id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0604053
|
Maciej Kurant
|
Maciej Kurant, Patrick Thiran
|
Survivable Routing in IP-over-WDM Networks in the Presence of Multiple
Failures
|
8 pages, 6 figures
| null | null | null |
cs.NI
| null |
Failure restoration at the IP layer in IP-over-WDM networks requires to map
the IP topology on the WDM topology in such a way that a failure at the WDM
layer leaves the IP topology connected. Such a mapping is called $survivable$.
As finding a survivable mapping is known to be NP-complete, in practice it
requires a heuristic approach. We have introduced in [1] a novel algorithm
called ``SMART'', that is more effective and scalable than the heuristics known
to date. Moreover, the formal analysis of SMART [2] has led to new
applications: the formal verification of the existence of a survivable mapping,
and a tool tracing and repairing the vulnerable areas of the network. In this
paper we extend the theoretical analysis in [2] by considering $multiple
failures$.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2006 17:10:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kurant",
"Maciej",
""
],
[
"Thiran",
"Patrick",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0604054
|
Maria Paola Bonacina
|
Alessandro Armando, Maria Paola Bonacina, Silvio Ranise, Stephan
Schulz
|
New results on rewrite-based satisfiability procedures
|
To appear in the ACM Transactions on Computational Logic, 49 pages
|
ACM Transactions on Computational Logic, 10(1):129-179, January
2009
|
10.1145/1459010.1459014
|
RR 36/2005
|
cs.AI cs.LO
| null |
Program analysis and verification require decision procedures to reason on
theories of data structures. Many problems can be reduced to the satisfiability
of sets of ground literals in theory T. If a sound and complete inference
system for first-order logic is guaranteed to terminate on T-satisfiability
problems, any theorem-proving strategy with that system and a fair search plan
is a T-satisfiability procedure. We prove termination of a rewrite-based
first-order engine on the theories of records, integer offsets, integer offsets
modulo and lists. We give a modularity theorem stating sufficient conditions
for termination on a combinations of theories, given termination on each. The
above theories, as well as others, satisfy these conditions. We introduce
several sets of benchmarks on these theories and their combinations, including
both parametric synthetic benchmarks to test scalability, and real-world
problems to test performances on huge sets of literals. We compare the
rewrite-based theorem prover E with the validity checkers CVC and CVC Lite.
Contrary to the folklore that a general-purpose prover cannot compete with
reasoners with built-in theories, the experiments are overall favorable to the
theorem prover, showing that not only the rewriting approach is elegant and
conceptually simple, but has important practical implications.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2006 19:53:24 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Nov 2006 19:54:27 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Jun 2007 17:15:23 GMT"
},
{
"version": "v4",
"created": "Sun, 1 Jun 2008 02:02:27 GMT"
}
] | 2015-02-11T00:00:00 |
[
[
"Armando",
"Alessandro",
""
],
[
"Bonacina",
"Maria Paola",
""
],
[
"Ranise",
"Silvio",
""
],
[
"Schulz",
"Stephan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0604055
|
Roman Vershynin
|
Roman Vershynin
|
Beyond Hirsch Conjecture: walks on random polytopes and smoothed
complexity of the simplex method
|
39 pages, 3 figures. Final version. Parts of the argument are
reorganized to make the paper more transparent. Figures added. Small mistakes
and typos corrected
|
SIAM Journal on Computing 39 (2009), 646--678. Conference version
in: FOCS'06, 133--142
| null | null |
cs.DS math.FA
| null |
The smoothed analysis of algorithms is concerned with the expected running
time of an algorithm under slight random perturbations of arbitrary inputs.
Spielman and Teng proved that the shadow-vertex simplex method has polynomial
smoothed complexity. On a slight random perturbation of an arbitrary linear
program, the simplex method finds the solution after a walk on polytope(s) with
expected length polynomial in the number of constraints n, the number of
variables d and the inverse standard deviation of the perturbation 1/sigma.
We show that the length of walk in the simplex method is actually
polylogarithmic in the number of constraints n. Spielman-Teng's bound on the
walk was O(n^{86} d^{55} sigma^{-30}), up to logarithmic factors. We improve
this to O(log^7 n (d^9 + d^3 \s^{-4})). This shows that the tight Hirsch
conjecture n-d on the length of walk on polytopes is not a limitation for the
smoothed Linear Programming. Random perturbations create short paths between
vertices.
We propose a randomized phase-I for solving arbitrary linear programs, which
is of independent interest. Instead of finding a vertex of a feasible set, we
add a vertex at random to the feasible set. This does not affect the solution
of the linear program with constant probability. This overcomes one of the
major difficulties of smoothed analysis of the simplex method -- one can now
statistically decouple the walk from the smoothed linear program. This yields a
much better reduction of the smoothed complexity to a geometric quantity -- the
size of planar sections of random polytopes. We also improve upon the known
estimates for that size, showing that it is polylogarithmic in the number of
vertices.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2006 22:36:59 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jun 2006 13:15:07 GMT"
},
{
"version": "v3",
"created": "Wed, 30 Apr 2008 23:13:47 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Vershynin",
"Roman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
cs/0604056
|
Woonchul Ham
|
Woonchul Ham, Kemin Zhou
|
A Short Note on The Volume of Hypersphere
| null | null | null | null |
cs.IT math.IT
| null |
In this note, a new method for deriving the volume of hypersphere is proposed
by using probability theory. The explicit expression of the multiple times
convolution of the probability density functions we should use is very
complicated. But in here, we don't need its whole explicit expression. We just
need the only a part of information and this fact make it possible to derive
the general expression of the voulume of hypersphere. We also comments about
the paradox in the hypersphere which was introduced by R.W.Hamming.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 02:31:39 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ham",
"Woonchul",
""
],
[
"Zhou",
"Kemin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604057
|
R.N.Mohan Professor
|
R.N.Mohan and P.T.Kulkarni
|
A New Fault-Tolerant M-network and its Analysis
| null | null | null | null |
cs.IT math.IT
| null |
This paper introduces a new class of efficient inter connection networks
called as M-graphs for large multi-processor systems.The concept of M-matrix
and M-graph is an extension of Mn-matrices and Mn-graphs.We analyze these
M-graphs regarding their suitability for large multi-processor systems. An(p,N)
M-graph consists of N nodes, where p is the degree of each node.The topology is
found to be having many attractive features prominent among them is the
capability of maximal fault-tolerance, high density and constant diameter.It is
found that these combinatorial structures exibit some properties like
symmetry,and an inter-relation with the nodes, and degree of the concerned
graph, which can be utilized for the purposes of inter connected networks.But
many of the properties of these mathematical and graphical structures still
remained unexplored and the present aim of the paper is to study and analyze
some of the properties of these M-graphs and explore their application in
networks and multi-processor systems.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 03:22:24 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mohan",
"R. N.",
""
],
[
"Kulkarni",
"P. T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604058
|
Yury Lifshits
|
Yury Lifshits
|
Solving Classical String Problems on Compressed Texts
|
10 pages, 6 figures, submitted
| null | null | null |
cs.DS cs.CC
| null |
Here we study the complexity of string problems as a function of the size of
a program that generates input. We consider straight-line programs (SLP), since
all algorithms on SLP-generated strings could be applied to processing
LZ-compressed texts.
The main result is a new algorithm for pattern matching when both a text T
and a pattern P are presented by SLPs (so-called fully compressed pattern
matching problem). We show how to find a first occurrence, count all
occurrences, check whether any given position is an occurrence or not in time
O(n^2m). Here m,n are the sizes of straight-line programs generating
correspondingly P and T.
Then we present polynomial algorithms for computing fingerprint table and
compressed representation of all covers (for the first time) and for finding
periods of a given compressed string (our algorithm is faster than previously
known). On the other hand, we show that computing the Hamming distance between
two SLP-generated strings is NP- and coNP-hard.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 08:12:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lifshits",
"Yury",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0604059
|
Olivier Devillers
|
Olivier Devillers (INRIA Sophia Antipolis), Philippe Guigue (INRIA
Sophia Antipolis)
|
Inner and Outer Rounding of Boolean Operations on Lattice Polygonal
Regions
| null | null | null | null |
cs.CG
| null |
Robustness problems due to the substitution of the exact computation on real
numbers by the rounded floating point arithmetic are often an obstacle to
obtain practical implementation of geometric algorithms. If the adoption of the
--exact computation paradigm--[Yap et Dube] gives a satisfactory solution to
this kind of problems for purely combinatorial algorithms, this solution does
not allow to solve in practice the case of algorithms that cascade the
construction of new geometric objects. In this report, we consider the problem
of rounding the intersection of two polygonal regions onto the integer lattice
with inclusion properties. Namely, given two polygonal regions A and B having
their vertices on the integer lattice, the inner and outer rounding modes
construct two polygonal regions with integer vertices which respectively is
included and contains the true intersection. We also prove interesting results
on the Hausdorff distance, the size and the convexity of these polygonal
regions.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 14:33:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Devillers",
"Olivier",
"",
"INRIA Sophia Antipolis"
],
[
"Guigue",
"Philippe",
"",
"INRIA\n Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0604060
|
Alexandre Sedoglavic
|
\'Evelyne Hubert (INRIA Sophia Antipolis), Alexandre Sedoglavic (INRIA
Futurs, LIFL)
|
Polynomial Time Nondimensionalisation of Ordinary Differential Equations
via their Lie Point Symmetries
| null | null | null | null |
cs.SC
| null |
Lie group theory states that knowledge of a $m$-parameters solvable group of
symmetries of a system of ordinary differential equations allows to reduce by
$m$ the number of equation. We apply this principle by finding dilatations and
translations that are Lie point symmetries of considered ordinary differential
system. By rewriting original problem in an invariant coordinates set for these
symmetries, one can reduce the involved number of parameters. This process is
classically call nondimensionalisation in dimensional analysis. We present an
algorithm based on this standpoint and show that its arithmetic complexity is
polynomial in input's size.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 14:35:00 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Hubert",
"Évelyne",
"",
"INRIA Sophia Antipolis"
],
[
"Sedoglavic",
"Alexandre",
"",
"INRIA\n Futurs, LIFL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0604061
|
Edwin Henneken
|
Edwin A. Henneken, Michael J. Kurtz, Guenther Eichhorn, Alberto
Accomazzi, Carolyn Grant, Donna Thompson, Stephen S. Murray
|
Effect of E-printing on Citation Rates in Astronomy and Physics
|
Submitted to the Journal of Electronic Publishing. 11 pages with 5
figures
| null | null | null |
cs.DL astro-ph
| null |
In this report we examine the change in citation behavior since the
introduction of the arXiv e-print repository (Ginsparg, 2001). It has been
observed that papers that initially appear as arXiv e-prints get cited more
than papers that do not (Lawrence, 2001; Brody et al., 2004; Schwarz &
Kennicutt, 2004; Kurtz et al., 2005a, Metcalfe, 2005). Using the citation
statistics from the NASA-Smithsonian Astrophysics Data System (ADS; Kurtz et
al., 1993, 2000), we confirm the findings from other studies, we examine the
average citation rate to e-printed papers in the Astrophysical Journal, and we
show that for a number of major astronomy and physics journals the most
important papers are submitted to the arXiv e-print repository first.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 22:02:05 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jun 2006 11:47:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Henneken",
"Edwin A.",
""
],
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn",
""
],
[
"Thompson",
"Donna",
""
],
[
"Murray",
"Stephen S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null
] |
cs/0604062
|
Liang Wu
|
Liang Wu
|
Biologically Inspired Hierarchical Model for Feature Extraction and
Localization
|
4 pages, 4 figures
| null | null | null |
cs.CV
| null |
Feature extraction and matching are among central problems of computer
vision. It is inefficent to search features over all locations and scales.
Neurophysiological evidence shows that to locate objects in a digital image the
human visual system employs visual attention to a specific object while
ignoring others. The brain also has a mechanism to search from coarse to fine.
In this paper, we present a feature extractor and an associated hierarchical
searching model to simulate such processes. With the hierarchical
representation of the object, coarse scanning is done through the matching of
the larger scale and precise localization is conducted through the matching of
the smaller scale. Experimental results justify the proposed model in its
effectiveness and efficiency to localize features.
|
[
{
"version": "v1",
"created": "Fri, 14 Apr 2006 04:40:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wu",
"Liang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0604063
|
Yi Hong Dr
|
Yi Hong, Emanuele Viterbo, and Jean-Claude Belfiore
|
Golden Space-Time Trellis Coded Modulation
|
33 pages, 13 figures
| null | null | null |
cs.IT math.IT
| null |
In this paper, we present a concatenated coding scheme for a high rate
$2\times 2$ multiple-input multiple-output (MIMO) system over slow fading
channels. The inner code is the Golden code \cite{Golden05} and the outer code
is a trellis code. Set partitioning of the Golden code is designed specifically
to increase the minimum determinant. The branches of the outer trellis code are
labeled with these partitions. Viterbi algorithm is applied for trellis
decoding. In order to compute the branch metrics a lattice sphere decoder is
used. The general framework for code optimization is given. The performance of
the proposed concatenated scheme is evaluated by simulation. It is shown that
the proposed scheme achieves significant performance gains over uncoded Golden
code.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2006 09:08:41 GMT"
},
{
"version": "v2",
"created": "Tue, 23 May 2006 09:53:20 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Jan 2007 00:33:19 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Hong",
"Yi",
""
],
[
"Viterbo",
"Emanuele",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604064
|
Mirco Mannucci Ph.D.
|
Mirco A. Mannucci
|
Quantum Fuzzy Sets: Blending Fuzzy Set Theory and Quantum Computation
|
12 pages
| null | null | null |
cs.LO cs.AI
| null |
In this article we investigate a way in which quantum computing can be used
to extend the class of fuzzy sets. The core idea is to see states of a quantum
register as characteristic functions of quantum fuzzy subsets of a given set.
As the real unit interval is embedded in the Bloch sphere, every fuzzy set is
automatically a quantum fuzzy set. However, a generic quantum fuzzy set can be
seen as a (possibly entangled) superposition of many fuzzy sets at once,
offering new opportunities for modeling uncertainty. After introducing the main
framework of quantum fuzzy set theory, we analyze the standard operations of
fuzzification and defuzzification from our viewpoint. We conclude this
preliminary paper with a list of possible applications of quantum fuzzy sets to
pattern recognition, as well as future directions of pure research in quantum
fuzzy set theory.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2006 16:23:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mannucci",
"Mirco A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0604065
|
Vincent Limouzy
|
Binh-Minh Bui-Xuan (LIRMM), Michel Habib (LIAFA), Vincent Limouzy
(LIAFA), Fabien De Montgolfier (LIAFA)
|
Unifying two Graph Decompositions with Modular Decomposition
|
Soumis \`a ISAAC 2007
|
Dans Lecture Notes in Computer Science - International Symposium
on Algorithms and Computation (ISAAC, Sendai : Japon (2007)
|
10.1007/978-3-540-77120-3
| null |
cs.DS
| null |
We introduces the umodules, a generalisation of the notion of graph module.
