id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0605040
Marcus Hutter
Marcus Hutter
General Discounting versus Average Reward
17 pages, 1 table
Proc. 17th International Conf. on Algorithmic Learning Theory (ALT 2006) pages 244-258
null
IDSIA-11-06
cs.LG
null
Consider an agent interacting with an environment in cycles. In every interaction cycle the agent is rewarded for its performance. We compare the average reward U from cycle 1 to m (average value) with the future discounted reward V from cycle k to infinity (discounted value). We consider essentially arbitrary (non-geometric) discount sequences and arbitrary reward sequences (non-MDP environments). We show that asymptotically U for m->infinity and V for k->infinity are equal, provided both limits exist. Further, if the effective horizon grows linearly with k or faster, then existence of the limit of U implies that the limit of V exists. Conversely, if the effective horizon grows linearly with k or slower, then existence of the limit of V implies that the limit of U exists.
[ { "version": "v1", "created": "Tue, 9 May 2006 10:39:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0605041
Jian Cao
Jian Cao, Edmund M. Yeh
Asymptotically Optimal Multiple-access Communication via Distributed Rate Splitting
Submitted to the IEEE Transactions on Information Theory. 15 Pages
null
10.1109/TIT.2006.887497
null
cs.IT math.IT
null
We consider the multiple-access communication problem in a distributed setting for both the additive white Gaussian noise channel and the discrete memoryless channel. We propose a scheme called Distributed Rate Splitting to achieve the optimal rates allowed by information theory in a distributed manner. In this scheme, each real user creates a number of virtual users via a power/rate splitting mechanism in the M-user Gaussian channel or via a random switching mechanism in the M-user discrete memoryless channel. At the receiver, all virtual users are successively decoded. Compared with other multiple-access techniques, Distributed Rate Splitting can be implemented with lower complexity and less coordination. Furthermore, in a symmetric setting, we show that the rate tuple achieved by this scheme converges to the maximum equal rate point allowed by the information-theoretic bound as the number of virtual users per real user tends to infinity. When the capacity regions are asymmetric, we show that a point on the dominant face can be achieved asymptotically. Finally, when there is an unequal number of virtual users per real user, we show that differential user rate requirements can be accommodated in a distributed fashion.
[ { "version": "v1", "created": "Tue, 9 May 2006 14:32:51 GMT" }, { "version": "v2", "created": "Tue, 3 Oct 2006 19:48:15 GMT" } ]
2016-11-18T00:00:00
[ [ "Cao", "Jian", "" ], [ "Yeh", "Edmund M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605042
Yufang Xi
Yufang Xi, Edmund M. Yeh
Throughput Optimal Distributed Control of Stochastic Wireless Networks
This paper has been withdrawn
null
null
null
cs.NI
null
This paper has been withdrawn by the author due to the need for further revision.
[ { "version": "v1", "created": "Tue, 9 May 2006 19:14:52 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 22:14:38 GMT" } ]
2022-04-26T00:00:00
[ [ "Xi", "Yufang", "" ], [ "Yeh", "Edmund M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605043
Stefano Guerrini
Stefano Guerrini and Andrea Masini
Continuations, proofs and tests
32 pages, uses xy-pic
null
null
null
cs.LO cs.PL
null
Continuation Passing Style (CPS) is one of the most important issues in the field of functional programming languages, and the quest for a primitive notion of types for continuation is still open. Starting from the notion of ``test'' proposed by Girard, we develop a notion of test for intuitionistic logic. We give a complete deductive system for tests and we show that it is good to deal with ``continuations''. In particular, in the proposed system it is possible to work with Call by Value and Call by Name translations in a uniform way.
[ { "version": "v1", "created": "Tue, 9 May 2006 20:11:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Guerrini", "Stefano", "" ], [ "Masini", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0605044
Georg Schmidt
Georg Schmidt, and Vladimir R. Sidorenko
Linear Shift-Register Synthesis for Multiple Sequences of Varying Length
null
null
null
null
cs.IT math.IT
null
The problem of finding the shortest linear shift-register capable of generating t finite length sequences over some field F is considered. A similar problem was already addressed by Feng and Tzeng. They presented an iterative algorithm for solving this multi-sequence shift-register synthesis problem, which can be considered as generalization of the well known Berlekamp-Massey algorithm. The Feng-Tzeng algorithm works indeed, if all t sequences have the same length. This paper focuses on multi-sequence shift-register synthesis for generating sequences of varying length. It is exposed, that the Feng-Tzeng algorithm does not always give the correct solution in this case. A modified algorithm is proposed and formally proved, which overcomes this problem.
