"",
"Cornell University"
],
[
"Servetto",
"Sergio D.",
"",
"Cornell University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603010
|
Ketan Savla
|
Ketan Savla, Emilio Frazzoli and Francesco Bullo
|
Asymptotic constant-factor approximation algorithm for the Traveling
Salesperson Problem for Dubins' vehicle
| null | null | null | null |
cs.RO
| null |
This article proposes the first known algorithm that achieves a
constant-factor approximation of the minimum length tour for a Dubins' vehicle
through $n$ points on the plane. By Dubins' vehicle, we mean a vehicle
constrained to move at constant speed along paths with bounded curvature
without reversing direction. For this version of the classic Traveling
Salesperson Problem, our algorithm closes the gap between previously
established lower and upper bounds; the achievable performance is of order
$n^{2/3}$.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 07:07:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Savla",
"Ketan",
""
],
[
"Frazzoli",
"Emilio",
""
],
[
"Bullo",
"Francesco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0603011
|
Alex Wiesmaier
|
A. Wiesmaier, U. Rauchschwalbe, C. Ludwig, B. Henhapl, M. Ruppert, J.
Buchmann
|
Intrinsically Legal-For-Trade Objects by Digital Signatures
|
4 pages, 0 figures
|
Sicherheit 2006: Sicherheit -- Schutz und Zuverlaessigkeit
| null | null |
cs.CR
| null |
The established techniques for legal-for-trade registration of weight values
meet the legal requirements, but in praxis they show serious disadvantages. We
report on the first implementation of intrinsically legal-for-trade objects,
namely weight values signed by the scale, that is accepted by the approval
authority. The strict requirements from both the approval- and the
verification-authority as well as the limitations due to the hardware of the
scale were a special challenge. The presented solution fulfills all legal
requirements and eliminates the existing practical disadvantages.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 13:59:31 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Wiesmaier",
"A.",
""
],
[
"Rauchschwalbe",
"U.",
""
],
[
"Ludwig",
"C.",
""
],
[
"Henhapl",
"B.",
""
],
[
"Ruppert",
"M.",
""
],
[
"Buchmann",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603012
|
Nils Hebbinghaus
|
Benjamin Doerr, Nils Hebbinghaus, S\"oren Werth
|
Improved Bounds and Schemes for the Declustering Problem
|
19 pages, 1 figure
| null | null | null |
cs.DM cs.DS
| null |
The declustering problem is to allocate given data on parallel working
storage devices in such a manner that typical requests find their data evenly
distributed on the devices. Using deep results from discrepancy theory, we
improve previous work of several authors concerning range queries to
higher-dimensional data. We give a declustering scheme with an additive error
of $O_d(\log^{d-1} M)$ independent of the data size, where $d$ is the
dimension, $M$ the number of storage devices and $d-1$ does not exceed the
smallest prime power in the canonical decomposition of $M$ into prime powers.
In particular, our schemes work for arbitrary $M$ in dimensions two and three.
For general $d$, they work for all $M\geq d-1$ that are powers of two.
Concerning lower bounds, we show that a recent proof of a
$\Omega_d(\log^{\frac{d-1}{2}} M)$ bound contains an error. We close the gap in
the proof and thus establish the bound.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 15:51:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Doerr",
"Benjamin",
""
],
[
"Hebbinghaus",
"Nils",
""
],
[
"Werth",
"Sören",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0603013
|
Heide Gluesing-Luerssen
|
Heide Gluesing-Luerssen, Gert Schneider
|
On the MacWilliams Identity for Convolutional Codes
| null | null | null | null |
cs.IT math.IT math.OC
| null |
The adjacency matrix associated with a convolutional code collects in a
detailed manner information about the weight distribution of the code. A
MacWilliams Identity Conjecture, stating that the adjacency matrix of a code
fully determines the adjacency matrix of the dual code, will be formulated, and
an explicit formula for the transformation will be stated. The formula involves
the MacWilliams matrix known from complete weight enumerators of block codes.
The conjecture will be proven for the class of convolutional codes where either
the code itself or its dual does not have Forney indices bigger than one. For
the general case the conjecture is backed up by many examples, and a weaker
version will be established.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 17:57:02 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Schneider",
"Gert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0603014
|
Carlos Munuera
|
C. Carvalho, C. Munuera, E. Silva, F. Torres
|
Near orders and codes
|
15 pages
| null | null | null |
cs.IT math.IT
| null |
Hoholdt, van Lint and Pellikaan used order functions to construct codes by
means of Linear Algebra and Semigroup Theory only. However, Geometric Goppa
codes that can be represented by this method are mainly those based on just one
point. In this paper we introduce the concept of near order function with the
aim of generalize this approach in such a way that a of wider family of
Geometric Goppa codes can be studied on a more elementary setting.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 18:31:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Carvalho",
"C.",
""
],
[
"Munuera",
"C.",
""
],
[
"Silva",
"E.",
""
],
[
"Torres",
"F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603015
|
Pritam Rajagopal
|
Pritam Rajagopal
|
The Basic Kak Neural Network with Complex Inputs
|
17 pages, 9 figures, 7 tables
| null | null | null |
cs.NE
| null |
The Kak family of neural networks is able to learn patterns quickly, and this
speed of learning can be a decisive advantage over other competing models in
many applications. Amongst the implementations of these networks are those
using reconfigurable networks, FPGAs and optical networks. In some
applications, it is useful to use complex data, and it is with that in mind
that this introduction to the basic Kak network with complex inputs is being
presented. The training algorithm is prescriptive and the network weights are
assigned simply upon examining the inputs. The input is mapped using quaternary
encoding for purpose of efficienty. This network family is part of a larger
hierarchy of learning schemes that include quantum models.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 23:59:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rajagopal",
"Pritam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0603016
|
M. H. van Emden
|
M.H. van Emden and S.C. Somosan
|
Object-Oriented Modeling of Programming Paradigms
|
Re-written introduction and abstract, new title, some references
deleted; 10 pages; 4 figures
| null | null |
DCS-310-IR
|
cs.SE cs.PL
| null |
For the right application, the use of programming paradigms such as
functional or logic programming can enormously increase productivity in
software development. But these powerful paradigms are tied to exotic
programming languages, while the management of software development dictates
standardization on a single language.
This dilemma can be resolved by using object-oriented programming in a new
way. It is conventional to analyze an application by object-oriented modeling.
In the new approach, the analysis identifies the paradigm that is ideal for the
application; development starts with object-oriented modeling of the paradigm.
In this paper we illustrate the new approach by giving examples of
object-oriented modeling of dataflow and constraint programming. These examples
suggest that it is no longer necessary to embody a programming paradigm in a
language dedicated to it.
|
[
{
"version": "v1",
"created": "Fri, 3 Mar 2006 05:19:42 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Nov 2006 18:46:06 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"van Emden",
"M. H.",
""
],
[
"Somosan",
"S. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603017
|
Paulin Jacobe De Naurois
|
Paulin Jacob\'e De Naurois (LIPN)
|
A Measure of Space for Computing over the Reals
| null |
Logical Approaches to Computational Barriers Second Conference on
Computability in Europe, CiE 2006, Royaume-Uni (2006) 231-240
| null | null |
cs.CC
| null |
We propose a new complexity measure of space for the BSS model of
computation. We define LOGSPACE\_W and PSPACE\_W complexity classes over the
reals. We prove that LOGSPACE\_W is included in NC^2\_R and in P\_W, i.e. is
small enough for being relevant. We prove that the Real Circuit Decision
Problem is P\_R-complete under LOGSPACE\_W reductions, i.e. that LOGSPACE\_W is
large enough for containing natural algorithms. We also prove that PSPACE\_W is
included in PAR\_R.
|
[
{
"version": "v1",
"created": "Fri, 3 Mar 2006 13:27:45 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Jul 2006 11:56:34 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"De Naurois",
"Paulin Jacobé",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0603018
|
Siddharth Ray
|
Siddharth Ray, Muriel Medard and Lizhong Zheng
|
On Non-coherent MIMO Channels in the Wideband Regime: Capacity and
Reliability
| null | null | null | null |
cs.IT math.IT
| null |
We consider a multiple-input, multiple-output (MIMO) wideband Rayleigh block
fading channel where the channel state is unknown to both the transmitter and
the receiver and there is only an average power constraint on the input. We
compute the capacity and analyze its dependence on coherence length, number of
antennas and receive signal-to-noise ratio (SNR) per degree of freedom. We
establish conditions on the coherence length and number of antennas for the
non-coherent channel to have a "near coherent" performance in the wideband
regime. We also propose a signaling scheme that is near-capacity achieving in
this regime.
We compute the error probability for this wideband non-coherent MIMO channel
and study its dependence on SNR, number of transmit and receive antennas and
coherence length. We show that error probability decays inversely with
coherence length and exponentially with the product of the number of transmit
and receive antennas. Moreover, channel outage dominates error probability in
the wideband regime. We also show that the critical as well as cut-off rates
are much smaller than channel capacity in this regime.
|
[
{
"version": "v1",
"created": "Fri, 3 Mar 2006 22:41:58 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ray",
"Siddharth",
""
],
[
"Medard",
"Muriel",
""
],
[
"Zheng",
"Lizhong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603019
|
Leandro R\^ego
|
Joseph Y. Halpern and Leandro Chaves Rego
|
Characterizing the NP-PSPACE Gap in the Satisfiability Problem for Modal
Logic
|
6 pages
| null | null | null |
cs.LO cs.CC
| null |
There has been a great of work on characterizing the complexity of the
satisfiability and validity problem for modal logics. In particular, Ladner
showed that the validity problem for all logics between K, T, and S4 is {\sl
PSPACE}-complete, while for S5 it is {\sl NP}-complete. We show that, in a
precise sense, it is \emph{negative introspection}, the axiom $\neg K p \rimp K
\neg K p$, that causes the gap. In a precise sense, if we require this axiom,
then the satisfiability problem is {\sl NP}-complete; without it, it is {\sl
PSPACE}-complete.
