id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0603085
Jonathan Adams
Jonathan K. Adams, Basheer N. Bristow
Access Control for Hierarchical Joint-Tenancy
To appear in WSEAS Transactions on Computers, will probably be edited further before final revision replaced due to typographical errors
WSEAS Transactions on Computers, June 2006, Issue 6, Volume 5, p. 1313-1318
null
null
cs.CR
null
Basic role based access control [RBAC] provides a mechanism for segregating access privileges based upon a user's hierarchical roles within an organization. This model doesn't scale well when there is tight integration of multiple hierarchies. In a case where there is joint-tenancy and a requirement for different levels of disclosure based upon a user's hierarchy, or in our case, organization or company, basic RBAC requires these hierarchies to be effectively merged. Specific roles that effectively represent both the user's organizations and roles must be translated to fit within the merged hierarchy to be used to control access. Essentially, users from multiple organizations are served from a single role base with roles designed to constrain their access as needed. Our work proposes, through parameterized roles and privileges, a means for accurately representing both users' roles within their respective hierarchies for providing access to controlled objects. Using this method will reduce the amount of complexity required in terms of the number of roles and privileges. The resulting set of roles, privileges, and objects will make modeling and visualizing the access role hierarchy significantly simplified. This paper will give some background on role based access control, parameterized roles and privileges, and then focus on how RBAC with parameterized roles and privileges can be leveraged as an access control solution for the problems presented by joint tenancy.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 10:59:06 GMT" }, { "version": "v2", "created": "Thu, 23 Mar 2006 01:18:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Adams", "Jonathan K.", "" ], [ "Bristow", "Basheer N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0603086
Joel Le Roux
Joel Le Roux (1), Philippe Chaurand (1) and Mickael Urrutia (1) ((1) University of Nice (France))
Matching Edges in Images ; Application to Face Recognition
11 Pages, 6 figures
null
null
null
cs.CV
null
This communication describes a representation of images as a set of edges characterized by their position and orientation. This representation allows the comparison of two images and the computation of their similarity. The first step in this computation of similarity is the seach of a geometrical basis of the two dimensional space where the two images are represented simultaneously after transformation of one of them. Presently, this simultaneous representation takes into account a shift and a scaling ; it may be extended to rotations or other global geometrical transformations. An elementary probabilistic computation shows that a sufficient but not excessive number of trials (a few tens) ensures that the exhibition of this common basis is guaranteed in spite of possible errors in the detection of edges. When this first step is performed, the search of similarity between the two images reduces to counting the coincidence of edges in the two images. The approach may be applied to many problems of pattern matching ; it was checked on face recognition.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 14:51:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Roux", "Joel Le", "" ], [ "Chaurand", "Philippe", "" ], [ "Urrutia", "Mickael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0603087
P. Oscar Boykin
Arijit Ganguly, Abhishek Agrawal, P. Oscar Boykin, Renato Figueiredo
IP over P2P: Enabling Self-configuring Virtual IP Networks for Grid Computing
To appear in IPDPS 2006
null
null
null
cs.DC cs.NI
null
Peer-to-peer (P2P) networks have mostly focused on task oriented networking, where networks are constructed for single applications, i.e. file-sharing, DNS caching, etc. In this work, we introduce IPOP, a system for creating virtual IP networks on top of a P2P overlay. IPOP enables seamless access to Grid resources spanning multiple domains by aggregating them into a virtual IP network that is completely isolated from the physical network. The virtual IP network provided by IPOP supports deployment of existing IP-based protocols over a robust, self-configuring P2P overlay. We present implementation details as well as experimental measurement results taken from LAN, WAN, and Planet-Lab tests.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 16:50:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Ganguly", "Arijit", "" ], [ "Agrawal", "Abhishek", "" ], [ "Boykin", "P. Oscar", "" ], [ "Figueiredo", "Renato", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0603088
Himanshu Thapliyal
Himanshu Thapliyal, Saurabh Kotiyal and M.B Srinivas
Novel BCD Adders and Their Reversible Logic Implementation for IEEE 754r Format
6 Pages: This paper is a corrected version of our recent publication published in 19th International Conference on VLSI Design and 5th International Conference on Embedded Systems (VLSI Design 2006), Hyderabad, India, Jan 4-7, 2006
null
null
null
cs.AR
null
IEEE 754r is the ongoing revision to the IEEE 754 floating point standard and a major enhancement to the standard is the addition of decimal format. This paper proposes two novel BCD adders called carry skip and carry look-ahead BCD adders respectively. Furthermore, in the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. It is not possible to realize quantum computing without reversible logic. Thus, this paper also paper provides the reversible logic implementation of the conventional BCD adder as the well as the proposed Carry Skip BCD adder using a recently proposed TSG gate. Furthermore, a new reversible gate called TS-3 is also being proposed and it has been shown that the proposed reversible logic implementation of the BCD Adders is much better compared to recently proposed one, in terms of number of reversible gates used and garbage outputs produced. The reversible BCD circuits designed and proposed here form the basis of the decimal ALU of a primitive quantum CPU.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 18:11:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Kotiyal", "Saurabh", "" ], [ "Srinivas", "M. B", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0603089
Lawrence Ioannou
Lawrence M. Ioannou and Benjamin C. Travaglione and Donny Cheung
Convex Separation from Optimization via Heuristics
null
null
null
null
cs.DS math.OC
null
Let $K$ be a full-dimensional convex subset of $\mathbb{R}^n$. We describe a new polynomial-time Turing reduction from the weak separation problem for $K$ to the weak optimization problem for $K$ that is based on a geometric heuristic. We compare our reduction, which relies on analytic centers, with the standard, more general reduction.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 19:46:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Ioannou", "Lawrence M.", "" ], [ "Travaglione", "Benjamin C.", "" ], [ "Cheung", "Donny", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
cs/0603090
Alexander Gorban
A.N. Gorban, N.R. Sumner, A.Y. Zinovyev
Topological Grammars for Data Approximation
Corrected Journal version, Appl. Math. Lett., in press. 7 pgs., 2 figs
Applied Mathematics Letters 20 (2007) 382--386
10.1016/j.aml.2006.04.022
null
cs.NE cs.LG
null
A method of {\it topological grammars} is proposed for multidimensional data approximation. For data with complex topology we define a {\it principal cubic complex} of low dimension and given complexity that gives the best approximation for the dataset. This complex is a generalization of linear and non-linear principal manifolds and includes them as particular cases. The problem of optimal principal complex construction is transformed into a series of minimization problems for quadratic functionals. These quadratic functionals have a physically transparent interpretation in terms of elastic energy. For the energy computation, the whole complex is represented as a system of nodes and springs. Topologically, the principal complex is a product of one-dimensional continuums (represented by graphs), and the grammars describe how these continuums transform during the process of optimal complex construction. This factorization of the whole process onto one-dimensional transformations using minimization of quadratic energy functionals allow us to construct efficient algorithms.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 22:52:23 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 13:41:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Gorban", "A. N.", "" ], [ "Sumner", "N. R.", "" ], [ "Zinovyev", "A. Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0603091
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
A New Reversible TSG Gate and Its Application For Designing Efficient Adder Circuits
5 Pages: Published in 7th International Symposium on Representations and Methodology of Future Computing Technologies(RM 2005), Tokyo, Japan, September 5-6, 2005
null
null
null
cs.AR
null
In the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper proposes a new 4 * 4 reversible gate called TSG gate. The proposed gate is used to design efficient adder units. The most significant aspect of the proposed gate is that it can work singly as a reversible full adder i.e reversible full adder can now be implemented with a single gate only. The proposed gate is then used to design reversible ripple carry and carry skip adders. It is demonstrated that the adder architectures designed using the proposed gate are much better and optimized, compared to their existing counterparts in literature; in terms of number of reversible gates and garbage outputs. Thus, this paper provides the initial threshold to building of more complex system which can execute more complicated operations using reversible logic.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 06:44:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0603092
Himanshu Thapliyal
Himanshu Thapliyal and M.B Srinivas
An Extension to DNA Based Fredkin Gate Circuits: Design of Reversible Sequential Circuits using Fredkin Gates
7 Pages: Deals with design of reversible sequential circuits. Published: Proceedings of SPIE Volume: 6050, pp.196-202.Optomechatronic Micro/Nano Devices and Components, Sapporo, Japan, December 5-7, 2005; Editor(s): Yoshitada Katagiri
null
null
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having its applications in low power computing, quantum computing, nanotechnology, optical computing and DNA computing. The classical set of gates such as AND, OR, and EXOR are not reversible. Recently, it has been shown how to encode information in DNA and use DNA amplification to implement Fredkin gates. Furthermore, in the past Fredkin gates have been constructed using DNA, whose outputs are used as inputs for other Fredkin gates. Thus, it can be concluded that arbitrary circuits of Fredkin gates can be constructed using DNA. This paper provides the initial threshold to building of more complex system having reversible sequential circuits and which can execute more complicated operations. The novelty of the paper is the reversible designs of sequential circuits using Fredkin gate. Since, Fredkin gate has already been realized using DNA, it is expected that this work will initiate the building of complex systems using DNA. The reversible circuits designed here are highly optimized in terms of number of gates and garbage outputs. The modularization approach that is synthesizing small circuits and thereafter using them to construct bigger circuits is used for designing the optimal reversible sequential circuits.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 08:33:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0603093
Maurice Margenstern
Maurice Margenstern
About the domino problem in the hyperbolic plane from an algorithmic point of view
11 pages, 6 figures
About the domino problem in the hyperbolic plane from an algorithmic point of view, Theoretical Informatics and Applications, 42(1), (2008), 21-36
10.1051/ita:2007045
null
cs.CG cs.DM
null
In this paper, we prove that the general problem of tiling the hyperbolic plane with \`a la Wang tiles is undecidable.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 09:36:52 GMT" } ]
2009-07-07T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0603094
Philippe Loubaton
Julien Dumont, Philippe Loubaton, Samson Lasaulce
On the Capacity Achieving Transmit Covariance Matrices of MIMO Correlated Rician Channels: A Large System Approach
Paper submitted to Globecom2006
null
null
null
cs.IT math.IT
null
We determine the capacity-achieving input covariance matrices for coherent block-fading correlated MIMO Rician channels. In contrast with the Rayleigh and uncorrelated Rician cases, no closed-form expressions for the eigenvectors of the optimum input covariance matrix are available. Both the eigenvectors and eigenvalues have to be evaluated by using numerical techniques. As the corresponding optimization algorithms are not very attractive, we evaluate the limit of the average mutual information when the number of transmit and receive antennas converge to infinity at the same rate. If the channel is semi-correlated, we propose an attractive optimization algorithm of the large system approximant, and establish some convergence results. Simulation results show that our approach provide reliable results even for a quite moderate number of transmit and receive antennas.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 12:14:53 GMT" }, { "version": "v2", "created": "Fri, 25 Aug 2006 12:07:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Dumont", "Julien", "" ], [ "Loubaton", "Philippe", "" ], [ "Lasaulce", "Samson", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603095
Yan-Xiu Zheng
Yan-Xiu Zheng and Yu T. Su
A Turbo Coding System for High Speed Communications
11 figures
null
null
null
cs.IT math.IT
null
Conventional turbo codes (CTCs) usually employ a block-oriented interleaving so that each block is separately encoded and decoded. As interleaving and de-interleaving are performed within a block, the message-passing process associated with an iterative decoder is limited to proceed within the corresponding range. This paper presents a new turbo coding scheme that uses a special interleaver structure and a multiple-round early termination test involving both sign check and a CRC code. The new interleaver structure is naturally suited for high speed parallel processing and the resulting coding system offers new design options and tradeoffs that are not available to CTCs. In particular, it becomes possible for the decoder to employ an efficient inter-block collaborative decoding algorithm, passing the information obtained from termination test proved blocks to other unproved blocks. It also becomes important to have a proper decoding schedule. The combined effect is improved performance and reduction in the average decoding delay (whence the required computing power). A memory (storage) management mechanism is included as a critical part of the decoder so as to provide additional design tradeoff between performance and memory size. It is shown that the latter has a modular-like effect in that additional memory units render enhanced performance due not only to less forced early terminations but to possible increases of the interleaving depth. Depending on the decoding schedule, the degree of parallelism and other decoding resources available, the proposed scheme admits a variety of decoder architectures that meet a large range of throughput and performance demands.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 15:03:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Zheng", "Yan-Xiu", "" ], [ "Su", "Yu T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603096
Massimiliano Siti Mr.
