id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0603085
|
Jonathan Adams
|
Jonathan K. Adams, Basheer N. Bristow
|
Access Control for Hierarchical Joint-Tenancy
|
To appear in WSEAS Transactions on Computers, will probably be edited
further before final revision replaced due to typographical errors
|
WSEAS Transactions on Computers, June 2006, Issue 6, Volume 5, p.
1313-1318
| null | null |
cs.CR
| null |
Basic role based access control [RBAC] provides a mechanism for segregating
access privileges based upon a user's hierarchical roles within an
organization. This model doesn't scale well when there is tight integration of
multiple hierarchies. In a case where there is joint-tenancy and a requirement
for different levels of disclosure based upon a user's hierarchy, or in our
case, organization or company, basic RBAC requires these hierarchies to be
effectively merged. Specific roles that effectively represent both the user's
organizations and roles must be translated to fit within the merged hierarchy
to be used to control access. Essentially, users from multiple organizations
are served from a single role base with roles designed to constrain their
access as needed.
Our work proposes, through parameterized roles and privileges, a means for
accurately representing both users' roles within their respective hierarchies
for providing access to controlled objects. Using this method will reduce the
amount of complexity required in terms of the number of roles and privileges.
The resulting set of roles, privileges, and objects will make modeling and
visualizing the access role hierarchy significantly simplified. This paper will
give some background on role based access control, parameterized roles and
privileges, and then focus on how RBAC with parameterized roles and privileges
can be leveraged as an access control solution for the problems presented by
joint tenancy.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 10:59:06 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Mar 2006 01:18:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Adams",
"Jonathan K.",
""
],
[
"Bristow",
"Basheer N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603086
|
Joel Le Roux
|
Joel Le Roux (1), Philippe Chaurand (1) and Mickael Urrutia (1) ((1)
University of Nice (France))
|
Matching Edges in Images ; Application to Face Recognition
|
11 Pages, 6 figures
| null | null | null |
cs.CV
| null |
This communication describes a representation of images as a set of edges
characterized by their position and orientation. This representation allows the
comparison of two images and the computation of their similarity. The first
step in this computation of similarity is the seach of a geometrical basis of
the two dimensional space where the two images are represented simultaneously
after transformation of one of them. Presently, this simultaneous
representation takes into account a shift and a scaling ; it may be extended to
rotations or other global geometrical transformations. An elementary
probabilistic computation shows that a sufficient but not excessive number of
trials (a few tens) ensures that the exhibition of this common basis is
guaranteed in spite of possible errors in the detection of edges. When this
first step is performed, the search of similarity between the two images
reduces to counting the coincidence of edges in the two images. The approach
may be applied to many problems of pattern matching ; it was checked on face
recognition.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 14:51:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Roux",
"Joel Le",
""
],
[
"Chaurand",
"Philippe",
""
],
[
"Urrutia",
"Mickael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0603087
|
P. Oscar Boykin
|
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato Figueiredo
|
IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid
Computing
|
To appear in IPDPS 2006
| null | null | null |
cs.DC cs.NI
| null |
Peer-to-peer (P2P) networks have mostly focused on task oriented networking,
where networks are constructed for single applications, i.e. file-sharing, DNS
caching, etc. In this work, we introduce IPOP, a system for creating virtual IP
networks on top of a P2P overlay. IPOP enables seamless access to Grid
resources spanning multiple domains by aggregating them into a virtual IP
network that is completely isolated from the physical network. The virtual IP
network provided by IPOP supports deployment of existing IP-based protocols
over a robust, self-configuring P2P overlay. We present implementation details
as well as experimental measurement results taken from LAN, WAN, and Planet-Lab
tests.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 16:50:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ganguly",
"Arijit",
""
],
[
"Agrawal",
"Abhishek",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Figueiredo",
"Renato",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0603088
|
Himanshu Thapliyal
|
Himanshu Thapliyal, Saurabh Kotiyal and M.B Srinivas
|
Novel BCD Adders and Their Reversible Logic Implementation for IEEE 754r
Format
|
6 Pages: This paper is a corrected version of our recent publication
published in 19th International Conference on VLSI Design and 5th
International Conference on Embedded Systems (VLSI Design 2006), Hyderabad,
India, Jan 4-7, 2006
| null | null | null |
cs.AR
| null |
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and
a major enhancement to the standard is the addition of decimal format. This
paper proposes two novel BCD adders called carry skip and carry look-ahead BCD
adders respectively. Furthermore, in the recent years, reversible logic has
emerged as a promising technology having its applications in low power CMOS,
quantum computing, nanotechnology, and optical computing. It is not possible to
realize quantum computing without reversible logic. Thus, this paper also paper
provides the reversible logic implementation of the conventional BCD adder as
the well as the proposed Carry Skip BCD adder using a recently proposed TSG
gate. Furthermore, a new reversible gate called TS-3 is also being proposed and
it has been shown that the proposed reversible logic implementation of the BCD
Adders is much better compared to recently proposed one, in terms of number of
reversible gates used and garbage outputs produced. The reversible BCD circuits
designed and proposed here form the basis of the decimal ALU of a primitive
quantum CPU.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 18:11:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thapliyal",
"Himanshu",
""
],
[
"Kotiyal",
"Saurabh",
""
],
[
"Srinivas",
"M. B",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0603089
|
Lawrence Ioannou
|
Lawrence M. Ioannou and Benjamin C. Travaglione and Donny Cheung
|
Convex Separation from Optimization via Heuristics
| null | null | null | null |
cs.DS math.OC
| null |
Let $K$ be a full-dimensional convex subset of $\mathbb{R}^n$. We describe a
new polynomial-time Turing reduction from the weak separation problem for $K$
to the weak optimization problem for $K$ that is based on a geometric
heuristic. We compare our reduction, which relies on analytic centers, with the
standard, more general reduction.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 19:46:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ioannou",
"Lawrence M.",
""
],
[
"Travaglione",
"Benjamin C.",
""
],
[
"Cheung",
"Donny",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0603090
|
Alexander Gorban
|
A.N. Gorban, N.R. Sumner, A.Y. Zinovyev
|
Topological Grammars for Data Approximation
|
Corrected Journal version, Appl. Math. Lett., in press. 7 pgs., 2
figs
|
Applied Mathematics Letters 20 (2007) 382--386
|
10.1016/j.aml.2006.04.022
| null |
cs.NE cs.LG
| null |
A method of {\it topological grammars} is proposed for multidimensional data
approximation. For data with complex topology we define a {\it principal cubic
complex} of low dimension and given complexity that gives the best
approximation for the dataset. This complex is a generalization of linear and
non-linear principal manifolds and includes them as particular cases. The
problem of optimal principal complex construction is transformed into a series
of minimization problems for quadratic functionals. These quadratic functionals
have a physically transparent interpretation in terms of elastic energy. For
the energy computation, the whole complex is represented as a system of nodes
and springs. Topologically, the principal complex is a product of
one-dimensional continuums (represented by graphs), and the grammars describe
how these continuums transform during the process of optimal complex
construction. This factorization of the whole process onto one-dimensional
transformations using minimization of quadratic energy functionals allow us to
construct efficient algorithms.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 22:52:23 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 13:41:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gorban",
"A. N.",
""
],
[
"Sumner",
"N. R.",
""
],
[
"Zinovyev",
"A. Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0603091
|
Himanshu Thapliyal
|
Himanshu Thapliyal and M.B Srinivas
|
A New Reversible TSG Gate and Its Application For Designing Efficient
Adder Circuits
|
5 Pages: Published in 7th International Symposium on Representations
and Methodology of Future Computing Technologies(RM 2005), Tokyo, Japan,
September 5-6, 2005
| null | null | null |
cs.AR
| null |
In the recent years, reversible logic has emerged as a promising technology
having its applications in low power CMOS, quantum computing, nanotechnology,
and optical computing. The classical set of gates such as AND, OR, and EXOR are
not reversible. This paper proposes a new 4 * 4 reversible gate called TSG
gate. The proposed gate is used to design efficient adder units. The most
significant aspect of the proposed gate is that it can work singly as a
reversible full adder i.e reversible full adder can now be implemented with a
single gate only. The proposed gate is then used to design reversible ripple
carry and carry skip adders. It is demonstrated that the adder architectures
designed using the proposed gate are much better and optimized, compared to
their existing counterparts in literature; in terms of number of reversible
gates and garbage outputs. Thus, this paper provides the initial threshold to
building of more complex system which can execute more complicated operations
using reversible logic.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2006 06:44:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0603092
|
Himanshu Thapliyal
|
Himanshu Thapliyal and M.B Srinivas
|
An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible
Sequential Circuits using Fredkin Gates
|
7 Pages: Deals with design of reversible sequential circuits.
Published: Proceedings of SPIE Volume: 6050, pp.196-202.Optomechatronic
Micro/Nano Devices and Components, Sapporo, Japan, December 5-7, 2005;
Editor(s): Yoshitada Katagiri
| null | null | null |
cs.AR
| null |
In recent years, reversible logic has emerged as a promising computing
paradigm having its applications in low power computing, quantum computing,
nanotechnology, optical computing and DNA computing. The classical set of gates
such as AND, OR, and EXOR are not reversible. Recently, it has been shown how
to encode information in DNA and use DNA amplification to implement Fredkin
gates. Furthermore, in the past Fredkin gates have been constructed using DNA,
whose outputs are used as inputs for other Fredkin gates. Thus, it can be
concluded that arbitrary circuits of Fredkin gates can be constructed using
DNA. This paper provides the initial threshold to building of more complex
system having reversible sequential circuits and which can execute more
complicated operations. The novelty of the paper is the reversible designs of
sequential circuits using Fredkin gate. Since, Fredkin gate has already been
realized using DNA, it is expected that this work will initiate the building of
complex systems using DNA. The reversible circuits designed here are highly
optimized in terms of number of gates and garbage outputs. The modularization
approach that is synthesizing small circuits and thereafter using them to
construct bigger circuits is used for designing the optimal reversible
sequential circuits.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2006 08:33:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0603093
|
Maurice Margenstern
|
Maurice Margenstern
|
About the domino problem in the hyperbolic plane from an algorithmic
point of view
|
11 pages, 6 figures
|
About the domino problem in the hyperbolic plane from an
algorithmic point of view, Theoretical Informatics and Applications, 42(1),
(2008), 21-36
|
10.1051/ita:2007045
| null |
cs.CG cs.DM
| null |
In this paper, we prove that the general problem of tiling the hyperbolic
plane with \`a la Wang tiles is undecidable.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2006 09:36:52 GMT"
}
] | 2009-07-07T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0603094
|
Philippe Loubaton
|
Julien Dumont, Philippe Loubaton, Samson Lasaulce
|
On the Capacity Achieving Transmit Covariance Matrices of MIMO
Correlated Rician Channels: A Large System Approach
|
Paper submitted to Globecom2006
| null | null | null |
cs.IT math.IT
| null |
We determine the capacity-achieving input covariance matrices for coherent
block-fading correlated MIMO Rician channels. In contrast with the Rayleigh and
uncorrelated Rician cases, no closed-form expressions for the eigenvectors of
the optimum input covariance matrix are available. Both the eigenvectors and
eigenvalues have to be evaluated by using numerical techniques. As the
corresponding optimization algorithms are not very attractive, we evaluate the
limit of the average mutual information when the number of transmit and receive
antennas converge to infinity at the same rate. If the channel is
semi-correlated, we propose an attractive optimization algorithm of the large
system approximant, and establish some convergence results. Simulation results
show that our approach provide reliable results even for a quite moderate
number of transmit and receive antennas.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2006 12:14:53 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2006 12:07:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dumont",
"Julien",
""
],
[
"Loubaton",
"Philippe",
""
],
[
"Lasaulce",
"Samson",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603095
|
Yan-Xiu Zheng
|
Yan-Xiu Zheng and Yu T. Su
|
A Turbo Coding System for High Speed Communications
|
11 figures
| null | null | null |
cs.IT math.IT
| null |
Conventional turbo codes (CTCs) usually employ a block-oriented interleaving
so that each block is separately encoded and decoded. As interleaving and
de-interleaving are performed within a block, the message-passing process
associated with an iterative decoder is limited to proceed within the
corresponding range. This paper presents a new turbo coding scheme that uses a
special interleaver structure and a multiple-round early termination test
involving both sign check and a CRC code. The new interleaver structure is
naturally suited for high speed parallel processing and the resulting coding
system offers new design options and tradeoffs that are not available to CTCs.