[ { "version": "v1", "created": "Tue, 9 May 2006 21:23:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Georg", "" ], [ "Sidorenko", "Vladimir R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605045
R.N.Mohan Professor
R.N.Mohan
On Orthogonalities in Matrices
null
null
null
null
cs.DM
null
In this paper we have discussed different possible orthogonalities in matrices, namely orthogonal, quasi-orthogonal, semi-orthogonal and non-orthogonal matrices including completely positive matrices, while giving some of their constructions besides studying some of their properties.
[ { "version": "v1", "created": "Wed, 10 May 2006 03:12:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Mohan", "R. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0605046
Gil Shamir
Gil I. Shamir
Patterns of i.i.d. Sequences and Their Entropy - Part I: General Bounds
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Tight bounds on the block entropy of patterns of sequences generated by independent and identically distributed (i.i.d.) sources are derived. A pattern of a sequence is a sequence of integer indices with each index representing the order of first occurrence of the respective symbol in the original sequence. Since a pattern is the result of data processing on the original sequence, its entropy cannot be larger. Bounds derived here describe the pattern entropy as function of the original i.i.d. source entropy, the alphabet size, the symbol probabilities, and their arrangement in the probability space. Matching upper and lower bounds derived provide a useful tool for very accurate approximations of pattern block entropies for various distributions, and for assessing the decrease of the pattern entropy from that of the original i.i.d. sequence.
[ { "version": "v1", "created": "Wed, 10 May 2006 04:13:58 GMT" }, { "version": "v2", "created": "Wed, 14 Nov 2007 01:30:18 GMT" } ]
2007-11-14T00:00:00
[ [ "Shamir", "Gil I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605047
Mokshay Madiman
Mokshay Madiman and Andrew Barron
Generalized Entropy Power Inequalities and Monotonicity Properties of Information
13 pages. Many minor modifications from first version, plus a section on refined results. This is almost but not exactly identical to the published version
IEEE Transactions on Information Theory, Vol. 53(7), pp. 2317-2329, July 2007
null
null
cs.IT math.IT math.PR math.ST stat.TH
null
New families of Fisher information and entropy power inequalities for sums of independent random variables are presented. These inequalities relate the information in the sum of $n$ independent random variables to the information contained in sums over subsets of the random variables, for an arbitrary collection of subsets. As a consequence, a simple proof of the monotonicity of information in central limit theorems is obtained, both in the setting of i.i.d. summands as well as in the more general setting of independent summands with variance-standardized sums.
[ { "version": "v1", "created": "Thu, 11 May 2006 01:07:10 GMT" }, { "version": "v2", "created": "Mon, 2 Jul 2007 09:49:06 GMT" } ]
2010-06-16T00:00:00
[ [ "Madiman", "Mokshay", "" ], [ "Barron", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
cs/0605048
Sebastian Roch
S. Roch
On Learning Thresholds of Parities and Unions of Rectangles in Random Walk Models
null
null
null
null
cs.LG cs.CC math.PR
null
In a recent breakthrough, [Bshouty et al., 2005] obtained the first passive-learning algorithm for DNFs under the uniform distribution. They showed that DNFs are learnable in the Random Walk and Noise Sensitivity models. We extend their results in several directions. We first show that thresholds of parities, a natural class encompassing DNFs, cannot be learned efficiently in the Noise Sensitivity model using only statistical queries. In contrast, we show that a cyclic version of the Random Walk model allows to learn efficiently polynomially weighted thresholds of parities. We also extend the algorithm of Bshouty et al. to the case of Unions of Rectangles, a natural generalization of DNFs to $\{0,...,b-1\}^n$.
[ { "version": "v1", "created": "Thu, 11 May 2006 03:27:12 GMT" } ]
2011-09-07T00:00:00
[ [ "Roch", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0605049
R.N.Mohan Professor
V.M.Siddlenikov, R.N.Mohan, Moon Ho Lee
On fractionally linear functions over a finite field
null
null
null
null
cs.DM
null
Abstrct: In this note, by considering fractionally linear functions over a finite field and consequently developing an abstract sequence, we study some of its properties.
[ { "version": "v1", "created": "Thu, 11 May 2006 06:58:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Siddlenikov", "V. M.", "" ], [ "Mohan", "R. N.", "" ], [ "Lee", "Moon Ho", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0605050
V. Arvind
V. Arvind and Piyush P Kurur
A Polynomial Time Nilpotence Test for Galois Groups and Related Results
12 pages
null
null
null
cs.CC cs.DS
null
We give a deterministic polynomial-time algorithm to check whether the Galois group $\Gal{f}$ of an input polynomial $f(X) \in \Q[X]$ is nilpotent: the running time is polynomial in $\size{f}$. Also, we generalize the Landau-Miller solvability test to an algorithm that tests if $\Gal{f}$ is in $\Gamma_d$: this algorithm runs in time polynomial in $\size{f}$ and $n^d$ and, moreover, if $\Gal{f}\in\Gamma_d$ it computes all the prime factors of $# \Gal{f}$.