The theory we develop captures among others undirected graphs, tournaments,
digraphs, and $2-$structures. We show that, under some axioms, a unique
decomposition tree exists for umodules. Polynomial-time algorithms are provided
for: non-trivial umodule test, maximal umodule computation, and decomposition
tree computation when the tree exists. Our results unify many known
decomposition like modular and bi-join decomposition of graphs, and a new
decomposition of tournaments.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2006 19:41:38 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Sep 2006 12:10:31 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Jun 2007 17:57:45 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Bui-Xuan",
"Binh-Minh",
"",
"LIRMM"
],
[
"Habib",
"Michel",
"",
"LIAFA"
],
[
"Limouzy",
"Vincent",
"",
"LIAFA"
],
[
"De Montgolfier",
"Fabien",
"",
"LIAFA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0604066
|
Elias Tsigaridas
|
Elias P. Tsigaridas and Ioannis Z. Emiris
|
Univariate polynomial real root isolation: Continued Fractions revisited
|
12 pages
| null | null | null |
cs.SC cs.CC cs.MS
| null |
We present algorithmic, complexity and implementation results concerning real
root isolation of integer univariate polynomials using the continued fraction
expansion of real algebraic numbers. One motivation is to explain the method's
good performance in practice. We improve the previously known bound by a factor
of $d \tau$, where $d$ is the polynomial degree and $\tau$ bounds the
coefficient bitsize, thus matching the current record complexity for real root
isolation by exact methods. Namely, the complexity bound is $\sOB(d^4 \tau^2)$
using the standard bound on the expected bitsize of the integers in the
continued fraction expansion. We show how to compute the multiplicities within
the same complexity and extend the algorithm to non square-free polynomials.
Finally, we present an efficient open-source \texttt{C++} implementation in the
algebraic library \synaps, and illustrate its efficiency as compared to other
available software. We use polynomials with coefficient bitsize up to 8000 and
degree up to 1000.
|
[
{
"version": "v1",
"created": "Mon, 17 Apr 2006 10:52:35 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Tsigaridas",
"Elias P.",
""
],
[
"Emiris",
"Ioannis Z.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0604067
|
R.N.Mohan Professor
|
R.N.Mohan, Moon Ho Lee, Subhash Pokrel
|
Certain t-partite graphs
| null | null | null | null |
cs.DM
| null |
By making use of the generalized concept of orthogonality in Latin squares,
certain t-partite graphs have been constructed and a suggestion for a net work
system and some applications have been made.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2006 09:30:55 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2006 00:11:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mohan",
"R. N.",
""
],
[
"Lee",
"Moon Ho",
""
],
[
"Pokrel",
"Subhash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604068
|
Christian Klein
|
Benjamin Doerr and Tobias Friedrich and Christian Klein and Ralf
Osbild
|
Unbiased Matrix Rounding
|
10th Scandinavian Workshop on Algorithm Theory (SWAT), 2006, to
appear
| null | null | null |
cs.DS cs.DM
| null |
We show several ways to round a real matrix to an integer one such that the
rounding errors in all rows and columns as well as the whole matrix are less
than one. This is a classical problem with applications in many fields, in
particular, statistics.
We improve earlier solutions of different authors in two ways. For rounding
matrices of size $m \times n$, we reduce the runtime from $O((m n)^2 Second,
our roundings also have a rounding error of less than one in all initial
intervals of rows and columns. Consequently, arbitrary intervals have an error
of at most two. This is particularly useful in the statistics application of
controlled rounding.
The same result can be obtained via (dependent) randomized rounding. This has
the additional advantage that the rounding is unbiased, that is, for all
entries $y_{ij}$ of our rounding, we have $E(y_{ij}) = x_{ij}$, where $x_{ij}$
is the corresponding entry of the input matrix.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2006 15:08:37 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Apr 2006 18:25:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Doerr",
"Benjamin",
""
],
[
"Friedrich",
"Tobias",
""
],
[
"Klein",
"Christian",
""
],
[
"Osbild",
"Ralf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604069
|
Neri Merhav
|
Neri Merhav and Meir Feder
|
Universal decoding with an erasure option
|
23 pages. submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Motivated by applications of rateless coding, decision feedback, and ARQ, we
study the problem of universal decoding for unknown channels, in the presence
of an erasure option. Specifically, we harness the competitive minimax
methodology developed in earlier studies, in order to derive a universal
version of Forney's classical erasure/list decoder, which in the erasure case,
optimally trades off between the probability of erasure and the probability of
undetected error. The proposed universal erasure decoder guarantees universal
achievability of a certain fraction $\xi$ of the optimum error exponents of
these probabilities (in a sense to be made precise in the sequel). A
single--letter expression for $\xi$, which depends solely on the coding rate
and the threshold, is provided. The example of the binary symmetric channel is
studied in full detail, and some conclusions are drawn.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2006 16:42:03 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Merhav",
"Neri",
""
],
[
"Feder",
"Meir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604070
|
Yongzhi Cao
|
Yongzhi Cao, Mingsheng Ying, and Guoqing Chen
|
Retraction and Generalized Extension of Computing with Words
|
13 double column pages; 3 figures; to be published in the IEEE
Transactions on Fuzzy Systems
|
IEEE Transactions on Fuzzy Systems, vol. 15(6): 1238-1250, Dec.
2007
|
10.1109/TED.2007.893191
| null |
cs.AI
| null |
Fuzzy automata, whose input alphabet is a set of numbers or symbols, are a
formal model of computing with values. Motivated by Zadeh's paradigm of
computing with words rather than numbers, Ying proposed a kind of fuzzy
automata, whose input alphabet consists of all fuzzy subsets of a set of
symbols, as a formal model of computing with all words. In this paper, we
introduce a somewhat general formal model of computing with (some special)
words. The new features of the model are that the input alphabet only comprises
some (not necessarily all) fuzzy subsets of a set of symbols and the fuzzy
transition function can be specified arbitrarily. By employing the methodology
of fuzzy control, we establish a retraction principle from computing with words
to computing with values for handling crisp inputs and a generalized extension
principle from computing with words to computing with all words for handling
fuzzy inputs. These principles show that computing with values and computing
with all words can be respectively implemented by computing with words. Some
algebraic properties of retractions and generalized extensions are addressed as
well.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 06:28:55 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Nov 2006 01:56:51 GMT"
}
] | 2015-06-25T00:00:00 |
[
[
"Cao",
"Yongzhi",
""
],
[
"Ying",
"Mingsheng",
""
],
[
"Chen",
"Guoqing",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0604071
|
Nuno Santos
|
Nuno Santos, Birger Koblitz
|
Distributed Metadata with the AMGA Metadata Catalog
|
6 pages, 3 figures, to appear in Workshop on Next-Generation
Distributed Data Management - HPDC-15
| null | null | null |
cs.DC cs.DB
| null |
Catalog Services play a vital role on Data Grids by allowing users and
applications to discover and locate the data needed. On large Data Grids, with
hundreds of geographically distributed sites, centralized Catalog Services do
not provide the required scalability, performance or fault-tolerance. In this
article, we start by presenting and discussing the general requirements on Grid
Catalogs of applications being developed by the EGEE user community. This
provides the motivation for the second part of the article, where we present
the replication and distribution mechanisms we have designed and implemented
into the AMGA Metadata Catalog, which is part of the gLite software stack being
developed for the EGEE project. Implementing these mechanisms in the catalog
itself has the advantages of not requiring any special support from the
relational database back-end, of being database independent, and of allowing
tailoring the mechanisms to the specific requirements and characteristics of
Metadata Catalogs.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 10:01:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Santos",
"Nuno",
""
],
[
"Koblitz",
"Birger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0604072
|
Carlos Gershenson
|
Francis Heylighen, Paul Cilliers, and Carlos Gershenson
|
Complexity and Philosophy
|
21 pages
|
In Bogg, J. and R. Geyer (eds.) Complexity, Science and Society.
Radcliffe Publishing, Oxford. 2007.
| null | null |
cs.CC cond-mat.other
| null |
The science of complexity is based on a new way of thinking that stands in
sharp contrast to the philosophy underlying Newtonian science, which is based
on reductionism, determinism, and objective knowledge. This paper reviews the
historical development of this new world view, focusing on its philosophical
foundations. Determinism was challenged by quantum mechanics and chaos theory.
Systems theory replaced reductionism by a scientifically based holism.
Cybernetics and postmodern social science showed that knowledge is
intrinsically subjective. These developments are being integrated under the
header of "complexity science". Its central paradigm is the multi-agent system.
Agents are intrinsically subjective and uncertain about their environment and
future, but out of their local interactions, a global organization emerges.
Although different philosophers, and in particular the postmodernists, have
voiced similar ideas, the paradigm of complexity still needs to be fully
assimilated by philosophy. This will throw a new light on old philosophical
issues such as relativism, ethics and the role of the subject.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 11:12:38 GMT"
}
] | 2008-07-29T00:00:00 |
[
[
"Heylighen",
"Francis",
""
],
[
"Cilliers",
"Paul",
""
],
[
"Gershenson",
"Carlos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
}
] |
cs/0604073
|
Muthiah Annamalai
|
Muthiah Annamalai, Hemant Kumar, Leela Velusamy
|
Octave-GTK: A GTK binding for GNU Octave
|
Comments: Presented at Octave2006 Conference, Washington D.C
| null | null |
Octave2006/02
|
cs.SE
| null |
This paper discusses the problems faced with interoperability between two
programming languages, with respect to GNU Octave, and GTK API written in C, to
provide the GTK API on Octave.Octave-GTK is the fusion of two different API's:
one exported by GNU Octave [scientific computing tool] and the other GTK [GUI
toolkit]; this enables one to use GTK primitives within GNU Octave, to build
graphical front ends,at the same time using octave engine for number crunching
power. This paper illustrates our implementation of binding logic, and shows
results extended to various other libraries using the same base code generator.
Also shown, are methods of code generation, binding automation, and the niche
we plan to fill in the absence of GUI in Octave. Canonical discussion of
advantages, feasibility and problems faced in the process are elucidated.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 16:46:23 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2006 18:43:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Annamalai",
"Muthiah",
""
],
[
"Kumar",
"Hemant",
""
],
[
"Velusamy",
"Leela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0604074
|
Rodrigo de Miguel
|
Rodrigo de Miguel, Ori Shental, Ralf R. Muller and Ido Kanter
|
Information and multiaccess interference in a complexity-constrained
vector channel
|
The author has withdrawn this submission [arXiv admin]
| null |
10.1088/1751-8113/40/20/002
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rodrigo de Miguel et al 2007 J. Phys. A: Math. Theor. 40 5241-5260: A noisy
vector channel operating under a strict complexity constraint at the receiver
is introduced. According to this constraint, detected bits, obtained by
performing hard decisions directly on the channel's matched filter output, must
be the same as the transmitted binary inputs. An asymptotic analysis is carried
out using mathematical tools imported from the study of neural networks, and it
is shown that, under a bounded noise assumption, such complexity-constrained
channel exhibits a non-trivial Shannon-theoretic capacity. It is found that
performance relies on rigorous interference-based multiuser cooperation at the
transmitter and that this cooperation is best served when all transmitters use
the same amplitude.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 17:02:38 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jun 2008 18:12:38 GMT"
},
{
"version": "v3",
"created": "Tue, 19 May 2009 20:51:04 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"de Miguel",
"Rodrigo",
""
],
[
"Shental",
"Ori",
""
],
[
"Muller",
"Ralf R.",
""
],
[
"Kanter",
"Ido",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604075
|
Gyorgy Korniss
|
Qiming Lu, G. Korniss, and Boleslaw K. Szymanski
|
Naming Games in Spatially-Embedded Random Networks
|
We have found a programming error in our code used to generate the
results of the earlier version. We have corrected the error, reran all
simulations, and regenerated all data plots. While the qualitative behavior
of the model has not changed, the numerical values of some of the scaling
exponents did. 7 figures
|
Proceedings of the 2006 American Association for Artificial
Intelligence Fall Symposium Series, Interaction and Emergent Phenomena in
Societies of Agents (AAAI Press, Menlo Park, CA 2006) pp. 148-155
| null | null |
cs.MA cond-mat.stat-mech cs.AI
| null |
We investigate a prototypical agent-based model, the Naming Game, on random
geometric networks. The Naming Game is a minimal model, employing local
communications that captures the emergence of shared communication schemes
(languages) in a population of autonomous semiotic agents. Implementing the
Naming Games on random geometric graphs, local communications being local
broadcasts, serves as a model for agreement dynamics in large-scale,
autonomously operating wireless sensor networks. Further, it captures essential
features of the scaling properties of the agreement process for
spatially-embedded autonomous agents. We also present results for the case when
a small density of long-range communication links are added on top of the
random geometric graph, resulting in a "small-world"-like network and yielding
a significantly reduced time to reach global agreement.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 17:48:11 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 21:35:33 GMT"
},
{
"version": "v3",
"created": "Mon, 7 May 2007 21:10:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lu",
"Qiming",
""
],
[
"Korniss",
"G.",
""
],
[
"Szymanski",
"Boleslaw K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0604076
|
Loreto Bravo
|
Loreto Bravo and Leopoldo Bertossi
|
Semantically Correct Query Answers in the Presence of Null Values
|
20 pages. To appear in Proc. of International Workshop on
Inconsistency and Incompleteness in Databases (IIDB 2006)
| null | null | null |
cs.DB
| null |
For several reasons a database may not satisfy a given set of integrity
constraints(ICs), but most likely most of the information in it is still
consistent with those ICs; and could be retrieved when queries are answered.