Massimiliano Siti, Michael P. Fitz
On Reduced Complexity Soft-Output MIMO ML detection
43 pages, 10 figures Submitted to the IEEE Transactions on Information Theory, March 2006
null
null
null
cs.IT math.IT
null
In multiple-input multiple-output (MIMO) fading channels maximum likelihood (ML) detection is desirable to achieve high performance, but its complexity grows exponentially with the spectral efficiency. The current state of the art in MIMO detection is list decoding and lattice decoding. This paper proposes a new class of lattice detectors that combines some of the principles of both list and lattice decoding, thus resulting in an efficient parallelizable implementation and near optimal soft-ouput ML performance. The novel detector is called layered orthogonal lattice detector (LORD), because it adopts a new lattice formulation and relies on a channel orthogonalization process. It should be noted that the algorithm achieves optimal hard-output ML performance in case of two transmit antennas. For two transmit antennas max-log bit soft-output information can be generated and for greater than two antennas approximate max-log detection is achieved. Simulation results show that LORD, in MIMO system employing orthogonal frequency division multiplexing (OFDM) and bit interleaved coded modulation (BICM) is able to achieve very high signal-to-noise ratio (SNR) gains compared to practical soft-output detectors such as minimum-mean square error (MMSE), in either linear or nonlinear iterative scheme. Besides, the performance comparison with hard-output decoded algebraic space time codes shows the fundamental importance of soft-output generation capability for practical wireless applications.
[ { "version": "v1", "created": "Fri, 24 Mar 2006 09:44:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Siti", "Massimiliano", "" ], [ "Fitz", "Michael P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603097
Gustavo L. Gilardoni
Gustavo L. Gilardoni
On Pinsker's Type Inequalities and Csiszar's f-divergences. Part I: Second and Fourth-Order Inequalities
15 pages
IEEE Transactions on Information Theory, Vol. 56(11), pp. 5377-5386, 2010
10.1109/TIT.2010.2068710
null
cs.IT math.IT
null
We study conditions on $f$ under which an $f$-divergence $D_f$ will satisfy $D_f \geq c_f V^2$ or $D_f \geq c_{2,f} V^2 + c_{4,f} V^4$, where $V$ denotes variational distance and the coefficients $c_f$, $c_{2,f}$ and $c_{4,f}$ are {\em best possible}. As a consequence, we obtain lower bounds in terms of $V$ for many well known distance and divergence measures. For instance, let $D_{(\alpha)} (P,Q) = [\alpha (\alpha-1)]^{-1} [\int q^{\alpha} p^{1-\alpha} d \mu -1]$ and ${\cal I}_\alpha (P,Q) = (\alpha -1)^{-1} \log [\int p^\alpha q^{1-\alpha} d \mu]$ be respectively the {\em relative information of type} ($1-\alpha$) and {\em R\'{e}nyi's information gain of order} $\alpha$. We show that $D_{(\alpha)} \geq {1/2} V^2 + {1/72} (\alpha+1)(2-\alpha) V^4$ whenever $-1 \leq \alpha \leq 2$, $\alpha \not= 0,1$ and that ${\cal I}_{\alpha} = \frac{\alpha}{2} V^2 + {1/36} \alpha (1 + 5 \alpha - 5 \alpha^2) V^4$ for $0 < \alpha < 1$. Pinsker's inequality $D \geq {1/2} V^2$ and its extension $D \geq {1/2} V^2 + {1/36} V^4$ are special cases of each one of these.
[ { "version": "v1", "created": "Fri, 24 Mar 2006 11:47:59 GMT" }, { "version": "v2", "created": "Tue, 18 Apr 2006 15:06:27 GMT" } ]
2010-11-09T00:00:00
[ [ "Gilardoni", "Gustavo L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603098
Siddharth Ray
Siddharth Ray, Muriel Medard and Lizhong Zheng
A SIMO Fiber Aided Wireless Network Architecture
null
null
null
null
cs.IT math.IT
null
The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity by leveraging the speed of optical networks. In this paper, we consider a single-input, multiple-output (SIMO) FAWNA, which consists of a SIMO wireless channel and an optical fiber channel, connected through wireless-optical interfaces. We propose a scheme where the received wireless signal at each interface is quantized and sent over the fiber. Though our architecture is similar to that of the classical CEO problem, our problem is different from it. We show that the capacity of our scheme approaches the capacity of the architecture, exponentially with fiber capacity. We also show that for a given fiber capacity, there is an optimal operating wireless bandwidth and an optimal number of wireless-optical interfaces. The wireless-optical interfaces of our scheme have low complexity and do not require knowledge of the transmitter code book. They are also extendable to FAWNAs with large number of transmitters and interfaces and, offer adaptability to variable rates, changing channel conditions and node positions.
[ { "version": "v1", "created": "Sat, 25 Mar 2006 00:46:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Ray", "Siddharth", "" ], [ "Medard", "Muriel", "" ], [ "Zheng", "Lizhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603099
Alin Suciu PhD
Alin Suciu, Rodica Potolea, Tudor Muresan
Benchmark Problems for Constraint Solving
null
null
null
null
cs.PF cs.SC
null
Constraint Programming is roughly a new software technology introduced by Jaffar and Lassez in 1987 for description and effective solving of large, particularly combinatorial, problems especially in areas of planning and scheduling. In the following we define three problems for constraint solving from the domain of electrical networks; based on them we define 43 related problems. For the defined set of problems we benchmarked five systems: ILOG OPL, AMPL, GAMS, Mathematica and UniCalc. As expected some of the systems performed very well for some problems while others performed very well on others.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:19:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Potolea", "Rodica", "" ], [ "Muresan", "Tudor", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0603100
Alin Suciu PhD
Alin Suciu, Kalman Pusztai
Efficient Compression of Prolog Programs
null
null
null
null
cs.PL
null
We propose a special-purpose class of compression algorithms for efficient compression of Prolog programs. It is a dictionary-based compression method, specially designed for the compression of Prolog code, and therefore we name it PCA (Prolog Compression Algorithm). According to the experimental results this method provides better compression than state-of-the-art general-purpose compression algorithms. Since the algorithm works with Prolog syntactic entities (e.g. atoms, terms, etc.) the implementation of a Prolog prototype is straightforward and very easy to use in any Prolog application that needs compression. Although the algorithm is designed for Prolog programs, the idea can be easily applied for the compression of programs written in other (logic) languages.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:27:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0603101
Alin Suciu PhD
Alin Suciu, Kalman Pusztai, Andrei Vancea
Prolog Server Pages
null
null
null
null
cs.NI cs.PL
null
Prolog Server Pages (PSP) is a scripting language, based on Prolog, than can be embedded in HTML documents. To run PSP applications one needs a web server, a web browser and a PSP interpreter. The code is executed, by the interpreter, on the server-side (web server) and the output (together with the html code in witch the PSP code is embedded) is sent to the client-side (browser). The current implementation supports Apache Web Server. We implemented an Apache web server module that handles PSP files, and sends the result (an html document) to the client. PSP supports both GET and POST http requests. It also provides methods for working with http cookies.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:35:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ], [ "Vancea", "Andrei", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0603102
Alin Suciu PhD
Alin Suciu, Kalman Pusztai, Andrei Diaconu
Enhanced Prolog Remote Predicate Call Protocol
null
null
null
null
cs.NI cs.PL
null
Following the ideas of the Remote Procedure Call model, we have developed a logic programming counterpart, naturally called Prolog Remote Predicate Call (Prolog RPC). The Prolog RPC protocol facilitates the integration of Prolog code in multi-language applications as well as the development of distributed intelligent applications. One use of the protocol's most important uses could be the development of distributed applications that use Prolog at least partially to achieve their goals. Most notably the Distributed Artificial Intelligence (DAI) applications that are suitable for logic programming can profit from the use of the protocol. After proving its usefulness, we went further, developing a new version of the protocol, making it more reliable and extending its functionality. Because it has a new syntax and the new set of commands, we call this version Enhanced Prolog Remote Procedure Call. This paper describes the new features and modifications this second version introduced.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 20:44:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Suciu", "Alin", "" ], [ "Pusztai", "Kalman", "" ], [ "Diaconu", "Andrei", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0603103
Amir Leshem
Amir Leshem and Ephraim Zehavi
Bargaining over the interference channel
null
null
null
null
cs.IT math.IT
null
In this paper we analyze the interference channel as a conflict situation. This viewpoint implies that certain points in the rate region are unreasonable to one of the players. Therefore these points cannot be considered achievable based on game theoretic considerations. We then propose to use Nash bargaining solution as a tool that provides preferred points on the boundary of the game theoretic rate region. We provide analysis for the 2x2 intereference channel using the FDM achievable rate region. We also outline how to generalize our results to other achievable rate regions for the interference channel as well as the multiple access channel. Keywords: Spectrum optimization, distributed coordination, game theory, interference channel, multiple access channel.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 21:28:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Leshem", "Amir", "" ], [ "Zehavi", "Ephraim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603104
Patrick Baillot
Vincent Atassi (LIPN), Patrick Baillot (LIPN), Kazushige Terui (NII)
Verification of Ptime reducibility for system F terms via Dual Light Affine Logic
21 pages
A para\^{i}tre dans Proceedings Computer Science Logic 2006 (CSL'06), LNCS, Springer. (2006)
null
null
cs.LO
null
In a previous work we introduced Dual Light Affine Logic (DLAL) ([BaillotTerui04]) as a variant of Light Linear Logic suitable for guaranteeing complexity properties on lambda-calculus terms: all typable terms can be evaluated in polynomial time and all Ptime functions can be represented. In the present work we address the problem of typing lambda-terms in second-order DLAL. For that we give a procedure which, starting with a term typed in system F, finds all possible ways to decorate it into a DLAL typed term. We show that our procedure can be run in time polynomial in the size of the original Church typed system F term.
[ { "version": "v1", "created": "Mon, 27 Mar 2006 09:14:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Atassi", "Vincent", "", "LIPN" ], [ "Baillot", "Patrick", "", "LIPN" ], [ "Terui", "Kazushige", "", "NII" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0603105
Laurent Noe
Gregory Kucherov (LIFL), Laurent Noe (LIFL), Mikhail Roytberg (LIFL)
A unifying framework for seed sensitivity and its application to subset seeds (Extended abstract)
null
Algorithms in Bioinformatics, LNBI 3692 : 251-263, 2005
10.1007/11557067_21
null
cs.OH
null
We propose a general approach to compute the seed sensitivity, that can be applied to different definitions of seeds. It treats separately three components of the seed sensitivity problem - a set of target alignments, an associated probability distribution, and a seed model - that are specified by distinct finite automata. The approach is then applied to a new concept of subset seeds for which we propose an efficient automaton construction. Experimental results confirm that sensitive subset seeds can be efficiently designed using our approach, and can then be used in similarity search producing better results than ordinary spaced seeds.
[ { "version": "v1", "created": "Mon, 27 Mar 2006 13:21:21 GMT" } ]
2011-01-18T00:00:00
[ [ "Kucherov", "Gregory", "", "LIFL" ], [ "Noe", "Laurent", "", "LIFL" ], [ "Roytberg", "Mikhail", "", "LIFL" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0603106
Laurent Noe
Gregory Kucherov (LIFL), Laurent Noe (LIFL), Yann Ponty (LRI)
Estimating seed sensitivity on homogeneous alignments
null
Proceedings of the Fourth IEEE Symposium on Bioinformatics and Bioengineering (BIBE), 387-394, 2004
10.1109/BIBE.2004.1317369
null
cs.OH
null
We address the problem of estimating the sensitivity of seed-based similarity search algorithms. In contrast to approaches based on Markov models [18, 6, 3, 4, 10], we study the estimation based on homogeneous alignments. We describe an algorithm for counting and random generation of those alignments and an algorithm for exact computation of the sensitivity for a broad class of seed strategies. We provide experimental results demonstrating a bias introduced by ignoring the homogeneousness condition.