|
[
{
"version": "v1",
"created": "Sun, 5 Mar 2006 23:11:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro Chaves",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0603020
|
Leandro R\^ego
|
Joseph Y. halpern and Leandro Chaves Rego
|
Reasoning About Knowledge of Unawareness
|
32 pages
| null | null | null |
cs.LO cs.MA
| null |
Awareness has been shown to be a useful addition to standard epistemic logic
for many applications. However, standard propositional logics for knowledge and
awareness cannot express the fact that an agent knows that there are facts of
which he is unaware without there being an explicit fact that the agent knows
he is unaware of. We propose a logic for reasoning about knowledge of
unawareness, by extending Fagin and Halpern's \emph{Logic of General
Awareness}. The logic allows quantification over variables, so that there is a
formula in the language that can express the fact that ``an agent explicitly
knows that there exists a fact of which he is unaware''. Moreover, that formula
can be true without the agent explicitly knowing that he is unaware of any
particular formula. We provide a sound and complete axiomatization of the
logic, using standard axioms from the literature to capture the quantification
operator. Finally, we show that the validity problem for the logic is
recursively enumerable, but not decidable.
|
[
{
"version": "v1",
"created": "Sun, 5 Mar 2006 21:14:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro Chaves",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0603021
|
Joy Mukherjee
|
Joy Mukherjee, Srinidhi Varadarajan
|
Language Support for Optional Functionality
|
6 pages, 8 figures
| null | null | null |
cs.PL cs.OS cs.SE
| null |
We recommend a programming construct - availability check - for programs that
need to automatically adjust to presence or absence of segments of code. The
idea is to check the existence of a valid definition before a function call is
invoked. The syntax is that of a simple 'if' statement. The vision is to enable
customization of application functionality through addition or removal of
optional components, but without requiring complete re-building. Focus is on
C-like compiled procedural languages and UNIX-based systems. Essentially, our
approach attempts to combine the flexibility of dynamic libraries with the
usability of utility (dependency) libraries. We outline the benefits over
prevalent strategies mainly in terms of development complexity, crudely
measured as lesser lines of code. We also allude to performance and flexibility
facets. A Preliminary implementation and figures from early experimental
evaluation are presented.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2006 00:46:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mukherjee",
"Joy",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0603022
|
Siddharth Ray
|
Siddharth Ray, Michelle Effros, Muriel Medard, Ralf Koetter, Tracey
Ho, David Karger and Jinane Abounadi
|
On Separation, Randomness and Linearity for Network Codes over Finite
Fields
| null | null | null |
MIT LIDS Technical Report 2687
|
cs.IT math.IT
| null |
We examine the issue of separation and code design for networks that operate
over finite fields. We demonstrate that source-channel (or source-network)
separation holds for several canonical network examples like the noisy multiple
access channel and the erasure degraded broadcast channel, when the whole
network operates over a common finite field. This robustness of separation is
predicated on the fact that noise and inputs are independent, and we examine
the failure of separation when noise is dependent on inputs in multiple access
channels.
Our approach is based on the sufficiency of linear codes. Using a simple and
unifying framework, we not only re-establish with economy the optimality of
linear codes for single-transmitter, single-receiver channels and for
Slepian-Wolf source coding, but also establish the optimality of linear codes
for multiple access and for erasure degraded broadcast channels. The linearity
allows us to obtain simple optimal code constructions and to study capacity
regions of the noisy multiple access and the degraded broadcast channel. The
linearity of both source and network coding blurs the delineation between
source and network codes. While our results point to the fact that separation
of source coding and channel coding is optimal in some canonical networks, we
show that decomposing networks into canonical subnetworks may not be effective.
Thus, we argue that it may be the lack of decomposability of a network into
canonical network modules, rather than the lack of separation between source
and channel coding, that presents major challenges for coding over networks.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2006 16:52:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ray",
"Siddharth",
""
],
[
"Effros",
"Michelle",
""
],
[
"Medard",
"Muriel",
""
],
[
"Koetter",
"Ralf",
""
],
[
"Ho",
"Tracey",
""
],
[
"Karger",
"David",
""
],
[
"Abounadi",
"Jinane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603023
|
Marcus Hutter
|
Viktor Zhumatiy and Faustino Gomez and Marcus Hutter and Juergen
Schmidhuber
|
Metric State Space Reinforcement Learning for a Vision-Capable Mobile
Robot
|
14 pages, 8 figures
|
Proc. 9th International Conf. on Intelligent Autonomous Systems
(IAS 2006) pages 272-281
| null |
IDSIA-05-06
|
cs.RO cs.LG
| null |
We address the problem of autonomously learning controllers for
vision-capable mobile robots. We extend McCallum's (1995) Nearest-Sequence
Memory algorithm to allow for general metrics over state-action trajectories.
We demonstrate the feasibility of our approach by successfully running our
algorithm on a real mobile robot. The algorithm is novel and unique in that it
(a) explores the environment and learns directly on a mobile robot without
using a hand-made computer model as an intermediate step, (b) does not require
manual discretization of the sensor input space, (c) works in piecewise
continuous perceptual spaces, and (d) copes with partial observability.
Together this allows learning from much less experience compared to previous
methods.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2006 08:44:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zhumatiy",
"Viktor",
""
],
[
"Gomez",
"Faustino",
""
],
[
"Hutter",
"Marcus",
""
],
[
"Schmidhuber",
"Juergen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0603024
|
Carl Lagoze
|
Carl Lagoze, Dean Krafft, Tim Cornwell, Dean Eckstrom, Susan Jesuroga,
Chris Wilper
|
Representing Contextualized Information in the NSDL
| null | null | null | null |
cs.DL
| null |
The NSDL (National Science Digital Library) is funded by the National Science
Foundation to advance science and match education. The inital product was a
metadata-based digital library providing search and access to distributed
resources. Our recent work recognizes the importance of context - relations,
metadata, annotations - for the pedagogical value of a digital library. This
new architecture uses Fedora, a tool for representing complex content, data,
metadata, web-based services, and semantic relationships, as the basis of an
information network overlay (INO). The INO provides an extensible knowl-edge
base for an expanding suite of digital library services.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2006 15:50:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lagoze",
"Carl",
""
],
[
"Krafft",
"Dean",
""
],
[
"Cornwell",
"Tim",
""
],
[
"Eckstrom",
"Dean",
""
],
[
"Jesuroga",
"Susan",
""
],
[
"Wilper",
"Chris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0603025
|
Stijn Heymans
|
Stijn Heymans, Davy Van Nieuwenborgh and Dirk Vermeir
|
Open Answer Set Programming with Guarded Programs
|
51 pages, 1 figure, accepted for publication in ACM's TOCL
| null | null | null |
cs.AI
| null |
Open answer set programming (OASP) is an extension of answer set programming
where one may ground a program with an arbitrary superset of the program's
constants. We define a fixed point logic (FPL) extension of Clark's completion
such that open answer sets correspond to models of FPL formulas and identify a
syntactic subclass of programs, called (loosely) guarded programs. Whereas
reasoning with general programs in OASP is undecidable, the FPL translation of
(loosely) guarded programs falls in the decidable (loosely) guarded fixed point
logic (mu(L)GF). Moreover, we reduce normal closed ASP to loosely guarded OASP,
enabling for the first time, a characterization of an answer set semantics by
muLGF formulas. We further extend the open answer set semantics for programs
with generalized literals. Such generalized programs (gPs) have interesting
properties, e.g., the ability to express infinity axioms. We restrict the
syntax of gPs such that both rules and generalized literals are guarded. Via a
translation to guarded fixed point logic, we deduce 2-exptime-completeness of
satisfiability checking in such guarded gPs (GgPs). Bound GgPs are restricted
GgPs with exptime-complete satisfiability checking, but still sufficiently
expressive to optimally simulate computation tree logic (CTL). We translate
Datalog lite programs to GgPs, establishing equivalence of GgPs under an open
answer set semantics, alternation-free muGF, and Datalog lite.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2006 17:54:59 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Feb 2007 12:32:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Heymans",
"Stijn",
""
],
[
"Van Nieuwenborgh",
"Davy",
""
],
[
"Vermeir",
"Dirk",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0603026
|
Valentin Polishchuk
|
Esther M. Arkin (1), Michael A. Bender (2), Joseph S. B. Mitchell (1),
Valentin Polishchuk (1) ((1) Department of Applied Mathematics and
Statistics, Stony Brook University, (2) Department of Computer Science, Stony
Brook University)
|
The Snowblower Problem
|
19 pages, 10 figures, 1 table. Submitted to WAFR 2006
| null | null | null |
cs.DS cs.CC cs.RO
| null |
We introduce the snowblower problem (SBP), a new optimization problem that is
closely related to milling problems and to some material-handling problems. The
objective in the SBP is to compute a short tour for the snowblower to follow to
remove all the snow from a domain (driveway, sidewalk, etc.). When a snowblower
passes over each region along the tour, it displaces snow into a nearby region.
The constraint is that if the snow is piled too high, then the snowblower
cannot clear the pile.
We give an algorithmic study of the SBP. We show that in general, the problem
is NP-complete, and we present polynomial-time approximation algorithms for
removing snow under various assumptions about the operation of the snowblower.
Most commercially-available snowblowers allow the user to control the direction
in which the snow is thrown. We differentiate between the cases in which the
snow can be thrown in any direction, in any direction except backwards, and
only to the right. For all cases, we give constant-factor approximation
algorithms; the constants increase as the throw direction becomes more
restricted.
Our results are also applicable to robotic vacuuming (or lawnmowing) with
bounded capacity dust bin and to some versions of material-handling problems,
in which the goal is to rearrange cartons on the floor of a warehouse.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2006 20:35:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Arkin",
"Esther M.",
""
],
[
"Bender",
"Michael A.",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Polishchuk",
"Valentin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0603027
|
Shuangquan Wang
|
Shuangquan Wang, Ali Abdi
|
On the Second-Order Statistics of the Instantaneous Mutual Information
in Rayleigh Fading Channels
|
11 pages, 6 figures, submitted to IEEE Trans. Inform. Theory, Dec.