Consistent answers to queries wrt a set of ICs have been characterized as
answers that can be obtained from every possible minimally repaired consistent
version of the original database. In this paper we consider databases that
contain null values and are also repaired, if necessary, using null values. For
this purpose, we propose first a precise semantics for IC satisfaction in a
database with null values that is compatible with the way null values are
treated in commercial database management systems. Next, a precise notion of
repair is introduced that privileges the introduction of null values when
repairing foreign key constraints, in such a way that these new values do not
create an infinite cycle of new inconsistencies. Finally, we analyze how to
specify this kind of repairs of a database that contains null values using
disjunctive logic programs with stable model semantics.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 22:33:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bravo",
"Loreto",
""
],
[
"Bertossi",
"Leopoldo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0604077
|
Jun Chen
|
Jun Chen, Toby Berger
|
Successive Wyner-Ziv Coding Scheme and its Application to the Quadratic
Gaussian CEO Problem
|
28 pages, submitted to the IEEE Transactions on Information Theory
| null |
10.1109/TIT.2008.917687
| null |
cs.IT math.IT
| null |
We introduce a distributed source coding scheme called successive Wyner-Ziv
coding. We show that any point in the rate region of the quadratic Gaussian CEO
problem can be achieved via the successive Wyner-Ziv coding. The concept of
successive refinement in the single source coding is generalized to the
distributed source coding scenario, which we refer to as distributed successive
refinement. For the quadratic Gaussian CEO problem, we establish a necessary
and sufficient condition for distributed successive refinement, where the
successive Wyner-Ziv coding scheme plays an important role.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2006 23:06:00 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Chen",
"Jun",
""
],
[
"Berger",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604078
|
Maria Chli
|
Maria Chli, Philippe De Wilde
|
The emergence of knowledge exchange: an agent-based model of a software
market
|
fixed legend problem
| null | null | null |
cs.MA cs.CE
| null |
We investigate knowledge exchange among commercial organisations, the
rationale behind it and its effects on the market. Knowledge exchange is known
to be beneficial for industry, but in order to explain it, authors have used
high level concepts like network effects, reputation and trust. We attempt to
formalise a plausible and elegant explanation of how and why companies adopt
information exchange and why it benefits the market as a whole when this
happens. This explanation is based on a multi-agent model that simulates a
market of software providers. Even though the model does not include any
high-level concepts, information exchange naturally emerges during simulations
as a successful profitable behaviour. The conclusions reached by this
agent-based analysis are twofold: (1) A straightforward set of assumptions is
enough to give rise to exchange in a software market. (2) Knowledge exchange is
shown to increase the efficiency of the market.
|
[
{
"version": "v1",
"created": "Thu, 20 Apr 2006 11:20:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chli",
"Maria",
""
],
[
"De Wilde",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0604079
|
Gregory B. Sorkin
|
Alexander D. Scott and Gregory B. Sorkin
|
Polynomial Constraint Satisfaction, Graph Bisection, and the Ising
Partition Function
|
Another algorithm, some applications, and a general revamping
|
ACM Transactions on Algorithms, 5(4):45:1-27, October 2009.
|
10.1145/1597036.1597049
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a problem class we call Polynomial Constraint Satisfaction
Problems, or PCSP. Where the usual CSPs from computer science and optimization
have real-valued score functions, and partition functions from physics have
monomials, PCSP has scores that are arbitrary multivariate formal polynomials,
or indeed take values in an arbitrary ring.
Although PCSP is much more general than CSP, remarkably, all (exact,
exponential-time) algorithms we know of for 2-CSP (where each score depends on
at most 2 variables) extend to 2-PCSP, at the expense of just a polynomial
factor in running time. Specifically, we extend the reduction-based algorithm
of Scott and Sorkin; the specialization of that approach to sparse random
instances, where the algorithm runs in polynomial expected time;
dynamic-programming algorithms based on tree decompositions; and the
split-and-list matrix-multiplication algorithm of Williams.
This gives the first polynomial-space exact algorithm more efficient than
exhaustive enumeration for the well-studied problems of finding a minimum
bisection of a graph, and calculating the partition function of an Ising model,
and the most efficient algorithm known for certain instances of Maximum
Independent Set. Furthermore, PCSP solves both optimization and counting
versions of a wide range of problems, including all CSPs, and thus enables
samplers including uniform sampling of optimal solutions and Gibbs sampling of
all solutions.
|
[
{
"version": "v1",
"created": "Thu, 20 Apr 2006 20:21:59 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Feb 2007 15:51:04 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Apr 2009 22:24:21 GMT"
}
] | 2010-01-14T00:00:00 |
[
[
"Scott",
"Alexander D.",
""
],
[
"Sorkin",
"Gregory B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604080
|
Gregory B. Sorkin
|
Alexander D. Scott and Gregory B. Sorkin
|
Linear-programming design and analysis of fast algorithms for Max 2-Sat
and Max 2-CSP
|
Updated per published version
|
Discrete Optimization, 4(3-4): 260-287, 2007
| null | null |
cs.DM
| null |
The class $(r,2)$-CSP, or simply Max 2-CSP, consists of constraint
satisfaction problems with at most two $r$-valued variables per clause. For
instances with $n$ variables and $m$ binary clauses, we present an $O(n
r^{5+19m/100})$-time algorithm which is the fastest polynomial-space algorithm
for many problems in the class, including Max Cut. The method also proves a
treewidth bound $\tw(G) \leq (13/75+o(1))m$, which gives a faster Max 2-CSP
algorithm that uses exponential space: running in time
$\Ostar{2^{(13/75+o(1))m}}$, this is fastest for most problems in Max 2-CSP.
Parametrizing in terms of $n$ rather than $m$, for graphs of average degree $d$
we show a simple algorithm running time $\Ostar{2^{(1-\frac{2}{d+1})n}}$, the
fastest polynomial-space algorithm known.
In combination with ``Polynomial CSPs'' introduced in a companion paper,
these algorithms also allow (with an additional polynomial-factor overhead in
space and time) counting and sampling, and the solution of problems like Max
Bisection that escape the usual CSP framework.
Linear programming is key to the design as well as the analysis of the
algorithms.
|
[
{
"version": "v1",
"created": "Thu, 20 Apr 2006 21:00:56 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Feb 2007 15:39:16 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Mar 2008 20:02:58 GMT"
}
] | 2008-03-26T00:00:00 |
[
[
"Scott",
"Alexander D.",
""
],
[
"Sorkin",
"Gregory B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604081
|
Stephan Merz
|
Dominique M\'ery (INRIA Lorraine - LORIA), Stephan Merz (INRIA
Lorraine - LORIA)
|
Event Systems and Access Control
| null | null | null | null |
cs.LO cs.CR
| null |
We consider the interpretations of notions of access control (permissions,
interdictions, obligations, and user rights) as run-time properties of
information systems specified as event systems with fairness. We give proof
rules for verifying that an access control policy is enforced in a system, and
consider preservation of access control by refinement of event systems. In
particular, refinement of user rights is non-trivial; we propose to combine
low-level user rights and system obligations to implement high-level user
rights.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 13:21:40 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Méry",
"Dominique",
"",
"INRIA Lorraine - LORIA"
],
[
"Merz",
"Stephan",
"",
"INRIA\n Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0604082
|
Farhad Meshkati
|
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz and Radu V. Balan
|
Energy-Efficient Power and Rate Control with QoS Constraints: A
Game-Theoretic Approach
|
To appear in the proceedings of the 2006 International Wireless
Communications and Mobile Computing Conference (IWCMC'06), Vancouver, BC,
Canada, July 2006
| null | null | null |
cs.IT math.IT
| null |
A game-theoretic model is proposed to study the cross-layer problem of joint
power and rate control with quality of service (QoS) constraints in
multiple-access networks. In the proposed game, each user seeks to choose its
transmit power and rate in a distributed manner in order to maximize its own
utility and at the same time satisfy its QoS requirements. The user's QoS
constraints are specified in terms of the average source rate and average
delay. The utility function considered here measures energy efficiency and the
delay includes both transmission and queueing delays. The Nash equilibrium
solution for the proposed non-cooperative game is derived and a closed-form
expression for the utility achieved at equilibrium is obtained. It is shown
that the QoS requirements of a user translate into a "size" for the user which
is an indication of the amount of network resources consumed by the user. Using
this framework, the tradeoffs among throughput, delay, network capacity and
energy efficiency are also studied.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 14:46:14 GMT"
},
{
"version": "v2",
"created": "Fri, 5 May 2006 19:37:13 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Meshkati",
"Farhad",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Schwartz",
"Stuart C.",
""
],
[
"Balan",
"Radu V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604083
|
Ori Shental
|
Ori Shental and Ido Kanter
|
Optimum Asymptotic Multiuser Efficiency of Pseudo-Orthogonal Randomly
Spread CDMA
|
WIC 27th Symposium on Information Theory in the Benelux, 2006
| null | null | null |
cs.IT math.IT
| null |
A $K$-user pseudo-orthogonal (PO) randomly spread CDMA system, equivalent to
transmission over a subset of $K'\leq K$ single-user Gaussian channels, is
introduced. The high signal-to-noise ratio performance of the PO-CDMA is
analyzed by rigorously deriving its asymptotic multiuser efficiency (AME) in
the large system limit. Interestingly, the $K'$-optimized PO-CDMA transceiver
scheme yields an AME which is practically equal to 1 for system loads smaller
than 0.1 and lower bounded by 1/4 for increasing loads. As opposed to the
vanishing efficiency of linear multiuser detectors, the derived efficiency is
comparable to the ultimate CDMA efficiency achieved for the intractable optimal
multiuser detector.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 14:47:18 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shental",
"Ori",
""
],
[
"Kanter",
"Ido",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604084
|
Michael Singer
|
Ziming Li, Michael F. Singer, Min Wu, Dabin Zheng
|
A Recursive Method for Determining the One-Dimensional Submodules of
Laurent-Ore Modules
|
To appear in the Proceedings of ISSAC 2006
| null | null | null |
cs.SC math.CA
| null |
We present a method for determining the one-dimensional submodules of a
Laurent-Ore module. The method is based on a correspondence between
hyperexponential solutions of associated systems and one-dimensional
submodules. The hyperexponential solutions are computed recursively by solving
a sequence of first-order ordinary matrix equations. As the recursion proceeds,
the matrix equations will have constant coefficients with respect to the
operators that have been considered.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:04:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Li",
"Ziming",
""
],
[
"Singer",
"Michael F.",
""
],
[
"Wu",
"Min",
""
],
[
"Zheng",
"Dabin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
] |
cs/0604085
|
Gayathre Krishnan
|
Gayathre Krishnan
|
Information in Quantum Description and Gate Implementation
|
4 pages
| null | null | null |
cs.IT math.IT
| null |
This note considers Kak's observer-reference model of quantum information,
where it is shown that qubits carry information that is sqrt n / ln n times
classical information, where n is the number of components in the measurement
system, to analyze information processing in quantum gates. The obverse side of
this exponential nature of quantum information is that the computational
complexity of implementing unconditionally reliable quantum gates is also
exponential.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:36:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Krishnan",
"Gayathre",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604086
|
Michael Fink
|
Thomas Eiter, Michael Fink, and Hans Tompits
|
A Knowledge-Based Approach for Selecting Information Sources
|
53 pages, 2 Figures; to appear in Theory and Practice of Logic
Programming (TPLP)
| null | null | null |
cs.AI
| null |
Through the Internet and the World-Wide Web, a vast number of information
sources has become available, which offer information on various subjects by
different providers, often in heterogeneous formats. This calls for tools and
methods for building an advanced information-processing infrastructure. One
issue in this area is the selection of suitable information sources in query
answering. In this paper, we present a knowledge-based approach to this
problem, in the setting where one among a set of information sources
(prototypically, data repositories) should be selected for evaluating a user
query. We use extended logic programs (ELPs) to represent rich descriptions of
the information sources, an underlying domain theory, and user queries in a
formal query language (here, XML-QL, but other languages can be handled as
well). Moreover, we use ELPs for declarative query analysis and generation of a
query description. Central to our approach are declarative source-selection
programs, for which we define syntax and semantics. Due to the structured
nature of the considered data items, the semantics of such programs must
carefully respect implicit context information in source-selection rules, and
furthermore combine it with possible user preferences. A prototype
implementation of our approach has been realized exploiting the DLV KR system
and its plp front-end for prioritized ELPs. We describe a representative
example involving specific movie databases, and report about experimental
results.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:53:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Eiter",
"Thomas",
""
],
[
"Fink",
"Michael",
""
],
[
"Tompits",
"Hans",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0604087
|
Yongzhi Cao
|
Yongzhi Cao, Lirong Xia and Mingsheng Ying
|
Probabilistic Automata for Computing with Words
|
35 pages; 3 figures
| null | null | null |
cs.AI cs.CL
| null |
Usually, probabilistic automata and probabilistic grammars have crisp symbols
as inputs, which can be viewed as the formal models of computing with values.
In this paper, we first introduce probabilistic automata and probabilistic
grammars for computing with (some special) words in a probabilistic framework,
where the words are interpreted as probabilistic distributions or possibility
distributions over a set of crisp symbols. By probabilistic conditioning, we
then establish a retraction principle from computing with words to computing
with values for handling crisp inputs and a generalized extension principle
from computing with words to computing with all words for handling arbitrary
inputs. These principles show that computing with values and computing with all
words can be respectively implemented by computing with some special words. To
compare the transition probabilities of two near inputs, we also examine some
analytical properties of the transition probability functions of generalized
extensions. Moreover, the retractions and the generalized extensions are shown
to be equivalence-preserving. Finally, we clarify some relationships among the
retractions, the generalized extensions, and the extensions studied recently by
Qiu and Wang.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 02:58:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cao",
"Yongzhi",
""
],
[
"Xia",
"Lirong",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0604088
|
Santanu Maiti Kumar
|
Santanu K. Maiti
|
How to Run Mathematica Batch-files in Background ?
|
7 pages, 1 figure
| null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mathematica is a versatile equipment for doing numeric and symbolic
computations and it has wide spread applications in all branches of science.
Mathematica has a complete consistency to design it at every stage that gives
it multilevel capability and helps advanced usage evolve naturally. Mathematica
functions work for any precision of number and it can be easily computed with
symbols, represented graphically to get the best answer. Mathematica is a
robust software development that can be used in any popular operating systems
and it can be communicated with external programs by using proper mathlink
commands.
Sometimes it is quite desirable to run jobs in background of a computer which
can take considerable amount of time to finish, and this allows us to do work
on other tasks, while keeping the jobs running. Most of us are very familiar to
run jobs in background for the programs written in the languages like C, C++,
F77, F90, F95, etc. But the way of running jobs, written in a mathematica
notebook, in background is quite different from the conventional method. In
this article, we explore how to create a mathematica batch-file from a
mathematica notebook and run it in background. Here we concentrate our study
only for the Unix version, but one can run mathematica programs in background
for the Windows version as well by using proper mathematica batch-file.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 09:39:02 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Oct 2008 10:54:54 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Oct 2008 06:04:58 GMT"
}
] | 2008-10-17T00:00:00 |
[
[
"Maiti",
"Santanu K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0604089
|
Michele Tucci
|
Michele Tucci
|
Evolutionary Socioeconomics: a Schumpeterian Computer Simulation
|
PDF, 15 pages, 5 graphs
| null | null | null |
cs.GT cs.CY
| null |
The following note contains a computer simulation concerning the struggle
between two companies: the first one is "the biggest zaibatsu of all", while
the second one is "small, fast, ruthless". The model is based on a
neo-Schumpeterian framework operating in a Darwinian evolutionary environment.