[ { "version": "v1", "created": "Mon, 27 Mar 2006 13:26:12 GMT" } ]
2011-01-18T00:00:00
[ [ "Kucherov", "Gregory", "", "LIFL" ], [ "Noe", "Laurent", "", "LIFL" ], [ "Ponty", "Yann", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0603107
Pedro Fortuny Ayuso
Pedro Fortuny Ayuso
Towards an information-theoretically safe cryptographic protocol
2 pages
null
null
null
cs.CR
null
We introduce what --if some kind of group action exists-- is a truly (information theoretically) safe cryptographic communication system: a protocol which provides \emph{zero} information to any passive adversary having full access to the channel.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 17:47:11 GMT" }, { "version": "v2", "created": "Tue, 28 Mar 2006 21:27:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Ayuso", "Pedro Fortuny", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0603108
Michael Brinkmeier
Michael Brinkmeier
Minimizing Symmetric Set Functions Faster
9 pages
null
null
null
cs.DM math.CO
null
We describe a combinatorial algorithm which, given a monotone and consistent symmetric set function d on a finite set V in the sense of Rizzi, constructs a non trivial set S minimizing d(S,V-S). This includes the possibility for the minimization of symmetric submodular functions. The presented algorithm requires at most as much time as the one described by Rizzi, but depending on the function d, it may allow several improvements.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 10:25:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Brinkmeier", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
cs/0603109
Saravanan Vijayakumaran
Saravanan Vijayakumaran
Encoding of Functions of Correlated Sources
This paper has been withdrawn
null
null
null
cs.IT math.IT
null
This submission is being withdrawn due to serious errors in the achievability proofs. The reviewers of the journal I had submitted to had found errors back in 2006. I had forgotten about this paper until I saw the CFP for a JSAC issue on in-network computation. http://www.jsac.ucsd.edu/Calls/in-networkcomputationcfp.pdf.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 15:11:54 GMT" }, { "version": "v2", "created": "Thu, 1 Sep 2011 14:19:20 GMT" } ]
2011-09-02T00:00:00
[ [ "Vijayakumaran", "Saravanan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603110
Marcus Hutter
Daniil Ryabko and Marcus Hutter
Asymptotic Learnability of Reinforcement Problems with Arbitrary Dependence
15 pages
Proc. 17th International Conf. on Algorithmic Learning Theory (ALT 2006) pages 334-347
null
IDSIA-09-06
cs.LG cs.AI
null
We address the problem of reinforcement learning in which observations may exhibit an arbitrary form of stochastic dependence on past observations and actions. The task for an agent is to attain the best possible asymptotic reward where the true generating environment is unknown but belongs to a known countable family of environments. We find some sufficient conditions on the class of environments under which an agent exists which attains the best asymptotic reward for any environment in the class. We analyze how tight these conditions are and how they relate to different probabilistic assumptions known in reinforcement learning and related fields, such as Markov Decision Processes and mixing conditions.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 16:22:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Ryabko", "Daniil", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0603111
Tomasz Blachowicz
T. Blachowicz and M. Wieja
Remote-control and clustering of physical computations using the XML-RPC protocol and the open-Mosix system
18 pages, 2 figures
null
null
null
cs.DC cs.NI
null
The applications of the remote control of physical simulations performed in clustered computers running under an open-Mosix system are presented. Results from the simulation of a 2-dimensional ferromagnetic system of spins in the Ising scheme are provided. Basic parameters of a simulated hysteresis loop like coercivity and exchange bias due to pinning of ferromagnetic spins are given. The paper describes in physicists terminology a cost effective solution which utilizes an XML-RPC protocol (Extensible Markup Language - Remote Procedure Calling) and standard C++ and Python languages.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 20:45:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Blachowicz", "T.", "" ], [ "Wieja", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0603112
Joseph Kong
Joseph S. Kong, Jesse S. A. Bridgewater and Vwani P. Roychowdhury
A General Framework for Scalability and Performance Analysis of DHT Routing Systems
11 pages, 8 figures; to be published in IEEE DSN 2006
null
10.1109/DSN.2006.4
null
cs.DC
null
In recent years, many DHT-based P2P systems have been proposed, analyzed, and certain deployments have reached a global scale with nearly one million nodes. One is thus faced with the question of which particular DHT system to choose, and whether some are inherently more robust and scalable. Toward developing such a comparative framework, we present the reachable component method (RCM) for analyzing the performance of different DHT routing systems subject to random failures. We apply RCM to five DHT systems and obtain analytical expressions that characterize their routability as a continuous function of system size and node failure probability. An important consequence is that in the large-network limit, the routability of certain DHT systems go to zero for any non-zero probability of node failure. These DHT routing algorithms are therefore unscalable, while some others, including Kademlia, which powers the popular eDonkey P2P system, are found to be scalable.
[ { "version": "v1", "created": "Tue, 28 Mar 2006 22:54:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Kong", "Joseph S.", "" ], [ "Bridgewater", "Jesse S. A.", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0603113
Serge Gornev
Serge Gornev
Mathematical Modeling of Aerodynamic Space -to - Surface Flight with Trajectory for Avoid Intercepting Process
null
null
null
null
cs.OH
null
Modeling has been created for a Space-to-Surface system defined for an optimal trajectory for targeting in terminal phase with avoids an intercepting process. The modeling includes models for simulation atmosphere, speed of sound, aerodynamic flight and navigation by an infrared system. The modeling and simulation includes statistical analysis of the modeling results.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 01:21:34 GMT" } ]
2009-03-23T00:00:00
[ [ "Gornev", "Serge", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0603114
William Yurcik
Gregory A. Pluta, Larry Brumbaugh, William Yurcik
Using SMART for Customized Monitoring of Windows Services
15 pages, 10 figures, 2 tables
null
null
null
cs.NI cs.CR
null
We focus on examining and working with an important category of computer software called Services, which are provided as a part of newer Microsoft Windows operating systems. A typical Windows user transparently utilizes many of these services but is frequently unaware of their existence. Since some services have the potential to create significant problems when they are executing, it is important for a system administrator to identify which services are running on the network, the types of processing done by each service, and any interrelationships among the various services. This information can then be used to improve the overall integrity of both the individual computer where a questionable service is running and in aggregate an entire network of computers. NCSA has developed an application called SMART (Services Monitoring And Reporting Tool) that can be used to identify and display all services currently running in the network. A commercial program called Hyena remotely monitors the services on all computers attached to the network and exports this information to SMART. SMART produces various outputs that the system administrator can analyze and then determine appropriate actions to take. In particular, SMART provides a color coordinated user interface to quickly identify and classify both potentially hazardous services and also unknown services.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 05:25:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Pluta", "Gregory A.", "" ], [ "Brumbaugh", "Larry", "" ], [ "Yurcik", "William", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0603115
David Defour
Guillaume Da Gra\c{c}ca (LP2A), David Defour (LP2A)
Implementation of float-float operators on graphics hardware
null
null
null
null
cs.AR cs.GR
null
The Graphic Processing Unit (GPU) has evolved into a powerful and flexible processor. The latest graphic processors provide fully programmable vertex and pixel processing units that support vector operations up to single floating-point precision. This computational power is now being used for general-purpose computations. However, some applications require higher precision than single precision. This paper describes the emulation of a 44-bit floating-point number format and its corresponding operations. An implementation is presented along with performance and accuracy results.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 11:48:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Da Graçca", "Guillaume", "", "LP2A" ], [ "Defour", "David", "", "LP2A" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0603116
Bruno de Figueiredo Moutinho
G.A. Giraldi and B.F. Moutinho and D.M.L. de Carvalho and J.C. de Oliveira
Fourier Analysis and Holographic Representations of 1D and 2D Signals
13 pages
null
null
null
cs.CV
null
In this paper, we focus on Fourier analysis and holographic transforms for signal representation. For instance, in the case of image processing, the holographic representation has the property that an arbitrary portion of the transformed image enables reconstruction of the whole image with details missing. We focus on holographic representation defined through the Fourier Transforms. Thus, We firstly review some results in Fourier transform and Fourier series. Next, we review the Discrete Holographic Fourier Transform (DHFT) for image representation. Then, we describe the contributions of our work. We show a simple scheme for progressive transmission based on the DHFT. Next, we propose the Continuous Holographic Fourier Transform (CHFT) and discuss some theoretical aspects of it for 1D signals. Finally, some testes are presented in the experimental results
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:07:52 GMT" }, { "version": "v2", "created": "Mon, 3 Apr 2006 13:16:24 GMT" } ]
2011-11-09T00:00:00
[ [ "Giraldi", "G. A.", "" ], [ "Moutinho", "B. F.", "" ], [ "de Carvalho", "D. M. L.", "" ], [ "de Oliveira", "J. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0603117
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Affine functions and series with co-inductive real numbers
null
Mathematical Structures in Computer Science 17, 1 (2006)
null
null
cs.LO
null
We extend the work of A. Ciaffaglione and P. Di Gianantonio on mechanical verification of algorithms for exact computation on real numbers, using infinite streams of digits implemented as co-inductive types. Four aspects are studied: the first aspect concerns the proof that digit streams can be related to the axiomatized real numbers that are already axiomatized in the proof system (axiomatized, but with no fixed representation). The second aspect re-visits the definition of an addition function, looking at techniques to let the proof search mechanism perform the effective construction of an algorithm that is correct by construction. The third aspect concerns the definition of a function to compute affine formulas with positive rational coefficients. This should be understood as a testbed to describe a technique to combine co-recursion and recursion to obtain a model for an algorithm that appears at first sight to be outside the expressive power allowed by the proof system. The fourth aspect concerns the definition of a function to compute series, with an application on the series that is used to compute Euler's number e. All these experiments should be reproducible in any proof system that supports co-inductive types, co-recursion and general forms of terminating recursion, but we performed with the Coq system [12, 3, 14].
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:36:03 GMT" }, { "version": "v2", "created": "Mon, 1 May 2006 07:38:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0603118
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
Coq in a Hurry
null
Cours (2008) 22 pages
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These notes provide a quick introduction to the Coq system and show how it can be used to define logical concepts and functions and reason about them. It is designed as a tutorial, so that readers can quickly start their own experiments, learning only a few of the capabilities of the system. A much more comprehensive study is provided in [1], which also provides an extensive collection of exercises to train on.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:38:33 GMT" }, { "version": "v2", "created": "Wed, 24 May 2006 13:05:17 GMT" }, { "version": "v3", "created": "Fri, 7 Nov 2008 09:44:20 GMT" } ]
2008-11-07T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0603119
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis)
CoInduction in Coq
null
null
null
null
cs.LO
null
We describe the basic notions of co-induction as they are available in the coq system. As an application, we describe arithmetic properties for simple representations of real numbers.
[ { "version": "v1", "created": "Wed, 29 Mar 2006 19:39:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0603120
Zengyou He
Zengyou He
Approximation Algorithms for K-Modes Clustering
7 pages
null
null
Tr-06-0330
cs.AI
null
In this paper, we study clustering with respect to the k-modes objective function, a natural formulation of clustering for categorical data. One of the main contributions of this paper is to establish the connection between k-modes and k-median, i.e., the optimum of k-median is at most twice the optimum of k-modes for the same categorical data clustering problem. Based on this observation, we derive a deterministic algorithm that achieves an approximation factor of 2. Furthermore, we prove that the distance measure in k-modes defines a metric. Hence, we are able to extend existing approximation algorithms for metric k-median to k-modes. Empirical results verify the superiority of our method.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 02:02:37 GMT" } ]
2007-05-23T00:00:00
[ [ "He", "Zengyou", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0603121
Scott Turner
Scott Turner, Manuel A. Perez-Quinones and Stephen H. Edwards
minimUML: A Minimalist Approach to UML Diagraming for Early Computer Science Education
38 pages, 15 figures
null
null
null
cs.HC cs.SE
null
The Unified Modeling Language (UML) is commonly used in introductory Computer Science to teach basic object-oriented design. However, there appears to be a lack of suitable software to support this task. Many of the available programs that support UML focus on developing code and not on enhancing learning. Those that were designed for educational use sometimes have poor interfaces or are missing common and important features, such as multiple selection and undo/redo. There is a need for software that is tailored to an instructional environment and has all the useful and needed functionality for that specific task. This is the purpose of minimUML. minimUML provides a minimum amount of UML, just what is commonly used in beginning programming classes, while providing a simple, usable interface. In particular, minimUML was designed to support abstract design while supplying features for exploratory learning and error avoidance. In addition, it allows for the annotation of diagrams, through text or freeform drawings, so students can receive feedback on their work. minimUML was developed with the goal of supporting ease of use, supporting novice students, and a requirement of no prior-training for its use.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 06:12:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Turner", "Scott", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Edwards", "Stephen H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0603122
Irene Guessarian
Eug\'enie Foustoucos (MPLA), Irene Guessarian (LIAFA)
Complexity of Monadic inf-datalog. Application to temporal logic
null
Proc. 4th Panhellenic Logic Symposium (2003) 95-99
null
null
cs.DS
null
In [11] we defined Inf-Datalog and characterized the fragments of Monadic inf-Datalog that have the same expressive power as Modal Logic (resp. $CTL$, alternation-free Modal $\mu$-calculus and Modal $\mu$-calculus). We study here the time and space complexity of evaluation of Monadic inf-Datalog programs on finite models. We deduce a new unified proof that model checking has 1. linear data and program complexities (both in time and space) for $CTL$ and alternation-free Modal $\mu$-calculus, and 2. linear-space (data and program) complexities, linear-time program complexity and polynomial-time data complexity for $L\mu\_k$ (Modal $\mu$-calculus with fixed alternation-depth at most $k$).}
[ { "version": "v1", "created": "Thu, 30 Mar 2006 15:25:11 GMT" } ]
2016-08-16T00:00:00
[ [ "Foustoucos", "Eugénie", "", "MPLA" ], [ "Guessarian", "Irene", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0603123
Jean-Claude Belfiore
Sheng Yang and Jean-Claude Belfiore
Towards the Optimal Amplify-and-Forward Cooperative Diversity Scheme
30 pages, 11 figures, submitted to IEEE trans. IT, revised version
null
null
null
cs.IT math.IT
null
In a slow fading channel, how to find a cooperative diversity scheme that achieves the transmit diversity bound is still an open problem. In fact, all previously proposed amplify-and-forward (AF) and decode-and-forward (DF) schemes do not improve with the number of relays in terms of the diversity multiplexing tradeoff (DMT) for multiplexing gains r higher than 0.5. In this work, we study the class of slotted amplify-and-forward (SAF) schemes. We first establish an upper bound on the DMT for any SAF scheme with an arbitrary number of relays N and number of slots M. Then, we propose a sequential SAF scheme that can exploit the potential diversity gain in the high multiplexing gain regime. More precisely, in certain conditions, the sequential SAF scheme achieves the proposed DMT upper bound which tends to the transmit diversity bound when M goes to infinity. In particular, for the two-relay case, the three-slot sequential SAF scheme achieves the proposed upper bound and outperforms the two-relay non-orthorgonal amplify-and-forward (NAF) scheme of Azarian et al. for multiplexing gains r < 2/3. Numerical results reveal a significant gain of our scheme over the previously proposed AF schemes, especially in high spectral efficiency and large network size regime.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 16:59:42 GMT" }, { "version": "v2", "created": "Thu, 30 Nov 2006 18:35:53 GMT" } ]
2007-07-16T00:00:00
[ [ "Yang", "Sheng", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603124
Sheng Yang
Sheng Yang and Jean-Claude Belfiore
Diversity-Multiplexing Tradeoff of Double Scattering MIMO Channels
17 pages, 1 figure, submitted to IEEE trans. IT
null
null
null
cs.IT math.IT
null
It is well known that the presence of double scattering degrades the performance of a MIMO channel, in terms of both the multiplexing gain and the diversity gain. In this paper, a closed-form expression of the diversity-multiplexing tradeoff (DMT) of double scattering MIMO channels is obtained. It is shown that, for a channel with nT transmit antennas, nR receive antennas and nS scatterers, the DMT only depends on the ordered version of the triple (nT,nS,nR), for arbitrary nT, nS and nR. The condition under which the double scattering channel has the same DMT as the single scattering channel is also established.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 17:45:59 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2006 12:40:33 GMT" } ]
2007-07-16T00:00:00
[ [ "Yang", "Sheng", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603125
Russ Abbott
Russ Abbott
If a tree casts a shadow is it telling the time?