[ { "version": "v1", "created": "Thu, 11 May 2006 08:20:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Arvind", "V.", "" ], [ "Kurur", "Piyush P", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0605051
Chad Cole
Chad A. Cole, Stephen G. Wilson, Eric. K. Hall, Thomas R. Giallorenzi
A General Method for Finding Low Error Rates of LDPC Codes
Submitted Trans. Inf. Theory
null
null
null
cs.IT math.IT
null
This paper outlines a three-step procedure for determining the low bit error rate performance curve of a wide class of LDPC codes of moderate length. The traditional method to estimate code performance in the higher SNR region is to use a sum of the contributions of the most dominant error events to the probability of error. These dominant error events will be both code and decoder dependent, consisting of low-weight codewords as well as non-codeword events if ML decoding is not used. For even moderate length codes, it is not feasible to find all of these dominant error events with a brute force search. The proposed method provides a convenient way to evaluate very low bit error rate performance of an LDPC code without requiring knowledge of the complete error event weight spectrum or resorting to a Monte Carlo simulation. This new method can be applied to various types of decoding such as the full belief propagation version of the message passing algorithm or the commonly used min-sum approximation to belief propagation. The proposed method allows one to efficiently see error performance at bit error rates that were previously out of reach of Monte Carlo methods. This result will provide a solid foundation for the analysis and design of LDPC codes and decoders that are required to provide a guaranteed very low bit error rate performance at certain SNRs.
[ { "version": "v1", "created": "Thu, 11 May 2006 14:21:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Cole", "Chad A.", "" ], [ "Wilson", "Stephen G.", "" ], [ "Hall", "Eric. K.", "" ], [ "Giallorenzi", "Thomas R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605052
Yufang Xi
Yufang Xi and Edmund M. Yeh
Node-Based Optimal Power Control, Routing, and Congestion Control in Wireless Networks
Full paper with 8 figures. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.NI
null
We present a unified analytical framework within which power control, rate allocation, routing, and congestion control for wireless networks can be optimized in a coherent and integrated manner. We consider a multi-commodity flow model with an interference-limited physical-layer scheme in which power control and routing variables are chosen to minimize the sum of convex link costs reflecting, for instance, queuing delay. Distributed network algorithms where joint power control and routing are performed on a node-by-node basis are presented. We show that with appropriately chosen parameters, these algorithms iteratively converge to the global optimum from any initial point with finite cost. Next, we study refinements of the algorithms for more accurate link capacity models, and extend the results to wireless networks where the physical-layer achievable rate region is given by an arbitrary convex set, and the link costs are strictly quasiconvex. Finally, we demonstrate that congestion control can be seamlessly incorporated into our framework, so that algorithms developed for power control and routing can naturally be extended to optimize user input rates.
[ { "version": "v1", "created": "Thu, 11 May 2006 21:15:31 GMT" }, { "version": "v2", "created": "Tue, 18 Sep 2007 15:15:15 GMT" } ]
2007-09-18T00:00:00
[ [ "Xi", "Yufang", "" ], [ "Yeh", "Edmund M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605053
Rajkumar Buyya
Hussein Gibbins and Rajkumar Buyya
Gridscape II: A Customisable and Pluggable Grid Monitoring Portal and its Integration with Google Maps
12 pages
null
null
Technical Report, GRIDS-TR-2006-8, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, May 12, 2006
cs.DC
null
Grid computing has emerged as an effective means of facilitating the sharing of distributed heterogeneous resources, enabling collaboration in large scale environments. However, the nature of Grid systems, coupled with the overabundance and fragmentation of information, makes it difficult to monitor resources, services, and computations in order to plan and make decisions. In this paper we present Gridscape II, a customisable portal component that can be used on its own or plugged in to compliment existing Grid portals. Gridscape II manages the gathering of information from arbitrary, heterogeneous and distributed sources and presents them together seamlessly within a single interface. It also leverages the Google Maps API in order to provide a highly interactive user interface. Gridscape II is simple and easy to use, providing a solution to those users who do not wish to invest heavily in developing their own monitoring portal from scratch, and also for those users who want something that is easy to customise and extend for their specific needs.