After running the program a large number of times, two characteristics stand
out: -- There is always a winner which takes it all, while the loser
disappears. -- The key to success is the ability to employ efficiently the
technological innovations. The topic of the present paper is strictly related
with the content of the following notes: Michele Tucci, Evolution and
Gravitation: a Computer Simulation of a Non-Walrasian Equilibrium Model;
Michele Tucci, Oligopolistic Competition in an Evolutionary Environment: a
Computer Simulation. The texts can be downloaded respectively at the following
addresses: http://arxiv.org/abs/cs.CY/0209017
http://arxiv.org/abs/cs.CY/0501037 These references include some preliminary
considerations regarding the comparison between the evolutionary and the
gravitational paradigms and the evaluation of approaches belonging to rival
schools of economic thought.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 13:29:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Tucci",
"Michele",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0604090
|
Mirco Mannucci Ph.D.
|
Mirco A. Mannucci, Lisa Sparks, Daniele C. Struppa
|
Simplicial models of social aggregation I
|
31 pages
| null | null | null |
cs.CE
| null |
This paper presents the foundational ideas for a new way of modeling social
aggregation. Traditional approaches have been using network theory, and the
theory of random networks. Under that paradigm, every social agent is
represented by a node, and every social interaction is represented by a segment
connecting two nodes. Early work in family interactions, as well as more recent
work in the study of terrorist organizations, shows that network modeling may
be insufficient to describe the complexity of human social structures.
Specifically, network theory does not seem to have enough flexibility to
represent higher order aggregations, where several agents interact as a group,
rather than as a collection of pairs. The model we present here uses a well
established mathematical theory, the theory of simplicial complexes, to address
this complex issue prevalent in interpersonal and intergroup communication. The
theory enables us to provide a richer graphical representation of social
interactions, and to determine quantitative mechanisms to describe the
robustness of a social structure. We also propose a methodology to create
random simplicial complexes, with the purpose of providing a new method to
simulate computationally the creation and disgregation of social structures.
Finally, we propose several measures which could be taken and observed in order
to describe and study an actual social aggregation occurring in interpersonal
and intergroup contexts.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 19:28:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mannucci",
"Mirco A.",
""
],
[
"Sparks",
"Lisa",
""
],
[
"Struppa",
"Daniele C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0604091
|
Jun Chen
|
Jun Chen, Toby Berger
|
Robust Distributed Source Coding
|
40 pages, submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
We consider a distributed source coding system in which several observations
are communicated to the decoder using limited transmission rate. The
observations must be separately coded. We introduce a robust distributed coding
scheme which flexibly trades off between system robustness and compression
efficiency. The optimality of this coding scheme is proved for various special
cases.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 20:44:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Jun",
""
],
[
"Berger",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604092
|
Sinan Gezici Dr
|
Sinan Gezici, Mung Chiang, H. Vincent Poor, and Hisashi Kobayashi
|
Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake
Receivers in Impulse Radio UWB Systems
|
Submitted to the EURASIP Journal on Wireless Communications and
Networking - Special Issue on Ultra-Wideband (UWB) Communication Systems -
Technology and Applications
| null | null | null |
cs.IT math.IT
| null |
The problem of choosing the optimal multipath components to be employed at a
minimum mean square error (MMSE) selective Rake receiver is considered for an
impulse radio ultra-wideband system. First, the optimal finger selection
problem is formulated as an integer programming problem with a non-convex
objective function. Then, the objective function is approximated by a convex
function and the integer programming problem is solved by means of constraint
relaxation techniques. The proposed algorithms are suboptimal due to the
approximate objective function and the constraint relaxation steps. However,
they perform better than the conventional finger selection algorithm, which is
suboptimal since it ignores the correlation between multipath components, and
they can get quite close to the optimal scheme that cannot be implemented in
practice due to its complexity. In addition to the convex relaxation
techniques, a genetic algorithm (GA) based approach is proposed, which does not
need any approximations or integer relaxations. This iterative algorithm is
based on the direct evaluation of the objective function, and can achieve
near-optimal performance with a reasonable number of iterations. Simulation
results are presented to compare the performance of the proposed finger
selection algorithms with that of the conventional and the optimal schemes.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 23:51:34 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gezici",
"Sinan",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Kobayashi",
"Hisashi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604093
|
Jean-Claude Belfiore
|
F. Oggier, G. Rekaya-Ben Othman, J.-C. Belfiore and E. Viterbo
|
Perfect Space Time Block Codes
|
39 pages, 7 figures, submitted to IEEE Trans. on Inform. Theory Sep.
2004, revised version
| null | null | null |
cs.IT math.IT
| null |
In this paper, we introduce the notion of perfect space-time block codes
(STBC). These codes have full rate, full diversity, non-vanishing constant
minimum determinant for increasing spectral efficiency, uniform average
transmitted energy per antenna and good shaping. We present algebraic
constructions of perfect STBCs for 2, 3, 4 and 6 antennas.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2006 13:07:32 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Oggier",
"F.",
""
],
[
"Othman",
"G. Rekaya-Ben",
""
],
[
"Belfiore",
"J. -C.",
""
],
[
"Viterbo",
"E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604094
|
Luciano da Fontoura Costa
|
Luciano da Fontoura Costa and Erik Bollt
|
A Fast and Accurate Nonlinear Spectral Method for Image Recognition and
Registration
|
4 pages, 3 figures
|
Appl. Phys. Lett. 89, 174102 (2006)
|
10.1063/1.2358325
| null |
cs.DC cond-mat.stat-mech cs.CG cs.CV
| null |
This article addresses the problem of two- and higher dimensional pattern
matching, i.e. the identification of instances of a template within a larger
signal space, which is a form of registration. Unlike traditional correlation,
we aim at obtaining more selective matchings by considering more strict
comparisons of gray-level intensity. In order to achieve fast matching, a
nonlinear thresholded version of the fast Fourier transform is applied to a
gray-level decomposition of the original 2D image. The potential of the method
is substantiated with respect to real data involving the selective
identification of neuronal cell bodies in gray-level images.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2006 16:38:01 GMT"
}
] | 2007-09-19T00:00:00 |
[
[
"Costa",
"Luciano da Fontoura",
""
],
[
"Bollt",
"Erik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0604095
|
Gregory Gutin
|
Gregory Gutin, Stefan Szeider, Anders Yeo
|
Fixed-Parameter Complexity of Minimum Profile Problems
| null | null | null | null |
cs.DS cs.DM
| null |
Let $G=(V,E)$ be a graph. An ordering of $G$ is a bijection $\alpha: V\dom
\{1,2,..., |V|\}.$ For a vertex $v$ in $G$, its closed neighborhood is
$N[v]=\{u\in V: uv\in E\}\cup \{v\}.$ The profile of an ordering $\alpha$ of
$G$ is $\prf_{\alpha}(G)=\sum_{v\in V}(\alpha(v)-\min\{\alpha(u): u\in
N[v]\}).$ The profile $\prf(G)$ of $G$ is the minimum of $\prf_{\alpha}(G)$
over all orderings $\alpha$ of $G$. It is well-known that $\prf(G)$ is the
minimum number of edges in an interval graph $H$ that contains $G$ is a
subgraph. Since $|V|-1$ is a tight lower bound for the profile of connected
graphs $G=(V,E)$, the parametrization above the guaranteed value $|V|-1$ is of
particular interest. We show that deciding whether the profile of a connected
graph $G=(V,E)$ is at most $|V|-1+k$ is fixed-parameter tractable with respect
to the parameter $k$. We achieve this result by reduction to a problem kernel
of linear size.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2006 17:30:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gutin",
"Gregory",
""
],
[
"Szeider",
"Stefan",
""
],
[
"Yeo",
"Anders",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0604096
|
Tracey Ho
|
Tracey Ho
|
Polynomial-time algorithms for coding across multiple unicasts
| null | null | null | null |
cs.NI
| null |
We consider the problem of network coding across multiple unicasts. We give,
for wired and wireless networks, efficient polynomial time algorithms for
finding optimal network codes within the class of network codes restricted to
XOR coding between pairs of flows.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 02:55:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ho",
"Tracey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0604097
|
Boulos Harb
|
Sudipto Guha and Boulos Harb
|
Approximation algorithms for wavelet transform coding of data streams
|
Added a universal representation that provides a provable
approximation guarantee under all p-norms simultaneously
| null | null | null |
cs.DS
| null |
This paper addresses the problem of finding a B-term wavelet representation
of a given discrete function $f \in \real^n$ whose distance from f is
minimized. The problem is well understood when we seek to minimize the
Euclidean distance between f and its representation. The first known algorithms
for finding provably approximate representations minimizing general $\ell_p$
distances (including $\ell_\infty$) under a wide variety of compactly supported
wavelet bases are presented in this paper. For the Haar basis, a polynomial
time approximation scheme is demonstrated. These algorithms are applicable in
the one-pass sublinear-space data stream model of computation. They generalize
naturally to multiple dimensions and weighted norms. A universal representation
that provides a provable approximation guarantee under all p-norms
simultaneously; and the first approximation algorithms for bit-budget versions
of the problem, known as adaptive quantization, are also presented. Further, it
is shown that the algorithms presented here can be used to select a basis from
a tree-structured dictionary of bases and find a B-term representation of the
given function that provably approximates its best dictionary-basis
representation.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 01:27:37 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Apr 2006 23:39:35 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Sep 2006 18:14:50 GMT"
},
{
"version": "v4",
"created": "Sun, 22 Jul 2007 17:33:29 GMT"
}
] | 2007-07-23T00:00:00 |
[
[
"Guha",
"Sudipto",
""
],
[
"Harb",
"Boulos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0604098
|
Lawrence Ong
|
Lawrence Ong, Mehul Motani
|
Achievable Rates for the Multiple Access Channel with Feedback and
Correlated Sources
|
Proceedings of the 43rd Annual Allerton Conference on Communication,
Control, and Computing, Allerton House, the University of Illinois, Sept
28-30 2005
|
Proceedings of the 43rd Annual Allerton Conference on
Communication, Control, and Computing, Allerton House, the University of
Illinois, Sept 28-30 2005.
| null | null |
cs.IT math.IT
| null |
In this paper, we investigate achievable rates on the multiple access channel
with feedback and correlated sources (MACFCS). The motivation for studying the
MACFCS stems from the fact that in a sensor network, sensors collect and
transmit correlated data to a common sink. We derive two achievable rate
regions for the three-node MACFCS.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 06:55:25 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Ong",
"Lawrence",
""
],
[
"Motani",
"Mehul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604099
|
Lawrence Ong
|
Lawrence Ong, Mehul Motani
|
Myopic Coding in Wireless Networks
|
Proceedings of the 39th Conference on Information Sciences and
Systems (CISS 2005), John Hopkins University, Baltimore, MD, March 16-18 2005
|
Proceedings of the 39th Conference on Information Sciences and
Systems (CISS 2005), John Hopkins University, Baltimore, MD, March 16-18
2005.
| null | null |
cs.IT math.IT
| null |
We investigate the achievable rate of data transmission from sources to sinks
through a multiple-relay network. We study achievable rates for omniscient
coding, in which all nodes are considered in the coding design at each node. We
find that, when maximizing the achievable rate, not all nodes need to
``cooperate'' with all other nodes in terms of coding and decoding. This leads
us to suggest a constrained network, whereby each node only considers a few
neighboring nodes during encoding and decoding. We term this myopic coding and
calculate achievable rates for myopic coding. We show by examples that, when
nodes transmit at low SNR, these rates are close to that achievable by
omniscient coding, when the network is unconstrained . This suggests that a
myopic view of the network might be as good as a global view. In addition,
myopic coding has the practical advantage of being more robust to topology
changes. It also mitigates the high computational complexity and large
buffer/memory requirements of omniscient coding schemes.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 07:41:36 GMT"
}
] | 2010-04-15T00:00:00 |
[
[
"Ong",
"Lawrence",
""
],
[
"Motani",
"Mehul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604100
|
Abhishek Parakh
|
Abhishek Parakh
|
Protocols for Kak's Cubic Cipher and Diffie-Hellman Based Asymmetric
Oblivious Key Exchange
|
7 pages, with minor typographical corrections.
| null | null | null |
cs.CR
| null |
This paper presents protocols for Kak's cubic transformation and proposes a
modification to Diffie-Hellman key exchange protocol in order to achieve
asymmetric oblivious exchange of keys.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 17:39:37 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Apr 2007 17:49:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Parakh",
"Abhishek",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0604101
|
Frederic Chyzak
|
Alin Bostan (INRIA Rocquencourt), Fr\'ed\'eric Chyzak (INRIA
Rocquencourt), Fran\c{c}ois Ollivier (LIX), Bruno Salvy (INRIA Rocquencourt),
\'Eric Schost (LIX), Alexandre Sedoglavic (LIFL)
|
Fast computation of power series solutions of systems of differential
equations
| null |
Dans 2007 ACM-SIAM Symposium on Discrete Algorithms (2007)
1012--1021
| null | null |
cs.SC
| null |
We propose new algorithms for the computation of the first N terms of a
vector (resp. a basis) of power series solutions of a linear system of
differential equations at an ordinary point, using a number of arithmetic
operations which is quasi-linear with respect to N. Similar results are also
given in the non-linear case. This extends previous results obtained by Brent
and Kung for scalar differential equations of order one and two.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 15:25:35 GMT"
}
] | 2008-05-05T00:00:00 |
[
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Chyzak",
"Frédéric",
"",
"INRIA\n Rocquencourt"
],
[
"Ollivier",
"François",
"",
"LIX"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
],
[
"Schost",
"Éric",
"",
"LIX"
],
[
"Sedoglavic",
"Alexandre",
"",
"LIFL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0604102
|
Vita Hinze-Hoare
|
Vita Hinze-Hoare
|
HCI and Educational Metrics as Tools for VLE Evaluation
| null | null | null | null |
cs.HC cs.LG
| null |
The general set of HCI and Educational principles are considered and a
classification system constructed. A frequency analysis of principles is used
to obtain the most significant set. Metrics are devised to provide objective
measures of these principles and a consistent testing regime devised. These
principles are used to analyse Blackboard and Moodle.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 19:32:03 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hinze-Hoare",
"Vita",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0604103
|
Vita Hinze-Hoare
|
Vita Hinze-Hoare
|
Further Evaluationh of VLEs using HCI and Educational Metrics
| null | null | null | null |
cs.HC
| null |
Under consideration are the general set of Human computer Interaction (HCI)
and Educational principles from prominent authors in the field and the
construction of a system for evaluating Virtual Learning Environments (VLEs)
with respect to the application of these HCI and Educational Principles. A
frequency analysis of principles is used to obtain the most significant set.