2005
| null | null | null |
cs.IT math.IT
| null |
In this paper, the second-order statistics of the instantaneous mutual
information are studied, in time-varying Rayleigh fading channels, assuming
general non-isotropic scattering environments. Specifically, first the
autocorrelation function, correlation coefficient, level crossing rate, and the
average outage duration of the instantaneous mutual information are
investigated in single-input single-output (SISO) systems. Closed-form exact
expressions are derived, as well as accurate approximations in low- and
high-SNR regimes. Then, the results are extended to multiple-input
single-output and single-input multiple-output systems, as well as
multiple-input multiple-output systems with orthogonal space-time block code
transmission. Monte Carlo simulations are provided to verify the accuracy of
the analytical results. The results shed more light on the dynamic behavior of
the instantaneous mutual information in mobile fading channels.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2006 01:21:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Shuangquan",
""
],
[
"Abdi",
"Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603028
|
Jan Van den Bussche
|
Wim Janssen, Alexandr Korlyukov, Jan Van den Bussche
|
On the tree-transformation power of XSLT
| null |
Acta Informatica, Volume 43, Number 6 / January, 2007
|
10.1007/s00236-006-0026-8
| null |
cs.PL cs.DB
| null |
XSLT is a standard rule-based programming language for expressing
transformations of XML data. The language is currently in transition from
version 1.0 to 2.0. In order to understand the computational consequences of
this transition, we restrict XSLT to its pure tree-transformation capabilities.
Under this focus, we observe that XSLT~1.0 was not yet a computationally
complete tree-transformation language: every 1.0 program can be implemented in
exponential time. A crucial new feature of version~2.0, however, which allows
nodesets over temporary trees, yields completeness. We provide a formal
operational semantics for XSLT programs, and establish confluence for this
semantics.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2006 13:48:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Janssen",
"Wim",
""
],
[
"Korlyukov",
"Alexandr",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0603029
|
Abhishek Parakh
|
Abhishek Parakh
|
A d-Sequence based Recursive Random Number Generator
|
7 pages
|
Proceedings of International Symposium on System and Information
Security -- Sao Jose dos Campos: CTA/ITA/IEC, 2006. 542p
| null |
2006/310 Cryptology ePrint Archive
|
cs.CR
| null |
This paper proposes a new recursive technique using d-sequences to generate
random numbers.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2006 23:43:01 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Sep 2006 18:24:03 GMT"
}
] | 2007-06-13T00:00:00 |
[
[
"Parakh",
"Abhishek",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603030
|
Jonathan Adams
|
Jonathan K. Adams
|
A Service-Centric Approach to a Parameterized RBAC Service
| null |
In Proceedings of the 5th WSEAS International Conference on
Applied Computer Science (ACOS 2006)
|
10.5555/1973598.1973803
| null |
cs.CR
| null |
Significant research has been done in the area of Role Based Access Control
[RBAC]. Within this research there has been a thread of work focusing on adding
parameters to the role and permissions within RBAC. The primary benefit of
parameter support in RBAC comes in the form of a significant increase in
specificity in how permissions may be granted. This paper focuses on
implementing a parameterized implementation based heavily upon existing
standards.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 03:30:42 GMT"
}
] | 2021-01-12T00:00:00 |
[
[
"Adams",
"Jonathan K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603031
|
Wei Dai
|
Wei Dai, Youjian Liu, Brian Rider
|
Performance Analysis of CDMA Signature Optimization with Finite Rate
Feedback
|
6 pages, 3 figures, conference paper for CISS 2006
| null | null | null |
cs.IT cs.DM math.IT
| null |
We analyze the performance of CDMA signature optimization with finite rate
feedback. For a particular user, the receiver selects a signature vector from a
signature codebook to avoid the interference from other users, and feeds the
corresponding index back to this user through a finite rate and error-free
feedback link. We assume the codebook is randomly constructed where the entries
are independent and isotropically distributed. It has been shown that the
randomly constructed codebook is asymptotically optimal. In this paper, we
consider two types of signature selection criteria. One is to select the
signature vector that minimizes the interference from other users. The other
one is to select the signature vector to match the weakest interference
directions. By letting the processing gain, number of users and feedback bits
approach infinity with fixed ratios, we derive the exact asymptotic formulas to
calculate the average interference for both criteria. Our simulations
demonstrate the theoretical formulas. The analysis can be extended to evaluate
the signal-to-interference plus noise ratio performance for both match filter
and linear minimum mean-square error receivers.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 03:52:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Rider",
"Brian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603032
|
Somdeb Lahiri
|
Somdeb Lahiri
|
Market Equilibrium for Bundle Auctions and the Matching Core of
Nonnegative TU Games
|
17 pages
| null | null | null |
cs.GT
| null |
We discuss bundle auctions within the framework of an integer allocation
problem. We show that for multi-unit auctions, of which bundle auctions are a
special case, market equilibrium and constrained market equilibrium are
equivalent concepts. This equivalence, allows us to obtain a computable
necessary and sufficient condition for the existence of constrained market
equilibrium for bundle auctions. We use this result to obtain a necessary and
sufficient condition for the existence of market equilibrium for multi-unit
auctions. After obtaining the induced bundle auction of a nonnegative TU game,
we show that the existence of market equilibrium implies the existence of a
possibly different market equilibrium as well, which corresponds very naturally
to an outcome in the matching core of the TU game. Consequently we show that
the matching core of the nonnegative TU game is non-empty if and only if the
induced market game has a market equilibrium.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 12:45:19 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Mar 2006 05:29:06 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Apr 2006 10:08:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lahiri",
"Somdeb",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0603033
|
Vaghinak Petrosyan
|
Vaghinak Petrosyan
|
Inter-component communication methods in object-oriented frameworks
| null | null | null | null |
cs.SE
| null |
Modern frameworks for development of graphical interfaces are using the
native controls of the operating system. Because of that they are using
operating system events model for inter-component communication. We consider a
method to increase inter-component communication speed by sending messages from
one component to the other passing over the operating system. Besides the
messages subscription helps to avoid receiving of unnecessary messages.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 08:44:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Petrosyan",
"Vaghinak",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0603034
|
Ivan Jos\'e Varzinczak
|
Andreas Herzig and Ivan Varzinczak
|
Metatheory of actions: beyond consistency
| null | null | null | null |
cs.AI
| null |
Consistency check has been the only criterion for theory evaluation in
logic-based approaches to reasoning about actions. This work goes beyond that
and contributes to the metatheory of actions by investigating what other
properties a good domain description in reasoning about actions should have. We
state some metatheoretical postulates concerning this sore spot. When all
postulates are satisfied together we have a modular action theory. Besides
being easier to understand and more elaboration tolerant in McCarthy's sense,
modular theories have interesting properties. We point out the problems that
arise when the postulates about modularity are violated and propose algorithmic
checks that can help the designer of an action theory to overcome them.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 10:07:46 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Herzig",
"Andreas",
""
],
[
"Varzinczak",
"Ivan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0603035
|
Richard McClatchey
|
Chiara Del Frate, Jose Galvez, Tamas Hauer, David Manset, Richard
McClatchey, Mohammed Odeh, Dmitry Rogulin, Tony Solomonides, Ruth Warren
|
Final Results from and Exploitation Plans for MammoGrid
|
11 pages, 3 figures, 2 tables. Accepted at the 4th International
HealthGrid conference, Valencia Spain June 2006
| null | null | null |
cs.DC
| null |
The MammoGrid project has delivered the first deployed instance of a
healthgrid for clinical mammography that spans national boundaries. During the
last year, the final MammoGrid prototype has undergone a series of rigorous
tests undertaken by radiologists in the UK and Italy and this paper draws
conclusions from those tests for the benefit of the Healthgrid community. In
addition, lessons learned during the lifetime of the project are detailed and
recommendations drawn for future health applications using grids. Following the
completion of the project, plans have been put in place for the
commercialisation of the MammoGrid system and this is also reported in this
article. Particular emphasis is placed on the issues surrounding the transition
from collaborative research project to a marketable product. This paper
concludes by highlighting some of the potential areas of future development and
research.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:49:14 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Mar 2006 19:17:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Del Frate",
"Chiara",
""
],
[
"Galvez",
"Jose",
""
],
[
"Hauer",
"Tamas",
""
],
[
"Manset",
"David",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"Rogulin",
"Dmitry",
""
],
[
"Solomonides",
"Tony",
""
],
[
"Warren",
"Ruth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0603036
|
Richard McClatchey
|
Joerg Freund, Dorin Comaniciu, Yannis Ioannis, Peiya Liu, Richard
McClatchey, Edwin Morley-Fletcher, Xavier Pennec, Giacomo Pongiglione, Xiang
(Sean)ZHOU
|
Health-e-Child : An Integrated Biomedical Platform for Grid-Based
Paediatric Applications
|
12 pages, 2 figures. Accepted at the 4th International HealthGrid
conference, Valencia, Spain June 2006
| null | null | null |
cs.DC
| null |
There is a compelling demand for the integration and exploitation of
heterogeneous biomedical information for improved clinical practice, medical
research, and personalised healthcare across the EU. The Health-e-Child project
aims at developing an integrated healthcare platform for European Paediatrics,
providing seamless integration of traditional and emerging sources of
biomedical information. The long-term goal of the project is to provide
uninhibited access to universal biomedical knowledge repositories for
personalised and preventive healthcare, large-scale information-based
biomedical research and training, and informed policy making. The project focus
will be on individualised disease prevention, screening, early diagnosis,
therapy and follow-up of paediatric heart diseases, inflammatory diseases, and
brain tumours. The project will build a Grid-enabled European network of