12 pages. Submitted for conference presentation
null
null
null
cs.MA cs.GL
null
Physical processes are computations only when we use them to externalize thought. Computation is the performance of one or more fixed processes within a contingent environment. We reformulate the Church-Turing thesis so that it applies to programs rather than to computability. When suitably formulated agent-based computing in an open, multi-scalar environment represents the current consensus view of how we interact with the world. But we don't know how to formulate multi-scalar environments.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 22:31:26 GMT" }, { "version": "v2", "created": "Wed, 7 Jun 2006 01:49:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
cs/0603126
Russ Abbott
Russ Abbott
Open at the Top; Open at the Bottom; and Continually (but Slowly) Evolving
6 pages. To be presented at the IEEE Conference on Systems of Systems Engineering, April, 2006
null
10.1109/SYSOSE.2006.1652271
null
cs.MA
null
Systems of systems differ from traditional systems in that they are open at the top, open at the bottom, and continually (but slowly) evolving. "Open at the top" means that there is no pre-defined top level application. New applications may be created at any time. "Open at the bottom" means that the system primitives are defined functionally rather than concretely. This allows the implementation of these primitives to be modified as technology changes. "Continually (but slowly) evolving" means that the system's functionality is stable enough to be useful but is understood to be subject to modification. Systems with these properties tend to be environments within which other systems operate--and hence are systems of systems. It is also important to understand the larger environment within which a system of systems exists.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 22:53:15 GMT" } ]
2016-11-17T00:00:00
[ [ "Abbott", "Russ", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0603127
Russ Abbott
Russ Abbott
Complex Systems + Systems Engineering = Complex Systems Engineeri
10 pages. Position paper to be presented at Conference on Systems Engineering Research
null
null
null
cs.MA
null
One may define a complex system as a system in which phenomena emerge as a consequence of multiscale interaction among the system's components and their environments. The field of Complex Systems is the study of such systems--usually naturally occurring, either bio-logical or social. Systems Engineering may be understood to include the conceptualising and building of systems that consist of a large number of concurrently operating and interacting components--usually including both human and non-human elements. It has become increasingly apparent that the kinds of systems that systems engineers build have many of the same multiscale characteristics as those of naturally occurring complex systems. In other words, systems engineering is the engineering of complex systems. This paper and the associated panel will explore some of the connections between the fields of complex systems and systems engineering.
[ { "version": "v1", "created": "Thu, 30 Mar 2006 22:58:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Abbott", "Russ", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0603128
Kai-Uwe Schmidt
Kai-Uwe Schmidt
On Cosets of the Generalized First-Order Reed-Muller Code with Low PMEPR
null
IEEE Trans. Inf. Theory, vol. 52, no. 7, pp. 3220-3232, July 2006
null
null
cs.IT math.IT
null
Golay sequences are well suited for the use as codewords in orthogonal frequency-division multiplexing (OFDM), since their peak-to-mean envelope power ratio (PMEPR) in q-ary phase-shift keying (PSK) modulation is at most 2. It is known that a family of polyphase Golay sequences of length 2^m organizes in m!/2 cosets of a q-ary generalization of the first-order Reed-Muller code, RM_q(1,m). In this paper a more general construction technique for cosets of RM_q(1,m) with low PMEPR is established. These cosets contain so-called near-complementary sequences. The application of this theory is then illustrated by providing some construction examples. First, it is shown that the m!/2 cosets of RM_q(1,m) comprised of Golay sequences just arise as a special case. Second, further families of cosets of RM_q(1,m) with maximum PMEPR between 2 and 4 are presented, showing that some previously unexplained phenomena can now be understood within a unified framework. A lower bound on the PMEPR of cosets of RM_q(1,m) is proved as well, and it is demonstrated that the upper bound on the PMEPR is tight in many cases. Finally it is shown that all upper bounds on the PMEPR of cosets of RM_q(1,m) also hold for the peak-to-average power ratio (PAPR) under the Walsh-Hadamard transform.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 08:51:35 GMT" }, { "version": "v2", "created": "Thu, 30 Nov 2006 09:52:48 GMT" } ]
2007-07-16T00:00:00
[ [ "Schmidt", "Kai-Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603129
Damiano Bolzoni
Xiamoneg Su, Damiano Bolzoni, Pascal van Eck
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements
null
null
null
TR-CTIT-06-08
cs.CR
null
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to link explicitly security requirements with the organization's business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. A conceptual framework is presented, where the relationships between business vision, critical impact factors and valuable assets (together with their security requirements) are shown.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 13:15:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Su", "Xiamoneg", "" ], [ "Bolzoni", "Damiano", "" ], [ "van Eck", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0603130
Shreecharan Tangirala
Rashmi Agarwal and M. S. Santhanam
Digital watermarking in the singular vector domain
11 pages, 21 figures, Elsevier class
International Journal of Image and Graphics, volume 8, page 351 (2008)
10.1142/S0219467808003131
null
cs.MM
null
Many current watermarking algorithms insert data in the spatial or transform domains like the discrete cosine, the discrete Fourier, and the discrete wavelet transforms. In this paper, we present a data-hiding algorithm that exploits the singular value decomposition (SVD) representation of the data. We compute the SVD of the host image and the watermark and embed the watermark in the singular vectors of the host image. The proposed method leads to an imperceptible scheme for digital images, both in grey scale and color and is quite robust against attacks like noise and JPEG compression.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 19:36:03 GMT" } ]
2010-12-13T00:00:00
[ [ "Agarwal", "Rashmi", "" ], [ "Santhanam", "M. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0603131
Chris Snow
C. Snow, L. Lampe, R. Schober
Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static Fading Channels
5 pages, 3 figures, 2 tables. Submitted to Globecom 2006
null
null
null
cs.IT math.IT
null
This paper presents two methods for approximating the performance of coded multicarrier systems operating over frequency-selective, quasi-static fading channels with non-ideal interleaving. The first method is based on approximating the performance of the system over each realization of the channel, and is suitable for obtaining the outage performance of this type of system. The second method is based on knowledge of the correlation matrix of the frequency-domain channel gains and can be used to directly obtain the average performance. Both of the methods are applicable for convolutionally-coded interleaved systems employing Quadrature Amplitude Modulation (QAM). As examples, both methods are used to study the performance of the Multiband Orthogonal Frequency Division Multiplexing (OFDM) proposal for high data-rate Ultra-Wideband (UWB) communication.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 19:36:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Snow", "C.", "" ], [ "Lampe", "L.", "" ], [ "Schober", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0603132
Michael McGuigan
Michael McGuigan
Graphics Turing Test
6 pages
null
null
null
cs.GR
null
We define a Graphics Turing Test to measure graphics performance in a similar manner to the definition of the traditional Turing Test. To pass the test one needs to reach a computational scale, the Graphics Turing Scale, for which Computer Generated Imagery becomes comparatively indistinguishable from real images while also being interactive. We derive an estimate for this computational scale which, although large, is within reach of todays supercomputers. We consider advantages and disadvantages of various computer systems designed to pass the Graphics Turing Test. Finally we discuss commercial applications from the creation of such a system, in particular Interactive Cinema.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 19:58:30 GMT" } ]
2007-05-23T00:00:00
[ [ "McGuigan", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0604001
Fabrice Rossi
Fabrice Rossi (INRIA Rocquencourt / INRIA Sophia Antipolis), Brieuc Conan-Guez (LITA)
Theoretical Properties of Projection Based Multilayer Perceptrons with Functional Inputs
null
null
10.1007/s11063-005-3100-2
null
cs.NE
null
Many real world data are sampled functions. As shown by Functional Data Analysis (FDA) methods, spectra, time series, images, gesture recognition data, etc. can be processed more efficiently if their functional nature is taken into account during the data analysis process. This is done by extending standard data analysis methods so that they can apply to functional inputs. A general way to achieve this goal is to compute projections of the functional data onto a finite dimensional sub-space of the functional space. The coordinates of the data on a basis of this sub-space provide standard vector representations of the functions. The obtained vectors can be processed by any standard method. In our previous work, this general approach has been used to define projection based Multilayer Perceptrons (MLPs) with functional inputs. We study in this paper important theoretical properties of the proposed model. We show in particular that MLPs with functional inputs are universal approximators: they can approximate to arbitrary accuracy any continuous mapping from a compact sub-space of a functional space to R. Moreover, we provide a consistency result that shows that any mapping from a functional space to R can be learned thanks to examples by a projection based MLP: the generalization mean square error of the MLP decreases to the smallest possible mean square error on the data when the number of examples goes to infinity.
[ { "version": "v1", "created": "Sat, 1 Apr 2006 20:16:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Rossi", "Fabrice", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Conan-Guez", "Brieuc", "", "LITA" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0604002
Leopoldo Bertossi
Andrei Lopatenko and Leopoldo Bertossi
Complexity of Consistent Query Answering in Databases under Cardinality-Based and Incremental Repair Semantics
26 pages, 2 figures
null
null
null
cs.DB cs.CC
null
Consistent Query Answering (CQA) is the problem of computing from a database the answers to a query that are consistent with respect to certain integrity constraints that the database, as a whole, may fail to satisfy. Consistent answers have been characterized as those that are invariant under certain minimal forms of restoration of the database consistency. We investigate algorithmic and complexity theoretic issues of CQA under database repairs that minimally depart -wrt the cardinality of the symmetric difference- from the original database. We obtain first tight complexity bounds. We also address the problem of incremental complexity of CQA, that naturally occurs when an originally consistent database becomes inconsistent after the execution of a sequence of update operations. Tight bounds on incremental complexity are provided for various semantics under denial constraints. Fixed parameter tractability is also investigated in this dynamic context, where the size of the update sequence becomes the relevant parameter.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 03:07:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Lopatenko", "Andrei", "" ], [ "Bertossi", "Leopoldo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0604003
Petrus H Potgieter
Petrus H. Potgieter
Hypercomputing the Mandelbrot Set?