Metrics are devised to provide objective measures of these principles and a
consistent testing regime is introduced. These principles are used to analyse
the University VLE Blackboard. An open source VLE is also constructed with
similar content to Blackboard courses so that a systematic comparison can be
made. HCI and Educational metrics are determined for each VLE.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2006 19:53:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hinze-Hoare",
"Vita",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0604104
|
Navin Kashyap
|
Akiko Manada and Navin Kashyap
|
On the Shannon Covers of Certain Irreducible Constrained Systems of
Finite Type
|
5 pages, 9 figures; to appear in the Proceedings of the 2006
International Symposium on Information Theory, July 2006
| null | null | null |
cs.IT cs.DM math.IT
| null |
A construction of Crochemore, Mignosi and Restivo in the automata theory
literature gives a presentation of a finite-type constrained system (FTCS) that
is deterministic and has a relatively small number of states. This construction
is thus a good starting point for determining the minimal deterministic
presentation, known as the Shannon cover, of an FTCS. We analyze in detail the
Crochemore-Mignosi-Restivo (CMR) construction in the case when the list of
forbidden words defining the FTCS is of size at most two. We show that if the
FTCS is irreducible, then an irreducible presentation for the system can be
easily obtained by deleting a prescribed few states from the CMR presentation.
By studying the follower sets of the states in this irreducible presentation,
we are able to explicitly determine the Shannon cover in some cases. In
particular, our results show that the CMR construction directly yields the
Shannon cover in the case of an irreducible FTCS with exactly one forbidden
word, but this is not in general the case for FTCS's with two forbidden words.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2006 06:16:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Manada",
"Akiko",
""
],
[
"Kashyap",
"Navin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604105
|
Farid Benbadis
|
Farid Benbadis, Jean-Jacques Puig, Marcelo Dias de Amorim, Claude
Chaudet, Timur Friedman, David Simplot-Ryl
|
Jumps: Enhancing hop-count positioning in sensor networks using multiple
coordinates
| null | null | null | null |
cs.NI
| null |
Positioning systems in self-organizing networks generally rely on
measurements such as delay and received signal strength, which may be difficult
to obtain and often require dedicated equipment. An alternative to such
approaches is to use simple connectivity information, that is, the presence or
absence of a link between any pair of nodes, and to extend it to hop-counts, in
order to obtain an approximate coordinate system. Such an approximation is
sufficient for a large number of applications, such as routing. In this paper,
we propose Jumps, a positioning system for those self-organizing networks in
which other types of (exact) positioning systems cannot be used or are deemed
to be too costly. Jumps builds a multiple coordinate system based solely on
nodes neighborhood knowledge. Jumps is interesting in the context of wireless
sensor networks, as it neither requires additional embedded equipment nor
relies on any nodes capabilities. While other approaches use only three
hop-count measurements to infer the position of a node, Jumps uses an arbitrary
number. We observe that an increase in the number of measurements leads to an
improvement in the localization process, without requiring a high dense
environment. We show through simulations that Jumps, when compared with
existing approaches, reduces the number of nodes sharing the same coordinates,
which paves the way for functions such as position-based routing.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2006 11:39:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Benbadis",
"Farid",
""
],
[
"Puig",
"Jean-Jacques",
""
],
[
"de Amorim",
"Marcelo Dias",
""
],
[
"Chaudet",
"Claude",
""
],
[
"Friedman",
"Timur",
""
],
[
"Simplot-Ryl",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0604106
|
Ofer Shayevitz
|
Ofer Shayevitz, Ram Zamir and Meir Feder
|
Bounded expected delay in arithmetic coding
| null | null | null | null |
cs.IT math.IT
| null |
We address the problem of delay in an arithmetic coding system. Due to the
nature of the arithmetic coding process, source sequences causing arbitrarily
large encoding or decoding delays exist. This phenomena raises the question of
just how large is the expected input to output delay in these systems, i.e.,
once a source sequence has been encoded, what is the expected number of source
letters that should be further encoded to allow full decoding of that sequence.
In this paper, we derive several new upper bounds on the expected delay for a
memoryless source, which improve upon a known bound due to Gallager. The bounds
provided are uniform in the sense of being independent of the sequence's
history. In addition, we give a sufficient condition for a source to admit a
bounded expected delay, which holds for a stationary ergodic Markov source of
any order.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2006 13:58:53 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shayevitz",
"Ofer",
""
],
[
"Zamir",
"Ram",
""
],
[
"Feder",
"Meir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604107
|
Aleksandar Jovicic
|
Aleksandar Jovicic and Pramod Viswanath
|
Cognitive Radio: An Information-Theoretic Perspective
|
34 pages, Sections 5 and A.2 updated
| null | null | null |
cs.IT math.IT
| null |
Cognitive radios have been proposed as a means to implement efficient reuse
of the licensed spectrum. The key feature of a cognitive radio is its ability
to recognize the primary (licensed) user and adapt its communication strategy
to minimize the interference that it generates. We consider a communication
scenario in which the primary and the cognitive user wish to communicate to
different receivers, subject to mutual interference. Modeling the cognitive
radio as a transmitter with side-information about the primary transmission, we
characterize the largest rate at which the cognitive radio can reliably
communicate under the constraint that (i) no interference is created for the
primary user, and (ii) the primary encoder-decoder pair is oblivious to the
presence of the cognitive radio.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2006 06:00:07 GMT"
},
{
"version": "v2",
"created": "Tue, 9 May 2006 23:47:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jovicic",
"Aleksandar",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0604108
|
Francesc Rossell\'o
|
Francesc Rossello, Gabriel Valiente
|
An Algebraic View of the Relation between Largest Common Subtrees and
Smallest Common Supertrees
|
32 pages
| null | null | null |
cs.DS cs.DM math.CT
| null |
The relationship between two important problems in tree pattern matching, the
largest common subtree and the smallest common supertree problems, is
established by means of simple constructions, which allow one to obtain a
largest common subtree of two trees from a smallest common supertree of them,
and vice versa. These constructions are the same for isomorphic, homeomorphic,
topological, and minor embeddings, they take only time linear in the size of
the trees, and they turn out to have a clear algebraic meaning.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2006 10:32:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
cs/0604109
|
Klaus Rabbertz
|
K. Rabbertz (1), M. Thomas (2), S. Ashby (3), M. Corvo (3 and 4), S.
Argir\`o (3 and 5), N. Darmenov (3 and 6), R. Darwish (7), D. Evans (7), B.
Holzman (7), N. Ratnikova (7), S. Muzaffar (8), A. Nowack (9), T. Wildish
(10), B. Kim (11), J. Weng (1 and 3), V. B\"uge (1 and 12) (for the CMS
Collaboration) ((1) University of Karlsruhe, (2) CALTECH, (3) CERN, (4) INFN
Padova, (5) INFN-CNAF, (6) INRNE Sofia, (7) FERMILAB, (8) Northeastern
University, (9) RWTH Aachen, (10) Princeton University, (11) University of
Florida, (12) FZ Karlsruhe)
|
CMS Software Distribution on the LCG and OSG Grids
|
4 pages, 1 figure, latex with hyperrefs
| null | null | null |
cs.DC
| null |
The efficient exploitation of worldwide distributed storage and computing
resources available in the grids require a robust, transparent and fast
deployment of experiment specific software. The approach followed by the CMS
experiment at CERN in order to enable Monte-Carlo simulations, data analysis
and software development in an international collaboration is presented. The
current status and future improvement plans are described.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2006 16:14:32 GMT"
}
] | 2019-08-15T00:00:00 |
[
[
"Rabbertz",
"K.",
"",
"3 and 4"
],
[
"Thomas",
"M.",
"",
"3 and 4"
],
[
"Ashby",
"S.",
"",
"3 and 4"
],
[
"Corvo",
"M.",
"",
"3 and 4"
],
[
"Argirò",
"S.",
"",
"3 and 5"
],
[
"Darmenov",
"N.",
"",
"3 and 6"
],
[
"Darwish",
"R.",
"",
"1 and 3"
],
[
"Evans",
"D.",
"",
"1 and 3"
],
[
"Holzman",
"B.",
"",
"1 and 3"
],
[
"Ratnikova",
"N.",
"",
"1 and 3"
],
[
"Muzaffar",
"S.",
"",
"1 and 3"
],
[
"Nowack",
"A.",
"",
"1 and 3"
],
[
"Wildish",
"T.",
"",
"1 and 3"
],
[
"Kim",
"B.",
"",
"1 and 3"
],
[
"Weng",
"J.",
"",
"1 and 3"
],
[
"Büge",
"V.",
"",
"1 and 12"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0604110
|
Kristina Lerman
|
Aram Galstyan, Tad Hogg, Kristina Lerman
|
Modeling and Mathematical Analysis of Swarms of Microscopic Robots
|
2005 IEEE Swarm Intelligence Symposium, Pasadena, CA June 2005
| null |
10.1109/SIS.2005.1501623
| null |
cs.MA cs.RO
| null |
The biologically-inspired swarm paradigm is being used to design
self-organizing systems of locally interacting artificial agents. A major
difficulty in designing swarms with desired characteristics is understanding
the causal relation between individual agent and collective behaviors.
Mathematical analysis of swarm dynamics can address this difficulty to gain
insight into system design. This paper proposes a framework for mathematical
modeling of swarms of microscopic robots that may one day be useful in medical
applications. While such devices do not yet exist, the modeling approach can be
helpful in identifying various design trade-offs for the robots and be a useful
guide for their eventual fabrication. Specifically, we examine microscopic
robots that reside in a fluid, for example, a bloodstream, and are able to
detect and respond to different chemicals. We present the general mathematical
model of a scenario in which robots locate a chemical source. We solve the
scenario in one-dimension and show how results can be used to evaluate certain
design decisions.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2006 23:33:25 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Galstyan",
"Aram",
""
],
[
"Hogg",
"Tad",
""
],
[
"Lerman",
"Kristina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0604111
|
Kristina Lerman
|
Kristina Lerman, Chris Jones, Aram Galstyan and Maja J Mataric
|
Analysis of Dynamic Task Allocation in Multi-Robot Systems
|
Preprint version of the paper published in International Journal of
Robotics, March 2006, Volume 25, pp. 225-242
| null | null | null |
cs.RO cs.MA
| null |
Dynamic task allocation is an essential requirement for multi-robot systems
operating in unknown dynamic environments. It allows robots to change their
behavior in response to environmental changes or actions of other robots in
order to improve overall system performance. Emergent coordination algorithms
for task allocation that use only local sensing and no direct communication
between robots are attractive because they are robust and scalable. However, a
lack of formal analysis tools makes emergent coordination algorithms difficult
to design. In this paper we present a mathematical model of a general dynamic
task allocation mechanism. Robots using this mechanism have to choose between
two types of task, and the goal is to achieve a desired task division in the
absence of explicit communication and global knowledge. Robots estimate the
state of the environment from repeated local observations and decide which task
to choose based on these observations. We model the robots and observations as
stochastic processes and study the dynamics of the collective behavior.
Specifically, we analyze the effect that the number of observations and the
choice of the decision function have on the performance of the system. The
mathematical models are validated in a multi-robot multi-foraging scenario. The
model's predictions agree very closely with experimental results from
sensor-based simulations.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2006 23:56:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lerman",
"Kristina",
""
],
[
"Jones",
"Chris",
""
],
[
"Galstyan",
"Aram",
""
],
[
"Mataric",
"Maja J",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0604112
|
Jim Gray
|
Jacek Becla, Andrew Hanushevsky, Sergei Nikolaev, Ghaleb Abdulla, Alex
Szalay, Maria Nieto-Santisteban, Ani Thakar, Jim Gray
|
Designing a Multi-petabyte Database for LSST
|
8 pages. to appear in SPIE
| null |
10.1117/12.671721
| null |
cs.DB cs.DL
| null |
The 3.2 giga-pixel LSST camera will produce approximately half a petabyte of
archive images every month. These data need to be reduced in under a minute to
produce real-time transient alerts, and then added to the cumulative catalog
for further analysis. The catalog is expected to grow about three hundred
terabytes per year. The data volume, the real-time transient alerting
requirements of the LSST, and its spatio-temporal aspects require innovative
techniques to build an efficient data access system at reasonable cost. As
currently envisioned, the system will rely on a database for catalogs and
metadata. Several database systems are being evaluated to understand how they
perform at these data rates, data volumes, and access patterns. This paper
describes the LSST requirements, the challenges they impose, the data access
philosophy, results to date from evaluating available database technologies
against LSST requirements, and the proposed database architecture to meet the
data challenges.
|
[
{
"version": "v1",
"created": "Fri, 28 Apr 2006 03:04:00 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Becla",
"Jacek",
""
],
[
"Hanushevsky",
"Andrew",
""
],
[
"Nikolaev",
"Sergei",
""
],
[
"Abdulla",
"Ghaleb",
""
],
[
"Szalay",
"Alex",
""
],
[
"Nieto-Santisteban",
"Maria",
""
],
[
"Thakar",
"Ani",
""
],
[
"Gray",
"Jim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0604113
|
Andrea Sportiello
|
Sergio Caracciolo, Davide Fichera, Andrea Sportiello
|
One-in-Two-Matching Problem is NP-complete
|
30 pages
| null | null | null |
cs.CC
| null |
2-dimensional Matching Problem, which requires to find a matching of left- to
right-vertices in a balanced $2n$-vertex bipartite graph, is a well-known
polynomial problem, while various variants, like the 3-dimensional analogoue
(3DM, with triangles on a tripartite graph), or the Hamiltonian Circuit Problem
(HC, a restriction to ``unicyclic'' matchings) are among the main examples of
NP-hard problems, since the first Karp reduction series of 1972. The same holds
for the weighted variants of these problems, the Linear Assignment Problem
being polynomial, and the Numerical 3-Dimensional Matching and Travelling
Salesman Problem being NP-complete.
In this paper we show that a small modification of the 2-dimensional Matching
and Assignment Problems in which for each $i \leq n/2$ it is required that
either $\pi(2i-1)=2i-1$ or $\pi(2i)=2i$, is a NP-complete problem. The proof is
by linear reduction from SAT (or NAE-SAT), with the size $n$ of the Matching
Problem being four times the number of edges in the factor graph representation
of the boolean problem. As a corollary, in combination with the simple linear
reduction of One-in-Two Matching to 3-Dimensional Matching, we show that SAT
can be linearly reduced to 3DM, while the original Karp reduction was only
cubic.
|
[
{
"version": "v1",
"created": "Fri, 28 Apr 2006 16:40:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Caracciolo",
"Sergio",
""
],
[
"Fichera",
"Davide",
""
],
[
"Sportiello",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0605001
|
Chao Tian
|
Chao Tian and Suhas Diggavi
|
On Multistage Successive Refinement for Wyner-Ziv Source Coding with
Degraded Side Informations
|
Submitted to IEEE Trans. Information Theory Apr. 2006
| null | null | null |
cs.IT math.IT
| null |
We provide a complete characterization of the rate-distortion region for the
multistage successive refinement of the Wyner-Ziv source coding problem with
degraded side informations at the decoder. Necessary and sufficient conditions
for a source to be successively refinable along a distortion vector are
subsequently derived. A source-channel separation theorem is provided when the
descriptions are sent over independent channels for the multistage case.