leading clinical centres that will share and annotate biomedical data, validate
systems clinically, and diffuse clinical excellence across Europe by setting up
new technologies, clinical workflows, and standards. This paper outlines the
design approach being adopted in Health-e-Child to enable the delivery of an
integrated biomedical information platform.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:54:15 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Mar 2006 19:18:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Freund",
"Joerg",
"",
"Sean"
],
[
"Comaniciu",
"Dorin",
"",
"Sean"
],
[
"Ioannis",
"Yannis",
"",
"Sean"
],
[
"Liu",
"Peiya",
"",
"Sean"
],
[
"McClatchey",
"Richard",
"",
"Sean"
],
[
"Morley-Fletcher",
"Edwin",
"",
"Sean"
],
[
"Pennec",
"Xavier",
"",
"Sean"
],
[
"Pongiglione",
"Giacomo",
"",
"Sean"
],
[
"Xiang",
"",
"",
"Sean"
],
[
"ZHOU",
"",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0603037
|
Richard McClatchey
|
Haya El-Ghalayini, Mohammed Odeh, Richard McClatchey
|
Deriving Conceptual Data Models from Domain Ontologies for
Bioinformatics
|
6 pages, 1 figure. The 2nd international conference on Information
and Communication Technologies from Theory to Application (ICTTA06)
| null | null | null |
cs.SE
| null |
This paper studies the role that ontologies can play in establishing
conceptual data models during the process of information systems development. A
mapping algorithm has been proposed and embedded in a special purpose
Transformation-Engine to generate a conceptual data model from a given domain
ontology. In addition, this paper focuses on applying the proposed approach to
a bioinformatics context as the nature of biological data is considered a
barrier in representing biological conceptual data models. Both quantitative
and qualitative methods have been adopted to critically evaluate this new
approach. The results of this evaluation indicate that the quality of the
generated conceptual data models can reflect the problem domain entities and
the associations between them. The results are encouraging and support the
potential role that this approach can play in providing a suitable starting
point for conceptual data model development.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 13:59:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"El-Ghalayini",
"Haya",
""
],
[
"Odeh",
"Mohammed",
""
],
[
"McClatchey",
"Richard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0603038
|
Patrik O. Hoyer
|
Patrik O. Hoyer, Shohei Shimizu, Antti J. Kerminen
|
Estimation of linear, non-gaussian causal models in the presence of
confounding latent variables
|
8 pages, 4 figures, pdflatex
| null | null | null |
cs.AI
| null |
The estimation of linear causal models (also known as structural equation
models) from data is a well-known problem which has received much attention in
the past. Most previous work has, however, made an explicit or implicit
assumption of gaussianity, limiting the identifiability of the models. We have
recently shown (Shimizu et al, 2005; Hoyer et al, 2006) that for non-gaussian
distributions the full causal model can be estimated in the no hidden variables
case. In this contribution, we discuss the estimation of the model when
confounding latent variables are present. Although in this case uniqueness is
no longer guaranteed, there is at most a finite set of models which can fit the
data. We develop an algorithm for estimating this set, and describe numerical
simulations which confirm the theoretical arguments and demonstrate the
practical viability of the approach. Full Matlab code is provided for all
simulations.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 14:46:18 GMT"
},
{
"version": "v2",
"created": "Mon, 22 May 2006 17:02:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hoyer",
"Patrik O.",
""
],
[
"Shimizu",
"Shohei",
""
],
[
"Kerminen",
"Antti J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0603039
|
Wei Dai
|
Wei Dai, Youjian Liu, Brian Rider
|
Quantization Bounds on Grassmann Manifolds and Applications to MIMO
Communications
|
26 pages, 7 figures, submitted to IEEE Transactions on Information
Theory in Aug, 2005
| null | null | null |
cs.IT math.IT
| null |
This paper considers the quantization problem on the Grassmann manifold
\mathcal{G}_{n,p}, the set of all p-dimensional planes (through the origin) in
the n-dimensional Euclidean space. The chief result is a closed-form formula
for the volume of a metric ball in the Grassmann manifold when the radius is
sufficiently small. This volume formula holds for Grassmann manifolds with
arbitrary dimension n and p, while previous results pertained only to p=1, or a
fixed p with asymptotically large n. Based on this result, several quantization
bounds are derived for sphere packing and rate distortion tradeoff. We
establish asymptotically equivalent lower and upper bounds for the rate
distortion tradeoff. Since the upper bound is derived by constructing random
codes, this result implies that the random codes are asymptotically optimal.
The above results are also extended to the more general case, in which
\mathcal{G}_{n,q} is quantized through a code in \mathcal{G}_{n,p}, where p and
q are not necessarily the same. Finally, we discuss some applications of the
derived results to multi-antenna communication systems.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 16:58:27 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2006 02:53:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Rider",
"Brian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603040
|
Wei Dai
|
Wei Dai, Youjian Liu, Vincent K.N. Lau, Brian Rider
|
On the Information Rate of MIMO Systems with Finite Rate Channel State
Feedback Using Beamforming and Power On/Off Strategy
|
44 pages, 8 figures, submitted to IEEE Transactions on Information
Theory in 2005
| null | null | null |
cs.IT math.IT
| null |
It is well known that Multiple-Input Multiple-Output (MIMO) systems have high
spectral efficiency, especially when channel state information at the
transmitter (CSIT) is available. When CSIT is obtained by feedback, it is
practical to assume that the channel state feedback rate is finite and the CSIT
is not perfect. For such a system, we consider beamforming and power on/off
strategy for its simplicity and near optimality, where power on/off means that
a beamforming vector (beam) is either turned on with a constant power or turned
off. The main contribution of this paper is to accurately evaluate the
information rate as a function of the channel state feedback rate. Name a beam
turned on as an on-beam and the minimum number of the transmit and receive
antennas as the dimension of a MIMO system. We prove that the ratio of the
optimal number of on-beams and the system dimension converges to a constant for
a given signal-to-noise ratio (SNR) when the numbers of transmit and receive
antennas approach infinity simultaneously and when beamforming is perfect.
Asymptotic formulas are derived to evaluate this ratio and the corresponding
information rate per dimension. The asymptotic results can be accurately
applied to finite dimensional systems and suggest a power on/off strategy with
a constant number of on-beams. For this suboptimal strategy, we take a novel
approach to introduce power efficiency factor, which is a function of the
feedback rate, to quantify the effect of imperfect beamforming. By combining
power efficiency factor and the asymptotic formulas for perfect beamforming
case, the information rate of the power on/off strategy with a constant number
of on-beams is accurately characterized.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:08:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Lau",
"Vincent K. N.",
""
],
[
"Rider",
"Brian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603041
|
Prasanta K. Panigrahi
|
S. Hemachander, Amit Verma, Siddharth Arora, Prasanta K. Panigrahi
|
Locally Adaptive Block Thresholding Method with Continuity Constraint
|
12 Pages, 4 figures, 1 Table
| null | null | null |
cs.CV
| null |
We present an algorithm that enables one to perform locally adaptive block
thresholding, while maintaining image continuity. Images are divided into
sub-images based some standard image attributes and thresholding technique is
employed over the sub-images. The present algorithm makes use of the thresholds
of neighboring sub-images to calculate a range of values. The image continuity
is taken care by choosing the threshold of the sub-image under consideration to
lie within the above range. After examining the average range values for
various sub-image sizes of a variety of images, it was found that the range of
acceptable threshold values is substantially high, justifying our assumption of
exploiting the freedom of range for bringing out local details.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:14:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hemachander",
"S.",
""
],
[
"Verma",
"Amit",
""
],
[
"Arora",
"Siddharth",
""
],
[
"Panigrahi",
"Prasanta K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0603042
|
Will Scott II
|
Willie L. Scott II
|
The NoN Approach to Autonomic Face Recognition
|
15 pages, 6 figures, 6 tables
| null | null | null |
cs.NE
| null |
A method of autonomic face recognition based on the biologically plausible
network of networks (NoN) model of information processing is presented. The NoN
model is based on locally parallel and globally coordinated transformations in
which the neurons or computational units form distributed networks, which
themselves link to form larger networks. This models the structures in the
cerebral cortex described by Mountcastle and the architecture based on that
proposed for information processing by Sutton. In the proposed implementation,
face images are processed by a nested family of locally operating networks
along with a hierarchically superior network that classifies the information
from each of the local networks. The results of the experiments yielded a
maximum of 98.5% recognition accuracy and an average of 97.4% recognition
accuracy on a benchmark database.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:35:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Scott",
"Willie L.",
"II"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0603043
|
Mihai Patrascu
|
Mihai Patrascu and Mikkel Thorup
|
Time-Space Trade-Offs for Predecessor Search
|
29 pages. Full version (preliminary) of a paper appearing in STOC'06
| null | null | null |
cs.CC cs.DS
| null |
We develop a new technique for proving cell-probe lower bounds for static
data structures. Previous lower bounds used a reduction to communication games,
which was known not to be tight by counting arguments. We give the first lower
bound for an explicit problem which breaks this communication complexity
barrier. In addition, our bounds give the first separation between polynomial
and near linear space. Such a separation is inherently impossible by
communication complexity.
Using our lower bound technique and new upper bound constructions, we obtain
tight bounds for searching predecessors among a static set of integers. Given a
set Y of n integers of l bits each, the goal is to efficiently find
predecessor(x) = max{y in Y | y <= x}, by representing Y on a RAM using space
S.
In external memory, it follows that the optimal strategy is to use either
standard B-trees, or a RAM algorithm ignoring the larger block size. In the
important case of l = c*lg n, for c>1 (i.e. polynomial universes), and near
linear space (such as S = n*poly(lg n)), the optimal search time is Theta(lg
l). Thus, our lower bound implies the surprising conclusion that van Emde Boas'
classic data structure from [FOCS'75] is optimal in this case. Note that for
space n^{1+eps}, a running time of O(lg l / lglg l) was given by Beame and Fich
[STOC'99].