In particular, it becomes possible for the decoder to employ an efficient
inter-block collaborative decoding algorithm, passing the information obtained
from termination test proved blocks to other unproved blocks. It also becomes
important to have a proper decoding schedule. The combined effect is improved
performance and reduction in the average decoding delay (whence the required
computing power). A memory (storage) management mechanism is included as a
critical part of the decoder so as to provide additional design tradeoff
between performance and memory size. It is shown that the latter has a
modular-like effect in that additional memory units render enhanced performance
due not only to less forced early terminations but to possible increases of the
interleaving depth. Depending on the decoding schedule, the degree of
parallelism and other decoding resources available, the proposed scheme admits
a variety of decoder architectures that meet a large range of throughput and
performance demands.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2006 15:03:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zheng",
"Yan-Xiu",
""
],
[
"Su",
"Yu T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603096
|
Massimiliano Siti Mr.
|
Massimiliano Siti, Michael P. Fitz
|
On Reduced Complexity Soft-Output MIMO ML detection
|
43 pages, 10 figures Submitted to the IEEE Transactions on
Information Theory, March 2006
| null | null | null |
cs.IT math.IT
| null |
In multiple-input multiple-output (MIMO) fading channels maximum likelihood
(ML) detection is desirable to achieve high performance, but its complexity
grows exponentially with the spectral efficiency. The current state of the art
in MIMO detection is list decoding and lattice decoding. This paper proposes a
new class of lattice detectors that combines some of the principles of both
list and lattice decoding, thus resulting in an efficient parallelizable
implementation and near optimal soft-ouput ML performance. The novel detector
is called layered orthogonal lattice detector (LORD), because it adopts a new
lattice formulation and relies on a channel orthogonalization process. It
should be noted that the algorithm achieves optimal hard-output ML performance
in case of two transmit antennas. For two transmit antennas max-log bit
soft-output information can be generated and for greater than two antennas
approximate max-log detection is achieved. Simulation results show that LORD,
in MIMO system employing orthogonal frequency division multiplexing (OFDM) and
bit interleaved coded modulation (BICM) is able to achieve very high
signal-to-noise ratio (SNR) gains compared to practical soft-output detectors
such as minimum-mean square error (MMSE), in either linear or nonlinear
iterative scheme. Besides, the performance comparison with hard-output decoded
algebraic space time codes shows the fundamental importance of soft-output
generation capability for practical wireless applications.
|
[
{
"version": "v1",
"created": "Fri, 24 Mar 2006 09:44:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Siti",
"Massimiliano",
""
],
[
"Fitz",
"Michael P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603097
|
Gustavo L. Gilardoni
|
Gustavo L. Gilardoni
|
On Pinsker's Type Inequalities and Csiszar's f-divergences. Part I:
Second and Fourth-Order Inequalities
|
15 pages
|
IEEE Transactions on Information Theory, Vol. 56(11), pp.
5377-5386, 2010
|
10.1109/TIT.2010.2068710
| null |
cs.IT math.IT
| null |
We study conditions on $f$ under which an $f$-divergence $D_f$ will satisfy
$D_f \geq c_f V^2$ or $D_f \geq c_{2,f} V^2 + c_{4,f} V^4$, where $V$ denotes
variational distance and the coefficients $c_f$, $c_{2,f}$ and $c_{4,f}$ are
{\em best possible}. As a consequence, we obtain lower bounds in terms of $V$
for many well known distance and divergence measures. For instance, let
$D_{(\alpha)} (P,Q) = [\alpha (\alpha-1)]^{-1} [\int q^{\alpha} p^{1-\alpha} d
\mu -1]$ and ${\cal I}_\alpha (P,Q) = (\alpha -1)^{-1} \log [\int p^\alpha
q^{1-\alpha} d \mu]$ be respectively the {\em relative information of type}
($1-\alpha$) and {\em R\'{e}nyi's information gain of order} $\alpha$. We show
that $D_{(\alpha)} \geq {1/2} V^2 + {1/72} (\alpha+1)(2-\alpha) V^4$ whenever
$-1 \leq \alpha \leq 2$, $\alpha \not= 0,1$ and that ${\cal I}_{\alpha} =
\frac{\alpha}{2} V^2 + {1/36} \alpha (1 + 5 \alpha - 5 \alpha^2) V^4$ for $0 <
\alpha < 1$. Pinsker's inequality $D \geq {1/2}
V^2$ and its extension $D \geq {1/2} V^2 + {1/36} V^4$ are special cases of
each one of these.
|
[
{
"version": "v1",
"created": "Fri, 24 Mar 2006 11:47:59 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2006 15:06:27 GMT"
}
] | 2010-11-09T00:00:00 |
[
[
"Gilardoni",
"Gustavo L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603098
|
Siddharth Ray
|
Siddharth Ray, Muriel Medard and Lizhong Zheng
|
A SIMO Fiber Aided Wireless Network Architecture
| null | null | null | null |
cs.IT math.IT
| null |
The concept of a fiber aided wireless network architecture (FAWNA) is
introduced in [Ray et al., Allerton Conference 2005], which allows high-speed
mobile connectivity by leveraging the speed of optical networks. In this paper,
we consider a single-input, multiple-output (SIMO) FAWNA, which consists of a
SIMO wireless channel and an optical fiber channel, connected through
wireless-optical interfaces. We propose a scheme where the received wireless
signal at each interface is quantized and sent over the fiber. Though our
architecture is similar to that of the classical CEO problem, our problem is
different from it. We show that the capacity of our scheme approaches the
capacity of the architecture, exponentially with fiber capacity. We also show
that for a given fiber capacity, there is an optimal operating wireless
bandwidth and an optimal number of wireless-optical interfaces. The
wireless-optical interfaces of our scheme have low complexity and do not
require knowledge of the transmitter code book. They are also extendable to
FAWNAs with large number of transmitters and interfaces and, offer adaptability
to variable rates, changing channel conditions and node positions.
|
[
{
"version": "v1",
"created": "Sat, 25 Mar 2006 00:46:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ray",
"Siddharth",
""
],
[
"Medard",
"Muriel",
""
],
[
"Zheng",
"Lizhong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603099
|
Alin Suciu PhD
|
Alin Suciu, Rodica Potolea, Tudor Muresan
|
Benchmark Problems for Constraint Solving
| null | null | null | null |
cs.PF cs.SC
| null |
Constraint Programming is roughly a new software technology introduced by
Jaffar and Lassez in 1987 for description and effective solving of large,
particularly combinatorial, problems especially in areas of planning and
scheduling. In the following we define three problems for constraint solving
from the domain of electrical networks; based on them we define 43 related
problems. For the defined set of problems we benchmarked five systems: ILOG
OPL, AMPL, GAMS, Mathematica and UniCalc. As expected some of the systems
performed very well for some problems while others performed very well on
others.
|
[
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:19:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Suciu",
"Alin",
""
],
[
"Potolea",
"Rodica",
""
],
[
"Muresan",
"Tudor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0603100
|
Alin Suciu PhD
|
Alin Suciu, Kalman Pusztai
|
Efficient Compression of Prolog Programs
| null | null | null | null |
cs.PL
| null |
We propose a special-purpose class of compression algorithms for efficient
compression of Prolog programs. It is a dictionary-based compression method,
specially designed for the compression of Prolog code, and therefore we name it
PCA (Prolog Compression Algorithm). According to the experimental results this
method provides better compression than state-of-the-art general-purpose
compression algorithms. Since the algorithm works with Prolog syntactic
entities (e.g. atoms, terms, etc.) the implementation of a Prolog prototype is
straightforward and very easy to use in any Prolog application that needs
compression. Although the algorithm is designed for Prolog programs, the idea
can be easily applied for the compression of programs written in other (logic)
languages.
|
[
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:27:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603101
|
Alin Suciu PhD
|
Alin Suciu, Kalman Pusztai, Andrei Vancea
|
Prolog Server Pages
| null | null | null | null |
cs.NI cs.PL
| null |
Prolog Server Pages (PSP) is a scripting language, based on Prolog, than can
be embedded in HTML documents. To run PSP applications one needs a web server,
a web browser and a PSP interpreter. The code is executed, by the interpreter,
on the server-side (web server) and the output (together with the html code in
witch the PSP code is embedded) is sent to the client-side (browser). The
current implementation supports Apache Web Server. We implemented an Apache web
server module that handles PSP files, and sends the result (an html document)
to the client. PSP supports both GET and POST http requests. It also provides
methods for working with http cookies.
|
[
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:35:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
],
[
"Vancea",
"Andrei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603102
|
Alin Suciu PhD
|
Alin Suciu, Kalman Pusztai, Andrei Diaconu
|
Enhanced Prolog Remote Predicate Call Protocol
| null | null | null | null |
cs.NI cs.PL
| null |
Following the ideas of the Remote Procedure Call model, we have developed a
logic programming counterpart, naturally called Prolog Remote Predicate Call
(Prolog RPC). The Prolog RPC protocol facilitates the integration of Prolog
code in multi-language applications as well as the development of distributed
intelligent applications. One use of the protocol's most important uses could
be the development of distributed applications that use Prolog at least
partially to achieve their goals. Most notably the Distributed Artificial
Intelligence (DAI) applications that are suitable for logic programming can
profit from the use of the protocol. After proving its usefulness, we went
further, developing a new version of the protocol, making it more reliable and
extending its functionality. Because it has a new syntax and the new set of
commands, we call this version Enhanced Prolog Remote Procedure Call. This
paper describes the new features and modifications this second version
introduced.
|
[
{
"version": "v1",
"created": "Sun, 26 Mar 2006 20:44:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Suciu",
"Alin",
""
],
[
"Pusztai",
"Kalman",
""
],
[
"Diaconu",
"Andrei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0603103
|
Amir Leshem
|
Amir Leshem and Ephraim Zehavi
|
Bargaining over the interference channel
| null | null | null | null |
cs.IT math.IT
| null |
In this paper we analyze the interference channel as a conflict situation.
This viewpoint implies that certain points in the rate region are unreasonable
to one of the players. Therefore these points cannot be considered achievable
based on game theoretic considerations. We then propose to use Nash bargaining
solution as a tool that provides preferred points on the boundary of the game
theoretic rate region. We provide analysis for the 2x2 intereference channel
using the FDM achievable rate region. We also outline how to generalize our
results to other achievable rate regions for the interference channel as well
as the multiple access channel.
Keywords: Spectrum optimization, distributed coordination, game theory,
interference channel, multiple access channel.
|
[
{
"version": "v1",
"created": "Sun, 26 Mar 2006 21:28:54 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Leshem",
"Amir",
""
],
[
"Zehavi",
"Ephraim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603104
|
Patrick Baillot
|
Vincent Atassi (LIPN), Patrick Baillot (LIPN), Kazushige Terui (NII)
|
Verification of Ptime reducibility for system F terms via Dual Light
Affine Logic
|
21 pages
|
A para\^{i}tre dans Proceedings Computer Science Logic 2006
(CSL'06), LNCS, Springer. (2006)
| null | null |
cs.LO
| null |
In a previous work we introduced Dual Light Affine Logic (DLAL)
([BaillotTerui04]) as a variant of Light Linear Logic suitable for guaranteeing
complexity properties on lambda-calculus terms: all typable terms can be
evaluated in polynomial time and all Ptime functions can be represented. In the
present work we address the problem of typing lambda-terms in second-order
DLAL. For that we give a procedure which, starting with a term typed in system
F, finds all possible ways to decorate it into a DLAL typed term. We show that
our procedure can be run in time polynomial in the size of the original Church
typed system F term.
|
[
{
"version": "v1",
"created": "Mon, 27 Mar 2006 09:14:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Atassi",
"Vincent",
"",
"LIPN"
],
[
"Baillot",
"Patrick",
"",
"LIPN"
],
[
"Terui",
"Kazushige",
"",
"NII"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0603105
|
Laurent Noe
|
Gregory Kucherov (LIFL), Laurent Noe (LIFL), Mikhail Roytberg (LIFL)
|
A unifying framework for seed sensitivity and its application to subset
seeds (Extended abstract)
| null |
Algorithms in Bioinformatics, LNBI 3692 : 251-263, 2005
|
10.1007/11557067_21
| null |
cs.OH
| null |
We propose a general approach to compute the seed sensitivity, that can be
applied to different definitions of seeds. It treats separately three
components of the seed sensitivity problem - a set of target alignments, an
associated probability distribution, and a seed model - that are specified by
distinct finite automata. The approach is then applied to a new concept of
subset seeds for which we propose an efficient automaton construction.