11 pages, 2 figures
null
null
null
cs.CC
null
The Mandelbrot set is an extremely well-known mathematical object that can be described in a quite simple way but has very interesting and non-trivial properties. This paper surveys some results that are known concerning the (non-)computability of the set. It considers two models of decidability over the reals (which have been treated much more thoroughly and technically by Hertling (2005), Blum, Shub and Smale, Brattka (2003) and Weihrauch (1999 and 2003) among others), two over the computable reals (the Russian school and hypercomputation) and a model over the rationals.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 15:31:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Potgieter", "Petrus H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0604004
Alexander Evako
Alexander V. Evako
The Poincare conjecture for digital spaces. Properties of digital n-dimensional disks and spheres
null
null
null
null
cs.DM cs.CV math.AT
null
Motivated by the Poincare conjecture, we study properties of digital n-dimensional spheres and disks, which are digital models of their continuous counterparts. We introduce homeomorphic transformations of digital manifolds, which retain the connectedness, the dimension, the Euler characteristics and the homology groups of manifolds. We find conditions where an n-dimensional digital manifold is the n-dimensional digital sphere and discuss the link between continuous closed n-manifolds and their digital models.
[ { "version": "v1", "created": "Sun, 2 Apr 2006 19:55:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" } ]
cs/0604005
Sergio Servetto
Sergio D. Servetto (Cornell University)
Multiterminal Source Coding with Two Encoders--I: A Computable Outer Bound
Submitted to the IEEE Transactions on Information Theory; Revised, November 2006. Substantial revision after the first round of reviews
null
null
null
cs.IT math.IT
null
In this first part, a computable outer bound is proved for the multiterminal source coding problem, for a setup with two encoders, discrete memoryless sources, and bounded distortion measures.
[ { "version": "v1", "created": "Mon, 3 Apr 2006 04:44:33 GMT" }, { "version": "v2", "created": "Mon, 8 May 2006 22:12:18 GMT" }, { "version": "v3", "created": "Wed, 15 Nov 2006 05:32:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Servetto", "Sergio D.", "", "Cornell University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604006
David Bateman
David Bateman and Andy Adler
Sparse Matrix Implementation in Octave
null
null
null
Octave2006/04
cs.MS
null
There are many classes of mathematical problems which give rise to matrices, where a large number of the elements are zero. In this case it makes sense to have a special matrix type to handle this class of problems where only the non-zero elements of the matrix are stored. Not only does this reduce the amount of memory to store the matrix, but it also means that operations on this type of matrix can take advantage of the a-priori knowledge of the positions of the non-zero elements to accelerate their calculations. A matrix type that stores only the non-zero elements is generally called sparse. Until recently Octave has lacked a full implementation of sparse matrices. This article address the implementation of sparse matrices within Octave, including their storage, creation, fundamental algorithms used, their implementations and the basic operations and functions implemented for sparse matrices. Mathematical issues such as the return types of sparse operations, matrix fill-in and reordering for sparse matrix factorization is discussed in the context of a real example. Benchmarking of Octave's implementation of sparse operations compared to their equivalent in Matlab are given and their implications discussed. Results are presented for multiplication and linear algebra operations for various matrix orders and densities. Furthermore, the use of Octave's sparse matrix implementation is demonstrated using a real example of a finite element model (FEM) problem. Finally, the method of using sparse matrices with Octave's oct-files is discussed. The means of creating, using and returning sparse matrices within oct-files is discussed as well as the differences between Octave's Sparse and Array classes.
[ { "version": "v1", "created": "Mon, 3 Apr 2006 12:56:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Bateman", "David", "" ], [ "Adler", "Andy", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0604007
Guillaume Theyssier
Laurent Boyer (LIP), Victor Poupet (LIP), Guillaume Theyssier (LM-Savoie)
On the Complexity of Limit Sets of Cellular Automata Associated with Probability Measures
null
Mathematical Foundations of Computer Science 2006Springer (Ed.) (28/08/2006) 190-201
null
null
cs.DM cs.CC math.DS
null
We study the notion of limit sets of cellular automata associated with probability measures (mu-limit sets). This notion was introduced by P. Kurka and A. Maass. It is a refinement of the classical notion of omega-limit sets dealing with the typical long term behavior of cellular automata. It focuses on the words whose probability of appearance does not tend to 0 as time tends to infinity (the persistent words). In this paper, we give a characterisation of the persistent language for non sensible cellular automata associated with Bernouilli measures. We also study the computational complexity of these languages. We show that the persistent language can be non-recursive. But our main result is that the set of quasi-nilpotent cellular automata (those with a single configuration in their mu-limit set) is neither recursively enumerable nor co-recursively enumerable.
[ { "version": "v1", "created": "Tue, 4 Apr 2006 10:21:36 GMT" }, { "version": "v2", "created": "Mon, 2 Oct 2006 08:53:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Boyer", "Laurent", "", "LIP" ], [ "Poupet", "Victor", "", "LIP" ], [ "Theyssier", "Guillaume", "", "LM-Savoie" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" } ]
cs/0604008
Sandor P. Fekete
Esther M. Arkin and Herve Broennimann and Jeff Erickson and Sandor P. Fekete and Christian Knauer and Jonathan Lenchner and Joseph S. B. Mitchell and Kim Whittlesey
Minimum-Cost Coverage of Point Sets by Disks
10 pages, 4 figures, Latex, to appear in ACM Symposium on Computational Geometry 2006
null
null
null
cs.DS cs.CG
null
We consider a class of geometric facility location problems in which the goal is to determine a set X of disks given by their centers (t_j) and radii (r_j) that cover a given set of demand points Y in the plane at the smallest possible cost. We consider cost functions of the form sum_j f(r_j), where f(r)=r^alpha is the cost of transmission to radius r. Special cases arise for alpha=1 (sum of radii) and alpha=2 (total area); power consumption models in wireless network design often use an exponent alpha>2. Different scenarios arise according to possible restrictions on the transmission centers t_j, which may be constrained to belong to a given discrete set or to lie on a line, etc. We obtain several new results, including (a) exact and approximation algorithms for selecting transmission points t_j on a given line in order to cover demand points Y in the plane; (b) approximation algorithms (and an algebraic intractability result) for selecting an optimal line on which to place transmission points to cover Y; (c) a proof of NP-hardness for a discrete set of transmission points in the plane and any fixed alpha>1; and (d) a polynomial-time approximation scheme for the problem of computing a minimum cost covering tour (MCCT), in which the total cost is a linear combination of the transmission cost for the set of disks and the length of a tour/path that connects the centers of the disks.
[ { "version": "v1", "created": "Tue, 4 Apr 2006 17:24:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Arkin", "Esther M.", "" ], [ "Broennimann", "Herve", "" ], [ "Erickson", "Jeff", "" ], [ "Fekete", "Sandor P.", "" ], [ "Knauer", "Christian", "" ], [ "Lenchner", "Jonathan", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Whittlesey", "Kim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0604009
Alexey Melkikh
Alexey V. Melkikh
Can an Organism Adapt Itself to Unforeseen Circumstances?
null
null
null
null
cs.AI
null
A model of an organism as an autonomous intelligent system has been proposed. This model was used to analyze learning of an organism in various environmental conditions. Processes of learning were divided into two types: strong and weak processes taking place in the absence and the presence of aprioristic information about an object respectively. Weak learning is synonymous to adaptation when aprioristic programs already available in a system (an organism) are started. It was shown that strong learning is impossible for both an organism and any autonomous intelligent system. It was shown also that the knowledge base of an organism cannot be updated. Therefore, all behavior programs of an organism are congenital. A model of a conditioned reflex as a series of consecutive measurements of environmental parameters has been advanced. Repeated measurements are necessary in this case to reduce the error during decision making.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 10:29:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Melkikh", "Alexey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0604010
Christos Dimitrakakis
Christos Dimitrakakis
Nearly optimal exploration-exploitation decision thresholds
10 pages, 2 figures; IDIAP Research Report. Originally published in ICANN 2006. This version updates the paper with some links to previous and followup work
null
null
IDIAP-RR-06-12
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While in general trading off exploration and exploitation in reinforcement learning is hard, under some formulations relatively simple solutions exist. In this paper, we first derive upper bounds for the utility of selecting different actions in the multi-armed bandit setting. Unlike the common statistical upper confidence bounds, these explicitly link the planning horizon, uncertainty and the need for exploration explicit. The resulting algorithm can be seen as a generalisation of the classical Thompson sampling algorithm. We experimentally test these algorithms, as well as $\epsilon$-greedy and the value of perfect information heuristics. Finally, we also introduce the idea of bagging for reinforcement learning. By employing a version of online bootstrapping, we can efficiently sample from an approximate posterior distribution.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 10:29:48 GMT" }, { "version": "v2", "created": "Mon, 4 Jun 2018 18:17:32 GMT" } ]
2018-06-06T00:00:00
[ [ "Dimitrakakis", "Christos", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0604011
Noam Shental
Gad Getz, Noam Shental, Eytan Domany
Semi-Supervised Learning -- A Statistical Physics Approach
9 pages. Appeared in in the Proceedings of "Learning with Partially Classified Training Data", ICML 2005 workshop
null
null
null
cs.LG cond-mat.stat-mech cs.CV
null
We present a novel approach to semi-supervised learning which is based on statistical physics. Most of the former work in the field of semi-supervised learning classifies the points by minimizing a certain energy function, which corresponds to a minimal k-way cut solution. In contrast to these methods, we estimate the distribution of classifications, instead of the sole minimal k-way cut, which yields more accurate and robust results. Our approach may be applied to all energy functions used for semi-supervised learning. The method is based on sampling using a Multicanonical Markov chain Monte-Carlo algorithm, and has a straightforward probabilistic interpretation, which allows for soft assignments of points to classes, and also to cope with yet unseen class types. The suggested approach is demonstrated on a toy data set and on two real-life data sets of gene expression.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 18:07:31 GMT" }, { "version": "v2", "created": "Thu, 6 Apr 2006 12:23:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Getz", "Gad", "" ], [ "Shental", "Noam", "" ], [ "Domany", "Eytan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0604012
Sreeram Vuppala
Sreeram Vuppala
The Aryabhata Algorithm Using Least Absolute Remainders
9 pages
null
null
null
cs.CR
null
This paper presents an introduction to the Aryabhata algorithm for finding multiplicative inverses and solving linear congruences, both of which have applications in cryptography. We do so by the use of the least absolute remainders. The exposition of the Aryabhata algorithm provided here can have performance that could exceed what was described recently by Rao and Yang.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 19:18:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Vuppala", "Sreeram", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0604013
Shripad Thite
Shripad Thite
On Covering a Graph Optimally with Induced Subgraphs
9 pages
null
null
null
cs.DM
null
We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number of vertices in each subgraph is minimized. We prove NP-completeness of the problem, prove lower bounds, and give approximation algorithms for certain graph classes.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 17:06:51 GMT" }, { "version": "v2", "created": "Fri, 7 Apr 2006 07:44:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Thite", "Shripad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0604014
Habibi Omar Jr.
O. Habibi, U.R. Patihnedj, M.O. Dhar
Towards Analog Reverse Time Computation
null
null
null
null
cs.CC
null
We report the consequences of a destabilization process on a simulated General Purpose Analog Computer. This new technology overcomes problems linked with serial ambiguity, and provides an analog bias to encode algorithms whose complexity is over polynomial. We also implicitly demonstrate how countermesures of the Stochastic Aperture Degeneracy could efficiently reach higher computational classes, and would open a road towards Analog Reverse Time Computation.