Furthermore, we introduce the notion of generalized successive refinability
with multiple degraded side informations. This notion captures whether
progressive encoding to satisfy multiple distortion constraints for different
side informations is as good as encoding without progressive requirement.
Necessary and sufficient conditions for generalized successive refinability are
given. It is shown that the following two sources are generalized successively
refinable: (1) the Gaussian source with degraded Gaussian side informations,
(2) the doubly symmetric binary source when the worse side information is a
constant. Thus for both cases, the failure of being successively refinable is
only due to the inherent uncertainty on which side information will occur at
the decoder, but not the progressive encoding requirement.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2006 12:41:23 GMT"
},
{
"version": "v2",
"created": "Tue, 2 May 2006 18:20:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Tian",
"Chao",
""
],
[
"Diggavi",
"Suhas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605002
|
Chao Pang Yang
|
Chao-Yang Pang, Zheng-Wei Zhou, and Guang-Can Guo
|
A Hybrid Quantum Encoding Algorithm of Vector Quantization for Image
Compression
|
Modify on June 21. 10pages, 3 figures
| null |
10.1088/1009-1963/15/12/044
| null |
cs.MM cs.DS
| null |
Many classical encoding algorithms of Vector Quantization (VQ) of image
compression that can obtain global optimal solution have computational
complexity O(N). A pure quantum VQ encoding algorithm with probability of
success near 100% has been proposed, that performs operations 45sqrt(N) times
approximately. In this paper, a hybrid quantum VQ encoding algorithm between
classical method and quantum algorithm is presented. The number of its
operations is less than sqrt(N) for most images, and it is more efficient than
the pure quantum algorithm.
Key Words: Vector Quantization, Grover's Algorithm, Image Compression,
Quantum Algorithm
|
[
{
"version": "v1",
"created": "Sun, 30 Apr 2006 13:35:54 GMT"
},
{
"version": "v2",
"created": "Tue, 2 May 2006 18:12:20 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Jun 2006 03:22:38 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Pang",
"Chao-Yang",
""
],
[
"Zhou",
"Zheng-Wei",
""
],
[
"Guo",
"Guang-Can",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0605003
|
Amitabh Saxena
|
Amitabh Saxena and Ben Soh
|
A New Cryptosystem Based On Hidden Order Groups
|
removed examples for multiparty key agreement and join protocols,
since they are redundant
| null | null | null |
cs.CR cs.CC
| null |
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the
Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a
fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and
having oracle access to a `Diffie-Hellman Problem' solver with fixed generator
$g$, it is possible to compute $g^{1/x} \in G_1$ in polynomial time (see
theorem 3.2). On the other hand, it is not known if such a reduction exists
when $\phi(n)$ is unknown (see conjuncture 3.1). We exploit this ``gap'' to
construct a cryptosystem based on hidden order groups and present a practical
implementation of a novel cryptographic primitive called an \emph{Oracle Strong
Associative One-Way Function} (O-SAOWF). O-SAOWFs have applications in
multiparty protocols. We demonstrate this by presenting a key agreement
protocol for dynamic ad-hoc groups.
|
[
{
"version": "v1",
"created": "Sun, 30 Apr 2006 18:13:10 GMT"
},
{
"version": "v2",
"created": "Tue, 2 May 2006 16:59:08 GMT"
},
{
"version": "v3",
"created": "Wed, 3 May 2006 17:55:02 GMT"
},
{
"version": "v4",
"created": "Wed, 3 May 2006 21:23:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Saxena",
"Amitabh",
""
],
[
"Soh",
"Ben",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0605004
|
Himanshu Thapliyal
|
Himanshu Thapliyal and M.B Srinivas
|
Novel Reversible Multiplier Architecture Using Reversible TSG Gate
|
4 Pages; Published in Proceedings of the 4th ACS/IEEE International
Conference on Computer Systems and Applications (AICCSA-06), Dubai, March
2006. pp. 100-103. Contains the missing reference
| null | null | null |
cs.AR
| null |
In the recent years, reversible logic has emerged as a promising technology
having its applications in low power CMOS, quantum computing, nanotechnology,
and optical computing. The classical set of gates such as AND, OR, and EXOR are
not reversible. Recently a 4 * 4 reversible gate called TSG is proposed. The
most significant aspect of the proposed gate is that it can work singly as a
reversible full adder, that is reversible full adder can now be implemented
with a single gate only. This paper proposes a NXN reversible multiplier using
TSG gate. It is based on two concepts. The partial products can be generated in
parallel with a delay of d using Fredkin gates and thereafter the addition can
be reduced to log2N steps by using reversible parallel adder designed from TSG
gates. Similar multiplier architecture in conventional arithmetic (using
conventional logic) has been reported in existing literature, but the proposed
one in this paper is totally based on reversible logic and reversible cells as
its building block. A 4x4 architecture of the proposed reversible multiplier is
also designed. It is demonstrated that the proposed multiplier architecture
using the TSG gate is much better and optimized, compared to its existing
counterparts in literature; in terms of number of reversible gates and garbage
outputs. Thus, this paper provides the initial threshold to building of more
complex system which can execute more complicated operations using reversible
logic.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2006 09:34:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thapliyal",
"Himanshu",
""
],
[
"Srinivas",
"M. B",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0605005
|
Ruoheng Liu
|
Ruoheng Liu, Ivana Maric, Roy D. Yates, and Predrag Spasojevic
|
The Discrete Memoryless Multiple Access Channel with Confidential
Messages
|
1 figure, accepted by ISIT 2006 conference
| null | null | null |
cs.IT math.IT
| null |
A multiple-access channel is considered in which messages from one encoder
are confidential. Confidential messages are to be transmitted with perfect
secrecy, as measured by equivocation at the other encoder. The upper bounds and
the achievable rates for this communication situation are determined.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2006 21:19:29 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Feb 2007 20:28:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Ruoheng",
""
],
[
"Maric",
"Ivana",
""
],
[
"Yates",
"Roy D.",
""
],
[
"Spasojevic",
"Predrag",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605006
|
Shengtian Yang
|
Shengtian Yang, Peiliang Qiu
|
An Information-Spectrum Approach to Multiterminal Rate-Distortion Theory
|
Submitted to IEEE Transactions on Information Theory (Apr. 2006)
| null | null | null |
cs.IT math.IT
| null |
An information-spectrum approach is applied to solve the multiterminal source
coding problem for correlated general sources, where sources may be
nonstationary and/or nonergodic, and the distortion measure is arbitrary and
may be nonadditive. A general formula for the rate-distortion region of the
multiterminal source coding problem with the maximum distortion criterion under
fixed-length coding is shown in this correspondence.
|
[
{
"version": "v1",
"created": "Tue, 2 May 2006 01:29:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Yang",
"Shengtian",
""
],
[
"Qiu",
"Peiliang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605007
|
Dmitri Krioukov
|
Priya Mahadevan, Dmitri Krioukov, Kevin Fall, Amin Vahdat
|
Systematic Topology Analysis and Generation Using Degree Correlations
|
Final version
|
SIGCOMM 2006 (ACM SIGCOMM Computer Communication Review (CCR),
v.36, n.4, p.135-146, 2006)
|
10.1145/1151659.1159930
| null |
cs.NI cond-mat.stat-mech physics.soc-ph
| null |
We present a new, systematic approach for analyzing network topologies. We
first introduce the dK-series of probability distributions specifying all
degree correlations within d-sized subgraphs of a given graph G. Increasing
values of d capture progressively more properties of G at the cost of more
complex representation of the probability distribution. Using this series, we
can quantitatively measure the distance between two graphs and construct random
graphs that accurately reproduce virtually all metrics proposed in the
literature. The nature of the dK-series implies that it will also capture any
future metrics that may be proposed. Using our approach, we construct graphs
for d=0,1,2,3 and demonstrate that these graphs reproduce, with increasing
accuracy, important properties of measured and modeled Internet topologies. We
find that the d=2 case is sufficient for most practical purposes, while d=3
essentially reconstructs the Internet AS- and router-level topologies exactly.
We hope that a systematic method to analyze and synthesize topologies offers a
significant improvement to the set of tools available to network topology and
protocol researchers.
|
[
{
"version": "v1",
"created": "Tue, 2 May 2006 04:05:57 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Jul 2006 05:26:59 GMT"
}
] | 2008-04-16T00:00:00 |
[
[
"Mahadevan",
"Priya",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"Fall",
"Kevin",
""
],
[
"Vahdat",
"Amin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0605008
|
Arnaud Durand
|
Arnaud Durand (ELM), Etienne Grandjean (GREYC)
|
The complexity of acyclic conjunctive queries revisited
|
30 pages
| null | null | null |
cs.LO
| null |
In this paper, we consider first-order logic over unary functions and study
the complexity of the evaluation problem for conjunctive queries described by
such kind of formulas. A natural notion of query acyclicity for this language
is introduced and we study the complexity of a large number of variants or
generalizations of acyclic query problems in that context (Boolean or not
Boolean, with or without inequalities, comparisons, etc...). Our main results
show that all those problems are \textit{fixed-parameter linear} i.e. they can
be evaluated in time $f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$ where $|Q|$ is the
size of the query $Q$, $|\textbf{db}|$ the database size, $|Q(\textbf{db})|$ is
the size of the output and $f$ is some function whose value depends on the
specific variant of the query problem (in some cases, $f$ is the identity
function). Our results have two kinds of consequences. First, they can be
easily translated in the relational (i.e., classical) setting. Previously known
bounds for some query problems are improved and new tractable cases are then
exhibited. Among others, as an immediate corollary, we improve a result of
\~\cite{PapadimitriouY-99} by showing that any (relational) acyclic conjunctive
query with inequalities can be evaluated in time
$f(|Q|).|\textbf{db}|.|Q(\textbf{db})|$. A second consequence of our method is
that it provides a very natural descriptive approach to the complexity of
well-known algorithmic problems. A number of examples (such as acyclic subgraph
problems, multidimensional matching, etc...) are considered for which new
insights of their complexity are given.
|
[
{
"version": "v1",
"created": "Tue, 2 May 2006 09:31:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Durand",
"Arnaud",
"",
"ELM"
],
[
"Grandjean",
"Etienne",
"",
"GREYC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0605009
|
Marcus Hutter
|
Marcus Hutter
|
On the Foundations of Universal Sequence Prediction
|
14 pages
|
Proc. 3rd Annual Conference on Theory and Applications of Models
of Computation (TAMC 2006) pages 408-420
| null |
IDSIA-03-06
|
cs.LG cs.IT math.IT math.ST stat.TH
| null |
Solomonoff completed the Bayesian framework by providing a rigorous, unique,
formal, and universal choice for the model class and the prior. We discuss in
breadth how and in which sense universal (non-i.i.d.) sequence prediction
solves various (philosophical) problems of traditional Bayesian sequence
prediction. We show that Solomonoff's model possesses many desirable
properties: Fast convergence and strong bounds, and in contrast to most
classical continuous prior densities has no zero p(oste)rior problem, i.e. can
confirm universal hypotheses, is reparametrization and regrouping invariant,
and avoids the old-evidence and updating problem. It even performs well
(actually better) in non-computable environments.
|
[
{
"version": "v1",
"created": "Wed, 3 May 2006 07:47:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0605010
|
Di Wu
|
Di Wu and Predrag Spasojevic
|
Complementary Set Matrices Satisfying a Column Correlation Constraint
| null | null | null | null |
cs.IT math.IT
| null |
Motivated by the problem of reducing the peak to average power ratio (PAPR)
of transmitted signals, we consider a design of complementary set matrices
whose column sequences satisfy a correlation constraint. The design algorithm
recursively builds a collection of $2^{t+1}$ mutually orthogonal (MO)
complementary set matrices starting from a companion pair of sequences. We
relate correlation properties of column sequences to that of the companion pair
and illustrate how to select an appropriate companion pair to ensure that a
given column correlation constraint is satisfied. For $t=0$, companion pair
properties directly determine matrix column correlation properties. For $t\geq
1$, reducing correlation merits of the companion pair may lead to improved
column correlation properties. However, further decrease of the maximum
out-off-phase aperiodic autocorrelation of column sequences is not possible
once the companion pair correlation merit is less than a threshold determined
by $t$. We also reveal a design of the companion pair which leads to
complementary set matrices with Golay column sequences. Exhaustive search for
companion pairs satisfying a column correlation constraint is infeasible for
medium and long sequences. We instead search for two shorter length sequences
by minimizing a cost function in terms of their autocorrelation and
crosscorrelation merits. Furthermore, an improved cost function which helps in
reducing the maximum out-off-phase column correlation is derived based on the
properties of the companion pair. By exploiting the well-known Welch bound,
sufficient conditions for the existence of companion pairs which satisfy a set
of column correlation constraints are also given.
|
[
{
"version": "v1",
"created": "Wed, 3 May 2006 16:19:22 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wu",
"Di",
""
],
[
"Spasojevic",
"Predrag",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605011
|
Vida Dujmovi\'c
|
Prosenjit Bose, Vida Dujmovi\'c, Danny Krizanc, Stefan Langerman, Pat
Morin, David R. Wood, Stefanie Wuhrer
|
A Characterization of the Degree Sequences of 2-Trees
|
17 pages, 5 figures
|
The Journal of Graph Theory, 58(3):191-209, 2008
|
10.1002/jgt.20302
| null |
cs.DM math.CO
| null |
A graph G is a 2-tree if G=K_3, or G has a vertex v of degree 2, whose
neighbours are adjacent, and G\v{i}s a 2-tree. A characterization of the degree
sequences of 2-trees is given. This characterization yields a linear-time
algorithm for recognizing and realizing degree sequences of 2-trees.