Experimental results confirm that sensitive subset seeds can be efficiently
designed using our approach, and can then be used in similarity search
producing better results than ordinary spaced seeds.
|
[
{
"version": "v1",
"created": "Mon, 27 Mar 2006 13:21:21 GMT"
}
] | 2011-01-18T00:00:00 |
[
[
"Kucherov",
"Gregory",
"",
"LIFL"
],
[
"Noe",
"Laurent",
"",
"LIFL"
],
[
"Roytberg",
"Mikhail",
"",
"LIFL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0603106
|
Laurent Noe
|
Gregory Kucherov (LIFL), Laurent Noe (LIFL), Yann Ponty (LRI)
|
Estimating seed sensitivity on homogeneous alignments
| null |
Proceedings of the Fourth IEEE Symposium on Bioinformatics and
Bioengineering (BIBE), 387-394, 2004
|
10.1109/BIBE.2004.1317369
| null |
cs.OH
| null |
We address the problem of estimating the sensitivity of seed-based similarity
search algorithms. In contrast to approaches based on Markov models [18, 6, 3,
4, 10], we study the estimation based on homogeneous alignments. We describe an
algorithm for counting and random generation of those alignments and an
algorithm for exact computation of the sensitivity for a broad class of seed
strategies. We provide experimental results demonstrating a bias introduced by
ignoring the homogeneousness condition.
|
[
{
"version": "v1",
"created": "Mon, 27 Mar 2006 13:26:12 GMT"
}
] | 2011-01-18T00:00:00 |
[
[
"Kucherov",
"Gregory",
"",
"LIFL"
],
[
"Noe",
"Laurent",
"",
"LIFL"
],
[
"Ponty",
"Yann",
"",
"LRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0603107
|
Pedro Fortuny Ayuso
|
Pedro Fortuny Ayuso
|
Towards an information-theoretically safe cryptographic protocol
|
2 pages
| null | null | null |
cs.CR
| null |
We introduce what --if some kind of group action exists-- is a truly
(information theoretically) safe cryptographic communication system: a protocol
which provides \emph{zero} information to any passive adversary having full
access to the channel.
|
[
{
"version": "v1",
"created": "Tue, 28 Mar 2006 17:47:11 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Mar 2006 21:27:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ayuso",
"Pedro Fortuny",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603108
|
Michael Brinkmeier
|
Michael Brinkmeier
|
Minimizing Symmetric Set Functions Faster
|
9 pages
| null | null | null |
cs.DM math.CO
| null |
We describe a combinatorial algorithm which, given a monotone and consistent
symmetric set function d on a finite set V in the sense of Rizzi, constructs a
non trivial set S minimizing d(S,V-S). This includes the possibility for the
minimization of symmetric submodular functions. The presented algorithm
requires at most as much time as the one described by Rizzi, but depending on
the function d, it may allow several improvements.
|
[
{
"version": "v1",
"created": "Tue, 28 Mar 2006 10:25:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Brinkmeier",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0603109
|
Saravanan Vijayakumaran
|
Saravanan Vijayakumaran
|
Encoding of Functions of Correlated Sources
|
This paper has been withdrawn
| null | null | null |
cs.IT math.IT
| null |
This submission is being withdrawn due to serious errors in the achievability
proofs. The reviewers of the journal I had submitted to had found errors back
in 2006. I had forgotten about this paper until I saw the CFP for a JSAC issue
on in-network computation.
http://www.jsac.ucsd.edu/Calls/in-networkcomputationcfp.pdf.
|
[
{
"version": "v1",
"created": "Tue, 28 Mar 2006 15:11:54 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Sep 2011 14:19:20 GMT"
}
] | 2011-09-02T00:00:00 |
[
[
"Vijayakumaran",
"Saravanan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603110
|
Marcus Hutter
|
Daniil Ryabko and Marcus Hutter
|
Asymptotic Learnability of Reinforcement Problems with Arbitrary
Dependence
|
15 pages
|
Proc. 17th International Conf. on Algorithmic Learning Theory (ALT
2006) pages 334-347
| null |
IDSIA-09-06
|
cs.LG cs.AI
| null |
We address the problem of reinforcement learning in which observations may
exhibit an arbitrary form of stochastic dependence on past observations and
actions. The task for an agent is to attain the best possible asymptotic reward
where the true generating environment is unknown but belongs to a known
countable family of environments. We find some sufficient conditions on the
class of environments under which an agent exists which attains the best
asymptotic reward for any environment in the class. We analyze how tight these
conditions are and how they relate to different probabilistic assumptions known
in reinforcement learning and related fields, such as Markov Decision Processes
and mixing conditions.
|
[
{
"version": "v1",
"created": "Tue, 28 Mar 2006 16:22:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ryabko",
"Daniil",
""
],
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0603111
|
Tomasz Blachowicz
|
T. Blachowicz and M. Wieja
|
Remote-control and clustering of physical computations using the XML-RPC
protocol and the open-Mosix system
|
18 pages, 2 figures
| null | null | null |
cs.DC cs.NI
| null |
The applications of the remote control of physical simulations performed in
clustered computers running under an open-Mosix system are presented. Results
from the simulation of a 2-dimensional ferromagnetic system of spins in the
Ising scheme are provided. Basic parameters of a simulated hysteresis loop like
coercivity and exchange bias due to pinning of ferromagnetic spins are given.
The paper describes in physicists terminology a cost effective solution which
utilizes an XML-RPC protocol (Extensible Markup Language - Remote Procedure
Calling) and standard C++ and Python languages.
|
[
{
"version": "v1",
"created": "Tue, 28 Mar 2006 20:45:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Blachowicz",
"T.",
""
],
[
"Wieja",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0603112
|
Joseph Kong
|
Joseph S. Kong, Jesse S. A. Bridgewater and Vwani P. Roychowdhury
|
A General Framework for Scalability and Performance Analysis of DHT
Routing Systems
|
11 pages, 8 figures; to be published in IEEE DSN 2006
| null |
10.1109/DSN.2006.4
| null |
cs.DC
| null |
In recent years, many DHT-based P2P systems have been proposed, analyzed, and
certain deployments have reached a global scale with nearly one million nodes.
One is thus faced with the question of which particular DHT system to choose,
and whether some are inherently more robust and scalable.
Toward developing such a comparative framework, we present the reachable
component method (RCM) for analyzing the performance of different DHT routing
systems subject to random failures. We apply RCM to five DHT systems and obtain
analytical expressions that characterize their routability as a continuous
function of system size and node failure probability. An important consequence
is that in the large-network limit, the routability of certain DHT systems go
to zero for any non-zero probability of node failure. These DHT routing
algorithms are therefore unscalable, while some others, including Kademlia,
which powers the popular eDonkey P2P system, are found to be scalable.
|
[
{
"version": "v1",
"created": "Tue, 28 Mar 2006 22:54:37 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Kong",
"Joseph S.",
""
],
[
"Bridgewater",
"Jesse S. A.",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0603113
|
Serge Gornev
|
Serge Gornev
|
Mathematical Modeling of Aerodynamic Space -to - Surface Flight with
Trajectory for Avoid Intercepting Process
| null | null | null | null |
cs.OH
| null |
Modeling has been created for a Space-to-Surface system defined for an
optimal trajectory for targeting in terminal phase with avoids an intercepting
process. The modeling includes models for simulation atmosphere, speed of
sound, aerodynamic flight and navigation by an infrared system. The modeling
and simulation includes statistical analysis of the modeling results.
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2006 01:21:34 GMT"
}
] | 2009-03-23T00:00:00 |
[
[
"Gornev",
"Serge",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0603114
|
William Yurcik
|
Gregory A. Pluta, Larry Brumbaugh, William Yurcik
|
Using SMART for Customized Monitoring of Windows Services
|
15 pages, 10 figures, 2 tables
| null | null | null |
cs.NI cs.CR
| null |
We focus on examining and working with an important category of computer
software called Services, which are provided as a part of newer Microsoft
Windows operating systems. A typical Windows user transparently utilizes many
of these services but is frequently unaware of their existence. Since some
services have the potential to create significant problems when they are
executing, it is important for a system administrator to identify which
services are running on the network, the types of processing done by each
service, and any interrelationships among the various services. This
information can then be used to improve the overall integrity of both the
individual computer where a questionable service is running and in aggregate an
entire network of computers.
NCSA has developed an application called SMART (Services Monitoring And
Reporting Tool) that can be used to identify and display all services currently
running in the network. A commercial program called Hyena remotely monitors the
services on all computers attached to the network and exports this information
to SMART. SMART produces various outputs that the system administrator can
analyze and then determine appropriate actions to take. In particular, SMART
provides a color coordinated user interface to quickly identify and classify
both potentially hazardous services and also unknown services.
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2006 05:25:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pluta",
"Gregory A.",
""
],
[
"Brumbaugh",
"Larry",
""
],
[
"Yurcik",
"William",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603115
|
David Defour
|
Guillaume Da Gra\c{c}ca (LP2A), David Defour (LP2A)
|
Implementation of float-float operators on graphics hardware
| null | null | null | null |
cs.AR cs.GR
| null |
The Graphic Processing Unit (GPU) has evolved into a powerful and flexible
processor. The latest graphic processors provide fully programmable vertex and
pixel processing units that support vector operations up to single
floating-point precision. This computational power is now being used for
general-purpose computations. However, some applications require higher
precision than single precision. This paper describes the emulation of a 44-bit
floating-point number format and its corresponding operations. An
implementation is presented along with performance and accuracy results.
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2006 11:48:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Da Graçca",
"Guillaume",
"",
"LP2A"
],
[
"Defour",
"David",
"",
"LP2A"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0603116
|
Bruno de Figueiredo Moutinho
|
G.A. Giraldi and B.F. Moutinho and D.M.L. de Carvalho and J.C. de
Oliveira
|
Fourier Analysis and Holographic Representations of 1D and 2D Signals
|
13 pages
| null | null | null |
cs.CV
| null |
In this paper, we focus on Fourier analysis and holographic transforms for
signal representation. For instance, in the case of image processing, the
holographic representation has the property that an arbitrary portion of the
transformed image enables reconstruction of the whole image with details
missing. We focus on holographic representation defined through the Fourier
Transforms. Thus, We firstly review some results in Fourier transform and
Fourier series. Next, we review the Discrete Holographic Fourier Transform
(DHFT) for image representation. Then, we describe the contributions of our
work. We show a simple scheme for progressive transmission based on the DHFT.
Next, we propose the Continuous Holographic Fourier Transform (CHFT) and
discuss some theoretical aspects of it for 1D signals. Finally, some testes are
presented in the experimental results
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:07:52 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2006 13:16:24 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Giraldi",
"G. A.",
""
],
[
"Moutinho",
"B. F.",
""
],
[
"de Carvalho",
"D. M. L.",
""
],
[
"de Oliveira",
"J. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0603117
|
Yves Bertot
|
Yves Bertot (INRIA Sophia Antipolis)
|
Affine functions and series with co-inductive real numbers
| null |
Mathematical Structures in Computer Science 17, 1 (2006)
| null | null |
cs.LO
| null |
We extend the work of A. Ciaffaglione and P. Di Gianantonio on mechanical
verification of algorithms for exact computation on real numbers, using
infinite streams of digits implemented as co-inductive types. Four aspects are
studied: the first aspect concerns the proof that digit streams can be related
to the axiomatized real numbers that are already axiomatized in the proof
system (axiomatized, but with no fixed representation). The second aspect
re-visits the definition of an addition function, looking at techniques to let
the proof search mechanism perform the effective construction of an algorithm
that is correct by construction. The third aspect concerns the definition of a
function to compute affine formulas with positive rational coefficients. This
should be understood as a testbed to describe a technique to combine
co-recursion and recursion to obtain a model for an algorithm that appears at
first sight to be outside the expressive power allowed by the proof system. The
fourth aspect concerns the definition of a function to compute series, with an
application on the series that is used to compute Euler's number e. All these
experiments should be reproducible in any proof system that supports
co-inductive types, co-recursion and general forms of terminating recursion,
but we performed with the Coq system [12, 3, 14].
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:36:03 GMT"
},
{
"version": "v2",
"created": "Mon, 1 May 2006 07:38:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0603118
|
Yves Bertot
|
Yves Bertot (INRIA Sophia Antipolis)
|
Coq in a Hurry
| null |
Cours (2008) 22 pages
| null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
These notes provide a quick introduction to the Coq system and show how it
can be used to define logical concepts and functions and reason about them. It
is designed as a tutorial, so that readers can quickly start their own
experiments, learning only a few of the capabilities of the system. A much more
comprehensive study is provided in [1], which also provides an extensive
collection of exercises to train on.
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:38:33 GMT"
},
{
"version": "v2",
"created": "Wed, 24 May 2006 13:05:17 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Nov 2008 09:44:20 GMT"
}
] | 2008-11-07T00:00:00 |
[
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0603119
|
Yves Bertot
|
Yves Bertot (INRIA Sophia Antipolis)
|
CoInduction in Coq
| null | null | null | null |
cs.LO
| null |
We describe the basic notions of co-induction as they are available in the
coq system. As an application, we describe arithmetic properties for simple
representations of real numbers.