[ { "version": "v1", "created": "Wed, 5 Apr 2006 23:40:56 GMT" }, { "version": "v2", "created": "Fri, 7 Apr 2006 09:39:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Habibi", "O.", "" ], [ "Patihnedj", "U. R.", "" ], [ "Dhar", "M. O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0604015
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, George Riley, kc claffy
Revealing the Autonomous System Taxonomy: The Machine Learning Approach
null
PAM 2006, best paper award
null
null
cs.NI cs.LG
null
Although the Internet AS-level topology has been extensively studied over the past few years, little is known about the details of the AS taxonomy. An AS "node" can represent a wide variety of organizations, e.g., large ISP, or small private business, university, with vastly different network characteristics, external connectivity patterns, network growth tendencies, and other properties that we can hardly neglect while working on veracious Internet representations in simulation environments. In this paper, we introduce a radically new approach based on machine learning techniques to map all the ASes in the Internet into a natural AS taxonomy. We successfully classify 95.3% of ASes with expected accuracy of 78.1%. We release to the community the AS-level topology dataset augmented with: 1) the AS taxonomy information and 2) the set of AS attributes we used to classify ASes. We believe that this dataset will serve as an invaluable addition to further understanding of the structure and evolution of the Internet.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 00:08:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Riley", "George", "" ], [ "claffy", "kc", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0604016
Michael Baer
Michael B. Baer
On Conditional Branches in Optimal Search Trees
8 pages, 5 figures (with 10 illustrations total), 1 table; reformatted with some additional notes
null
null
null
cs.PF cs.DS cs.IR
null
Algorithms for efficiently finding optimal alphabetic decision trees -- such as the Hu-Tucker algorithm -- are well established and commonly used. However, such algorithms generally assume that the cost per decision is uniform and thus independent of the outcome of the decision. The few algorithms without this assumption instead use one cost if the decision outcome is ``less than'' and another cost otherwise. In practice, neither assumption is accurate for software optimized for today's microprocessors. Such software generally has one cost for the more likely decision outcome and a greater cost -- often far greater -- for the less likely decision outcome. This problem and generalizations thereof are thus applicable to hard coding static decision tree instances in software, e.g., for optimizing program bottlenecks or for compiling switch statements. An O(n^3)-time O(n^2)-space dynamic programming algorithm can solve this optimal binary decision tree problem, and this approach has many generalizations that optimize for the behavior of processors with predictive branch capabilities, both static and dynamic. Solutions to this formulation are often faster in practice than ``optimal'' decision trees as formulated in the literature. Different search paradigms can sometimes yield even better performance.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 00:54:44 GMT" }, { "version": "v2", "created": "Tue, 23 May 2006 05:07:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0604017
Dmitri Krioukov
Xenofontas Dimitropoulos, Dmitri Krioukov, Marina Fomenkov, Bradley Huffaker, Young Hyun, kc claffy, George Riley
AS Relationships: Inference and Validation
Final journal version
ACM SIGCOMM Computer Communication Review (CCR), v.37, n.1, p.29-40, 2007
10.1145/1198255.1198259
null
cs.NI
null
Research on performance, robustness, and evolution of the global Internet is fundamentally handicapped without accurate and thorough knowledge of the nature and structure of the contractual relationships between Autonomous Systems (ASs). In this work we introduce novel heuristics for inferring AS relationships. Our heuristics improve upon previous works in several technical aspects, which we outline in detail and demonstrate with several examples. Seeking to increase the value and reliability of our inference results, we then focus on validation of inferred AS relationships. We perform a survey with ASs' network administrators to collect information on the actual connectivity and policies of the surveyed ASs. Based on the survey results, we find that our new AS relationship inference techniques achieve high levels of accuracy: we correctly infer 96.5% customer to provider (c2p), 82.8% peer to peer (p2p), and 90.3% sibling to sibling (s2s) relationships. We then cross-compare the reported AS connectivity with the AS connectivity data contained in BGP tables. We find that BGP tables miss up to 86.2% of the true adjacencies of the surveyed ASs. The majority of the missing links are of the p2p type, which highlights the limitations of present measuring techniques to capture links of this type. Finally, to make our results easily accessible and practically useful for the community, we open an AS relationship repository where we archive, on a weekly basis, and make publicly available the complete Internet AS-level topology annotated with AS relationship information for every pair of AS neighbors.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 01:04:05 GMT" }, { "version": "v2", "created": "Wed, 26 Apr 2006 01:35:18 GMT" }, { "version": "v3", "created": "Thu, 7 Dec 2006 07:20:37 GMT" } ]
2008-04-16T00:00:00
[ [ "Dimitropoulos", "Xenofontas", "" ], [ "Krioukov", "Dmitri", "" ], [ "Fomenkov", "Marina", "" ], [ "Huffaker", "Bradley", "" ], [ "Hyun", "Young", "" ], [ "claffy", "kc", "" ], [ "Riley", "George", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0604018
Suneel Madhekar
Madhekar Suneel
Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map
Submitted to the Indian Academy of Sciences for possible publication in Sadhana (Academy Proceedings in Engineering Sciences). Results of statistical tests included. Introduction revised
null
null
null
cs.CR nlin.CD
null
A scheme for pseudo-random binary sequence generation based on the two-dimensional discrete-time Henon map is proposed. Properties of the proposed sequences pertaining to linear complexity, linear complexity profile, correlation and auto-correlation are investigated. All these properties of the sequences suggest a strong resemblance to random sequences. Results of statistical testing of the sequences are found encouraging. An attempt is made to estimate the keyspace size if the proposed scheme is used for cryptographic applications. The keyspace size is found to be large and is dependent on the precision of the computing platform used.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 09:13:55 GMT" }, { "version": "v2", "created": "Wed, 16 Aug 2006 16:56:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Suneel", "Madhekar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" } ]
cs/0604019
Thomas Giuli
K. Venkatesh Prasad, TJ Giuli, and David Watson
The Case for Modeling Security, Privacy, Usability and Reliability (SPUR) in Automotive Software
12 pages, 3 figures, presented at the 2006 Automotive Software Workshop, San Diego, CA
null
null
null
cs.SE cs.CR cs.HC
null
Over the past five years, there has been considerable growth and established value in the practice of modeling automotive software requirements. Much of this growth has been centered on requirements of software associated with the established functional areas of an automobile, such as those associated with powertrain, chassis, body, safety and infotainment. This paper makes a case for modeling four additional attributes that are increasingly important as vehicles become information conduits: security, privacy, usability, and reliability. These four attributes are important in creating specifications for embedded in-vehicle automotive software.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 13:23:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Prasad", "K. Venkatesh", "" ], [ "Giuli", "TJ", "" ], [ "Watson", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0604020
Bodo Manthey
Bodo Manthey
Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions
This paper has been joint with "On Approximating Restricted Cycle Covers" (cs.CC/0504038). Please refer to that paper. The paper "Approximation Algorithms for Restricted Cycle Covers Based on Cycle Decompositions" is now obsolete
null
null
null
cs.DS cs.CC cs.DM
null
A cycle cover of a graph is a set of cycles such that every vertex is part of exactly one cycle. An L-cycle cover is a cycle cover in which the length of every cycle is in the set L. The weight of a cycle cover of an edge-weighted graph is the sum of the weights of its edges. We come close to settling the complexity and approximability of computing L-cycle covers. On the one hand, we show that for almost all L, computing L-cycle covers of maximum weight in directed and undirected graphs is APX-hard and NP-hard. Most of our hardness results hold even if the edge weights are restricted to zero and one. On the other hand, we show that the problem of computing L-cycle covers of maximum weight can be approximated within a factor of 2 for undirected graphs and within a factor of 8/3 in the case of directed graphs. This holds for arbitrary sets L.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 13:53:25 GMT" }, { "version": "v2", "created": "Wed, 3 May 2006 13:01:24 GMT" }, { "version": "v3", "created": "Thu, 29 Jun 2006 07:32:39 GMT" }, { "version": "v4", "created": "Fri, 15 Dec 2006 14:16:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Manthey", "Bodo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0604021
Nima Sarshar
Nima Sarshar and Behnam A. Rezaei and Vwani P. Roychowdhury
Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges and a Hierarchical Solution
null
null
null
null
cs.IT math.IT
null
This paper is concerned with the scaling of the number of hops in a large scale wireless ad-hoc network (WANET), a quantity we call network latency. A large network latency affects all aspects of data communication in a WANET, including an increase in delay, packet loss, required processing power and memory. We consider network management and data routing challenges in WANETs with scalable network latency. On the physical side, reducing network latency imposes a significantly higher power and bandwidth demand on nodes, as is reflected in a set of new bounds. On the protocol front, designing distributed routing protocols that can guarantee the delivery of data packets within scalable number of hops is a challenging task. To solve this, we introduce multi-resolution randomized hierarchy (MRRH), a novel power and bandwidth efficient WANET protocol with scalable network latency. MRRH uses a randomized algorithm for building and maintaining a random hierarchical network topology, which together with the proposed routing algorithm can guarantee efficient delivery of data packets in the wireless network. For a network of size $N$, MRRH can provide an average latency of only $O(\log^{3} N)$. The power and bandwidth consumption of MRRH are shown to be \emph{nearly} optimal for the latency it provides. Therefore, MRRH, is a provably efficient candidate for truly large scale wireless ad-hoc networking.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 14:00:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Sarshar", "Nima", "" ], [ "Rezaei", "Behnam A.", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604022
Sandor P. Fekete
Robert Connelly and Erik D. Demaine and Martin L. Demaine and Sandor P. Fekete and Stefan Langerman and Joseph S. B. Mitchell and Ares Ribo and Guenter Rote
Locked and Unlocked Chains of Planar Shapes
23 pages, 25 figures, Latex; full journal version with all proof details. (Fixed crash-induced bugs in the abstract.)
Discrete and Computational Geometry 44 (2010), 439-462
10.1007/s00454-010-9262-3
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend linkage unfolding results from the well-studied case of polygonal linkages to the more general case of linkages of polygons. More precisely, we consider chains of nonoverlapping rigid planar shapes (Jordan regions) that are hinged together sequentially at rotatable joints. Our goal is to characterize the families of planar shapes that admit locked chains, where some configurations cannot be reached by continuous reconfiguration without self-intersection, and which families of planar shapes guarantee universal foldability, where every chain is guaranteed to have a connected configuration space. Previously, only obtuse triangles were known to admit locked shapes, and only line segments were known to guarantee universal foldability. We show that a surprisingly general family of planar shapes, called slender adornments, guarantees universal foldability: roughly, the distance from each edge along the path along the boundary of the slender adornment to each hinge should be monotone. In contrast, we show that isosceles triangles with any desired apex angle less than 90 degrees admit locked chains, which is precisely the threshold beyond which the inward-normal property no longer holds.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 14:46:27 GMT" }, { "version": "v2", "created": "Mon, 10 Apr 2006 10:45:29 GMT" }, { "version": "v3", "created": "Tue, 11 May 2010 18:23:09 GMT" }, { "version": "v4", "created": "Mon, 17 May 2010 17:20:33 GMT" } ]
2015-02-18T00:00:00
[ [ "Connelly", "Robert", "" ], [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Fekete", "Sandor P.", "" ], [ "Langerman", "Stefan", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Ribo", "Ares", "" ], [ "Rote", "Guenter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0604023
Sameet Sreenivasan
Sameet Sreenivasan, Reuven Cohen, Eduardo L\'opez, Zolt\'an Toroczkai, and H. Eugene Stanley
Communication Bottlenecks in Scale-Free Networks
5 pages, 3 figures
Phys. Rev. E 75, 036105 (2007)
10.1103/PhysRevE.75.036105
null
cs.NI cond-mat.stat-mech
null