|
[
{
"version": "v1",
"created": "Wed, 3 May 2006 16:57:21 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jun 2006 15:37:20 GMT"
}
] | 2012-10-23T00:00:00 |
[
[
"Bose",
"Prosenjit",
""
],
[
"Dujmović",
"Vida",
""
],
[
"Krizanc",
"Danny",
""
],
[
"Langerman",
"Stefan",
""
],
[
"Morin",
"Pat",
""
],
[
"Wood",
"David R.",
""
],
[
"Wuhrer",
"Stefanie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0605012
|
Martin Loetzsch
|
L. Steels, M. Loetzsch
|
Perspective alignment in spatial language
|
to appear in: K. Coventry, J. Bateman, and T. Tenbrink (eds.) Spatial
Language in Dialogue. Oxford University Press, 2008
| null | null | null |
cs.AI
| null |
It is well known that perspective alignment plays a major role in the
planning and interpretation of spatial language. In order to understand the
role of perspective alignment and the cognitive processes involved, we have
made precise complete cognitive models of situated embodied agents that
self-organise a communication system for dialoging about the position and
movement of real world objects in their immediate surroundings. We show in a
series of robotic experiments which cognitive mechanisms are necessary and
sufficient to achieve successful spatial language and why and how perspective
alignment can take place, either implicitly or based on explicit marking.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 17:16:02 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Feb 2008 13:43:13 GMT"
}
] | 2008-02-13T00:00:00 |
[
[
"Steels",
"L.",
""
],
[
"Loetzsch",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0605013
|
L. Sunil Chandran
|
L. Sunil Chandran and Mathew C Francis and Naveen Sivadasan
|
Geometric representation of graphs in low dimension
|
preliminary version appeared in Cocoon 2006
| null | null | null |
cs.DM cs.DS
| null |
We give an efficient randomized algorithm to construct a box representation
of any graph G on n vertices in $1.5 (\Delta + 2) \ln n$ dimensions, where
$\Delta$ is the maximum degree of G. We also show that $\boxi(G) \le (\Delta +
2) \ln n$ for any graph G. Our bound is tight up to a factor of $\ln n$. We
also show that our randomized algorithm can be derandomized to get a polynomial
time deterministic algorithm. Though our general upper bound is in terms of
maximum degree $\Delta$, we show that for almost all graphs on n vertices, its
boxicity is upper bound by $c\cdot(d_{av} + 1) \ln n$ where d_{av} is the
average degree and c is a small constant. Also, we show that for any graph G,
$\boxi(G) \le \sqrt{8 n d_{av} \ln n}$, which is tight up to a factor of $b
\sqrt{\ln n}$ for a constant b.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 16:53:29 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jul 2007 17:22:41 GMT"
}
] | 2007-07-31T00:00:00 |
[
[
"Chandran",
"L. Sunil",
""
],
[
"Francis",
"Mathew C",
""
],
[
"Sivadasan",
"Naveen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0605014
|
Yingbin Liang
|
Yingbin Liang and H. Vincent Poor
|
Generalized Multiple Access Channels with Confidential Messages
|
Submitted to IEEE Transactions on Information Theory, April 2006
| null | null | null |
cs.IT math.IT
| null |
A discrete memoryless generalized multiple access channel (GMAC) with
confidential messages is studied, where two users attempt to transmit common
information to a destination and each user also has private (confidential)
information intended for the destination. The two users are allowed to receive
channel outputs, and hence may obtain the confidential information sent by each
other from channel outputs they receive. However, each user views the other
user as a wire-tapper, and wishes to keep its confidential information as
secret as possible from the other user. The level of secrecy of the
confidential information is measured by the equivocation rate, i.e., the
entropy rate of the confidential information conditioned on channel outputs at
the wire-tapper. The performance measure of interest for the GMAC with
confidential messages is the rate-equivocation tuple that includes the common
rate, two private rates and two equivocation rates as components. The set that
includes all these achievable rate-equivocation tuples is referred to as the
capacity-equivocation region. The GMAC with one confidential message set is
first studied, where only one user (user 1) has private (confidential)
information for the destination. Inner and outer bounds on the
capacity-equivocation region are derived, and the capacity-equivocation are
established for some classes of channels including the Gaussian GMAC.
Furthermore, the secrecy capacity region is established, which is the set of
all achievable rates with user 2 being perfectly ignorant of confidential
messages of user 1. For the GMAC with two confidential message sets, where both
users have confidential messages for the destination, an inner bound on the
capacity-equivocation region is obtained.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 18:33:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605015
|
Ciro Cattuto
|
Ciro Cattuto, Vittorio Loreto, Luciano Pietronero
|
Collaborative Tagging and Semiotic Dynamics
|
8 pages, 7 figures
|
PNAS 104, 1461 (2007)
|
10.1073/pnas.0610487104
| null |
cs.CY cs.DL physics.data-an physics.soc-ph
| null |
Collaborative tagging has been quickly gaining ground because of its ability
to recruit the activity of web users into effectively organizing and sharing
vast amounts of information. Here we collect data from a popular system and
investigate the statistical properties of tag co-occurrence. We introduce a
stochastic model of user behavior embodying two main aspects of collaborative
tagging: (i) a frequency-bias mechanism related to the idea that users are
exposed to each other's tagging activity; (ii) a notion of memory - or aging of
resources - in the form of a heavy-tailed access to the past state of the
system. Remarkably, our simple modeling is able to account quantitatively for
the observed experimental features, with a surprisingly high accuracy. This
points in the direction of a universal behavior of users, who - despite the
complexity of their own cognitive processes and the uncoordinated and selfish
nature of their tagging activity - appear to follow simple activity patterns.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 18:53:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cattuto",
"Ciro",
""
],
[
"Loreto",
"Vittorio",
""
],
[
"Pietronero",
"Luciano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0605016
|
Yingbin Liang
|
Yingbin Liang and Venugopal V. Veeravalli
|
Cooperative Relay Broadcast Channels
|
Submitted to the IEEE Transactions on Information Theory, July 2005
| null | null | null |
cs.IT math.IT
| null |
The capacity regions are investigated for two relay broadcast channels
(RBCs), where relay links are incorporated into standard two-user broadcast
channels to support user cooperation. In the first channel, the Partially
Cooperative Relay Broadcast Channel, only one user in the system can act as a
relay and transmit to the other user through a relay link. An achievable rate
region is derived based on the relay using the decode-and-forward scheme. An
outer bound on the capacity region is derived and is shown to be tighter than
the cut-set bound. For the special case where the Partially Cooperative RBC is
degraded, the achievable rate region is shown to be tight and provides the
capacity region. Gaussian Partially Cooperative RBCs and Partially Cooperative
RBCs with feedback are further studied. In the second channel model being
studied in the paper, the Fully Cooperative Relay Broadcast Channel, both users
can act as relay nodes and transmit to each other through relay links. This is
a more general model than the Partially Cooperative RBC. All the results for
Partially Cooperative RBCs are correspondingly generalized to the Fully
Cooperative RBCs. It is further shown that the AWGN Fully Cooperative RBC has a
larger achievable rate region than the AWGN Partially Cooperative RBC. The
results illustrate that relaying and user cooperation are powerful techniques
in improving the capacity of broadcast channels.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 19:13:50 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Veeravalli",
"Venugopal V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605017
|
Tran Cao Son
|
Phan Huy Tu, Tran Cao Son, and Chitta Baral
|
Reasoning and Planning with Sensing Actions, Incomplete Information, and
Static Causal Laws using Answer Set Programming
|
72 pages, 3 figures, a preliminary version of this paper appeared in
the proceedings of the 7th International Conference on Logic Programming and
Non-Monotonic Reasoning, 2004. To appear in Theory and Practice of Logic
Programming
| null | null | null |
cs.AI
| null |
We extend the 0-approximation of sensing actions and incomplete information
in [Son and Baral 2000] to action theories with static causal laws and prove
its soundness with respect to the possible world semantics. We also show that
the conditional planning problem with respect to this approximation is
NP-complete. We then present an answer set programming based conditional
planner, called ASCP, that is capable of generating both conformant plans and
conditional plans in the presence of sensing actions, incomplete information
about the initial state, and static causal laws. We prove the correctness of
our implementation and argue that our planner is sound and complete with
respect to the proposed approximation. Finally, we present experimental results
comparing ASCP to other planners.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 22:35:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Tu",
"Phan Huy",
""
],
[
"Son",
"Tran Cao",
""
],
[
"Baral",
"Chitta",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0605018
|
Florentin Smarandache
|
Florentin Smarandache, Sukanto Bhattacharya, Mohammad Khoshnevisan,
Housila P. Singh, Rajesh Singh, F. Kaymram, S. Malakar, Jose L. Salmeron
|
Computational Modeling in Applied Problems: collected papers on
econometrics, operations research, game theory and simulation
|
108 pages, many figures
|
Hexis, 2006.
| null | null |
cs.OH
| null |
Computational models pervade all branches of the exact sciences and have in
recent times also started to prove to be of immense utility in some of the
traditionally 'soft' sciences like ecology, sociology and politics. This volume
is a collection of a few cutting-edge research papers on the application of
variety of computational models and tools in the analysis, interpretation and
solution of vexing real-world problems and issues in economics, management,
ecology and global politics by some prolific researchers in the field.
|
[
{
"version": "v1",
"created": "Fri, 5 May 2006 00:35:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Smarandache",
"Florentin",
""
],
[
"Bhattacharya",
"Sukanto",
""
],
[
"Khoshnevisan",
"Mohammad",
""
],
[
"Singh",
"Housila P.",
""
],
[
"Singh",
"Rajesh",
""
],
[
"Kaymram",
"F.",
""
],
[
"Malakar",
"S.",
""
],
[
"Salmeron",
"Jose L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0605019
|
Frederic Chyzak
|
Fr\'ed\'eric Chyzak (INRIA Rocquencourt), Michael Drmota, Thomas
Klausner, Gerard Kok
|
The Distribution of Patterns in Random Trees
| null | null | null | null |
cs.DM math.CO
| null |
Let $T\_n$ denote the set of unrooted labeled trees of size $n$ and let
$T\_n$ be a particular (finite, unlabeled) tree. Assuming that every tree of
$T\_n$ is equally likely, it is shown that the limiting distribution as $n$
goes to infinity of the number of occurrences of $M$ as an induced subtree is
asymptotically normal with mean value and variance asymptotically equivalent to
$\mu n$ and $\sigma^2n$, respectively, where the constants $\mu>0$ and
$\sigma\ge 0$ are computable.
|
[
{
"version": "v1",
"created": "Fri, 5 May 2006 09:31:01 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Chyzak",
"Frédéric",
"",
"INRIA Rocquencourt"
],
[
"Drmota",
"Michael",
""
],
[
"Klausner",
"Thomas",
""
],
[
"Kok",
"Gerard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0605020
|
Sergey Alpaev
|
Sergey Alpaev
|
Applied MVC Patterns. A pattern language
| null | null | null | null |
cs.SE
| null |
How to get advantages of MVC model without making applications unnecessarily
complex? The full-featured MVC implementation is on the top end of ladder of
complexity. The other end is meant for simple cases that do not call for such
complex designs, however still in need of the advantages of MVC patterns, such
as ability to change the look-and-feel. This paper presents patterns of MVC
implementation that help to benefit from the paradigm and keep the right
balance between flexibility and implementation complexity.
|
[
{
"version": "v1",
"created": "Fri, 5 May 2006 10:25:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Alpaev",
"Sergey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0605021
|
Harald Zankl
|
Harald Zankl
|
SAT Techniques for Lexicographic Path Orders
|
29 pages, Seminar Report
| null | null | null |
cs.SC
| null |
This seminar report is concerned with expressing LPO-termination of term
rewrite systems as a satisfiability problem in propositional logic. After
relevant algorithms are explained, experimental results are reported.
|
[
{
"version": "v1",
"created": "Fri, 5 May 2006 19:11:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zankl",
"Harald",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0605022
|
Martin Kurth
|
Martin Kurth, Jim LeBlanc
|
Toward a Collection-based Metadata Maintenance Model
|
10 pages, 4 figures; submitted to DC 2006
| null | null | null |
cs.DL
| null |
In this paper, the authors identify key entities and relationships in the
operational management of metadata catalogs that describe digital collections,
and they draft a data model to support the administration of metadata
maintenance for collections. Further, they consider this proposed model in
light of other data schemes to which it relates and discuss the implications of
the model for library metadata maintenance operations.
|
[
{
"version": "v1",
"created": "Fri, 5 May 2006 18:16:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kurth",
"Martin",
""
],
[
"LeBlanc",
"Jim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0605023
|
Ender Tekin
|
Ender Tekin and Aylin Yener
|
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy
Constraints
|
International Symposium on Information Theory, 2006. 5 pages
| null | null | null |
cs.IT cs.CR math.IT
| null |
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this
scenario, multiple users communicate with an intended receiver in the presence
of an intelligent and informed wire-tapper who receives a degraded version of
the signal at the receiver. We define a suitable security measure for this
multi-access environment. We derive an outer bound for the rate region such
that secrecy to some pre-determined degree can be maintained. We also find,
using Gaussian codebooks, an achievable such secrecy region. Gaussian codewords
are shown to achieve the sum capacity outer bound, and the achievable region
concides with the outer bound for Gaussian codewords, giving the capacity
region when inputs are constrained to be Gaussian. We present numerical results
showing the new rate region and compare it with that of the Gaussian
Multiple-Access Channel (GMAC) with no secrecy constraints.
|
[
{
"version": "v1",
"created": "Sat, 6 May 2006 16:22:26 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605024
|
Marcus Hutter
|
Shane Legg and Marcus Hutter
|
A Formal Measure of Machine Intelligence
|
8 two-column pages
|
Proc. 15th Annual Machine Learning Conference of {B}elgium and The
Netherlands (Benelearn 2006) pages 73-80
| null |
IDSIA-10-06
|
cs.AI cs.LG
| null |
A fundamental problem in artificial intelligence is that nobody really knows
what intelligence is. The problem is especially acute when we need to consider
artificial systems which are significantly different to humans. In this paper
we approach this problem in the following way: We take a number of well known
informal definitions of human intelligence that have been given by experts, and
extract their essential features. These are then mathematically formalised to
produce a general measure of intelligence for arbitrary machines. We believe
that this measure formally captures the concept of machine intelligence in the
broadest reasonable sense.
|
[
{
"version": "v1",
"created": "Sat, 6 May 2006 16:56:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Legg",
"Shane",
""
],
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0605025
|
Vytautas Perlibakas
|
Vytautas Perlibakas
|
Face Recognition using Principal Component Analysis and Log-Gabor
Filters
|
Unpublished manuscript. March 2005. 23 pages, 7 figures, 5 tables
| null | null | null |
cs.CV
| null |
In this article we propose a novel face recognition method based on Principal
Component Analysis (PCA) and Log-Gabor filters. The main advantages of the
proposed method are its simple implementation, training, and very high
recognition accuracy. For recognition experiments we used 5151 face images of
1311 persons from different sets of the FERET and AR databases that allow to
analyze how recognition accuracy is affected by the change of facial
expressions, illumination, and aging. Recognition experiments with the FERET
database (containing photographs of 1196 persons) showed that our method can
achieve maximal 97-98% first one recognition rate and 0.3-0.4% Equal Error
Rate. The experiments also showed that the accuracy of our method is less
affected by eye location errors and used image normalization method than of
traditional PCA -based recognition method.
|
[
{
"version": "v1",
"created": "Sun, 7 May 2006 13:30:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Perlibakas",
"Vytautas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0605026
|
Yuri Pritykin
|
Yuri Pritykin
|
Strongly Almost Periodic Sequences under Finite Automata Mappings
|
7 pages
| null | null | null |
cs.DM
| null |
The notion of almost periodicity nontrivially generalizes the notion of
periodicity. Strongly almost periodic sequences (=uniformly recurrent infinite
words) first appeared in the field of symbolic dynamics, but then turned out to
be interesting in connection with computer science. The paper studies the class
of eventually strongly almost periodic sequences (i. e., becoming strongly
almost periodic after deleting some prefix). We prove that the property of
eventual strong almost periodicity is preserved under the mappings done by
finite automata and finite transducers. The class of almost periodic sequences
includes the class of eventually strongly almost periodic sequences. We prove
this inclusion to be strict.
|
[
{
"version": "v1",
"created": "Sun, 7 May 2006 14:46:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pritykin",
"Yuri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0605027
|
Vytautas Perlibakas
|
Vytautas Perlibakas
|
Recognition of expression variant faces using masked log-Gabor features
and Principal Component Analysis
|
Unpublished manuscript. June 2005. 20 pages, 8 figures, 5 tables
| null | null | null |
cs.CV
| null |
In this article we propose a method for the recognition of faces with
different facial expressions. For recognition we extract feature vectors by
using log-Gabor filters of multiple orientations and scales. Using sliding
window algorithm and variances -based masking these features are extracted at
image regions that are less affected by the changes of facial expressions.