[ { "version": "v1", "created": "Fri, 12 May 2006 09:41:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gibbins", "Hussein", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0605054
Lutz Strassburger
Francois Lamarche and Lutz Strassburger
From Proof Nets to the Free *-Autonomous Category
LaTeX, 44 pages, final version for LMCS; v2: updated bibliography
Logical Methods in Computer Science, Volume 2, Issue 4 (October 5, 2006) lmcs:2239
10.2168/LMCS-2(4:3)2006
null
cs.LO
null
In the first part of this paper we present a theory of proof nets for full multiplicative linear logic, including the two units. It naturally extends the well-known theory of unit-free multiplicative proof nets. A linking is no longer a set of axiom links but a tree in which the axiom links are subtrees. These trees will be identified according to an equivalence relation based on a simple form of graph rewriting. We show the standard results of sequentialization and strong normalization of cut elimination. In the second part of the paper we show that the identifications enforced on proofs are such that the class of two-conclusion proof nets defines the free *-autonomous category.
[ { "version": "v1", "created": "Fri, 12 May 2006 12:03:16 GMT" }, { "version": "v2", "created": "Tue, 26 Sep 2006 14:07:40 GMT" }, { "version": "v3", "created": "Thu, 5 Oct 2006 12:53:01 GMT" } ]
2017-01-11T00:00:00
[ [ "Lamarche", "Francois", "" ], [ "Strassburger", "Lutz", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0605055
Pierre Bessiere
David Bellot (INRIA Rh\^one-Alpes / Gravir-Imag), Pierre Bessiere (INRIA Rh\^one-Alpes / Gravir-Imag)
Approximate Discrete Probability Distribution Representation using a Multi-Resolution Binary Tree
null
International Conference on Tools for Artificial Intelligence - ITCAI 2003, Sacramento, (2003) --
null
null
cs.AI
null
Computing and storing probabilities is a hard problem as soon as one has to deal with complex distributions over multiple random variables. The problem of efficient representation of probability distributions is central in term of computational efficiency in the field of probabilistic reasoning. The main problem arises when dealing with joint probability distributions over a set of random variables: they are always represented using huge probability arrays. In this paper, a new method based on binary-tree representation is introduced in order to store efficiently very large joint distributions. Our approach approximates any multidimensional joint distributions using an adaptive discretization of the space. We make the assumption that the lower is the probability mass of a particular region of feature space, the larger is the discretization step. This assumption leads to a very optimized representation in term of time and memory. The other advantages of our approach are the ability to refine dynamically the distribution every time it is needed leading to a more accurate representation of the probability distribution and to an anytime representation of the distribution.
[ { "version": "v1", "created": "Fri, 12 May 2006 13:32:50 GMT" } ]
2016-08-16T00:00:00
[ [ "Bellot", "David", "", "INRIA Rhône-Alpes / Gravir-Imag" ], [ "Bessiere", "Pierre", "", "INRIA Rhône-Alpes / Gravir-Imag" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0605056
Rajkumar Buyya
Chee Shin Yeo, Marcos Dias de Assuncao, Jia Yu, Anthony Sulistio, Srikumar Venugopal, Martin Placek, and Rajkumar Buyya
Utility Computing and Global Grids
23 pages
null
null
Technical Report, GRIDS-TR-2006-7, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, April 13, 2006
cs.DC
null
This chapter focuses on the use of Grid technologies to achieve utility computing. An overview of how Grids can support utility computing is first presented through the architecture of Utility Grids. Then, utility-based resource allocation is described in detail at each level of the architecture. Finally, some industrial solutions for utility computing are discussed.
[ { "version": "v1", "created": "Fri, 12 May 2006 20:36:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Yeo", "Chee Shin", "" ], [ "de Assuncao", "Marcos Dias", "" ], [ "Yu", "Jia", "" ], [ "Sulistio", "Anthony", "" ], [ "Venugopal", "Srikumar", "" ], [ "Placek", "Martin", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0605057
Rajiv Ranjan Mr.
Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya
SLA-Based Coordinated Superscheduling Scheme and Performance for Computational Grids
null
In Proceedings of the 8th IEEE International Conference on Cluster Computing (Cluster 2006), IEEE Computer Society Press, September 27 - 30, 2006, Barcelona, Spain.
null
null
cs.DC
null
The Service Level Agreement~(SLA) based grid superscheduling approach promotes coordinated resource sharing. Superscheduling is facilitated between administratively and topologically distributed grid sites by grid schedulers such as Resource brokers. In this work, we present a market-based SLA coordination mechanism. We based our SLA model on a well known \emph{contract net protocol}. The key advantages of our approach are that it allows:~(i) resource owners to have finer degree of control over the resource allocation that was previously not possible through traditional mechanism; and (ii) superschedulers to bid for SLA contracts in the contract net with focus on completing the job within the user specified deadline. In this work, we use simulation to show the effectiveness of our proposed approach.