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2006 19:39:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0603120
|
Zengyou He
|
Zengyou He
|
Approximation Algorithms for K-Modes Clustering
|
7 pages
| null | null |
Tr-06-0330
|
cs.AI
| null |
In this paper, we study clustering with respect to the k-modes objective
function, a natural formulation of clustering for categorical data. One of the
main contributions of this paper is to establish the connection between k-modes
and k-median, i.e., the optimum of k-median is at most twice the optimum of
k-modes for the same categorical data clustering problem. Based on this
observation, we derive a deterministic algorithm that achieves an approximation
factor of 2. Furthermore, we prove that the distance measure in k-modes defines
a metric. Hence, we are able to extend existing approximation algorithms for
metric k-median to k-modes. Empirical results verify the superiority of our
method.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 02:02:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"He",
"Zengyou",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0603121
|
Scott Turner
|
Scott Turner, Manuel A. Perez-Quinones and Stephen H. Edwards
|
minimUML: A Minimalist Approach to UML Diagraming for Early Computer
Science Education
|
38 pages, 15 figures
| null | null | null |
cs.HC cs.SE
| null |
The Unified Modeling Language (UML) is commonly used in introductory Computer
Science to teach basic object-oriented design. However, there appears to be a
lack of suitable software to support this task. Many of the available programs
that support UML focus on developing code and not on enhancing learning. Those
that were designed for educational use sometimes have poor interfaces or are
missing common and important features, such as multiple selection and
undo/redo. There is a need for software that is tailored to an instructional
environment and has all the useful and needed functionality for that specific
task. This is the purpose of minimUML. minimUML provides a minimum amount of
UML, just what is commonly used in beginning programming classes, while
providing a simple, usable interface. In particular, minimUML was designed to
support abstract design while supplying features for exploratory learning and
error avoidance. In addition, it allows for the annotation of diagrams, through
text or freeform drawings, so students can receive feedback on their work.
minimUML was developed with the goal of supporting ease of use, supporting
novice students, and a requirement of no prior-training for its use.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 06:12:17 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Turner",
"Scott",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Edwards",
"Stephen H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0603122
|
Irene Guessarian
|
Eug\'enie Foustoucos (MPLA), Irene Guessarian (LIAFA)
|
Complexity of Monadic inf-datalog. Application to temporal logic
| null |
Proc. 4th Panhellenic Logic Symposium (2003) 95-99
| null | null |
cs.DS
| null |
In [11] we defined Inf-Datalog and characterized the fragments of Monadic
inf-Datalog that have the same expressive power as Modal Logic (resp. $CTL$,
alternation-free Modal $\mu$-calculus and Modal $\mu$-calculus). We study here
the time and space complexity of evaluation of Monadic inf-Datalog programs on
finite models. We deduce a new unified proof that model checking has 1. linear
data and program complexities (both in time and space) for $CTL$ and
alternation-free Modal $\mu$-calculus, and 2. linear-space (data and program)
complexities, linear-time program complexity and polynomial-time data
complexity for $L\mu\_k$ (Modal $\mu$-calculus with fixed alternation-depth at
most $k$).}
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 15:25:11 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Foustoucos",
"Eugénie",
"",
"MPLA"
],
[
"Guessarian",
"Irene",
"",
"LIAFA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0603123
|
Jean-Claude Belfiore
|
Sheng Yang and Jean-Claude Belfiore
|
Towards the Optimal Amplify-and-Forward Cooperative Diversity Scheme
|
30 pages, 11 figures, submitted to IEEE trans. IT, revised version
| null | null | null |
cs.IT math.IT
| null |
In a slow fading channel, how to find a cooperative diversity scheme that
achieves the transmit diversity bound is still an open problem. In fact, all
previously proposed amplify-and-forward (AF) and decode-and-forward (DF)
schemes do not improve with the number of relays in terms of the diversity
multiplexing tradeoff (DMT) for multiplexing gains r higher than 0.5. In this
work, we study the class of slotted amplify-and-forward (SAF) schemes. We first
establish an upper bound on the DMT for any SAF scheme with an arbitrary number
of relays N and number of slots M. Then, we propose a sequential SAF scheme
that can exploit the potential diversity gain in the high multiplexing gain
regime. More precisely, in certain conditions, the sequential SAF scheme
achieves the proposed DMT upper bound which tends to the transmit diversity
bound when M goes to infinity. In particular, for the two-relay case, the
three-slot sequential SAF scheme achieves the proposed upper bound and
outperforms the two-relay non-orthorgonal amplify-and-forward (NAF) scheme of
Azarian et al. for multiplexing gains r < 2/3. Numerical results reveal a
significant gain of our scheme over the previously proposed AF schemes,
especially in high spectral efficiency and large network size regime.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 16:59:42 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 18:35:53 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Yang",
"Sheng",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603124
|
Sheng Yang
|
Sheng Yang and Jean-Claude Belfiore
|
Diversity-Multiplexing Tradeoff of Double Scattering MIMO Channels
|
17 pages, 1 figure, submitted to IEEE trans. IT
| null | null | null |
cs.IT math.IT
| null |
It is well known that the presence of double scattering degrades the
performance of a MIMO channel, in terms of both the multiplexing gain and the
diversity gain. In this paper, a closed-form expression of the
diversity-multiplexing tradeoff (DMT) of double scattering MIMO channels is
obtained. It is shown that, for a channel with nT transmit antennas, nR receive
antennas and nS scatterers, the DMT only depends on the ordered version of the
triple (nT,nS,nR), for arbitrary nT, nS and nR. The condition under which the
double scattering channel has the same DMT as the single scattering channel is
also established.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 17:45:59 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2006 12:40:33 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Yang",
"Sheng",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603125
|
Russ Abbott
|
Russ Abbott
|
If a tree casts a shadow is it telling the time?
|
12 pages. Submitted for conference presentation
| null | null | null |
cs.MA cs.GL
| null |
Physical processes are computations only when we use them to externalize
thought. Computation is the performance of one or more fixed processes within a
contingent environment. We reformulate the Church-Turing thesis so that it
applies to programs rather than to computability. When suitably formulated
agent-based computing in an open, multi-scalar environment represents the
current consensus view of how we interact with the world. But we don't know how
to formulate multi-scalar environments.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 22:31:26 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jun 2006 01:49:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Abbott",
"Russ",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0603126
|
Russ Abbott
|
Russ Abbott
|
Open at the Top; Open at the Bottom; and Continually (but Slowly)
Evolving
|
6 pages. To be presented at the IEEE Conference on Systems of Systems
Engineering, April, 2006
| null |
10.1109/SYSOSE.2006.1652271
| null |
cs.MA
| null |
Systems of systems differ from traditional systems in that they are open at
the top, open at the bottom, and continually (but slowly) evolving. "Open at
the top" means that there is no pre-defined top level application. New
applications may be created at any time. "Open at the bottom" means that the
system primitives are defined functionally rather than concretely. This allows
the implementation of these primitives to be modified as technology changes.
"Continually (but slowly) evolving" means that the system's functionality is
stable enough to be useful but is understood to be subject to modification.
Systems with these properties tend to be environments within which other
systems operate--and hence are systems of systems. It is also important to
understand the larger environment within which a system of systems exists.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 22:53:15 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Abbott",
"Russ",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0603127
|
Russ Abbott
|
Russ Abbott
|
Complex Systems + Systems Engineering = Complex Systems Engineeri
|
10 pages. Position paper to be presented at Conference on Systems
Engineering Research
| null | null | null |
cs.MA
| null |
One may define a complex system as a system in which phenomena emerge as a
consequence of multiscale interaction among the system's components and their
environments. The field of Complex Systems is the study of such
systems--usually naturally occurring, either bio-logical or social. Systems
Engineering may be understood to include the conceptualising and building of
systems that consist of a large number of concurrently operating and
interacting components--usually including both human and non-human elements. It
has become increasingly apparent that the kinds of systems that systems
engineers build have many of the same multiscale characteristics as those of
naturally occurring complex systems. In other words, systems engineering is the
engineering of complex systems. This paper and the associated panel will
explore some of the connections between the fields of complex systems and
systems engineering.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2006 22:58:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Abbott",
"Russ",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0603128
|
Kai-Uwe Schmidt
|
Kai-Uwe Schmidt
|
On Cosets of the Generalized First-Order Reed-Muller Code with Low PMEPR
| null |
IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 3220-3232, July 2006
| null | null |
cs.IT math.IT
| null |
Golay sequences are well suited for the use as codewords in orthogonal
frequency-division multiplexing (OFDM), since their peak-to-mean envelope power
ratio (PMEPR) in q-ary phase-shift keying (PSK) modulation is at most 2. It is
known that a family of polyphase Golay sequences of length 2^m organizes in
m!/2 cosets of a q-ary generalization of the first-order Reed-Muller code,
RM_q(1,m). In this paper a more general construction technique for cosets of
RM_q(1,m) with low PMEPR is established. These cosets contain so-called
near-complementary sequences. The application of this theory is then
illustrated by providing some construction examples. First, it is shown that
the m!/2 cosets of RM_q(1,m) comprised of Golay sequences just arise as a
special case. Second, further families of cosets of RM_q(1,m) with maximum
PMEPR between 2 and 4 are presented, showing that some previously unexplained
phenomena can now be understood within a unified framework. A lower bound on
the PMEPR of cosets of RM_q(1,m) is proved as well, and it is demonstrated that
the upper bound on the PMEPR is tight in many cases. Finally it is shown that
all upper bounds on the PMEPR of cosets of RM_q(1,m) also hold for the
peak-to-average power ratio (PAPR) under the Walsh-Hadamard transform.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2006 08:51:35 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Nov 2006 09:52:48 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Schmidt",
"Kai-Uwe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603129
|
Damiano Bolzoni
|
Xiamoneg Su, Damiano Bolzoni, Pascal van Eck
|
A Business Goal Driven Approach for Understanding and Specifying
Information Security Requirements
| null | null | null |
TR-CTIT-06-08
|
cs.CR
| null |
In this paper we present an approach for specifying and prioritizing
information security requirements in organizations. It is important to
prioritize security requirements since hundred per cent security is not
achievable and the limited resources available should be directed to satisfy
the most important ones. We propose to link explicitly security requirements
with the organization's business vision, i.e. to provide business rationale for
security requirements. The rationale is then used as a basis for comparing the
importance of different security requirements. A conceptual framework is
presented, where the relationships between business vision, critical impact
factors and valuable assets (together with their security requirements) are
shown.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2006 13:15:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Su",
"Xiamoneg",
""
],
[
"Bolzoni",
"Damiano",
""
],
[
"van Eck",
"Pascal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0603130
|
Shreecharan Tangirala
|
Rashmi Agarwal and M. S. Santhanam
|
Digital watermarking in the singular vector domain
|
11 pages, 21 figures, Elsevier class
|
International Journal of Image and Graphics, volume 8, page 351
(2008)
|
10.1142/S0219467808003131
| null |
cs.MM
| null |
Many current watermarking algorithms insert data in the spatial or transform
domains like the discrete cosine, the discrete Fourier, and the discrete
wavelet transforms. In this paper, we present a data-hiding algorithm that
exploits the singular value decomposition (SVD) representation of the data. We
compute the SVD of the host image and the watermark and embed the watermark in
the singular vectors of the host image. The proposed method leads to an
imperceptible scheme for digital images, both in grey scale and color and is
quite robust against attacks like noise and JPEG compression.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2006 19:36:03 GMT"
}
] | 2010-12-13T00:00:00 |
[
[
"Agarwal",
"Rashmi",
""
],
[
"Santhanam",
"M. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0603131
|
Chris Snow
|
C. Snow, L. Lampe, R. Schober
|
Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static
Fading Channels
|
5 pages, 3 figures, 2 tables. Submitted to Globecom 2006
| null | null | null |
cs.IT math.IT
| null |
This paper presents two methods for approximating the performance of coded
multicarrier systems operating over frequency-selective, quasi-static fading
channels with non-ideal interleaving. The first method is based on
approximating the performance of the system over each realization of the
channel, and is suitable for obtaining the outage performance of this type of
system. The second method is based on knowledge of the correlation matrix of
the frequency-domain channel gains and can be used to directly obtain the
average performance. Both of the methods are applicable for
convolutionally-coded interleaved systems employing Quadrature Amplitude
Modulation (QAM). As examples, both methods are used to study the performance
of the Multiband Orthogonal Frequency Division Multiplexing (OFDM) proposal for
high data-rate Ultra-Wideband (UWB) communication.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2006 19:36:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Snow",
"C.",
""
],
[
"Lampe",
"L.",
""
],
[
"Schober",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0603132
|
Michael McGuigan
|
Michael McGuigan
|
Graphics Turing Test
|
6 pages
| null | null | null |
cs.GR
| null |
We define a Graphics Turing Test to measure graphics performance in a similar
manner to the definition of the traditional Turing Test. To pass the test one
needs to reach a computational scale, the Graphics Turing Scale, for which
Computer Generated Imagery becomes comparatively indistinguishable from real
images while also being interactive. We derive an estimate for this
computational scale which, although large, is within reach of todays
supercomputers. We consider advantages and disadvantages of various computer
systems designed to pass the Graphics Turing Test. Finally we discuss
commercial applications from the creation of such a system, in particular
Interactive Cinema.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2006 19:58:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"McGuigan",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0604001
|
Fabrice Rossi
|
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc
Conan-Guez (LITA)
|
Theoretical Properties of Projection Based Multilayer Perceptrons with
Functional Inputs
| null | null |
10.1007/s11063-005-3100-2
| null |
cs.NE
| null |
Many real world data are sampled functions. As shown by Functional Data
Analysis (FDA) methods, spectra, time series, images, gesture recognition data,
etc. can be processed more efficiently if their functional nature is taken into
account during the data analysis process. This is done by extending standard
data analysis methods so that they can apply to functional inputs. A general
way to achieve this goal is to compute projections of the functional data onto
a finite dimensional sub-space of the functional space. The coordinates of the
data on a basis of this sub-space provide standard vector representations of
the functions. The obtained vectors can be processed by any standard method. In
our previous work, this general approach has been used to define projection
based Multilayer Perceptrons (MLPs) with functional inputs. We study in this
paper important theoretical properties of the proposed model. We show in
particular that MLPs with functional inputs are universal approximators: they
can approximate to arbitrary accuracy any continuous mapping from a compact
sub-space of a functional space to R. Moreover, we provide a consistency result
that shows that any mapping from a functional space to R can be learned thanks
to examples by a projection based MLP: the generalization mean square error of
the MLP decreases to the smallest possible mean square error on the data when
the number of examples goes to infinity.
|
[
{
"version": "v1",
"created": "Sat, 1 Apr 2006 20:16:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rossi",
"Fabrice",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Conan-Guez",
"Brieuc",
"",
"LITA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0604002
|
Leopoldo Bertossi
|
Andrei Lopatenko and Leopoldo Bertossi
|
Complexity of Consistent Query Answering in Databases under
Cardinality-Based and Incremental Repair Semantics
|
26 pages, 2 figures
| null | null | null |
cs.DB cs.CC
| null |
Consistent Query Answering (CQA) is the problem of computing from a database
the answers to a query that are consistent with respect to certain integrity
constraints that the database, as a whole, may fail to satisfy. Consistent
answers have been characterized as those that are invariant under certain
minimal forms of restoration of the database consistency. We investigate
algorithmic and complexity theoretic issues of CQA under database repairs that
minimally depart -wrt the cardinality of the symmetric difference- from the
original database. We obtain first tight complexity bounds.