We consider the effects of network topology on the optimality of packet routing quantified by $\gamma_c$, the rate of packet insertion beyond which congestion and queue growth occurs. The key result of this paper is to show that for any network, there exists an absolute upper bound, expressed in terms of vertex separators, for the scaling of $\gamma_c$ with network size $N$, irrespective of the routing algorithm used. We then derive an estimate to this upper bound for scale-free networks, and introduce a novel static routing protocol which is superior to shortest path routing under intense packet insertion rates.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 16:22:26 GMT" } ]
2016-08-16T00:00:00
[ [ "Sreenivasan", "Sameet", "" ], [ "Cohen", "Reuven", "" ], [ "López", "Eduardo", "" ], [ "Toroczkai", "Zoltán", "" ], [ "Stanley", "H. Eugene", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
cs/0604024
Joel Friedman
Joel Friedman
Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity II: A Simple Example
8 pages
null
null
null
cs.CC math.AG
null
In a previous paper we have suggested a number of ideas to attack circuit size complexity with cohomology. As a simple example, we take circuits that can only compute the AND of two inputs, which essentially reduces to SET COVER. We show a very special case of the cohomological approach (one particular free category, using injective and superskyscraper sheaves) gives the linear programming bound coming from the relaxation of the standard integer programming reformulation of SET COVER.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 20:07:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
cs/0604025
Tie Liu
Tie Liu and Pramod Viswanath
An Extremal Inequality Motivated by Multiterminal Information Theoretic Problems
32 pages, 1 figure
null
null
null
cs.IT math.IT
null
We prove a new extremal inequality, motivated by the vector Gaussian broadcast channel and the distributed source coding with a single quadratic distortion constraint problems. As a corollary, this inequality yields a generalization of the classical entropy-power inequality (EPI). As another corollary, this inequality sheds insight into maximizing the differential entropy of the sum of two dependent random variables.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 04:50:59 GMT" }, { "version": "v2", "created": "Fri, 21 Apr 2006 21:01:03 GMT" }, { "version": "v3", "created": "Tue, 7 Nov 2006 18:15:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Tie", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604026
Damiano Bolzoni
Damiano Bolzoni, Sandro Etalle
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
null
null
null
TR-CTIT-06-13
cs.CR
null
We present APHRODITE, an architecture designed to reduce false positives in network intrusion detection systems. APHRODITE works by detecting anomalies in the output traffic, and by correlating them with the alerts raised by the NIDS working on the input traffic. Benchmarks show a substantial reduction of false positives and that APHRODITE is effective also after a "quick setup", i.e. in the realistic case in which it has not been "trained" and set up optimally
[ { "version": "v1", "created": "Fri, 7 Apr 2006 12:13:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Bolzoni", "Damiano", "" ], [ "Etalle", "Sandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0604027
Laurent Romary
Majid Khayari (INIST), St\'ephane Schneider (INIST), Isabelle Kramer (LORIA), Laurent Romary (LORIA), the termsciences Collaboration
Unification of multi-lingual scientific terminological resources using the ISO 16642 standard. The TermSciences initiative
6p
null
null
null
cs.CL
null
This paper presents the TermSciences portal, which deals with the implementation of a conceptual model that uses the recent ISO 16642 standard (Terminological Markup Framework). This standard turns out to be suitable for concept modeling since it allowed for organizing the original resources by concepts and to associate the various terms for a given concept. Additional structuring is produced by sharing conceptual relationships, that is, cross-linking of resource results through the introduction of semantic relations which may have initially be missing.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 13:10:30 GMT" } ]
2009-01-20T00:00:00
[ [ "Khayari", "Majid", "", "INIST" ], [ "Schneider", "Stéphane", "", "INIST" ], [ "Kramer", "Isabelle", "", "LORIA" ], [ "Romary", "Laurent", "", "LORIA" ], [ "Collaboration", "the termsciences", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0604028
Tie Liu
Tie Liu and Pramod Viswanath
Two Proofs of the Fisher Information Inequality via Data Processing Arguments
6 pages, 0 figure
null
null
null
cs.IT math.IT
null
Two new proofs of the Fisher information inequality (FII) using data processing inequalities for mutual information and conditional variance are presented.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 16:51:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Tie", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604029
Richard Barton
Richard J. Barton and Rong Zheng
Order-Optimal Data Aggregation in Wireless Sensor Networks - Part I: Regular Networks
null
IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5811-5821, November 2010
null
null
cs.IT math.IT
null
The predominate traffic patterns in a wireless sensor network are many-to-one and one-to-many communication. Hence, the performance of wireless sensor networks is characterized by the rate at which data can be disseminated from or aggregated to a data sink. In this paper, we consider the data aggregation problem. We demonstrate that a data aggregation rate of O(log(n)/n) is optimal and that this rate can be achieved in wireless sensor networks using a generalization of cooperative beamforming called cooperative time-reversal communication.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 19:12:15 GMT" }, { "version": "v2", "created": "Sun, 11 Nov 2007 17:02:05 GMT" } ]
2016-01-15T00:00:00
[ [ "Barton", "Richard J.", "" ], [ "Zheng", "Rong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604030
Richard Barton
Richard J. Barton
The Influence of Adaptive Multicoding on Mutual Information and Channel Capacity for Uncertain Wideband CDMA Rayleigh Fading Channels
null
null
null
null
cs.IT math.IT
null
We consider the problem of adaptive modulation for wideband DS-CDMA Rayleigh fading channels with imperfect channel state information (CSI). We assume a multidimensional signal subspace spanned by a collection of random spreading codes (multicoding) and study the effects of both the subspace dimension and the probability distribution of the transmitted symbols on the mutual information between the channel input and output in the presence of uncertainty regarding the true state of the channel. We develop approximations for the mutual information as well as both upper and lower bounds on the mutual information that are stated explicitly in terms of the dimension of the signal constellation, the number of resolvable fading paths on the channel, the current estimate of channel state, and the mean-squared-error of the channel estimate. We analyze these approximations and bounds in order to quantify the impact of signal dimension and symbol distribution on system performance.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 19:28:22 GMT" } ]
2007-07-13T00:00:00
[ [ "Barton", "Richard J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604031
Amos Lapidoth
Amos Lapidoth and Ligong Wang
On the Low SNR Capacity of Peak-Limited Non-Coherent Fading Channels with Memory
null
null
null
null
cs.IT math.IT
null
The capacity of non-coherent stationary Gaussian fading channels with memory under a peak-power constraint is studied in the asymptotic weak-signal regime. It is assumed that the fading law is known to both transmitter and receiver but that neither is cognizant of the fading realization. A connection is demonstrated between the asymptotic behavior of channel capacity in this regime and the asymptotic behavior of the prediction error incurred in predicting the fading process from very noisy observations of its past. This connection can be viewed as the low signal-to-noise ratio (SNR) analog of recent results by Lapidoth & Moser and by Lapidoth demonstrating connections between the high SNR capacity growth and the noiseless or almost-noiseless prediction error. We distinguish between two families of fading laws: the ``slowly forgetting'' and the ``quickly forgetting''. For channels in the former category the low SNR capacity is achieved by IID inputs, whereas in the latter such inputs are typically sub-optimal. Instead, the asymptotic capacity can be approached by inputs with IID phase but block-constant magnitude.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 23:29:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Wang", "Ligong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604032
Martin Ziegler
Martin Ziegler and Klaus Meer
Real Computational Universality: The Word Problem for a class of groups with infinite presentation
corrected Section 4.5
null
null
null
cs.LO cs.SC
null
The word problem for discrete groups is well-known to be undecidable by a Turing Machine; more precisely, it is reducible both to and from and thus equivalent to the discrete Halting Problem. The present work introduces and studies a real extension of the word problem for a certain class of groups which are presented as quotient groups of a free group and a normal subgroup. Most important, the free group will be generated by an uncountable set of generators with index running over certain sets of real numbers. This allows to include many mathematically important groups which are not captured in the framework of the classical word problem. Our contribution extends computational group theory from the discrete to the Blum-Shub-Smale (BSS) model of real number computation. We believe this to be an interesting step towards applying BSS theory, in addition to semi-algebraic geometry, also to further areas of mathematics. The main result establishes the word problem for such groups to be not only semi-decidable (and thus reducible FROM) but also reducible TO the Halting Problem for such machines. It thus provides the first non-trivial example of a problem COMPLETE, that is, computationally universal for this model.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 23:57:46 GMT" }, { "version": "v2", "created": "Tue, 11 Apr 2006 11:38:19 GMT" }, { "version": "v3", "created": "Wed, 7 Jun 2006 07:48:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Ziegler", "Martin", "" ], [ "Meer", "Klaus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0604033
Shuangquan Wang
Shuangquan Wang, Ali Abdi
Statistical Properties of Eigen-Modes and Instantaneous Mutual Information in MIMO Time-Varying Rayleigh Channels
25 pages, 7 figures, 1 table, submitted to IEEE Trans. Inform. Theory, Apr., 2006
null
null
null
cs.IT math.IT
null
In this paper, we study two important metrics in multiple-input multiple-output (MIMO) time-varying Rayleigh flat fading channels. One is the eigen-mode, and the other is the instantaneous mutual information (IMI). Their second-order statistics, such as the correlation coefficient, level crossing rate (LCR), and average fade/outage duration, are investigated, assuming a general nonisotropic scattering environment. Exact closed-form expressions are derived and Monte Carlo simulations are provided to verify the accuracy of the analytical results. For the eigen-modes, we found they tend to be spatio-temporally uncorrelated in large MIMO systems. For the IMI, the results show that its correlation coefficient can be well approximated by the squared amplitude of the correlation coefficient of the channel, under certain conditions. Moreover, we also found the LCR of IMI is much more sensitive to the scattering environment than that of each eigen-mode.
[ { "version": "v1", "created": "Sat, 8 Apr 2006 15:55:21 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Shuangquan", "" ], [ "Abdi", "Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604034
David Eppstein
David Eppstein
Squarepants in a Tree: Sum of Subtree Clustering and Hyperbolic Pants Decomposition
22 pages, 14 figures. This version replaces the proof of what is now Lemma 5.2, as the previous proof was erroneous
ACM Trans. Algorithms 5(3): 29, 2009
10.1145/1541885.1541890
null
cs.CG
null
We provide efficient constant factor approximation algorithms for the problems of finding a hierarchical clustering of a point set in any metric space, minimizing the sum of minimimum spanning tree lengths within each cluster, and in the hyperbolic or Euclidean planes, minimizing the sum of cluster perimeters. Our algorithms for the hyperbolic and Euclidean planes can also be used to provide a pants decomposition, that is, a set of disjoint simple closed curves partitioning the plane minus the input points into subsets with exactly three boundary components, with approximately minimum total length. In the Euclidean case, these curves are squares; in the hyperbolic case, they combine our Euclidean square pants decomposition with our tree clustering method for general metric spaces.
[ { "version": "v1", "created": "Sun, 9 Apr 2006 01:18:29 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2008 04:43:44 GMT" } ]
2009-07-08T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0604035
R N Mohan Professor
R.N.Mohan, Sanpei Kageyama, Moon Ho Lee, Gao Yang
Certain new M-matrices and their properties and applications
21 pages,3 figures
null
null
null
cs.DM
null
The Mn-matrix was defined by Mohan [20] in which he has shown a method of constructing (1,-1)-matrices and studied some of their properties. The (1,-1)-matrices were constructed and studied by Cohn [5],Wang [33], Ehrlich [8] and Ehrlich and Zeller[9]. But in this paper, while giving some resemblances of this matrix with Hadamard matrix, and by naming it as M-matrix, we show how to construct partially balanced incomplete block (PBIB) designs and some regular bipartite graphs by it. We have considered two types of these M- matrices. Also we will make a mention of certain applications of these M-matrices in signal and communication processing, and network systems and end with some open problems.