[ { "version": "v1", "created": "Mon, 15 May 2006 13:41:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Ranjan", "Rajiv", "" ], [ "Harwood", "Aaron", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0605058
Russell O'Connor
Russell O'Connor
A Monadic, Functional Implementation of Real Numbers
This paper is to appear in an upcoming issue of Mathematical Structures in Computer Science published by Cambridge University Press. For more information and the latest source code for Few Digits, see <http://r6.ca/FewDigits/>
Russell O'Connor: A monadic, functional implementation of real numbers. Mathematical Structures in Computer Science 17(1): 129-159 (2007)
10.1017/S0960129506005871
null
cs.NA cs.MS
null
Large scale real number computation is an essential ingredient in several modern mathematical proofs. Because such lengthy computations cannot be verified by hand, some mathematicians want to use software proof assistants to verify the correctness of these proofs. This paper develops a new implementation of the constructive real numbers and elementary functions for such proofs by using the monad properties of the completion operation on metric spaces. Bishop and Bridges's notion of regular sequences is generalized to, what I call, regular functions which form the completion of any metric space. Using the monad operations, continuous functions on length spaces (a common subclass of metric spaces) are created by lifting continuous functions on the original space. A prototype Haskell implementation has been created. I believe that this approach yields a real number library that is reasonably efficient for computation, and still simple enough to easily verify its correctness.
[ { "version": "v1", "created": "Sun, 14 May 2006 17:05:14 GMT" } ]
2008-05-19T00:00:00
[ [ "O'Connor", "Russell", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0605059
Jean-Marc Rosengard
Jean-Marc Rosengard, Marian Ursu
Ontological Representations of Software Patterns
7 pages
Proceedings of KES'04, Lecture Notes in Computer Science, vol. 3215, pp. 31-37, Springer-Verlag, 2004
10.1007/b100916
null
cs.SE cs.AI
null
This paper is based on and advocates the trend in software engineering of extending the use of software patterns as means of structuring solutions to software development problems (be they motivated by best practice or by company interests and policies). The paper argues that, on the one hand, this development requires tools for automatic organisation, retrieval and explanation of software patterns. On the other hand, that the existence of such tools itself will facilitate the further development and employment of patterns in the software development process. The paper analyses existing pattern representations and concludes that they are inadequate for the kind of automation intended here. Adopting a standpoint similar to that taken in the semantic web, the paper proposes that feasible solutions can be built on the basis of ontological representations.
[ { "version": "v1", "created": "Sun, 14 May 2006 18:31:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Rosengard", "Jean-Marc", "" ], [ "Ursu", "Marian", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0605060
Rajiv Ranjan Mr.
Rajiv Ranjan, Aaron Harwood and Rajkumar Buyya
A Case for Cooperative and Incentive-Based Coupling of Distributed Clusters
22 pages, extended version of the conference paper published at IEEE Cluster'05, Boston, MA
In Proceedings of the 7th IEEE International Conference on Cluster Computing (Cluster 2005), IEEE Computer Society Press, September 27 - 30, 2005, Boston, Massachusetts, USA.