We also address the problem of incremental complexity of CQA, that naturally
occurs when an originally consistent database becomes inconsistent after the
execution of a sequence of update operations. Tight bounds on incremental
complexity are provided for various semantics under denial constraints. Fixed
parameter tractability is also investigated in this dynamic context, where the
size of the update sequence becomes the relevant parameter.
|
[
{
"version": "v1",
"created": "Sun, 2 Apr 2006 03:07:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lopatenko",
"Andrei",
""
],
[
"Bertossi",
"Leopoldo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0604003
|
Petrus H Potgieter
|
Petrus H. Potgieter
|
Hypercomputing the Mandelbrot Set?
|
11 pages, 2 figures
| null | null | null |
cs.CC
| null |
The Mandelbrot set is an extremely well-known mathematical object that can be
described in a quite simple way but has very interesting and non-trivial
properties. This paper surveys some results that are known concerning the
(non-)computability of the set. It considers two models of decidability over
the reals (which have been treated much more thoroughly and technically by
Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and
2003) among others), two over the computable reals (the Russian school and
hypercomputation) and a model over the rationals.
|
[
{
"version": "v1",
"created": "Sun, 2 Apr 2006 15:31:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Potgieter",
"Petrus H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0604004
|
Alexander Evako
|
Alexander V. Evako
|
The Poincare conjecture for digital spaces. Properties of digital
n-dimensional disks and spheres
| null | null | null | null |
cs.DM cs.CV math.AT
| null |
Motivated by the Poincare conjecture, we study properties of digital
n-dimensional spheres and disks, which are digital models of their continuous
counterparts. We introduce homeomorphic transformations of digital manifolds,
which retain the connectedness, the dimension, the Euler characteristics and
the homology groups of manifolds. We find conditions where an n-dimensional
digital manifold is the n-dimensional digital sphere and discuss the link
between continuous closed n-manifolds and their digital models.
|
[
{
"version": "v1",
"created": "Sun, 2 Apr 2006 19:55:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Evako",
"Alexander V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
cs/0604005
|
Sergio Servetto
|
Sergio D. Servetto (Cornell University)
|
Multiterminal Source Coding with Two Encoders--I: A Computable Outer
Bound
|
Submitted to the IEEE Transactions on Information Theory; Revised,
November 2006. Substantial revision after the first round of reviews
| null | null | null |
cs.IT math.IT
| null |
In this first part, a computable outer bound is proved for the multiterminal
source coding problem, for a setup with two encoders, discrete memoryless
sources, and bounded distortion measures.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2006 04:44:33 GMT"
},
{
"version": "v2",
"created": "Mon, 8 May 2006 22:12:18 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Nov 2006 05:32:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Servetto",
"Sergio D.",
"",
"Cornell University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604006
|
David Bateman
|
David Bateman and Andy Adler
|
Sparse Matrix Implementation in Octave
| null | null | null |
Octave2006/04
|
cs.MS
| null |
There are many classes of mathematical problems which give rise to matrices,
where a large number of the elements are zero. In this case it makes sense to
have a special matrix type to handle this class of problems where only the
non-zero elements of the matrix are stored. Not only does this reduce the
amount of memory to store the matrix, but it also means that operations on this
type of matrix can take advantage of the a-priori knowledge of the positions of
the non-zero elements to accelerate their calculations. A matrix type that
stores only the non-zero elements is generally called sparse.
Until recently Octave has lacked a full implementation of sparse matrices.
This article address the implementation of sparse matrices within Octave,
including their storage, creation, fundamental algorithms used, their
implementations and the basic operations and functions implemented for sparse
matrices. Mathematical issues such as the return types of sparse operations,
matrix fill-in and reordering for sparse matrix factorization is discussed in
the context of a real example.
Benchmarking of Octave's implementation of sparse operations compared to
their equivalent in Matlab are given and their implications discussed. Results
are presented for multiplication and linear algebra operations for various
matrix orders and densities. Furthermore, the use of Octave's sparse matrix
implementation is demonstrated using a real example of a finite element model
(FEM) problem. Finally, the method of using sparse matrices with Octave's
oct-files is discussed. The means of creating, using and returning sparse
matrices within oct-files is discussed as well as the differences between
Octave's Sparse and Array classes.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2006 12:56:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bateman",
"David",
""
],
[
"Adler",
"Andy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0604007
|
Guillaume Theyssier
|
Laurent Boyer (LIP), Victor Poupet (LIP), Guillaume Theyssier
(LM-Savoie)
|
On the Complexity of Limit Sets of Cellular Automata Associated with
Probability Measures
| null |
Mathematical Foundations of Computer Science 2006Springer (Ed.)
(28/08/2006) 190-201
| null | null |
cs.DM cs.CC math.DS
| null |
We study the notion of limit sets of cellular automata associated with
probability measures (mu-limit sets). This notion was introduced by P. Kurka
and A. Maass. It is a refinement of the classical notion of omega-limit sets
dealing with the typical long term behavior of cellular automata. It focuses on
the words whose probability of appearance does not tend to 0 as time tends to
infinity (the persistent words). In this paper, we give a characterisation of
the persistent language for non sensible cellular automata associated with
Bernouilli measures. We also study the computational complexity of these
languages. We show that the persistent language can be non-recursive. But our
main result is that the set of quasi-nilpotent cellular automata (those with a
single configuration in their mu-limit set) is neither recursively enumerable
nor co-recursively enumerable.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2006 10:21:36 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Oct 2006 08:53:03 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Boyer",
"Laurent",
"",
"LIP"
],
[
"Poupet",
"Victor",
"",
"LIP"
],
[
"Theyssier",
"Guillaume",
"",
"LM-Savoie"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
] |
cs/0604008
|
Sandor P. Fekete
|
Esther M. Arkin and Herve Broennimann and Jeff Erickson and Sandor P.
Fekete and Christian Knauer and Jonathan Lenchner and Joseph S. B. Mitchell
and Kim Whittlesey
|
Minimum-Cost Coverage of Point Sets by Disks
|
10 pages, 4 figures, Latex, to appear in ACM Symposium on
Computational Geometry 2006
| null | null | null |
cs.DS cs.CG
| null |
We consider a class of geometric facility location problems in which the goal
is to determine a set X of disks given by their centers (t_j) and radii (r_j)
that cover a given set of demand points Y in the plane at the smallest possible
cost. We consider cost functions of the form sum_j f(r_j), where f(r)=r^alpha
is the cost of transmission to radius r. Special cases arise for alpha=1 (sum
of radii) and alpha=2 (total area); power consumption models in wireless
network design often use an exponent alpha>2. Different scenarios arise
according to possible restrictions on the transmission centers t_j, which may
be constrained to belong to a given discrete set or to lie on a line, etc. We
obtain several new results, including (a) exact and approximation algorithms
for selecting transmission points t_j on a given line in order to cover demand
points Y in the plane; (b) approximation algorithms (and an algebraic
intractability result) for selecting an optimal line on which to place
transmission points to cover Y; (c) a proof of NP-hardness for a discrete set
of transmission points in the plane and any fixed alpha>1; and (d) a
polynomial-time approximation scheme for the problem of computing a minimum
cost covering tour (MCCT), in which the total cost is a linear combination of
the transmission cost for the set of disks and the length of a tour/path that
connects the centers of the disks.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2006 17:24:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Arkin",
"Esther M.",
""
],
[
"Broennimann",
"Herve",
""
],
[
"Erickson",
"Jeff",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Knauer",
"Christian",
""
],
[
"Lenchner",
"Jonathan",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Whittlesey",
"Kim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0604009
|
Alexey Melkikh
|
Alexey V. Melkikh
|
Can an Organism Adapt Itself to Unforeseen Circumstances?
| null | null | null | null |
cs.AI
| null |
A model of an organism as an autonomous intelligent system has been proposed.
This model was used to analyze learning of an organism in various environmental
conditions. Processes of learning were divided into two types: strong and weak
processes taking place in the absence and the presence of aprioristic
information about an object respectively. Weak learning is synonymous to
adaptation when aprioristic programs already available in a system (an
organism) are started. It was shown that strong learning is impossible for both
an organism and any autonomous intelligent system. It was shown also that the
knowledge base of an organism cannot be updated. Therefore, all behavior
programs of an organism are congenital. A model of a conditioned reflex as a
series of consecutive measurements of environmental parameters has been
advanced. Repeated measurements are necessary in this case to reduce the error
during decision making.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2006 10:29:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Melkikh",
"Alexey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0604010
|
Christos Dimitrakakis
|
Christos Dimitrakakis
|
Nearly optimal exploration-exploitation decision thresholds
|
10 pages, 2 figures; IDIAP Research Report. Originally published in
ICANN 2006. This version updates the paper with some links to previous and
followup work
| null | null |
IDIAP-RR-06-12
|
cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While in general trading off exploration and exploitation in reinforcement
learning is hard, under some formulations relatively simple solutions exist. In
this paper, we first derive upper bounds for the utility of selecting different
actions in the multi-armed bandit setting. Unlike the common statistical upper
confidence bounds, these explicitly link the planning horizon, uncertainty and
the need for exploration explicit. The resulting algorithm can be seen as a
generalisation of the classical Thompson sampling algorithm. We experimentally
test these algorithms, as well as $\epsilon$-greedy and the value of perfect
information heuristics. Finally, we also introduce the idea of bagging for
reinforcement learning. By employing a version of online bootstrapping, we can
efficiently sample from an approximate posterior distribution.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2006 10:29:48 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Jun 2018 18:17:32 GMT"
}
] | 2018-06-06T00:00:00 |
[
[
"Dimitrakakis",
"Christos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0604011
|
Noam Shental
|
Gad Getz, Noam Shental, Eytan Domany
|
Semi-Supervised Learning -- A Statistical Physics Approach
|
9 pages. Appeared in in the Proceedings of "Learning with Partially
Classified Training Data", ICML 2005 workshop
| null | null | null |
cs.LG cond-mat.stat-mech cs.CV
| null |
We present a novel approach to semi-supervised learning which is based on
statistical physics. Most of the former work in the field of semi-supervised
learning classifies the points by minimizing a certain energy function, which
corresponds to a minimal k-way cut solution. In contrast to these methods, we
estimate the distribution of classifications, instead of the sole minimal k-way
cut, which yields more accurate and robust results. Our approach may be applied
to all energy functions used for semi-supervised learning. The method is based
on sampling using a Multicanonical Markov chain Monte-Carlo algorithm, and has
a straightforward probabilistic interpretation, which allows for soft
assignments of points to classes, and also to cope with yet unseen class types.
The suggested approach is demonstrated on a toy data set and on two real-life
data sets of gene expression.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2006 18:07:31 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2006 12:23:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Getz",
"Gad",
""
],
[
"Shental",
"Noam",
""
],
[
"Domany",
"Eytan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0604012
|
Sreeram Vuppala
|
Sreeram Vuppala
|
The Aryabhata Algorithm Using Least Absolute Remainders
|
9 pages
| null | null | null |
cs.CR
| null |
This paper presents an introduction to the Aryabhata algorithm for finding
multiplicative inverses and solving linear congruences, both of which have
applications in cryptography. We do so by the use of the least absolute
remainders. The exposition of the Aryabhata algorithm provided here can have
performance that could exceed what was described recently by Rao and Yang.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2006 19:18:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vuppala",
"Sreeram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0604013
|
Shripad Thite
|
Shripad Thite
|
On Covering a Graph Optimally with Induced Subgraphs
|
9 pages
| null | null | null |
cs.DM
| null |
We consider the problem of covering a graph with a given number of induced
subgraphs so that the maximum number of vertices in each subgraph is minimized.