[ { "version": "v1", "created": "Sun, 9 Apr 2006 06:02:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Kageyama", "Sanpei", "" ], [ "Lee", "Moon Ho", "" ], [ "Yang", "Gao", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0604036
Jakob Vo{\ss}
Jakob Voss
Collaborative thesaurus tagging the Wikipedia way
7 pages, 7 figures, 7 tables; v2 with added appendix and fixed references
null
null
null
cs.IR cs.DL
null
This paper explores the system of categories that is used to classify articles in Wikipedia. It is compared to collaborative tagging systems like del.icio.us and to hierarchical classification like the Dewey Decimal Classification (DDC). Specifics and commonalitiess of these systems of subject indexing are exposed. Analysis of structural and statistical properties (descriptors per record, records per descriptor, descriptor levels) shows that the category system of Wikimedia is a thesaurus that combines collaborative tagging and hierarchical subject indexing in a special way.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 12:04:29 GMT" }, { "version": "v2", "created": "Thu, 27 Apr 2006 00:41:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Voss", "Jakob", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0604037
Oren Weimann
Erik D. Demaine, Shay Mozes, Benjamin Rossman, Oren Weimann
An O(n^3)-Time Algorithm for Tree Edit Distance
10 pages, 5 figures, 5 .tex files where TED.tex is the main one
ACM Transactions on Algorithms 6(1): (2009)
10.1145/1644015.1644017
null
cs.DS
null
The {\em edit distance} between two ordered trees with vertex labels is the minimum cost of transforming one tree into the other by a sequence of elementary operations consisting of deleting and relabeling existing nodes, as well as inserting new nodes. In this paper, we present a worst-case $O(n^3)$-time algorithm for this problem, improving the previous best $O(n^3\log n)$-time algorithm~\cite{Klein}. Our result requires a novel adaptive strategy for deciding how a dynamic program divides into subproblems (which is interesting in its own right), together with a deeper understanding of the previous algorithms for the problem. We also prove the optimality of our algorithm among the family of \emph{decomposition strategy} algorithms--which also includes the previous fastest algorithms--by tightening the known lower bound of $\Omega(n^2\log^2 n)$~\cite{Touzet} to $\Omega(n^3)$, matching our algorithm's running time. Furthermore, we obtain matching upper and lower bounds of $\Theta(n m^2 (1 + \log \frac{n}{m}))$ when the two trees have different sizes $m$ and~$n$, where $m < n$.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 00:39:11 GMT" }, { "version": "v2", "created": "Tue, 11 Apr 2006 21:06:17 GMT" }, { "version": "v3", "created": "Wed, 19 Apr 2006 06:19:35 GMT" } ]
2010-12-01T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Mozes", "Shay", "" ], [ "Rossman", "Benjamin", "" ], [ "Weimann", "Oren", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0604038
Evgueni Petrov
E. Petrov, Yu. Kostov, E. Botoeva
UniCalc.LIN: a linear constraint solver for the UniCalc system
rejected by the programm committee of the conforence on Perspective of System Informatics held in Novosibirsk, Russian Federation July 2006
null
null
null
cs.MS cs.AI
null
In this short paper we present a linear constraint solver for the UniCalc system, an environment for reliable solution of mathematical modeling problems.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 06:30:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Petrov", "E.", "" ], [ "Kostov", "Yu.", "" ], [ "Botoeva", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0604039
Laurent Mazet PhD
David Bateman, Laurent Mazet, Veronique Buzenac-Settineri and Markus Muck
A Fixed-Point Type for Octave
5 pages, 1 figure
null
null
octave2006/12
cs.MS
null
This paper announces the availability of a fixed point toolbox for the Matlab compatible software package Octave. This toolbox is released under the GNU Public License, and can be used to model the losses in algorithms implemented in hardware. Furthermore, this paper presents as an example of the use of this toolbox, the effects of a fixed point implementation on the precision of an OFDM modulator.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 08:22:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Bateman", "David", "" ], [ "Mazet", "Laurent", "" ], [ "Buzenac-Settineri", "Veronique", "" ], [ "Muck", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0604040
Nan Liu
Nan Liu and Sennur Ulukus
Optimal Distortion-Power Tradeoffs in Sensor Networks: Gauss-Markov Random Processes
6 pages, 0 figure, to appear in ICC 2006
null
null
null
cs.IT math.IT
null
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements from an underlying random process, code and transmit those measurement samples to a collector node in a cooperative multiple access channel with feedback, and reconstruct the entire random process at the collector node. We provide lower and upper bounds for the minimum achievable expected distortion when the underlying random process is stationary and Gaussian. In the case where the random process is also Markovian, we evaluate the lower and upper bounds explicitly and show that they are of the same order for a wide range of sum power constraints. Thus, for a Gauss-Markov random process, under these sum power constraints, we determine the achievability scheme that is order-optimal, and express the minimum achievable expected distortion as a function of the sum power constraint.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 16:48:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604041
R.N.Mohan Professor
R.N.Mohan, Moon Ho Lee, and Subash Pokreal
On Orthogonality of Latin Squares
29 pages
null
null
null
cs.DM
null
An arrangement of s elements in s rows and s columns, such that no element repeats more than once in each row and each column is called a Latin square of order s. If two Latin squares of the same order superimposed one on the other and in the resultant array if each ordered pair occurs once and only once then they are called othogonal Latin Squares. A frequency square is an nxn matrix, such that each element from the list of n elements, occurs t times in each row and in each column. These two concepts lead to a new third concept called as t orthogonal latin squares, where from a set of m orthogonal Latin squares, if t orthogonal Latin squares are superimposed and each ordered t tuple in the resultant array occurs once and only once then it is t othogonal Latin square. In this paper it is proposed to construct such t othogonal latin squares
[ { "version": "v1", "created": "Tue, 11 Apr 2006 02:54:04 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 09:25:59 GMT" } ]
2011-11-09T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ], [ "Pokreal", "Subash", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0604042
Florentin Smarandache
M. C. Florea, J. Dezert, P. Valin, F. Smarandache, Anne-Laure Jousselme
Adaptative combination rule and proportional conflict redistribution rule for information fusion
Presented at Cogis '06 Conference, Paris, March 2006
null
null
null
cs.AI
null
This paper presents two new promising rules of combination for the fusion of uncertain and potentially highly conflicting sources of evidences in the framework of the theory of belief functions in order to palliate the well-know limitations of Dempster's rule and to work beyond the limits of applicability of the Dempster-Shafer theory. We present both a new class of adaptive combination rules (ACR) and a new efficient Proportional Conflict Redistribution (PCR) rule allowing to deal with highly conflicting sources for static and dynamic fusion applications.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:35:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Florea", "M. C.", "" ], [ "Dezert", "J.", "" ], [ "Valin", "P.", "" ], [ "Smarandache", "F.", "" ], [ "Jousselme", "Anne-Laure", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0604043
Thomas Way
Thomas P. Way and Lori L. Pollock
Demand-driven Inlining in a Region-based Optimizer for ILP Architectures
23 pages
null
null
null
cs.DC cs.PL
null
Region-based compilation repartitions a program into more desirable compilation units using profiling information and procedure inlining to enable region formation analysis. Heuristics play a key role in determining when it is most beneficial to inline procedures during region formation. An ILP optimizing compiler using a region-based approach restructures a program to better reflect dynamic behavior and increase interprocedural optimization and scheduling opportunities. This paper presents an interprocedural compilation technique which performs procedure inlining on-demand, rather than as a separate phase, to improve the ability of a region-based optimizer to control code growth, compilation time and memory usage while improving performance. The interprocedural region formation algorithm utilizes a demand-driven, heuristics-guided approach to inlining, restructuring an input program into interprocedural regions. Experimental results are presented to demonstrate the impact of the algorithm and several inlining heuristics upon a number of traditional and novel compilation characteristics within a region-based ILP compiler and simulator.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 04:15:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Way", "Thomas P.", "" ], [ "Pollock", "Lori L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0604044
R.N.Mohan Professor
R.N.Mohan, Moon Ho Lee, and Ram Paudal
A new M-matrix of Type III, its properties and applications
12 pages, one figure
null
null
null
cs.DM
null
Some binary matrices like (1,-1) and (1,0) were studied by many authors like Cohn, Wang, Ehlich and Ehlich and Zeller, and Mohan, Kageyama, Lee, and Gao. In this recent paper by Mohan et al considered the M-matrices of Type I and II by studying some of their properties and applications. In the present paper they discussed the M-matrices of Type III, and studied their properties and applications. They gave some constructions of SPBIB designs and some corresponding M-graphs, which are being constructed by it. This is the continuation of our earlier research work in this direction, and these papers establish the importance of non-orthogonal matrices as well.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 04:21:14 GMT" } ]
2011-11-09T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ], [ "Paudal", "Ram", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0604045
Sandor P. Fekete
Sandor P. Fekete and Joerg Schepers and Jan C. van der Veen
An exact algorithm for higher-dimensional orthogonal packing
31 pages, 6 figures, 9 tables, to appear in Operations Research; full and updated journal version of sketches that appeared as parts of an extended abstract in ESA'97
null
null
null
cs.DS
null
Higher-dimensional orthogonal packing problems have a wide range of practical applications, including packing, cutting, and scheduling. Combining the use of our data structure for characterizing feasible packings with our new classes of lower bounds, and other heuristics, we develop a two-level tree search algorithm for solving higher-dimensional packing problems to optimality. Computational results are reported, including optimal solutions for all two--dimensional test problems from recent literature. This is the third in a series of articles describing new approaches to higher-dimensional packing; see cs.DS/0310032 and cs.DS/0402044.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 13:55:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Fekete", "Sandor P.", "" ], [ "Schepers", "Joerg", "" ], [ "van der Veen", "Jan C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0604046
Michael Aupetit
Dominique Lepetz, Max Nemoz-Gaillard and Michael Aupetit
Concerning the differentiability of the energy function in vector quantization algorithms
Under submission to a peer-reviewed international journal
null
null
null
cs.LG cs.NE
null
The adaptation rule for Vector Quantization algorithms, and consequently the convergence of the generated sequence, depends on the existence and properties of a function called the energy function, defined on a topological manifold. Our aim is to investigate the conditions of existence of such a function for a class of algorithms examplified by the initial ''K-means'' and Kohonen algorithms. The results presented here supplement previous studies and show that the energy function is not always a potential but at least the uniform limit of a series of potential functions which we call a pseudo-potential. Our work also shows that a large number of existing vector quantization algorithms developped by the Artificial Neural Networks community fall into this category. The framework we define opens the way to study the convergence of all the corresponding adaptation rules at once, and a theorem gives promising insights in that direction. We also demonstrate that the ''K-means'' energy function is a pseudo-potential but not a potential in general. Consequently, the energy function associated to the ''Neural-Gas'' is not a potential in general.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:00:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Lepetz", "Dominique", "" ], [ "Nemoz-Gaillard", "Max", "" ], [ "Aupetit", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0604047
rapha?l Jungers
Rapha\"el Jungers, Vladimir Protasov, Vincent D. Blondel
Efficient algorithms for deciding the type of growth of products of integer matrices
20 pages, 4 figures, submitted to LAA
null
null
null
cs.CC
null
For a given finite set $\Sigma$ of matrices with nonnegative integer entries we study the growth of $$ \max_t(\Sigma) = \max\{\|A_{1}... A_{t}\|: A_i \in \Sigma\}.$$ We show how to determine in polynomial time whether the growth with $t$ is bounded, polynomial, or exponential, and we characterize precisely all possible behaviors.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 14:10:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Jungers", "Raphaël", "" ], [ "Protasov", "Vladimir", "" ], [ "Blondel", "Vincent D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0604048
Vita Hinze-Hoare
Vita Hinze-Hoare
Will the Butterfly Cipher keep your Network Data secure? Developments in Computer Encryption
null
null
null
null
cs.CR
null
This paper explains the recent developments in security and encryption. The Butterfly cipher and quantum cryptography are reviewed and compared. Examples of their relative uses are discussed and suggestions for future developments considered. In addition application to network security together with a substantial review of classification of encryption systems and a summary of security weaknesses are considered.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 20:21:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hinze-Hoare", "Vita", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0604049
Vignesh Sethuraman
Vignesh Sethuraman, Bruce Hajek
Low SNR Capacity of Fading Channels with Peak and Average Power Constraints
13 pages, version without proofs submitted to ISIT 2006
null
null
null
cs.IT math.IT
null
Flat-fading channels that are correlated in time are considered under peak and average power constraints. For discrete-time channels, a new upper bound on the capacity per unit time is derived. A low SNR analysis of a full-scattering vector channel is used to derive a complimentary lower bound. Together, these bounds allow us to identify the exact scaling of channel capacity for a fixed peak to average ratio, as the average power converges to zero. The upper bound is also asymptotically tight as the average power converges to zero for a fixed peak power. For a continuous time infinite bandwidth channel, Viterbi identified the capacity for M-FSK modulation. Recently, Zhang and Laneman showed that the capacity can be achieved with non-bursty signaling (QPSK). An additional contribution of this paper is to obtain similar results under peak and average power constraints.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 23:02:57 GMT" }, { "version": "v2", "created": "Thu, 13 Apr 2006 03:40:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Hajek", "Bruce", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0604050
R.N.Mohan Professor
R.N.Mohan
On Hadamard Conjecture
null
null
null
null
cs.DM
null
In this note, while giving an overview of the state of art of the well known Hadamard conjecture, which is more than a century old and now it has been established by using the methods given in the two papers by Mohan et al [6,7].
[ { "version": "v1", "created": "Wed, 12 Apr 2006 01:34:56 GMT" } ]
2011-11-09T00:00:00
[ [ "Mohan", "R. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0604051
Michael Brinkmeier
Michael Brinkmeier
Structural Alignments of pseudo-knotted RNA-molecules in polynomial time
16 pages
null
null
null
cs.DS cs.CC cs.DM
null
An RNA molecule is structured on several layers. The primary and most obvious structure is its sequence of bases, i.e. a word over the alphabet {A,C,G,U}. The higher structure is a set of one-to-one base-pairings resulting in a two-dimensional folding of the one-dimensional sequence. One speaks of a secondary structure if these pairings do not cross and of a tertiary structure otherwise. Since the folding of the molecule is important for its function, the search for related RNA molecules should not only be restricted to the primary structure. It seems sensible to incorporate the higher structures in the search. Based on this assumption and certain edit-operations a distance between two arbitrary structures can be defined. It is known that the general calculation of this measure is NP-complete \cite{zhang02similarity}. But for some special cases polynomial algorithms are known. Using a new formal description of secondary and tertiary structures, we extend the class of structures for which the distance can be calculated in polynomial time. In addition the presented algorithm may be used to approximate the edit-distance between two arbitrary structures with a constant ratio.
[ { "version": "v1", "created": "Wed, 12 Apr 2006 06:46:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Brinkmeier", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0604052
Tentyukov Mikhail
M. Tentyukov and J.A.M. Vermaseren
Extension of the functionality of the symbolic program FORM by external software
36 pages, 2 Encapsulated postscript figures, LaTeX2e, uses elsart.cls (included)
Comput.Phys.Commun.176:385-405,2007
10.1016/j.cpc.2006.11.007
SFB/CPP-06-15, TTP06-12, NIKHEF 06-002
cs.SC hep-ph
null
We describe the implementation of facilities for the communication with external resources in the Symbolic Manipulation System FORM. This is done according to the POSIX standards defined for the UNIX operating system. We present a number of examples that illustrate the increased power due to these new capabilities.
[ { "version": "v1", "created": "Wed, 12 Apr 2006 16:03:03 GMT" }, { "version": "v2", "created": "Fri, 21 Apr 2006 19:07:01 GMT" } ]
2008-11-26T00:00:00
[ [ "Tentyukov", "M.", "" ], [ "Vermaseren", "J. A. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "hep-ph", "description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.", "span": "(High Energy Physics - Phenomenology)" } ]