10.1109/CLUSTR.2005.347038
null
cs.DC
null
Research interest in Grid computing has grown significantly over the past five years. Management of distributed resources is one of the key issues in Grid computing. Central to management of resources is the effectiveness of resource allocation as it determines the overall utility of the system. The current approaches to superscheduling in a grid environment are non-coordinated since application level schedulers or brokers make scheduling decisions independently of the others in the system. Clearly, this can exacerbate the load sharing and utilization problems of distributed resources due to suboptimal schedules that are likely to occur. To overcome these limitations, we propose a mechanism for coordinated sharing of distributed clusters based on computational economy. The resulting environment, called \emph{Grid-Federation}, allows the transparent use of resources from the federation when local resources are insufficient to meet its users' requirements. The use of computational economy methodology in coordinating resource allocation not only facilitates the QoS based scheduling, but also enhances utility delivered by resources.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:21:22 GMT" } ]
2016-11-18T00:00:00
[ [ "Ranjan", "Rajiv", "" ], [ "Harwood", "Aaron", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0605061
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan, Md. Abdul Mottalib and Minhaz Fahim Zibran
An Internet Framework to Bring Coherence between WAP and HTTP Ensuring Better Mobile Internet Security
8th International Conference on Advanced Communication Technology (ICACT 2006)
null
null
null
cs.NI
null
To bring coherence between Wireless Access Protocol (WAP) and Hyper Text Transfer Protocol (HTTP), in this paper, we have proposed an enhanced Internet framework, which incorporates a new markup language and a browser compatible with both of the access control protocols. This Markup Language and the browser enables co-existence of both Hyper Text Markup Language (HTML) and Wireless Markup Language (WML) contents in a single source file, whereas the browser incorporates the ability to hold contents compliant with both HTTP and WAP. The proposed framework also bridges the security gap that is present in the existing mobile Internet framework. Keywords: WAP, WML, HTTP, HTML, browser, parser, wireless devices.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:25:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Mottalib", "Md. Abdul", "" ], [ "Zibran", "Minhaz Fahim", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605062
Al-Mukaddim Khan Pathan
Al-Mukaddim Khan Pathan and Md. Golam Shagadul Amin Talukder
QoSIP: A QoS Aware IP Routing Ptotocol for Multimedia Data
8th International Conference of Advanced Communication Technology (ICACT 2006)
null
null
null
cs.NI
null
Conventional IP routing protocols are not suitable for multimedia applications which have very stringent Quality-of-Service (QoS) demands and they require a connection oriented service. For multimedia applications it is expected that the router should be able to forward the packet according to the demand of the packet and it is necessary to find a path that satisfies the specific demands of a particular application. In order to address these issues, in this paper, we have presented a QoS aware IP routing protocol where a router stores information about the QoS parameters and routes the packet accordingly. Keywords: IP Routing Protocol, Quality of Service (QoS) parameter, QoSIP, Selective Flooding.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:39:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Pathan", "Al-Mukaddim Khan", "" ], [ "Talukder", "Md. Golam Shagadul Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605063
Al-Mukaddim Khan Pathan
Asif Ahmed Anik and Al-Mukaddim Khan Pathan
An Electronic Payment System to Ensure Cost Effectiveness with Easy Security Incorporation for the Developing Countries
International Conference on Intelligent Agents, Web Technology and Internet Commerce (IAWTIC 2004)
null
null
null
cs.OH
null
With the rapid growth of Information and Communication Technology, Electronic commerce is now acting as a new means of carrying out business transactions through electronic means such as Internet environment. To avoid the complexities associated with the digital cash and electronic cash, consumers and vendors are looking for credit card payments on the Internet as one possible time-tested alternative. This gave rise of the on-line payment processing using a third-party verification; which is not suitable for the developing countries in most of the cases because of the excessive costs associated with it for maintenance and establishment of an online third-party processor. As a remedy of this problem, in this paper, we have proposed a framework for easy security incorporation in credit card based electronic payment system without the use of an on-line third- party processor; which tends to be low cost and effective for the developing countries.
[ { "version": "v1", "created": "Mon, 15 May 2006 10:57:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Anik", "Asif Ahmed", "" ], [ "Pathan", "Al-Mukaddim Khan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0605064
Carsten Lutz
Carsten Lutz and Frank Wolter
Modal Logics of Topological Relations
null
Logical Methods in Computer Science, Volume 2, Issue 2 (June 22, 2006) lmcs:2253
10.2168/LMCS-2(2:5)2006
null
cs.LO cs.AI cs.CC
null
Logical formalisms for reasoning about relations between spatial regions play a fundamental role in geographical information systems, spatial and constraint databases, and spatial reasoning in AI. In analogy with Halpern and Shoham's modal logic of time intervals based on the Allen relations, we introduce a family of modal logics equipped with eight modal operators that are interpreted by the Egenhofer-Franzosa (or RCC8) relations between regions in topological spaces such as the real plane. We investigate the expressive power and computational complexity of logics obtained in this way. It turns out that our modal logics have the same expressive power as the two-variable fragment of first-order logic, but are exponentially less succinct. The complexity ranges from (undecidable and) recursively enumerable to highly undecidable, where the recursively enumerable logics are obtained by considering substructures of structures induced by topological spaces. As our undecidability results also capture logics based on the real line, they improve upon undecidability results for interval temporal logics by Halpern and Shoham. We also analyze modal logics based on the five RCC5 relations, with similar results regarding the expressive power, but weaker results regarding the complexity.