Extracted features are passed to the Principal Component Analysis (PCA) -based
recognition method. The results of face recognition experiments using
expression variant faces showed that the proposed method could achieve higher
recognition accuracy than many other methods. For development and testing we
used facial images from the AR and FERET databases. Using facial photographs of
more than one thousand persons from the FERET database the proposed method
achieved 96.6-98.9% first one recognition rate and 0.2-0.6% Equal Error Rate
(EER).
|
[
{
"version": "v1",
"created": "Sun, 7 May 2006 15:02:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Perlibakas",
"Vytautas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0605028
|
Ender Tekin
|
Ender Tekin and Aylin Yener
|
The Gaussian Multiple Access Wire-Tap Channel
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.CR math.IT
| null |
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this
scenario, multiple users communicate with an intended receiver in the presence
of an intelligent and informed wire-tapper who receives a degraded version of
the signal at the receiver. We define suitable security measures for this
multi-access environment. Using codebooks generated randomly according to a
Gaussian distribution, achievable secrecy rate regions are identified using
superposition coding and TDMA coding schemes. An upper bound for the secrecy
sum-rate is derived, and our coding schemes are shown to achieve the sum
capacity. Numerical results showing the new rate region are presented and
compared with the capacity region of the Gaussian Multiple-Access Channel
(GMAC) with no secrecy constraints, quantifying the price paid for secrecy.
|
[
{
"version": "v1",
"created": "Sun, 7 May 2006 22:37:52 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Mar 2008 19:34:01 GMT"
}
] | 2008-03-31T00:00:00 |
[
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0605029
|
Shiva Kasiviswanathan
|
Martin Furer, Shiva Prasad Kasiviswanathan
|
Spanners for Geometric Intersection Graphs
|
16 pages, 5 figures, Latex
|
Journal of Computational Geometry 3(1) (2012) 31-64
| null | null |
cs.CG
| null |
Efficient algorithms are presented for constructing spanners in geometric
intersection graphs. For a unit ball graph in R^k, a (1+\epsilon)-spanner is
obtained using efficient partitioning of the space into hypercubes and solving
bichromatic closest pair problems. The spanner construction has almost
equivalent complexity to the construction of Euclidean minimum spanning trees.
The results are extended to arbitrary ball graphs with a sub-quadratic running
time.
For unit ball graphs, the spanners have a small separator decomposition which
can be used to obtain efficient algorithms for approximating proximity problems
like diameter and distance queries. The results on compressed quadtrees,
geometric graph separators, and diameter approximation might be of independent
interest.
|
[
{
"version": "v1",
"created": "Sun, 7 May 2006 23:38:00 GMT"
}
] | 2012-10-10T00:00:00 |
[
[
"Furer",
"Martin",
""
],
[
"Kasiviswanathan",
"Shiva Prasad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0605030
|
Randy Cogill
|
Randy Cogill and Sanjay Lall
|
A Delay Analysis of Maximal Matching Switching with Speedup
|
11 pages, 2 figures. Submitted to the 2006 IEEE Conference on
Decision and Control
| null | null | null |
cs.NI cs.PF
| null |
In this paper we analyze the average queue backlog in a combined input-output
queued switch using a maximal size matching scheduling algorithm. We compare
this average backlog to the average backlog achieved by an optimal switch. We
model the cell arrival process as independent and identically distributed
between time slots and uniformly distributed among input and output ports. For
switches with many input and output ports, the backlog associated with maximal
size matching with speedup 3 is no more than 10/3 times the backlog associated
with an optimal switch. Moreover, this performance ratio rapidly approaches 2
as speedup increases.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2006 08:04:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cogill",
"Randy",
""
],
[
"Lall",
"Sanjay",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0605031
|
Mihaela Dinsoreanu PhD
|
Mihaela Dinsoreanu, Ioan Salomie, Kalman Pusztai
|
On the Design of Agent-Based Systems using UML and Extensions
| null | null | null | null |
cs.AI cs.MA cs.SE
| null |
The Unified Software Development Process (USDP) and UML have been now
generally accepted as the standard methodology and modeling language for
developing Object-Oriented Systems. Although Agent-based Systems introduces new
issues, we consider that USDP and UML can be used in an extended manner for
modeling Agent-based Systems. The paper presents a methodology for designing
agent-based systems and the specific models expressed in an UML-based notation
corresponding to each phase of the software development process. UML was
extended using the provided mechanism: stereotypes. Therefore, this approach
can be managed with any CASE tool supporting UML. A Case Study, the development
of a specific agent-based Student Evaluation System (SAS), is presented.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2006 12:21:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Pusztai",
"Kalman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0605032
|
Mihaela Dinsoreanu PhD
|
Tudor Marian, Bogdan Dumitriu, Mihaela Dinsoreanu, Ioan Salomie
|
A framework of reusable structures for mobile agent development
| null | null | null | null |
cs.MA cs.AI cs.SE
| null |
Mobile agents research is clearly aiming towards imposing agent based
development as the next generation of tools for writing software. This paper
comes with its own contribution to this global goal by introducing a novel
unifying framework meant to bring simplicity and interoperability to and among
agent platforms as we know them today. In addition to this, we also introduce a
set of agent behaviors which, although tailored for and from the area of
virtual learning environments, are none the less generic enough to be used for
rapid, simple, useful and reliable agent deployment. The paper also presents an
illustrative case study brought forward to prove the feasibility of our design.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2006 12:27:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Marian",
"Tudor",
""
],
[
"Dumitriu",
"Bogdan",
""
],
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Salomie",
"Ioan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0605033
|
Mihaela Dinsoreanu PhD
|
Mihaela Dinsoreanu, Cristian Godja, Claudiu Anghel, Ioan Salomie, Tom
Coffey
|
Mobile Agent Based Solutions for Knowledge Assessment in elearning
Environments
| null | null | null | null |
cs.MA cs.AI cs.SE
| null |
E-learning is nowadays one of the most interesting of the "e- " domains
available through the Internet. The main problem to create a Web-based, virtual
environment is to model the traditional domain and to implement the model using
the most suitable technologies. We analyzed the distance learning domain and
investigated the possibility to implement some e-learning services using mobile
agent technologies. This paper presents a model of the Student Assessment
Service (SAS) and an agent-based framework developed to be used for
implementing specific applications. A specific Student Assessment application
that relies on the framework was developed.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2006 12:37:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dinsoreanu",
"Mihaela",
""
],
[
"Godja",
"Cristian",
""
],
[
"Anghel",
"Claudiu",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Coffey",
"Tom",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0605034
|
Srinivas Shakkottai
|
Srinivas Shakkottai, R. Srikant
|
Peer to Peer Networks for Defense Against Internet Worms
|
11 Pages
| null | null | null |
cs.CR cs.AR cs.NI
| null |
Internet worms, which spread in computer networks without human mediation,
pose a severe threat to computer systems today. The rate of propagation of
worms has been measured to be extremely high and they can infect a large
fraction of their potential hosts in a short time. We study two different
methods of patch dissemination to combat the spread of worms. We first show
that using a fixed number of patch servers performs woefully inadequately
against Internet worms. We then show that by exploiting the exponential data
dissemination capability of P2P systems, the spread of worms can be halted very
effectively. We compare the two methods by using fluid models to compute two
quantities of interest: the time taken to effectively combat the progress of
the worm and the maximum number of infected hosts. We validate our models using
Internet measurements and simulations.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2006 17:02:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shakkottai",
"Srinivas",
""
],
[
"Srikant",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0605035
|
Filip Radlinski
|
Filip Radlinski and Thorsten Joachims
|
Query Chains: Learning to Rank from Implicit Feedback
|
10 pages
|
Proceedings of the ACM Conference on Knowledge Discovery and Data
Mining (KDD), ACM, 2005
| null | null |
cs.LG cs.IR
| null |
This paper presents a novel approach for using clickthrough data to learn
ranked retrieval functions for web search results. We observe that users
searching the web often perform a sequence, or chain, of queries with a similar
information need. Using query chains, we generate new types of preference
judgments from search engine logs, thus taking advantage of user intelligence
in reformulating queries. To validate our method we perform a controlled user
study comparing generated preference judgments to explicit relevance judgments.
We also implemented a real-world search engine to test our approach, using a
modified ranking SVM to learn an improved ranking function from preference
data. Our results demonstrate significant improvements in the ranking given by
the search engine. The learned rankings outperform both a static ranking
function, as well as one trained without considering query chains.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2006 22:05:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0605036
|
Filip Radlinski
|
Filip Radlinski and Thorsten Joachims
|
Evaluating the Robustness of Learning from Implicit Feedback
|
8 pages, Presented at ICML Workshop on Learning In Web Search, 2005
| null | null | null |
cs.LG cs.IR
| null |
This paper evaluates the robustness of learning from implicit feedback in web
search. In particular, we create a model of user behavior by drawing upon user
studies in laboratory and real-world settings. The model is used to understand
the effect of user behavior on the performance of a learning algorithm for
ranked retrieval. We explore a wide range of possible user behaviors and find
that learning from implicit feedback can be surprisingly robust. This
complements previous results that demonstrated our algorithm's effectiveness in
a real-world search engine application.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2006 23:38:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0605037
|
Filip Radlinski
|
Filip Radlinski and Thorsten Joachims
|
Minimally Invasive Randomization for Collecting Unbiased Preferences
from Clickthrough Logs
|
7 pages. Proceedings of the 21st National Conference on Artificial
Intelligence (AAAI), 2006
| null | null | null |
cs.IR cs.LG
| null |
Clickthrough data is a particularly inexpensive and plentiful resource to
obtain implicit relevance feedback for improving and personalizing search
engines. However, it is well known that the probability of a user clicking on a
result is strongly biased toward documents presented higher in the result set
irrespective of relevance. We introduce a simple method to modify the
presentation of search results that provably gives relevance judgments that are
unaffected by presentation bias under reasonable assumptions. We validate this
property of the training data in interactive real world experiments. Finally,
we show that using these unbiased relevance judgments learning methods can be
guaranteed to converge to an ideal ranking given sufficient data.
|
[
{
"version": "v1",
"created": "Tue, 9 May 2006 01:53:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Radlinski",
"Filip",
""
],
[
"Joachims",
"Thorsten",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0605038
|
Enrico Pontelli
|
Tran Cao Son, Enrico Pontelli, Islam Elkabani
|
An Unfolding-Based Semantics for Logic Programming with Aggregates
| null | null | null | null |
cs.SE cs.AI
| null |
The paper presents two equivalent definitions of answer sets for logic
programs with aggregates. These definitions build on the notion of unfolding of
aggregates, and they are aimed at creating methodologies to translate logic
programs with aggregates to normal logic programs or positive programs, whose
answer set semantics can be used to defined the semantics of the original
programs. The first definition provides an alternative view of the semantics
for logic programming with aggregates described by Pelov et al.
The second definition is similar to the traditional answer set definition for
normal logic programs, in that, given a logic program with aggregates and an
interpretation, the unfolding process produces a positive program. The paper
shows how this definition can be extended to consider aggregates in the head of
the rules.
The proposed views of logic programming with aggregates are simple and
coincide with the ultimate stable model semantics, and with other semantic
characterizations for large classes of program (e.g., programs with monotone
aggregates and programs that are aggregate-stratified).
Moreover, it can be directly employed to support an implementation using
available answer set solvers. The paper describes a system, called ASP^A, that
is capable of computing answer sets of programs with arbitrary (e.g.,
recursively defined) aggregates.
|
[
{
"version": "v1",
"created": "Tue, 9 May 2006 04:08:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Son",
"Tran Cao",
""
],
[
"Pontelli",
"Enrico",
""
],
[
"Elkabani",
"Islam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0605039
|
Amitabha Roy
|
Amitabha Roy, Stephan Zeisset, Charles J. Fleckenstein, John C. Huang
|
Fast and Generalized Polynomial Time Memory Consistency Verification
|
To appear in the proceedings of Computer Aided Verification (CAV)
2006
| null | null | null |
cs.AR cs.LO cs.PF
| null |
The problem of verifying multi-threaded execution against the memory
consistency model of a processor is known to be an NP hard problem. However
polynomial time algorithms exist that detect almost all failures in such
execution. These are often used in practice for microprocessor verification. We
present a low complexity and fully parallelized algorithm to check program
execution against the processor consistency model. In addition our algorithm is
general enough to support a number of consistency models without any
degradation in performance. An implementation of this algorithm is currently
used in practice to verify processors in the post silicon stage for multiple
architectures.
|
[
{
"version": "v1",
"created": "Tue, 9 May 2006 05:45:52 GMT"
},
{
"version": "v2",
"created": "Wed, 17 May 2006 12:07:57 GMT"
},
{
"version": "v3",
"created": "Tue, 23 May 2006 10:03:21 GMT"
},
{
"version": "v4",
"created": "Mon, 29 May 2006 06:33:06 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Roy",
"Amitabha",
""
],
[
"Zeisset",
"Stephan",
""
],
[
"Fleckenstein",
"Charles J.",
""
],
[
"Huang",
"John C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.