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2006 14:50:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Patrascu",
"Mihai",
""
],
[
"Thorup",
"Mikkel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0603044
|
Vadim Tropashko
|
Marshall Spight, Vadim Tropashko
|
First Steps in Relational Lattice
|
11 pages, 3 figures
| null | null | null |
cs.DB
| null |
Relational lattice reduces the set of six classic relational algebra
operators to two binary lattice operations: natural join and inner union. We
give an introduction to this theory with emphasis on formal algebraic laws. New
results include Spight distributivity criteria and its applications to query
transformations.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2006 18:11:49 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2006 04:54:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Spight",
"Marshall",
""
],
[
"Tropashko",
"Vadim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0603045
|
Balaji Nedurumalli
|
Balaji Nedurumalli
|
Information and Errors in Quantum Teleportation
|
5 pages
| null | null | null |
cs.IT math.IT
| null |
This article considers the question of the teleportation protocol from an
engineering perspective. The protocol ideally requires an authority that
ensures that the two communicating parties have a perfectly entangled pair of
particles available to them. But this cannot be unconditionally established to
the satisfaction of the parties due to the fact that an unknown quantum state
cannot be copied. This supports the view that quantum information cannot be
treated on the same basis as classical information.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2006 22:54:56 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Nedurumalli",
"Balaji",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603046
|
William Perkins
|
William Perkins
|
Trusted Certificates in Quantum Cryptography
|
4 pages, 2 figures
| null | null | null |
cs.CR
| null |
This paper analyzes the performance of Kak's three stage quantum
cryptographic protocol based on public key cryptography against a
man-in-the-middle attack. A method for protecting against such an attack is
presented using certificates distributed by a trusted third party.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2006 23:05:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Perkins",
"William",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603047
|
Simone Severini
|
Stefano Mancini and Simone Severini
|
The Quantum Separability Problem for Gaussian States
|
8 pages
|
Electronic Notes in Theoretical Computer Science, Volume 169 ,
March 2007, pp. 121-131
|
10.1016/j.entcs.2006.07.034
| null |
cs.CC quant-ph
| null |
Determining whether a quantum state is separable or entangled is a problem of
fundamental importance in quantum information science. This is a brief review
in which we consider the problem for states in infinite dimensional Hilbert
spaces. We show how the problem becomes tractable for a class of Gaussian
states.
|
[
{
"version": "v1",
"created": "Sun, 12 Mar 2006 14:33:41 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2006 12:38:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mancini",
"Stefano",
""
],
[
"Severini",
"Simone",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0603048
|
Vincent Limouzy
|
Binh Minh Bui Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy
(LIAFA), Fabien De Montgolfier (LIAFA)
|
Homogeneity vs. Adjacency: generalising some graph decomposition
algorithms
|
soumis \`{a} WG 2006
|
Graph-Theoretic Concepts in Computer Science Springer (Ed.)
(22/06/2006) 278-288
|
10.1007/11917496\_25
| null |
cs.DS
| null |
In this paper, a new general decomposition theory inspired from modular graph
decomposition is presented. Our main result shows that, within this general
theory, most of the nice algorithmic tools developed for modular decomposition
are still efficient. This theory not only unifies the usual modular
decomposition generalisations such as modular decomposition of directed graphs
or decomposition of 2-structures, but also star cutsets and bimodular
decomposition. Our general framework provides a decomposition algorithm which
improves the best known algorithms for bimodular decomposition.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2006 09:48:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Xuan",
"Binh Minh Bui",
"",
"LIRMM"
],
[
"Habib",
"Michel",
"",
"LIAFA"
],
[
"Limouzy",
"Vincent",
"",
"LIAFA"
],
[
"De Montgolfier",
"Fabien",
"",
"LIAFA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0603049
|
Heide Gluesing-Luerssen
|
Heide Gluesing-Luerssen and Gert Schneider
|
State Space Realizations and Monomial Equivalence for Convolutional
Codes
| null | null | null | null |
cs.IT math.IT math.OC
| null |
We will study convolutional codes with the help of state space realizations.
It will be shown that two such minimal realizations belong to the same code if
and only if they are equivalent under the full state feedback group. This
result will be used in order to prove that two codes with positive Forney
indices are monomially equivalent if and only if they share the same adjacency
matrix. The adjacency matrix counts in a detailed way the weights of all
possible outputs and thus contains full information about the weights of the
codewords in the given code.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2006 10:43:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Schneider",
"Gert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0603050
|
Irene Guessarian
|
Patrick Cegielski (LACL), Irene Guessarian (LIAFA), Yuri Matiyasevich
(PDMI)
|
Multiple serial episode matching
|
12
|
CSIT05 (2005) 26-38
|
10.1016/j.ipl.2006.02.008
| null |
cs.DS
| null |
In a previous paper we generalized the Knuth-Morris-Pratt (KMP) pattern
matching algorithm and defined a non-conventional kind of RAM, the MP--RAMs
(RAMS equipped with extra operations), and designed an O(n) on-line algorithm
for solving the serial episode matching problem on MP--RAMs when there is only
one single episode. We here give two extensions of this algorithm to the case
when we search for several patterns simultaneously and compare them. More
preciseley, given $q+1$ strings (a text $t$ of length $n$ and $q$ patterns
$m\_1,...,m\_q$) and a natural number $w$, the {\em multiple serial episode
matching problem} consists in finding the number of size $w$ windows of text
$t$ which contain patterns $m\_1,...,m\_q$ as subsequences, i.e. for each
$m\_i$, if $m\_i=p\_1,..., p\_k$, the letters $p\_1,..., p\_k$ occur in the
window, in the same order as in $m\_i$, but not necessarily consecutively (they
may be interleaved with other letters).} The main contribution is an algorithm
solving this problem on-line in time $O(nq)$.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2006 11:03:34 GMT"
}
] | 2021-10-26T00:00:00 |
[
[
"Cegielski",
"Patrick",
"",
"LACL"
],
[
"Guessarian",
"Irene",
"",
"LIAFA"
],
[
"Matiyasevich",
"Yuri",
"",
"PDMI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0603051
|
Andreas U. Schmidt
|
Nicolai Kuntze and Andreas U. Schmidt
|
Transitive trust in mobile scenarios
|
Pre-refereed version. To appear in Proceedings of the International
Conference on Emerging Trends in Information and Communication Security
(ETRICS 2006), Freiburg im Breisgau, Germany 6th-9th June 2006. Lecture Notes
in Computer Science, Springer-Verlag
| null | null | null |
cs.CR
| null |
Horizontal integration of access technologies to networks and services should
be accompanied by some kind of convergence of authentication technologies. The
missing link for the federation of user identities across the technological
boundaries separating authentication methods can be provided by trusted
computing platforms. The concept of establishing transitive trust by trusted
computing enables the desired crossdomain authentication functionality. The
focus of target application scenarios lies in the realm of mobile networks and
devices.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2006 11:14:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603052
|
Evgueni Petrov
|
Evgueni Petrov
|
Evaluation of interval extension of the power function by graph
decomposition
|
submitted to the INTERVAL 2006 workshop to be held in St. Petersburg
June 2006, Russia; extended abstract
| null | null | null |
cs.MS
| null |
The subject of our talk is the correct evaluation of interval extension of
the function specified by the expression x^y without any constraints on the
values of x and y. The core of our approach is a decomposition of the graph of
x^y into a small number of parts which can be transformed into subsets of the
graph of x^y for non-negative bases x. Because of this fact, evaluation of
interval extension of x^y, without any constraints on x and y, is not much
harder than evaluation of interval extension of x^y for non-negative bases x.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2006 12:05:08 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Mar 2006 12:48:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Petrov",
"Evgueni",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0603053
|
Irene Guessarian
|
A. Ai T -Bouziad (LIAFA), Irene Guessarian (LIAFA), L. Vieille (NCM)
|
Automatic generation of simplified weakest preconditions for integrity
constraint verification
| null | null | null | null |
cs.DS cs.DB
| null |
Given a constraint $c$ assumed to hold on a database $B$ and an update $u$ to
be performed on $B$, we address the following question: will $c$ still hold
after $u$ is performed? When $B$ is a relational database, we define a
confluent terminating rewriting system which, starting from $c$ and $u$,
automatically derives a simplified weakest precondition $wp(c,u)$ such that,
whenever $B$ satisfies $wp(c,u)$, then the updated database $u(B)$ will satisfy
$c$, and moreover $wp(c,u)$ is simplified in the sense that its computation
depends only upon the instances of $c$ that may be modified by the update. We
then extend the definition of a simplified $wp(c,u)$ to the case of deductive
databases; we prove it using fixpoint induction.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 14:30:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"-Bouziad",
"A. Ai T",
"",
"LIAFA"
],
[
"Guessarian",
"Irene",
"",
"LIAFA"
],
[
"Vieille",
"L.",
"",
"NCM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0603054
|
Oleg Verbitsky
|
Martin Grohe and Oleg Verbitsky
|
Testing Graph Isomorphism in Parallel by Playing a Game
|
21 pages
| null | null | null |
cs.CC cs.LO
| null |
Our starting point is the observation that if graphs in a class C have low
descriptive complexity in first order logic, then the isomorphism problem for C
is solvable by a fast parallel algorithm (essentially, by a simple
combinatorial algorithm known as the multidimensional Weisfeiler-Lehman
algorithm). Using this approach, we prove that isomorphism of graphs of bounded
treewidth is testable in TC1, answering an open question posed by
Chandrasekharan. Furthermore, we obtain an AC1 algorithm for testing
isomorphism of rotation systems (combinatorial specifications of graph
embeddings). The AC1 upper bound was known before, but the fact that this bound
can be achieved by the simple Weisfeiler-Lehman algorithm is new. Combined with
other known results, it also yields a new AC1 isomorphism algorithm for planar
graphs.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 15:46:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grohe",
"Martin",
""
],
[
"Verbitsky",
"Oleg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0603055
|
Ashfaq Shaik
|
Ashfaq N Shaik
|
Improved Watermarking Scheme Using Decimal Sequences
|
7 pages, 10 figures
| null | null | null |
cs.CR
| null |
This paper presents watermarking algorithms using d-sequences so that the
peak signal to noise ratio (PSNR) is maximized and the distortion introduced in
the image due to the embedding is minimized. By exploiting the cross
correlation property of decimal sequences, the concept of embedding more than
one watermark in the same cover image is investigated.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 18:55:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shaik",
"Ashfaq N",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603056
|
Philip Davis
|
Philip M. Davis and Michael J. Fromerth
|
Does the arXiv lead to higher citations and reduced publisher downloads
for mathematics articles?
|
Last updated May 02, 2006
|
Scientometrics Vol. 71, No. 2. (May, 2007)
|
10.1007/s11192-007-1661-8
| null |
cs.DL cs.IR math.HO
| null |
An analysis of 2,765 articles published in four math journals from 1997 to
2005 indicate that articles deposited in the arXiv received 35% more citations
on average than non-deposited articles (an advantage of about 1.1 citations per
article), and that this difference was most pronounced for highly-cited
articles. Open Access, Early View, and Quality Differential were examined as
three non-exclusive postulates for explaining the citation advantage. There was
little support for a universal Open Access explanation, and no empirical
support for Early View. There was some inferential support for a Quality
Differential brought about by more highly-citable articles being deposited in
the arXiv. In spite of their citation advantage, arXiv-deposited articles
received 23% fewer downloads from the publisher's website (about 10 fewer
downloads per article) in all but the most recent two years after publication.