[ { "version": "v1", "created": "Mon, 15 May 2006 14:42:36 GMT" }, { "version": "v2", "created": "Thu, 22 Jun 2006 11:54:31 GMT" } ]
2017-01-11T00:00:00
[ [ "Lutz", "Carsten", "" ], [ "Wolter", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0605065
Hector Zenil
Hector Zenil, Francisco Hernandez-Quiroz
On the possible Computational Power of the Human Mind
Complexity, Science and Society Conference, 2005, University of Liverpool, UK. 23 pages
null
10.1142/9789812707420_0020
null
cs.NE cs.AI cs.CC
null
The aim of this paper is to address the question: Can an artificial neural network (ANN) model be used as a possible characterization of the power of the human mind? We will discuss what might be the relationship between such a model and its natural counterpart. A possible characterization of the different power capabilities of the mind is suggested in terms of the information contained (in its computational complexity) or achievable by it. Such characterization takes advantage of recent results based on natural neural networks (NNN) and the computational power of arbitrary artificial neural networks (ANN). The possible acceptance of neural networks as the model of the human mind's operation makes the aforementioned quite relevant.
[ { "version": "v1", "created": "Mon, 15 May 2006 17:56:55 GMT" }, { "version": "v2", "created": "Sat, 27 May 2006 00:57:13 GMT" }, { "version": "v3", "created": "Sun, 11 Jun 2006 21:54:06 GMT" }, { "version": "v4", "created": "Sun, 8 Apr 2007 20:19:23 GMT" } ]
2016-11-23T00:00:00
[ [ "Zenil", "Hector", "" ], [ "Hernandez-Quiroz", "Francisco", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0605066
Xiaowen Zhang
Xiaowen Zhang, Ke Tang, Li Shu
A Chaotic Cipher Mmohocc and Its Randomness Evaluation
8 pages, 4 figures, and 3 tables, submitted to ICCS06
null
null
null
cs.CR
null
After a brief introduction to a new chaotic stream cipher Mmohocc which utilizes the fundamental chaos characteristics of mixing, unpredictability, and sensitivity to initial conditions, we conducted the randomness statistical tests against the keystreams generated by the cipher. Two batteries of most stringent randomness tests, namely the NIST Suite and the Diehard Suite, were performed. The results showed that the keystreams have successfully passed all the statistical tests. We conclude that Mmohocc can generate high-quality pseudorandom numbers from a statistical point of view.
[ { "version": "v1", "created": "Mon, 15 May 2006 18:25:35 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 11:58:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Zhang", "Xiaowen", "" ], [ "Tang", "Ke", "" ], [ "Shu", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0605067
Desmond Lun
Desmond S. Lun
Efficient Operation of Coded Packet Networks
136 pages, 25 figures
Ph.D. dissertation, Massachusetts Institute of Technology, June 2006
null
null
cs.IT cs.NI math.IT
null
A fundamental problem faced in the design of almost all packet networks is that of efficient operation--of reliably communicating given messages among nodes at minimum cost in resource usage. We present a solution to the efficient operation problem for coded packet networks, i.e., packet networks where the contents of outgoing packets are arbitrary, causal functions of the contents of received packets. Such networks are in contrast to conventional, routed packet networks, where outgoing packets are restricted to being copies of received packets and where reliability is provided by the use of retransmissions. This thesis introduces four considerations to coded packet networks: 1. efficiency, 2. the lack of synchronization in packet networks, 3. the possibility of broadcast links, and 4. packet loss. We take these considerations and give a prescription for operation that is novel and general, yet simple, useful, and extensible.
[ { "version": "v1", "created": "Mon, 15 May 2006 20:55:11 GMT" } ]
2007-07-16T00:00:00
[ [ "Lun", "Desmond S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605068
Bruno Salvy
Alin Bostan (INRIA Rocquencourt), Fr\'ed\'eric Chyzak (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt), Thomas Cluzeau (INRIA Sophia Antipolis)
Low Complexity Algorithms for Linear Recurrences
This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution
ISSAC'06, pages 31--38, ACM Press, 2006
10.1145/1145768.1145781
null
cs.SC
null
We consider two kinds of problems: the computation of polynomial and rational solutions of linear recurrences with coefficients that are polynomials with integer coefficients; indefinite and definite summation of sequences that are hypergeometric over the rational numbers. The algorithms for these tasks all involve as an intermediate quantity an integer $N$ (dispersion or root of an indicial polynomial) that is potentially exponential in the bit size of their input. Previous algorithms have a bit complexity that is at least quadratic in $N$. We revisit them and propose variants that exploit the structure of solutions and avoid expanding polynomials of degree $N$. We give two algorithms: a probabilistic one that detects the existence or absence of nonzero polynomial and rational solutions in $O(\sqrt{N}\log^{2}N)$ bit operations; a deterministic one that computes a compact representation of the solution in $O(N\log^{3}N)$ bit operations. Similar speed-ups are obtained in indefinite and definite hypergeometric summation. We describe the results of an implementation.