We prove NP-completeness of the problem, prove lower bounds, and give
approximation algorithms for certain graph classes.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 17:06:51 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2006 07:44:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thite",
"Shripad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604014
|
Habibi Omar Jr.
|
O. Habibi, U.R. Patihnedj, M.O. Dhar
|
Towards Analog Reverse Time Computation
| null | null | null | null |
cs.CC
| null |
We report the consequences of a destabilization process on a simulated
General Purpose Analog Computer. This new technology overcomes problems linked
with serial ambiguity, and provides an analog bias to encode algorithms whose
complexity is over polynomial. We also implicitly demonstrate how
countermesures of the Stochastic Aperture Degeneracy could efficiently reach
higher computational classes, and would open a road towards Analog Reverse Time
Computation.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2006 23:40:56 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Apr 2006 09:39:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Habibi",
"O.",
""
],
[
"Patihnedj",
"U. R.",
""
],
[
"Dhar",
"M. O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0604015
|
Dmitri Krioukov
|
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, kc claffy
|
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
| null |
PAM 2006, best paper award
| null | null |
cs.NI cs.LG
| null |
Although the Internet AS-level topology has been extensively studied over the
past few years, little is known about the details of the AS taxonomy. An AS
"node" can represent a wide variety of organizations, e.g., large ISP, or small
private business, university, with vastly different network characteristics,
external connectivity patterns, network growth tendencies, and other properties
that we can hardly neglect while working on veracious Internet representations
in simulation environments. In this paper, we introduce a radically new
approach based on machine learning techniques to map all the ASes in the
Internet into a natural AS taxonomy. We successfully classify 95.3% of ASes
with expected accuracy of 78.1%. We release to the community the AS-level
topology dataset augmented with: 1) the AS taxonomy information and 2) the set
of AS attributes we used to classify ASes. We believe that this dataset will
serve as an invaluable addition to further understanding of the structure and
evolution of the Internet.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 00:08:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Riley",
"George",
""
],
[
"claffy",
"kc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0604016
|
Michael Baer
|
Michael B. Baer
|
On Conditional Branches in Optimal Search Trees
|
8 pages, 5 figures (with 10 illustrations total), 1 table;
reformatted with some additional notes
| null | null | null |
cs.PF cs.DS cs.IR
| null |
Algorithms for efficiently finding optimal alphabetic decision trees -- such
as the Hu-Tucker algorithm -- are well established and commonly used. However,
such algorithms generally assume that the cost per decision is uniform and thus
independent of the outcome of the decision. The few algorithms without this
assumption instead use one cost if the decision outcome is ``less than'' and
another cost otherwise. In practice, neither assumption is accurate for
software optimized for today's microprocessors. Such software generally has one
cost for the more likely decision outcome and a greater cost -- often far
greater -- for the less likely decision outcome. This problem and
generalizations thereof are thus applicable to hard coding static decision tree
instances in software, e.g., for optimizing program bottlenecks or for
compiling switch statements. An O(n^3)-time O(n^2)-space dynamic programming
algorithm can solve this optimal binary decision tree problem, and this
approach has many generalizations that optimize for the behavior of processors
with predictive branch capabilities, both static and dynamic. Solutions to this
formulation are often faster in practice than ``optimal'' decision trees as
formulated in the literature. Different search paradigms can sometimes yield
even better performance.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 00:54:44 GMT"
},
{
"version": "v2",
"created": "Tue, 23 May 2006 05:07:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0604017
|
Dmitri Krioukov
|
Xenofontas Dimitropoulos, Dmitri Krioukov, Marina Fomenkov, Bradley
Huffaker, Young Hyun, kc claffy, George Riley
|
AS Relationships: Inference and Validation
|
Final journal version
|
ACM SIGCOMM Computer Communication Review (CCR), v.37, n.1,
p.29-40, 2007
|
10.1145/1198255.1198259
| null |
cs.NI
| null |
Research on performance, robustness, and evolution of the global Internet is
fundamentally handicapped without accurate and thorough knowledge of the nature
and structure of the contractual relationships between Autonomous Systems
(ASs). In this work we introduce novel heuristics for inferring AS
relationships. Our heuristics improve upon previous works in several technical
aspects, which we outline in detail and demonstrate with several examples.
Seeking to increase the value and reliability of our inference results, we then
focus on validation of inferred AS relationships. We perform a survey with ASs'
network administrators to collect information on the actual connectivity and
policies of the surveyed ASs. Based on the survey results, we find that our new
AS relationship inference techniques achieve high levels of accuracy: we
correctly infer 96.5% customer to provider (c2p), 82.8% peer to peer (p2p), and
90.3% sibling to sibling (s2s) relationships. We then cross-compare the
reported AS connectivity with the AS connectivity data contained in BGP tables.
We find that BGP tables miss up to 86.2% of the true adjacencies of the
surveyed ASs. The majority of the missing links are of the p2p type, which
highlights the limitations of present measuring techniques to capture links of
this type. Finally, to make our results easily accessible and practically
useful for the community, we open an AS relationship repository where we
archive, on a weekly basis, and make publicly available the complete Internet
AS-level topology annotated with AS relationship information for every pair of
AS neighbors.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 01:04:05 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2006 01:35:18 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Dec 2006 07:20:37 GMT"
}
] | 2008-04-16T00:00:00 |
[
[
"Dimitropoulos",
"Xenofontas",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Fomenkov",
"Marina",
""
],
[
"Huffaker",
"Bradley",
""
],
[
"Hyun",
"Young",
""
],
[
"claffy",
"kc",
""
],
[
"Riley",
"George",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0604018
|
Suneel Madhekar
|
Madhekar Suneel
|
Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map
|
Submitted to the Indian Academy of Sciences for possible publication
in Sadhana (Academy Proceedings in Engineering Sciences). Results of
statistical tests included. Introduction revised
| null | null | null |
cs.CR nlin.CD
| null |
A scheme for pseudo-random binary sequence generation based on the
two-dimensional discrete-time Henon map is proposed. Properties of the proposed
sequences pertaining to linear complexity, linear complexity profile,
correlation and auto-correlation are investigated. All these properties of the
sequences suggest a strong resemblance to random sequences. Results of
statistical testing of the sequences are found encouraging. An attempt is made
to estimate the keyspace size if the proposed scheme is used for cryptographic
applications. The keyspace size is found to be large and is dependent on the
precision of the computing platform used.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 09:13:55 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Aug 2006 16:56:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Suneel",
"Madhekar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
}
] |
cs/0604019
|
Thomas Giuli
|
K. Venkatesh Prasad, TJ Giuli, and David Watson
|
The Case for Modeling Security, Privacy, Usability and Reliability
(SPUR) in Automotive Software
|
12 pages, 3 figures, presented at the 2006 Automotive Software
Workshop, San Diego, CA
| null | null | null |
cs.SE cs.CR cs.HC
| null |
Over the past five years, there has been considerable growth and established
value in the practice of modeling automotive software requirements. Much of
this growth has been centered on requirements of software associated with the
established functional areas of an automobile, such as those associated with
powertrain, chassis, body, safety and infotainment. This paper makes a case for
modeling four additional attributes that are increasingly important as vehicles
become information conduits: security, privacy, usability, and reliability.
These four attributes are important in creating specifications for embedded
in-vehicle automotive software.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 13:23:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Prasad",
"K. Venkatesh",
""
],
[
"Giuli",
"TJ",
""
],
[
"Watson",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0604020
|
Bodo Manthey
|
Bodo Manthey
|
Approximation Algorithms for Restricted Cycle Covers Based on Cycle
Decompositions
|
This paper has been joint with "On Approximating Restricted Cycle
Covers" (cs.CC/0504038). Please refer to that paper. The paper "Approximation
Algorithms for Restricted Cycle Covers Based on Cycle Decompositions" is now
obsolete
| null | null | null |
cs.DS cs.CC cs.DM
| null |
A cycle cover of a graph is a set of cycles such that every vertex is part of
exactly one cycle. An L-cycle cover is a cycle cover in which the length of
every cycle is in the set L. The weight of a cycle cover of an edge-weighted
graph is the sum of the weights of its edges.
We come close to settling the complexity and approximability of computing
L-cycle covers. On the one hand, we show that for almost all L, computing
L-cycle covers of maximum weight in directed and undirected graphs is APX-hard
and NP-hard. Most of our hardness results hold even if the edge weights are
restricted to zero and one.
On the other hand, we show that the problem of computing L-cycle covers of
maximum weight can be approximated within a factor of 2 for undirected graphs
and within a factor of 8/3 in the case of directed graphs. This holds for
arbitrary sets L.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 13:53:25 GMT"
},
{
"version": "v2",
"created": "Wed, 3 May 2006 13:01:24 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jun 2006 07:32:39 GMT"
},
{
"version": "v4",
"created": "Fri, 15 Dec 2006 14:16:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Manthey",
"Bodo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604021
|
Nima Sarshar
|
Nima Sarshar and Behnam A. Rezaei and Vwani P. Roychowdhury
|
Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges
and a Hierarchical Solution
| null | null | null | null |
cs.IT math.IT
| null |
This paper is concerned with the scaling of the number of hops in a large
scale wireless ad-hoc network (WANET), a quantity we call network latency. A
large network latency affects all aspects of data communication in a WANET,
including an increase in delay, packet loss, required processing power and
memory. We consider network management and data routing challenges in WANETs
with scalable network latency. On the physical side, reducing network latency
imposes a significantly higher power and bandwidth demand on nodes, as is
reflected in a set of new bounds. On the protocol front, designing distributed
routing protocols that can guarantee the delivery of data packets within
scalable number of hops is a challenging task. To solve this, we introduce
multi-resolution randomized hierarchy (MRRH), a novel power and bandwidth
efficient WANET protocol with scalable network latency. MRRH uses a randomized
algorithm for building and maintaining a random hierarchical network topology,
which together with the proposed routing algorithm can guarantee efficient
delivery of data packets in the wireless network. For a network of size $N$,
MRRH can provide an average latency of only $O(\log^{3} N)$. The power and
bandwidth consumption of MRRH are shown to be \emph{nearly} optimal for the
latency it provides. Therefore, MRRH, is a provably efficient candidate for
truly large scale wireless ad-hoc networking.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 14:00:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sarshar",
"Nima",
""
],
[
"Rezaei",
"Behnam A.",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604022
|
Sandor P. Fekete
|
Robert Connelly and Erik D. Demaine and Martin L. Demaine and Sandor
P. Fekete and Stefan Langerman and Joseph S. B. Mitchell and Ares Ribo and
Guenter Rote
|
Locked and Unlocked Chains of Planar Shapes
|
23 pages, 25 figures, Latex; full journal version with all proof
details. (Fixed crash-induced bugs in the abstract.)
|
Discrete and Computational Geometry 44 (2010), 439-462
|
10.1007/s00454-010-9262-3
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We extend linkage unfolding results from the well-studied case of polygonal
linkages to the more general case of linkages of polygons. More precisely, we
consider chains of nonoverlapping rigid planar shapes (Jordan regions) that are
hinged together sequentially at rotatable joints. Our goal is to characterize
the families of planar shapes that admit locked chains, where some
configurations cannot be reached by continuous reconfiguration without
self-intersection, and which families of planar shapes guarantee universal
foldability, where every chain is guaranteed to have a connected configuration
space. Previously, only obtuse triangles were known to admit locked shapes, and
only line segments were known to guarantee universal foldability. We show that
a surprisingly general family of planar shapes, called slender adornments,
guarantees universal foldability: roughly, the distance from each edge along
the path along the boundary of the slender adornment to each hinge should be
monotone. In contrast, we show that isosceles triangles with any desired apex
angle less than 90 degrees admit locked chains, which is precisely the
threshold beyond which the inward-normal property no longer holds.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 14:46:27 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Apr 2006 10:45:29 GMT"
},
{
"version": "v3",
"created": "Tue, 11 May 2010 18:23:09 GMT"
},
{
"version": "v4",
"created": "Mon, 17 May 2010 17:20:33 GMT"
}
] | 2015-02-18T00:00:00 |
[
[
"Connelly",
"Robert",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Fekete",
"Sandor P.",
""
],
[
"Langerman",
"Stefan",
""
],
[
"Mitchell",
"Joseph S. B.",
""
],
[
"Ribo",
"Ares",
""
],
[
"Rote",
"Guenter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0604023
|
Sameet Sreenivasan
|
Sameet Sreenivasan, Reuven Cohen, Eduardo L\'opez, Zolt\'an Toroczkai,
and H. Eugene Stanley
|
Communication Bottlenecks in Scale-Free Networks
|
5 pages, 3 figures
|
Phys. Rev. E 75, 036105 (2007)
|
10.1103/PhysRevE.75.036105
| null |
cs.NI cond-mat.stat-mech
| null |
We consider the effects of network topology on the optimality of packet
routing quantified by $\gamma_c$, the rate of packet insertion beyond which
congestion and queue growth occurs. The key result of this paper is to show
that for any network, there exists an absolute upper bound, expressed in terms
of vertex separators, for the scaling of $\gamma_c$ with network size $N$,
irrespective of the routing algorithm used. We then derive an estimate to this
upper bound for scale-free networks, and introduce a novel static routing
protocol which is superior to shortest path routing under intense packet
insertion rates.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 16:22:26 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Sreenivasan",
"Sameet",
""
],
[
"Cohen",
"Reuven",
""
],
[
"López",
"Eduardo",
""
],
[
"Toroczkai",
"Zoltán",
""
],
[
"Stanley",
"H. Eugene",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
cs/0604024
|
Joel Friedman
|
Joel Friedman
|
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean
Complexity II: A Simple Example
|
8 pages
| null | null | null |
cs.CC math.AG
| null |
In a previous paper we have suggested a number of ideas to attack circuit
size complexity with cohomology. As a simple example, we take circuits that can
only compute the AND of two inputs, which essentially reduces to SET COVER. We
show a very special case of the cohomological approach (one particular free
category, using injective and superskyscraper sheaves) gives the linear
programming bound coming from the relaxation of the standard integer
programming reformulation of SET COVER.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 20:07:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Friedman",
"Joel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
cs/0604025
|
Tie Liu
|
Tie Liu and Pramod Viswanath
|
An Extremal Inequality Motivated by Multiterminal Information Theoretic
Problems
|
32 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
We prove a new extremal inequality, motivated by the vector Gaussian
broadcast channel and the distributed source coding with a single quadratic
distortion constraint problems. As a corollary, this inequality yields a
generalization of the classical entropy-power inequality (EPI). As another
corollary, this inequality sheds insight into maximizing the differential
entropy of the sum of two dependent random variables.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 04:50:59 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Apr 2006 21:01:03 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Nov 2006 18:15:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Tie",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604026
|
Damiano Bolzoni
|
Damiano Bolzoni, Sandro Etalle
|
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
| null | null | null |
TR-CTIT-06-13
|
cs.CR
| null |
We present APHRODITE, an architecture designed to reduce false positives in
network intrusion detection systems. APHRODITE works by detecting anomalies in
the output traffic, and by correlating them with the alerts raised by the NIDS
working on the input traffic. Benchmarks show a substantial reduction of false
positives and that APHRODITE is effective also after a "quick setup", i.e. in
the realistic case in which it has not been "trained" and set up optimally
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 12:13:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bolzoni",
"Damiano",
""
],
[
"Etalle",
"Sandro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0604027
|
Laurent Romary
|
Majid Khayari (INIST), St\'ephane Schneider (INIST), Isabelle Kramer
(LORIA), Laurent Romary (LORIA), the termsciences Collaboration
|
Unification of multi-lingual scientific terminological resources using
the ISO 16642 standard. The TermSciences initiative
|
6p
| null | null | null |
cs.CL
| null |
This paper presents the TermSciences portal, which deals with the
implementation of a conceptual model that uses the recent ISO 16642 standard
(Terminological Markup Framework). This standard turns out to be suitable for
concept modeling since it allowed for organizing the original resources by
concepts and to associate the various terms for a given concept. Additional
structuring is produced by sharing conceptual relationships, that is,
cross-linking of resource results through the introduction of semantic
relations which may have initially be missing.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 13:10:30 GMT"
}
] | 2009-01-20T00:00:00 |
[
[
"Khayari",
"Majid",
"",
"INIST"
],
[
"Schneider",
"Stéphane",
"",
"INIST"
],
[
"Kramer",
"Isabelle",
"",
"LORIA"
],
[
"Romary",
"Laurent",
"",
"LORIA"
],
[
"Collaboration",
"the termsciences",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0604028
|
Tie Liu
|
Tie Liu and Pramod Viswanath
|
Two Proofs of the Fisher Information Inequality via Data Processing
Arguments
|
6 pages, 0 figure
| null | null | null |
cs.IT math.IT
| null |
Two new proofs of the Fisher information inequality (FII) using data
processing inequalities for mutual information and conditional variance are
presented.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 16:51:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Tie",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604029
|
Richard Barton
|
Richard J. Barton and Rong Zheng
|
Order-Optimal Data Aggregation in Wireless Sensor Networks - Part I:
Regular Networks
| null |
IEEE Transactions on Information Theory, vol. 56, no. 11, pp.