The data suggest that arXiv and the publisher's website may be fulfilling
distinct functional needs of the reader.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 19:36:24 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2006 21:08:20 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Mar 2006 17:34:40 GMT"
},
{
"version": "v4",
"created": "Tue, 2 May 2006 19:28:01 GMT"
},
{
"version": "v5",
"created": "Tue, 6 Feb 2007 14:52:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Davis",
"Philip M.",
""
],
[
"Fromerth",
"Michael J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
}
] |
cs/0603057
|
Nodari Sitchinava
|
David Eppstein, Michael T. Goodrich, Nodari Sitchinava
|
Guard Placement For Wireless Localization
| null | null | null | null |
cs.CG
| null |
Motivated by secure wireless networking, we consider the problem of placing
fixed localizers that enable mobile communication devices to prove they belong
to a secure region that is defined by the interior of a polygon. Each localizer
views an infinite wedge of the plane, and a device can prove membership in the
secure region if it is inside the wedges for a set of localizers whose common
intersection contains no points outside the polygon. This model leads to a
broad class of new art gallery type problems, for which we provide upper and
lower bounds.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 20:19:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Sitchinava",
"Nodari",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0603058
|
Ciamac Moallemi
|
Ciamac C. Moallemi and Benjamin Van Roy
|
Convergence of Min-Sum Message Passing for Quadratic Optimization
| null | null | null | null |
cs.IT cs.AI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish the convergence of the min-sum message passing algorithm for
minimization of a broad class of quadratic objective functions: those that
admit a convex decomposition. Our results also apply to the equivalent problem
of the convergence of Gaussian belief propagation.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 20:32:28 GMT"
},
{
"version": "v2",
"created": "Sat, 18 Mar 2006 20:14:32 GMT"
},
{
"version": "v3",
"created": "Tue, 6 May 2008 18:07:48 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Dec 2008 02:22:28 GMT"
}
] | 2008-12-24T00:00:00 |
[
[
"Moallemi",
"Ciamac C.",
""
],
[
"Van Roy",
"Benjamin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603059
|
Guangyue Han
|
Guangyue Han, Brian Marcus
|
Derivatives of Entropy Rate in Special Families of Hidden Markov Chains
|
The relaxed condtions for entropy rate and examples are taken out (to
be part of another paper). The section about general principle and an example
to determine the domain of analyticity is taken out (to be part of another
paper). A section about binary Markov chains corrupted by binary symmetric
noise is added
| null | null | null |
cs.IT math.IT math.PR
| null |
Consider a hidden Markov chain obtained as the observation process of an
ordinary Markov chain corrupted by noise. Zuk, et. al. [13], [14] showed how,
in principle, one can explicitly compute the derivatives of the entropy rate of
at extreme values of the noise. Namely, they showed that the derivatives of
standard upper approximations to the entropy rate actually stabilize at an
explicit finite time. We generalize this result to a natural class of hidden
Markov chains called ``Black Holes.'' We also discuss in depth special cases of
binary Markov chains observed in binary symmetric noise, and give an abstract
formula for the first derivative in terms of a measure on the simplex due to
Blackwell.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 21:51:34 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2006 21:22:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Han",
"Guangyue",
""
],
[
"Marcus",
"Brian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0603060
|
Tobias Riege
|
Tobias Riege, J\"org Rothe, Holger Spakowski and Masaki Yamamoto
|
An Improved Exact Algorithm for the Domatic Number Problem
|
9 pages, a two-page abstract of this paper is to appear in the
Proceedings of the Second IEEE International Conference on Information &
Communication Technologies: From Theory to Applications, April 2006
| null | null | null |
cs.CC
| null |
The 3-domatic number problem asks whether a given graph can be partitioned
intothree dominating sets. We prove that this problem can be solved by a
deterministic algorithm in time 2.695^n (up to polynomial factors). This result
improves the previous bound of 2.8805^n, which is due to Fomin, Grandoni,
Pyatkin, and Stepanov. To prove our result, we combine an algorithm by Fomin et
al. with Yamamoto's algorithm for the satisfiability problem. In addition, we
show that the 3-domatic number problem can be solved for graphs G with bounded
maximum degree Delta(G) by a randomized algorithm, whose running time is better
than the previous bound due to Riege and Rothe whenever Delta(G) >= 5. Our new
randomized algorithm employs Schoening's approach to constraint satisfaction
problems.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 16:05:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Riege",
"Tobias",
""
],
[
"Rothe",
"Jörg",
""
],
[
"Spakowski",
"Holger",
""
],
[
"Yamamoto",
"Masaki",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0603061
|
Chau Yuen
|
Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung
|
Quasi-Orthogonal STBC With Minimum Decoding Complexity
|
IEEE Trans. on Wirless Communications
| null | null | null |
cs.IT math.IT
| null |
In this paper, we consider a quasi-orthogonal (QO) space-time block code
(STBC) with minimum decoding complexity (MDC-QO-STBC). We formulate its
algebraic structure and propose a systematic method for its construction. We
show that a maximum-likelihood (ML) decoder for this MDC-QOSTBC, for any number
of transmit antennas, only requires the joint detection of two real symbols.
Assuming the use of a square or rectangular quadratic-amplitude modulation
(QAM) or multiple phase-shift keying (MPSK) modulation for this MDC-QOSTBC, we
also obtain the optimum constellation rotation angle, in order to achieve full
diversity and optimum coding gain. We show that the maximum achievable code
rate of these MDC-QOSTBC is 1 for three and four antennas and 3/4 for five to
eight antennas. We also show that the proposed MDC-QOSTBC has several desirable
properties, such as a more even power distribution among antennas and better
scalability in adjusting the number of transmit antennas, compared with the
coordinate interleaved orthogonal design (CIOD) and asymmetric CIOD (ACIOD)
codes. For the case of an odd number of transmit antennas, MDC-QO-STBC also has
better decoding performance than CIOD.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 12:59:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"Tjeng Thiang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603062
|
Benoit Donnet
|
Benoit Donnet, Bradley Huffaker, Timur Friedman, kc claffy
|
Implementation and Deployment of a Distributed Network Topology
Discovery Algorithm
| null | null | null | null |
cs.NI
| null |
In the past few years, the network measurement community has been interested
in the problem of internet topology discovery using a large number (hundreds or
thousands) of measurement monitors. The standard way to obtain information
about the internet topology is to use the traceroute tool from a small number
of monitors. Recent papers have made the case that increasing the number of
monitors will give a more accurate view of the topology. However, scaling up
the number of monitors is not a trivial process. Duplication of effort close to
the monitors wastes time by reexploring well-known parts of the network, and
close to destinations might appear to be a distributed denial-of-service (DDoS)
attack as the probes converge from a set of sources towards a given
destination. In prior work, authors of this report proposed Doubletree, an
algorithm for cooperative topology discovery, that reduces the load on the
network, i.e., router IP interfaces and end-hosts, while discovering almost as
many nodes and links as standard approaches based on traceroute. This report
presents our open-source and freely downloadable implementation of Doubletree
in a tool we call traceroute@home. We describe the deployment and validation of
traceroute@home on the PlanetLab testbed and we report on the lessons learned
from this experience. We discuss how traceroute@home can be developed further
and discuss ideas for future improvements.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 16:13:11 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Mar 2006 10:30:41 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Mar 2006 07:39:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Donnet",
"Benoit",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"Friedman",
"Timur",
""
],
[
"claffy",
"kc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0603063
|
Daniel Severin
|
Daniel E. Severin
|
Unary Primitive Recursive Functions
| null |
Journal of Symbolic Logic. Volume 73, Issue 4 (2008), p.
1122--1138
|
10.2178/jsl/1230396909
| null |
cs.SC cs.LO
| null |
In this article, we study some new characterizations of primitive recursive
functions based on restricted forms of primitive recursion, improving the
pioneering work of R. M. Robinson and M. D. Gladstone in this area. We reduce
certain recursion schemes (mixed/pure iteration without parameters) and we
characterize one-argument primitive recursive functions as the closure under
substitution and iteration of certain optimal sets.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 17:20:25 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Dec 2006 19:11:12 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Dec 2007 20:29:37 GMT"
}
] | 2014-05-28T00:00:00 |
[
[
"Severin",
"Daniel E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0603064
|
Rajesh Sundaresan
|
Rajesh Sundaresan
|
Guessing under source uncertainty
|
27 pages, submitted to IEEE Transactions on Information Theory, March
2006, revised September 2006, contains minor modifications and restructuring
based on reviewers' comments
| null |
10.1109/TIT.2006.887466
| null |
cs.IT math.IT
| null |
This paper considers the problem of guessing the realization of a finite
alphabet source when some side information is provided. The only knowledge the
guesser has about the source and the correlated side information is that the
joint source is one among a family. A notion of redundancy is first defined and
a new divergence quantity that measures this redundancy is identified. This
divergence quantity shares the Pythagorean property with the Kullback-Leibler
divergence. Good guessing strategies that minimize the supremum redundancy
(over the family) are then identified. The min-sup value measures the richness
of the uncertainty set. The min-sup redundancies for two examples - the
families of discrete memoryless sources and finite-state arbitrarily varying
sources - are then determined.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 18:19:20 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Sep 2006 12:19:28 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Sundaresan",
"Rajesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603065
|
Nihar Jindal
|
Nihar Jindal
|
MIMO Broadcast Channels with Finite Rate Feedback
|
Submitted to IEEE Trans. Information Theory, 34 pages
|
IEEE Trans. Information Theory, Vol. 52, No. 11, pp. 5045-5059,
Nov. 2006
| null | null |
cs.IT math.IT
| null |
Multiple transmit antennas in a downlink channel can provide tremendous
capacity (i.e. multiplexing) gains, even when receivers have only single
antennas. However, receiver and transmitter channel state information is
generally required. In this paper, a system where each receiver has perfect
channel knowledge, but the transmitter only receives quantized information
regarding the channel instantiation is analyzed. The well known zero forcing
transmission technique is considered, and simple expressions for the throughput
degradation due to finite rate feedback are derived. A key finding is that the
feedback rate per mobile must be increased linearly with the SNR (in dB) in
order to achieve the full multiplexing gain, which is in sharp contrast to
point-to-point MIMO systems in which it is not necessary to increase the
feedback rate as a function of the SNR.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 20:49:49 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Jindal",
"Nihar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603066
|
Nihar Jindal
|
Nihar Jindal
|
A Feedback Reduction Technique for MIMO Broadcast Channels
|
Submitted to Int. Symposium on Information Theory, January 2006
| null | null | null |
cs.IT math.IT
| null |
A multiple antenna broadcast channel with perfect channel state information
at the receivers is considered. If each receiver quantizes its channel
knowledge to a finite number of bits which are fed back to the transmitter, the
large capacity benefits of the downlink channel can be realized. However, the
required number of feedback bits per mobile must be scaled with both the number
of transmit antennas and the system SNR, and thus can be quite large in even
moderately sized systems. It is shown that a small number of antennas can be
used at each receiver to improve the quality of the channel estimate provided
to the transmitter. As a result, the required feedback rate per mobile can be
significantly decreased.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 21:02:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jindal",
"Nihar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603067
|
Priya Sivakumar
|
Priya Sivakumar
|
Implementing the Three-Stage Quantum Cryptography Protocol
|
4 pages, 1 figure
| null | null | null |
cs.CR
| null |
We present simple implementations of Kak's three-stage quantum cryptography
protocol. The case where the transformation is applied to more than one qubit
at the same time is also considered.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 22:20:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sivakumar",
"Priya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603068
|
Gil Shamir
|
Gil I. Shamir
|
Universal Lossless Compression with Unknown Alphabets - The Average Case
|
Revised for IEEE Transactions on Information Theory
| null |
10.1109/ISIT.2004.1365062
| null |
cs.IT math.IT
| null |
Universal compression of patterns of sequences generated by independently
identically distributed (i.i.d.) sources with unknown, possibly large,
alphabets is investigated. A pattern is a sequence of indices that contains all
consecutive indices in increasing order of first occurrence. If the alphabet of
a source that generated a sequence is unknown, the inevitable cost of coding
the unknown alphabet symbols can be exploited to create the pattern of the
sequence. This pattern can in turn be compressed by itself. It is shown that if
the alphabet size $k$ is essentially small, then the average minimax and
maximin redundancies as well as the redundancy of every code for almost every
source, when compressing a pattern, consist of at least 0.5 log(n/k^3) bits per
each unknown probability parameter, and if all alphabet letters are likely to
occur, there exist codes whose redundancy is at most 0.5 log(n/k^2) bits per
each unknown probability parameter, where n is the length of the data
sequences. Otherwise, if the alphabet is large, these redundancies are
essentially at least O(n^{-2/3}) bits per symbol, and there exist codes that
achieve redundancy of essentially O(n^{-1/2}) bits per symbol. Two sub-optimal
low-complexity sequential algorithms for compression of patterns are presented
and their description lengths analyzed, also pointing out that the pattern
average universal description length can decrease below the underlying i.i.d.\
entropy for large enough alphabets.
|
[
{
"version": "v1",
"created": "Fri, 17 Mar 2006 02:46:19 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Shamir",
"Gil I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603069
|
Xueliang Li
|
Fengwei Li, Xueliang Li
|
The neighbor-scattering number can be computed in polynomial time for
interval graphs
|
13 pages
| null | null | null |
cs.DM math.CO
| null |
Neighbor-scattering number is a useful measure for graph vulnerability. For
some special kinds of graphs, explicit formulas are given for this number.
However, for general graphs it is shown that to compute this number is
NP-complete. In this paper, we prove that for interval graphs this number can
be computed in polynomial time.
|
[
{
"version": "v1",
"created": "Fri, 17 Mar 2006 07:00:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Li",
"Fengwei",
""
],
[
"Li",
"Xueliang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0603070
|
Stefan Stefanov Z
|
S.Z.Stefanov
|
Predicting the Path of an Open System
|
18 pages
| null | null | null |
cs.RO
| null |
The expected path of an open system,which is a big Poincare system,has been
found in this paper.This path has been obtained from the actual and from the
expected droop of the open system.The actual droop has been reconstructed from
the variations in the power and in the frequency of the open system.The
expected droop has been found as a function of rotation from the expected
potential energy of the open system under synchronization of that system.
|
[
{
"version": "v1",
"created": "Fri, 17 Mar 2006 09:27:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Stefanov",
"S. Z.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0603071
|
Martin Ziegler
|
Klaus Meer, Martin Ziegler
|
An Explicit Solution to Post's Problem over the Reals
|
submitted to Journal of Complexity
| null | null | null |
cs.LO cs.SC
| null |
In the BCSS model of real number computations we prove a concrete and
explicit semi-decidable language to be undecidable yet not reducible from (and
thus strictly easier than) the real Halting Language. This solution to Post's
Problem over the reals significantly differs from its classical, discrete
variant where advanced diagonalization techniques are only known to yield the
existence of such intermediate Turing degrees. Strengthening the above result,
we construct (that is, obtain again explicitly) as well an uncountable number
of incomparable semi-decidable Turing degrees below the real Halting problem in
the BCSS model. Finally we show the same to hold for the linear BCSS model,
that is over (R,+,-,<) rather than (R,+,-,*,/,<).
|
[
{
"version": "v1",
"created": "Fri, 17 Mar 2006 16:12:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Meer",
"Klaus",
""
],
[
"Ziegler",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0603072
|
Raghuraman Mudumbai
|
R. Mudumbai, J. Hespanha, U. Madhow, G. Barriac
|
Distributed Transmit Beamforming using Feedback Control
| null | null | null | null |
cs.IT math.IT
| null |
A simple feedback control algorithm is presented for distributed beamforming
in a wireless network. A network of wireless sensors that seek to cooperatively
transmit a common message signal to a Base Station (BS) is considered. In this
case, it is well-known that substantial energy efficiencies are possible by
using distributed beamforming. The feedback algorithm is shown to achieve the
carrier phase coherence required for beamforming in a scalable and distributed
manner. In the proposed algorithm, each sensor independently makes a random
adjustment to its carrier phase. Assuming that the BS is able to broadcast one
bit of feedback each timeslot about the change in received signal to noise
ratio (SNR), the sensors are able to keep the favorable phase adjustments and
discard the unfavorable ones, asymptotically achieving perfect phase coherence.
A novel analytical model is derived that accurately predicts the convergence
rate. The analytical model is used to optimize the algorithm for fast
convergence and to establish the scalability of the algorithm.
|
[
{
"version": "v1",
"created": "Sat, 18 Mar 2006 01:59:25 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Mudumbai",
"R.",
""
],
[
"Hespanha",
"J.",
""
],
[
"Madhow",
"U.",
""
],
[
"Barriac",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603073
|
Bryan Ford
|
Bryan Ford
|
VXA: A Virtual Architecture for Durable Compressed Archives
|
14 pages, 7 figures, 2 tables
|
4th USENIX Conference on File and Storage Technologies, December
2005 (FAST '05), San Francisco, CA
| null | null |
cs.DL cs.IR
| null |
Data compression algorithms change frequently, and obsolete decoders do not
always run on new hardware and operating systems, threatening the long-term
usability of content archived using those algorithms. Re-encoding content into
new formats is cumbersome, and highly undesirable when lossy compression is
involved. Processor architectures, in contrast, have remained comparatively
stable over recent decades. VXA, an archival storage system designed around
this observation, archives executable decoders along with the encoded content
it stores. VXA decoders run in a specialized virtual machine that implements an
OS-independent execution environment based on the standard x86 architecture.
The VXA virtual machine strictly limits access to host system services, making
decoders safe to run even if an archive contains malicious code. VXA's adoption
of a "native" processor architecture instead of type-safe language technology
allows reuse of existing "hand-optimized" decoders in C and assembly language,
and permits decoders access to performance-enhancing architecture features such
as vector processing instructions. The performance cost of VXA's virtualization
is typically less than 15% compared with the same decoders running natively.
The storage cost of archived decoders, typically 30-130KB each, can be
amortized across many archived files sharing the same compression method.
|
[
{
"version": "v1",
"created": "Sat, 18 Mar 2006 16:31:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ford",
"Bryan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0603074
|
Bryan Ford
|
Bryan Ford, Pyda Srisuresh, Dan Kegel
|
Peer-to-Peer Communication Across Network Address Translators
|
8 figures, 1 table
|
USENIX Annual Technical Conference, April 2005 (USENIX '05),
Anaheim, CA
| null | null |
cs.NI cs.CR
| null |
Network Address Translation (NAT) causes well-known difficulties for
peer-to-peer (P2P) communication, since the peers involved may not be reachable
at any globally valid IP address. Several NAT traversal techniques are known,
but their documentation is slim, and data about their robustness or relative
merits is slimmer. This paper documents and analyzes one of the simplest but
most robust and practical NAT traversal techniques, commonly known as "hole
punching." Hole punching is moderately well-understood for UDP communication,
but we show how it can be reliably used to set up peer-to-peer TCP streams as
well. After gathering data on the reliability of this technique on a wide
variety of deployed NATs, we find that about 82% of the NATs tested support
hole punching for UDP, and about 64% support hole punching for TCP streams. As
NAT vendors become increasingly conscious of the needs of important P2P
applications such as Voice over IP and online gaming protocols, support for
hole punching is likely to increase in the future.
|
[
{
"version": "v1",
"created": "Sat, 18 Mar 2006 16:51:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ford",
"Bryan",
""
],
[
"Srisuresh",
"Pyda",
""
],
[
"Kegel",
"Dan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603075
|
Bryan Ford
|
Bryan Ford
|
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
|
7 pages, 3 figures
|
Second Workshop on Hot Topics in Networks (HotNets-II), November
2003, Cambridge, MA
| null | null |
cs.NI cs.OS
| null |
Though appropriate for core Internet infrastructure, the Internet Protocol is
unsuited to routing within and between emerging ad-hoc edge networks due to its
dependence on hierarchical, administratively assigned addresses. Existing
ad-hoc routing protocols address the management problem but do not scale to
Internet-wide networks. The promise of ubiquitous network computing cannot be
fulfilled until we develop an Unmanaged Internet Protocol (UIP), a scalable
routing protocol that manages itself automatically. UIP must route within and
between constantly changing edge networks potentially containing millions or
billions of nodes, and must still function within edge networks disconnected
from the main Internet, all without imposing the administrative burden of
hierarchical address assignment. Such a protocol appears challenging but
feasible. We propose an architecture based on self-certifying, cryptographic
node identities and a routing algorithm adapted from distributed hash tables.
|
[
{
"version": "v1",
"created": "Sat, 18 Mar 2006 17:11:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ford",
"Bryan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0603076
|
Bryan Ford
|
Bryan Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, Frans
Kaashoek, Robert Morris
|
User-Relative Names for Globally Connected Personal Devices
|
7 pages, 1 figure, 1 table
|
5th International Workshop on Peer-to-Peer Systems, February 2006
(IPTPS 2006), Santa Barbara, CA
| null | null |
cs.NI cs.DC cs.OS
| null |
Nontechnical users who own increasingly ubiquitous network-enabled personal
devices such as laptops, digital cameras, and smart phones need a simple,
intuitive, and secure way to share information and services between their
devices. User Information Architecture, or UIA, is a novel naming and
peer-to-peer connectivity architecture addressing this need. Users assign UIA
names by "introducing" devices to each other on a common local-area network,
but these names remain securely bound to their target as devices migrate.