5811-5821, November 2010
| null | null |
cs.IT math.IT
| null |
The predominate traffic patterns in a wireless sensor network are many-to-one
and one-to-many communication. Hence, the performance of wireless sensor
networks is characterized by the rate at which data can be disseminated from or
aggregated to a data sink. In this paper, we consider the data aggregation
problem. We demonstrate that a data aggregation rate of O(log(n)/n) is optimal
and that this rate can be achieved in wireless sensor networks using a
generalization of cooperative beamforming called cooperative time-reversal
communication.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 19:12:15 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Nov 2007 17:02:05 GMT"
}
] | 2016-01-15T00:00:00 |
[
[
"Barton",
"Richard J.",
""
],
[
"Zheng",
"Rong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604030
|
Richard Barton
|
Richard J. Barton
|
The Influence of Adaptive Multicoding on Mutual Information and Channel
Capacity for Uncertain Wideband CDMA Rayleigh Fading Channels
| null | null | null | null |
cs.IT math.IT
| null |
We consider the problem of adaptive modulation for wideband DS-CDMA Rayleigh
fading channels with imperfect channel state information (CSI). We assume a
multidimensional signal subspace spanned by a collection of random spreading
codes (multicoding) and study the effects of both the subspace dimension and
the probability distribution of the transmitted symbols on the mutual
information between the channel input and output in the presence of uncertainty
regarding the true state of the channel. We develop approximations for the
mutual information as well as both upper and lower bounds on the mutual
information that are stated explicitly in terms of the dimension of the signal
constellation, the number of resolvable fading paths on the channel, the
current estimate of channel state, and the mean-squared-error of the channel
estimate. We analyze these approximations and bounds in order to quantify the
impact of signal dimension and symbol distribution on system performance.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 19:28:22 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Barton",
"Richard J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604031
|
Amos Lapidoth
|
Amos Lapidoth and Ligong Wang
|
On the Low SNR Capacity of Peak-Limited Non-Coherent Fading Channels
with Memory
| null | null | null | null |
cs.IT math.IT
| null |
The capacity of non-coherent stationary Gaussian fading channels with memory
under a peak-power constraint is studied in the asymptotic weak-signal regime.
It is assumed that the fading law is known to both transmitter and receiver but
that neither is cognizant of the fading realization. A connection is
demonstrated between the asymptotic behavior of channel capacity in this regime
and the asymptotic behavior of the prediction error incurred in predicting the
fading process from very noisy observations of its past. This connection can be
viewed as the low signal-to-noise ratio (SNR) analog of recent results by
Lapidoth & Moser and by Lapidoth demonstrating connections between the high SNR
capacity growth and the noiseless or almost-noiseless prediction error. We
distinguish between two families of fading laws: the ``slowly forgetting'' and
the ``quickly forgetting''. For channels in the former category the low SNR
capacity is achieved by IID inputs, whereas in the latter such inputs are
typically sub-optimal. Instead, the asymptotic capacity can be approached by
inputs with IID phase but block-constant magnitude.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 23:29:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lapidoth",
"Amos",
""
],
[
"Wang",
"Ligong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604032
|
Martin Ziegler
|
Martin Ziegler and Klaus Meer
|
Real Computational Universality: The Word Problem for a class of groups
with infinite presentation
|
corrected Section 4.5
| null | null | null |
cs.LO cs.SC
| null |
The word problem for discrete groups is well-known to be undecidable by a
Turing Machine; more precisely, it is reducible both to and from and thus
equivalent to the discrete Halting Problem.
The present work introduces and studies a real extension of the word problem
for a certain class of groups which are presented as quotient groups of a free
group and a normal subgroup. Most important, the free group will be generated
by an uncountable set of generators with index running over certain sets of
real numbers. This allows to include many mathematically important groups which
are not captured in the framework of the classical word problem.
Our contribution extends computational group theory from the discrete to the
Blum-Shub-Smale (BSS) model of real number computation. We believe this to be
an interesting step towards applying BSS theory, in addition to semi-algebraic
geometry, also to further areas of mathematics.
The main result establishes the word problem for such groups to be not only
semi-decidable (and thus reducible FROM) but also reducible TO the Halting
Problem for such machines. It thus provides the first non-trivial example of a
problem COMPLETE, that is, computationally universal for this model.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 23:57:46 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2006 11:38:19 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Jun 2006 07:48:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ziegler",
"Martin",
""
],
[
"Meer",
"Klaus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0604033
|
Shuangquan Wang
|
Shuangquan Wang, Ali Abdi
|
Statistical Properties of Eigen-Modes and Instantaneous Mutual
Information in MIMO Time-Varying Rayleigh Channels
|
25 pages, 7 figures, 1 table, submitted to IEEE Trans. Inform.
Theory, Apr., 2006
| null | null | null |
cs.IT math.IT
| null |
In this paper, we study two important metrics in multiple-input
multiple-output (MIMO) time-varying Rayleigh flat fading channels. One is the
eigen-mode, and the other is the instantaneous mutual information (IMI). Their
second-order statistics, such as the correlation coefficient, level crossing
rate (LCR), and average fade/outage duration, are investigated, assuming a
general nonisotropic scattering environment. Exact closed-form expressions are
derived and Monte Carlo simulations are provided to verify the accuracy of the
analytical results. For the eigen-modes, we found they tend to be
spatio-temporally uncorrelated in large MIMO systems. For the IMI, the results
show that its correlation coefficient can be well approximated by the squared
amplitude of the correlation coefficient of the channel, under certain
conditions. Moreover, we also found the LCR of IMI is much more sensitive to
the scattering environment than that of each eigen-mode.
|
[
{
"version": "v1",
"created": "Sat, 8 Apr 2006 15:55:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Shuangquan",
""
],
[
"Abdi",
"Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604034
|
David Eppstein
|
David Eppstein
|
Squarepants in a Tree: Sum of Subtree Clustering and Hyperbolic Pants
Decomposition
|
22 pages, 14 figures. This version replaces the proof of what is now
Lemma 5.2, as the previous proof was erroneous
|
ACM Trans. Algorithms 5(3): 29, 2009
|
10.1145/1541885.1541890
| null |
cs.CG
| null |
We provide efficient constant factor approximation algorithms for the
problems of finding a hierarchical clustering of a point set in any metric
space, minimizing the sum of minimimum spanning tree lengths within each
cluster, and in the hyperbolic or Euclidean planes, minimizing the sum of
cluster perimeters. Our algorithms for the hyperbolic and Euclidean planes can
also be used to provide a pants decomposition, that is, a set of disjoint
simple closed curves partitioning the plane minus the input points into subsets
with exactly three boundary components, with approximately minimum total
length. In the Euclidean case, these curves are squares; in the hyperbolic
case, they combine our Euclidean square pants decomposition with our tree
clustering method for general metric spaces.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2006 01:18:29 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2008 04:43:44 GMT"
}
] | 2009-07-08T00:00:00 |
[
[
"Eppstein",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0604035
|
R N Mohan Professor
|
R.N.Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang
|
Certain new M-matrices and their properties and applications
|
21 pages,3 figures
| null | null | null |
cs.DM
| null |
The Mn-matrix was defined by Mohan [20] in which he has shown a method of
constructing (1,-1)-matrices and studied some of their properties. The
(1,-1)-matrices were constructed and studied by Cohn [5],Wang [33], Ehrlich [8]
and Ehrlich and Zeller[9]. But in this paper, while giving some resemblances of
this matrix with Hadamard matrix, and by naming it as M-matrix, we show how to
construct partially balanced incomplete block (PBIB) designs and some regular
bipartite graphs by it. We have considered two types of these M- matrices. Also
we will make a mention of certain applications of these M-matrices in signal
and communication processing, and network systems and end with some open
problems.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2006 06:02:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mohan",
"R. N.",
""
],
[
"Kageyama",
"Sanpei",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Yang",
"Gao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604036
|
Jakob Vo{\ss}
|
Jakob Voss
|
Collaborative thesaurus tagging the Wikipedia way
|
7 pages, 7 figures, 7 tables; v2 with added appendix and fixed
references
| null | null | null |
cs.IR cs.DL
| null |
This paper explores the system of categories that is used to classify
articles in Wikipedia. It is compared to collaborative tagging systems like
del.icio.us and to hierarchical classification like the Dewey Decimal
Classification (DDC). Specifics and commonalitiess of these systems of subject
indexing are exposed. Analysis of structural and statistical properties
(descriptors per record, records per descriptor, descriptor levels) shows that
the category system of Wikimedia is a thesaurus that combines collaborative
tagging and hierarchical subject indexing in a special way.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2006 12:04:29 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2006 00:41:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Voss",
"Jakob",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0604037
|
Oren Weimann
|
Erik D. Demaine, Shay Mozes, Benjamin Rossman, Oren Weimann
|
An O(n^3)-Time Algorithm for Tree Edit Distance
|
10 pages, 5 figures, 5 .tex files where TED.tex is the main one
|
ACM Transactions on Algorithms 6(1): (2009)
|
10.1145/1644015.1644017
| null |
cs.DS
| null |
The {\em edit distance} between two ordered trees with vertex labels is the
minimum cost of transforming one tree into the other by a sequence of
elementary operations consisting of deleting and relabeling existing nodes, as
well as inserting new nodes. In this paper, we present a worst-case
$O(n^3)$-time algorithm for this problem, improving the previous best
$O(n^3\log n)$-time algorithm~\cite{Klein}. Our result requires a novel
adaptive strategy for deciding how a dynamic program divides into subproblems
(which is interesting in its own right), together with a deeper understanding
of the previous algorithms for the problem. We also prove the optimality of our
algorithm among the family of \emph{decomposition strategy} algorithms--which
also includes the previous fastest algorithms--by tightening the known lower
bound of $\Omega(n^2\log^2 n)$~\cite{Touzet} to $\Omega(n^3)$, matching our
algorithm's running time. Furthermore, we obtain matching upper and lower
bounds of $\Theta(n m^2 (1 + \log \frac{n}{m}))$ when the two trees have
different sizes $m$ and~$n$, where $m < n$.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2006 00:39:11 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2006 21:06:17 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Apr 2006 06:19:35 GMT"
}
] | 2010-12-01T00:00:00 |
[
[
"Demaine",
"Erik D.",
""
],
[
"Mozes",
"Shay",
""
],
[
"Rossman",
"Benjamin",
""
],
[
"Weimann",
"Oren",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0604038
|
Evgueni Petrov
|
E. Petrov, Yu. Kostov, E. Botoeva
|
UniCalc.LIN: a linear constraint solver for the UniCalc system
|
rejected by the programm committee of the conforence on Perspective
of System Informatics held in Novosibirsk, Russian Federation July 2006
| null | null | null |
cs.MS cs.AI
| null |
In this short paper we present a linear constraint solver for the UniCalc
system, an environment for reliable solution of mathematical modeling problems.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2006 06:30:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Petrov",
"E.",
""
],
[
"Kostov",
"Yu.",
""
],
[
"Botoeva",
"E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0604039
|
Laurent Mazet PhD
|
David Bateman, Laurent Mazet, Veronique Buzenac-Settineri and Markus
Muck
|
A Fixed-Point Type for Octave
|
5 pages, 1 figure
| null | null |
octave2006/12
|
cs.MS
| null |
This paper announces the availability of a fixed point toolbox for the Matlab
compatible software package Octave. This toolbox is released under the GNU
Public License, and can be used to model the losses in algorithms implemented
in hardware. Furthermore, this paper presents as an example of the use of this
toolbox, the effects of a fixed point implementation on the precision of an
OFDM modulator.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2006 08:22:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bateman",
"David",
""
],
[
"Mazet",
"Laurent",
""
],
[
"Buzenac-Settineri",
"Veronique",
""
],
[
"Muck",
"Markus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0604040
|
Nan Liu
|
Nan Liu and Sennur Ulukus
|
Optimal Distortion-Power Tradeoffs in Sensor Networks: Gauss-Markov
Random Processes
|
6 pages, 0 figure, to appear in ICC 2006
| null | null | null |
cs.IT math.IT
| null |
We investigate the optimal performance of dense sensor networks by studying
the joint source-channel coding problem. The overall goal of the sensor network
is to take measurements from an underlying random process, code and transmit
those measurement samples to a collector node in a cooperative multiple access
channel with feedback, and reconstruct the entire random process at the
collector node. We provide lower and upper bounds for the minimum achievable
expected distortion when the underlying random process is stationary and
Gaussian. In the case where the random process is also Markovian, we evaluate
the lower and upper bounds explicitly and show that they are of the same order
for a wide range of sum power constraints. Thus, for a Gauss-Markov random
process, under these sum power constraints, we determine the achievability
scheme that is order-optimal, and express the minimum achievable expected
distortion as a function of the sum power constraint.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2006 16:48:48 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Nan",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604041
|
R.N.Mohan Professor
|
R.N.Mohan, Moon Ho Lee, and Subash Pokreal
|
On Orthogonality of Latin Squares
|
29 pages
| null | null | null |
cs.DM
| null |
An arrangement of s elements in s rows and s columns, such that no element
repeats more than once in each row and each column is called a Latin square of
order s. If two Latin squares of the same order superimposed one on the other
and in the resultant array if each ordered pair occurs once and only once then
they are called othogonal Latin Squares. A frequency square is an nxn matrix,
such that each element from the list of n elements, occurs t times in each row
and in each column. These two concepts lead to a new third concept called as t
orthogonal latin squares, where from a set of m orthogonal Latin squares, if t
orthogonal Latin squares are superimposed and each ordered t tuple in the
resultant array occurs once and only once then it is t othogonal Latin square.