Multiple devices owned by the same user, once introduced, automatically merge
their namespaces to form a distributed "personal cluster" that the owner can
access or modify from any of his devices. Instead of requiring users to
allocate globally unique names from a central authority, UIA enables users to
assign their own "user-relative" names both to their own devices and to other
users. With UIA, for example, Alice can always access her iPod from any of her
own personal devices at any location via the name "ipod", and her friend Bob
can access her iPod via a relative name like "ipod.Alice".
|
[
{
"version": "v1",
"created": "Sat, 18 Mar 2006 17:27:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ford",
"Bryan",
""
],
[
"Strauss",
"Jacob",
""
],
[
"Lesniewski-Laas",
"Chris",
""
],
[
"Rhea",
"Sean",
""
],
[
"Kaashoek",
"Frans",
""
],
[
"Morris",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0603077
|
Bryan Ford
|
Bryan Ford
|
Packrat Parsing: Simple, Powerful, Lazy, Linear Time
|
12 pages, 5 figures
|
International Conference on Functional Programming (ICFP '02),
October 2002, Pittsburgh, PA
| null | null |
cs.DS cs.CC cs.PL
| null |
Packrat parsing is a novel technique for implementing parsers in a lazy
functional programming language. A packrat parser provides the power and
flexibility of top-down parsing with backtracking and unlimited lookahead, but
nevertheless guarantees linear parse time. Any language defined by an LL(k) or
LR(k) grammar can be recognized by a packrat parser, in addition to many
languages that conventional linear-time algorithms do not support. This
additional power simplifies the handling of common syntactic idioms such as the
widespread but troublesome longest-match rule, enables the use of sophisticated
disambiguation strategies such as syntactic and semantic predicates, provides
better grammar composition properties, and allows lexical analysis to be
integrated seamlessly into parsing. Yet despite its power, packrat parsing
shares the same simplicity and elegance as recursive descent parsing; in fact
converting a backtracking recursive descent parser into a linear-time packrat
parser often involves only a fairly straightforward structural change. This
paper describes packrat parsing informally with emphasis on its use in
practical applications, and explores its advantages and disadvantages with
respect to the more conventional alternatives.
|
[
{
"version": "v1",
"created": "Sat, 18 Mar 2006 17:49:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ford",
"Bryan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603078
|
Ciamac Moallemi
|
Ciamac C. Moallemi and Benjamin Van Roy
|
Consensus Propagation
|
journal version
|
IEEE Transactions on Information Theory, 2006, 52(11): 4753-4766
|
10.1109/TIT.2006.883539
| null |
cs.IT cs.AI cs.NI math.IT
| null |
We propose consensus propagation, an asynchronous distributed protocol for
averaging numbers across a network. We establish convergence, characterize the
convergence rate for regular graphs, and demonstrate that the protocol exhibits
better scaling properties than pairwise averaging, an alternative that has
received much recent attention. Consensus propagation can be viewed as a
special case of belief propagation, and our results contribute to the belief
propagation literature. In particular, beyond singly-connected graphs, there
are very few classes of relevant problems for which belief propagation is known
to converge.
|
[
{
"version": "v1",
"created": "Sun, 19 Mar 2006 23:50:28 GMT"
},
{
"version": "v2",
"created": "Tue, 29 May 2007 17:23:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Moallemi",
"Ciamac C.",
""
],
[
"Van Roy",
"Benjamin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603079
|
Maria Chiara Meo
|
Maurizio Gabbrielli and Maria Chiara Meo
|
A compositional Semantics for CHR
| null | null | null | null |
cs.PL
| null |
Constraint Handling Rules (CHR) are a committed-choice declarative language
which has been designed for writing constraint solvers. A CHR program consists
of multi-headed guarded rules which allow one to rewrite constraints into
simpler ones until a solved form is reached.
CHR has received a considerable attention, both from the practical and from
the theoretical side. Nevertheless, due the use of multi-headed clauses, there
are several aspects of the CHR semantics which have not been clarified yet. In
particular, no compositional semantics for CHR has been defined so far.
In this paper we introduce a fix-point semantics which characterizes the
input/output behavior of a CHR program and which is and-compositional, that is,
which allows to retrieve the semantics of a conjunctive query from the
semantics of its components. Such a semantics can be used as a basis to define
incremental and modular analysis and verification tools.
|
[
{
"version": "v1",
"created": "Mon, 20 Mar 2006 14:17:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gabbrielli",
"Maurizio",
""
],
[
"Meo",
"Maria Chiara",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603080
|
Alin Suciu PhD
|
Alin Suciu
|
Yet Another Efficient Unification Algorithm
| null | null | null | null |
cs.LO cs.AI
| null |
The unification algorithm is at the core of the logic programming paradigm,
the first unification algorithm being developed by Robinson [5]. More efficient
algorithms were developed later [3] and I introduce here yet another efficient
unification algorithm centered on a specific data structure, called the
Unification Table.
|
[
{
"version": "v1",
"created": "Mon, 20 Mar 2006 20:15:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Suciu",
"Alin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0603081
|
Nikita Sakhanenko
|
Nikita A. Sakhanenko (1 and 2), George F. Luger (1), Hanna E. Makaruk
(2), David B. Holtkamp (2) ((1) CS Dept. University of New Mexico, (2)
Physics Div. Los Alamos National Laboratory)
|
Application of Support Vector Regression to Interpolation of Sparse
Shock Physics Data Sets
|
13 pages, 7 figures
| null | null |
LA-UR-06-1739
|
cs.AI
| null |
Shock physics experiments are often complicated and expensive. As a result,
researchers are unable to conduct as many experiments as they would like -
leading to sparse data sets. In this paper, Support Vector Machines for
regression are applied to velocimetry data sets for shock damaged and melted
tin metal. Some success at interpolating between data sets is achieved.
Implications for future work are discussed.
|
[
{
"version": "v1",
"created": "Mon, 20 Mar 2006 23:43:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sakhanenko",
"Nikita A.",
"",
"1 and 2"
],
[
"Luger",
"George F.",
""
],
[
"Makaruk",
"Hanna E.",
""
],
[
"Holtkamp",
"David B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0603082
|
Giorgi Pascal
|
Wayne Eberly, Mark Giesbrecht (SCG), Pascal Giorgi (LP2A, SCG), Arne
Storjohann (SCG), Gilles Villard (LIP)
|
Solving Sparse Integer Linear Systems
| null | null | null | null |
cs.SC
| null |
We propose a new algorithm to solve sparse linear systems of equations over
the integers. This algorithm is based on a $p$-adic lifting technique combined
with the use of block matrices with structured blocks. It achieves a sub-cubic
complexity in terms of machine operations subject to a conjecture on the
effectiveness of certain sparse projections. A LinBox-based implementation of
this algorithm is demonstrated, and emphasizes the practical benefits of this
new method over the previous state of the art.
|
[
{
"version": "v1",
"created": "Tue, 21 Mar 2006 16:09:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Eberly",
"Wayne",
"",
"SCG"
],
[
"Giesbrecht",
"Mark",
"",
"SCG"
],
[
"Giorgi",
"Pascal",
"",
"LP2A, SCG"
],
[
"Storjohann",
"Arne",
"",
"SCG"
],
[
"Villard",
"Gilles",
"",
"LIP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0603083
|
Ashutosh Gore
|
Ashutosh Deepak Gore and Abhay Karandikar
|
Entropy-optimal Generalized Token Bucket Regulator
|
6 pages (2 column, 10-point), 3 figures, 1 table
| null | null | null |
cs.IT math.IT
| null |
We derive the maximum entropy of a flow (information utility) which conforms
to traffic constraints imposed by a generalized token bucket regulator, by
taking into account the covert information present in the randomness of packet
lengths. Under equality constraints of aggregate tokens and aggregate bucket
depth, a generalized token bucket regulator can achieve higher information
utility than a standard token bucket regulator. The optimal generalized token
bucket regulator has a near-uniform bucket depth sequence and a decreasing
token increment sequence.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 06:23:53 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gore",
"Ashutosh Deepak",
""
],
[
"Karandikar",
"Abhay",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603084
|
Eran Ofek
|
Uriel Feige and Eran Ofek
|
Random 3CNF formulas elude the Lovasz theta function
|
14 pages
| null | null | null |
cs.CC cs.DS cs.LO
| null |
Let $\phi$ be a 3CNF formula with n variables and m clauses. A simple
nonconstructive argument shows that when m is sufficiently large compared to n,
most 3CNF formulas are not satisfiable. It is an open question whether there is
an efficient refutation algorithm that for most such formulas proves that they
are not satisfiable. A possible approach to refute a formula $\phi$ is: first,
translate it into a graph $G_{\phi}$ using a generic reduction from 3-SAT to
max-IS, then bound the maximum independent set of $G_{\phi}$ using the Lovasz
$\vartheta$ function. If the $\vartheta$ function returns a value $< m$, this
is a certificate for the unsatisfiability of $\phi$. We show that for random
formulas with $m < n^{3/2 -o(1)}$ clauses, the above approach fails, i.e. the
$\vartheta$ function is likely to return a value of m.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 10:30:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Feige",
"Uriel",
""
],
[
"Ofek",
"Eran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.