In this paper it is proposed to construct such t othogonal latin squares
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 02:54:04 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2006 09:25:59 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Pokreal",
"Subash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604042
|
Florentin Smarandache
|
M. C. Florea, J. Dezert, P. Valin, F. Smarandache, Anne-Laure
Jousselme
|
Adaptative combination rule and proportional conflict redistribution
rule for information fusion
|
Presented at Cogis '06 Conference, Paris, March 2006
| null | null | null |
cs.AI
| null |
This paper presents two new promising rules of combination for the fusion of
uncertain and potentially highly conflicting sources of evidences in the
framework of the theory of belief functions in order to palliate the well-know
limitations of Dempster's rule and to work beyond the limits of applicability
of the Dempster-Shafer theory. We present both a new class of adaptive
combination rules (ACR) and a new efficient Proportional Conflict
Redistribution (PCR) rule allowing to deal with highly conflicting sources for
static and dynamic fusion applications.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:35:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Florea",
"M. C.",
""
],
[
"Dezert",
"J.",
""
],
[
"Valin",
"P.",
""
],
[
"Smarandache",
"F.",
""
],
[
"Jousselme",
"Anne-Laure",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0604043
|
Thomas Way
|
Thomas P. Way and Lori L. Pollock
|
Demand-driven Inlining in a Region-based Optimizer for ILP Architectures
|
23 pages
| null | null | null |
cs.DC cs.PL
| null |
Region-based compilation repartitions a program into more desirable
compilation units using profiling information and procedure inlining to enable
region formation analysis. Heuristics play a key role in determining when it is
most beneficial to inline procedures during region formation. An ILP optimizing
compiler using a region-based approach restructures a program to better reflect
dynamic behavior and increase interprocedural optimization and scheduling
opportunities. This paper presents an interprocedural compilation technique
which performs procedure inlining on-demand, rather than as a separate phase,
to improve the ability of a region-based optimizer to control code growth,
compilation time and memory usage while improving performance. The
interprocedural region formation algorithm utilizes a demand-driven,
heuristics-guided approach to inlining, restructuring an input program into
interprocedural regions. Experimental results are presented to demonstrate the
impact of the algorithm and several inlining heuristics upon a number of
traditional and novel compilation characteristics within a region-based ILP
compiler and simulator.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 04:15:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Way",
"Thomas P.",
""
],
[
"Pollock",
"Lori L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0604044
|
R.N.Mohan Professor
|
R.N.Mohan, Moon Ho Lee, and Ram Paudal
|
A new M-matrix of Type III, its properties and applications
|
12 pages, one figure
| null | null | null |
cs.DM
| null |
Some binary matrices like (1,-1) and (1,0) were studied by many authors like
Cohn, Wang, Ehlich and Ehlich and Zeller, and Mohan, Kageyama, Lee, and Gao. In
this recent paper by Mohan et al considered the M-matrices of Type I and II by
studying some of their properties and applications. In the present paper they
discussed the M-matrices of Type III, and studied their properties and
applications. They gave some constructions of SPBIB designs and some
corresponding M-graphs, which are being constructed by it. This is the
continuation of our earlier research work in this direction, and these papers
establish the importance of non-orthogonal matrices as well.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 04:21:14 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Paudal",
"Ram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604045
|
Sandor P. Fekete
|
Sandor P. Fekete and Joerg Schepers and Jan C. van der Veen
|
An exact algorithm for higher-dimensional orthogonal packing
|
31 pages, 6 figures, 9 tables, to appear in Operations Research; full
and updated journal version of sketches that appeared as parts of an extended
abstract in ESA'97
| null | null | null |
cs.DS
| null |
Higher-dimensional orthogonal packing problems have a wide range of practical
applications, including packing, cutting, and scheduling. Combining the use of
our data structure for characterizing feasible packings with our new classes of
lower bounds, and other heuristics, we develop a two-level tree search
algorithm for solving higher-dimensional packing problems to optimality.
Computational results are reported, including optimal solutions for all
two--dimensional test problems from recent literature.
This is the third in a series of articles describing new approaches to
higher-dimensional packing; see cs.DS/0310032 and cs.DS/0402044.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 13:55:03 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fekete",
"Sandor P.",
""
],
[
"Schepers",
"Joerg",
""
],
[
"van der Veen",
"Jan C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0604046
|
Michael Aupetit
|
Dominique Lepetz, Max Nemoz-Gaillard and Michael Aupetit
|
Concerning the differentiability of the energy function in vector
quantization algorithms
|
Under submission to a peer-reviewed international journal
| null | null | null |
cs.LG cs.NE
| null |
The adaptation rule for Vector Quantization algorithms, and consequently the
convergence of the generated sequence, depends on the existence and properties
of a function called the energy function, defined on a topological manifold.
Our aim is to investigate the conditions of existence of such a function for a
class of algorithms examplified by the initial ''K-means'' and Kohonen
algorithms. The results presented here supplement previous studies and show
that the energy function is not always a potential but at least the uniform
limit of a series of potential functions which we call a pseudo-potential. Our
work also shows that a large number of existing vector quantization algorithms
developped by the Artificial Neural Networks community fall into this category.
The framework we define opens the way to study the convergence of all the
corresponding adaptation rules at once, and a theorem gives promising insights
in that direction. We also demonstrate that the ''K-means'' energy function is
a pseudo-potential but not a potential in general. Consequently, the energy
function associated to the ''Neural-Gas'' is not a potential in general.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:00:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lepetz",
"Dominique",
""
],
[
"Nemoz-Gaillard",
"Max",
""
],
[
"Aupetit",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0604047
|
rapha?l Jungers
|
Rapha\"el Jungers, Vladimir Protasov, Vincent D. Blondel
|
Efficient algorithms for deciding the type of growth of products of
integer matrices
|
20 pages, 4 figures, submitted to LAA
| null | null | null |
cs.CC
| null |
For a given finite set $\Sigma$ of matrices with nonnegative integer entries
we study the growth of $$ \max_t(\Sigma) = \max\{\|A_{1}... A_{t}\|: A_i \in
\Sigma\}.$$ We show how to determine in polynomial time whether the growth with
$t$ is bounded, polynomial, or exponential, and we characterize precisely all
possible behaviors.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 14:10:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Jungers",
"Raphaël",
""
],
[
"Protasov",
"Vladimir",
""
],
[
"Blondel",
"Vincent D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0604048
|
Vita Hinze-Hoare
|
Vita Hinze-Hoare
|
Will the Butterfly Cipher keep your Network Data secure? Developments in
Computer Encryption
| null | null | null | null |
cs.CR
| null |
This paper explains the recent developments in security and encryption. The
Butterfly cipher and quantum cryptography are reviewed and compared. Examples
of their relative uses are discussed and suggestions for future developments
considered. In addition application to network security together with a
substantial review of classification of encryption systems and a summary of
security weaknesses are considered.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 20:21:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hinze-Hoare",
"Vita",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0604049
|
Vignesh Sethuraman
|
Vignesh Sethuraman, Bruce Hajek
|
Low SNR Capacity of Fading Channels with Peak and Average Power
Constraints
|
13 pages, version without proofs submitted to ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
Flat-fading channels that are correlated in time are considered under peak
and average power constraints. For discrete-time channels, a new upper bound on
the capacity per unit time is derived. A low SNR analysis of a full-scattering
vector channel is used to derive a complimentary lower bound. Together, these
bounds allow us to identify the exact scaling of channel capacity for a fixed
peak to average ratio, as the average power converges to zero. The upper bound
is also asymptotically tight as the average power converges to zero for a fixed
peak power.
For a continuous time infinite bandwidth channel, Viterbi identified the
capacity for M-FSK modulation. Recently, Zhang and Laneman showed that the
capacity can be achieved with non-bursty signaling (QPSK). An additional
contribution of this paper is to obtain similar results under peak and average
power constraints.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 23:02:57 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2006 03:40:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sethuraman",
"Vignesh",
""
],
[
"Hajek",
"Bruce",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604050
|
R.N.Mohan Professor
|
R.N.Mohan
|
On Hadamard Conjecture
| null | null | null | null |
cs.DM
| null |
In this note, while giving an overview of the state of art of the well known
Hadamard conjecture, which is more than a century old and now it has been
established by using the methods given in the two papers by Mohan et al [6,7].
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2006 01:34:56 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Mohan",
"R. N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604051
|
Michael Brinkmeier
|
Michael Brinkmeier
|
Structural Alignments of pseudo-knotted RNA-molecules in polynomial time
|
16 pages
| null | null | null |
cs.DS cs.CC cs.DM
| null |
An RNA molecule is structured on several layers. The primary and most obvious
structure is its sequence of bases, i.e. a word over the alphabet {A,C,G,U}.
The higher structure is a set of one-to-one base-pairings resulting in a
two-dimensional folding of the one-dimensional sequence. One speaks of a
secondary structure if these pairings do not cross and of a tertiary structure
otherwise.
Since the folding of the molecule is important for its function, the search
for related RNA molecules should not only be restricted to the primary
structure. It seems sensible to incorporate the higher structures in the
search. Based on this assumption and certain edit-operations a distance between
two arbitrary structures can be defined. It is known that the general
calculation of this measure is NP-complete \cite{zhang02similarity}. But for
some special cases polynomial algorithms are known. Using a new formal
description of secondary and tertiary structures, we extend the class of
structures for which the distance can be calculated in polynomial time. In
addition the presented algorithm may be used to approximate the edit-distance
between two arbitrary structures with a constant ratio.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2006 06:46:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Brinkmeier",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604052
|
Tentyukov Mikhail
|
M. Tentyukov and J.A.M. Vermaseren
|
Extension of the functionality of the symbolic program FORM by external
software
|
36 pages, 2 Encapsulated postscript figures, LaTeX2e, uses elsart.cls
(included)
|
Comput.Phys.Commun.176:385-405,2007
|
10.1016/j.cpc.2006.11.007
|
SFB/CPP-06-15, TTP06-12, NIKHEF 06-002
|
cs.SC hep-ph
| null |
We describe the implementation of facilities for the communication with
external resources in the Symbolic Manipulation System FORM. This is done
according to the POSIX standards defined for the UNIX operating system. We
present a number of examples that illustrate the increased power due to these
new capabilities.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2006 16:03:03 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Apr 2006 19:07:01 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Tentyukov",
"M.",
""
],
[
"Vermaseren",
"J. A. M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.