[ { "version": "v1", "created": "Tue, 16 May 2006 10:03:04 GMT" } ]
2008-04-03T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Chyzak", "Frédéric", "", "INRIA\n Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ], [ "Cluzeau", "Thomas", "", "INRIA Sophia\n Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0605069
Ori Shental
Nadav Yacov, Hadar Efraim, Haggai Kfir, Ido Kanter and Ori Shental
Parallel vs. Sequential Belief Propagation Decoding of LDPC Codes over GF(q) and Markov Sources
null
null
10.1016/j.physa.2006.12.009
null
cs.IT math.IT
null
A sequential updating scheme (SUS) for belief propagation (BP) decoding of LDPC codes over Galois fields, $GF(q)$, and correlated Markov sources is proposed, and compared with the standard parallel updating scheme (PUS). A thorough experimental study of various transmission settings indicates that the convergence rate, in iterations, of the BP algorithm (and subsequently its complexity) for the SUS is about one half of that for the PUS, independent of the finite field size $q$. Moreover, this 1/2 factor appears regardless of the correlations of the source and the channel's noise model, while the error correction performance remains unchanged. These results may imply on the 'universality' of the one half convergence speed-up of SUS decoding.
[ { "version": "v1", "created": "Tue, 16 May 2006 11:58:37 GMT" } ]
2009-11-11T00:00:00
[ [ "Yacov", "Nadav", "" ], [ "Efraim", "Hadar", "" ], [ "Kfir", "Haggai", "" ], [ "Kanter", "Ido", "" ], [ "Shental", "Ori", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605070
Stephen Smith
Stephen L. Smith, Mireille E. Broucke, and Bruce A. Francis
Curve Shortening and the Rendezvous Problem for Mobile Autonomous Robots
15 pages, 18 figures
null
null
null
cs.RO cs.MA
null
If a smooth, closed, and embedded curve is deformed along its normal vector field at a rate proportional to its curvature, it shrinks to a circular point. This curve evolution is called Euclidean curve shortening and the result is known as the Gage-Hamilton-Grayson Theorem. Motivated by the rendezvous problem for mobile autonomous robots, we address the problem of creating a polygon shortening flow. A linear scheme is proposed that exhibits several analogues to Euclidean curve shortening: The polygon shrinks to an elliptical point, convex polygons remain convex, and the perimeter of the polygon is monotonically decreasing.
[ { "version": "v1", "created": "Tue, 16 May 2006 22:30:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Broucke", "Mireille E.", "" ], [ "Francis", "Bruce A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0605071
Wei Wu
Wei Wu, Sriram Vishwanath and Ari Arapostathis
On the Capacity of Interference Channels with Degraded Message sets
null
null
null
null
cs.IT math.IT
null
This paper is motivated by a sensor network on a correlated field where nearby sensors share information, and can thus assist rather than interfere with one another. A special class of two-user Gaussian interference channels (IFCs) is considered where one of the two transmitters knows both the messages to be conveyed to the two receivers (called the IFC with degraded message sets). Both achievability and converse arguments are provided for this scenario for a class of discrete memoryless channels with weak interference. For the case of the Gaussian weak interference channel with degraded message sets, optimality of Gaussian inputs is also shown, resulting in the capacity region of this channel.
[ { "version": "v1", "created": "Wed, 17 May 2006 07:19:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Wu", "Wei", "" ], [ "Vishwanath", "Sriram", "" ], [ "Arapostathis", "Ari", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605072
Wei Wu
Wei Wu, Sriram Vishwanath and Ari Arapostathis
On the Capacity of Gaussian Weak Interference Channels with Degraded Message sets
This paper appears in CISS 2006, Princeton, NJ
null
null
null
cs.IT math.IT
null
This paper is motivated by a sensor network on a correlated field where nearby sensors share information, and can thus assist rather than interfere with one another. We consider a special class of two-user Gaussian interference channels (IFCs) where one of the two transmitters knows both the messages to be conveyed to the two receivers. Both achievability and converse arguments are provided for a channel with Gaussian inputs and Gaussian noise when the interference is weaker than the direct link (a so called weak IFC). In general, this region serves as an outer bound on the capacity of weak IFCs with no shared knowledge between transmitters.
[ { "version": "v1", "created": "Wed, 17 May 2006 07:34:50 GMT" } ]
2007-07-13T00:00:00
[ [ "Wu", "Wei", "" ], [ "Vishwanath", "Sriram", "" ], [ "Arapostathis", "Ari", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605073
D Hristopulos Prof.
Dionissios T. Hristopulos, Samuel Elogne
Analytic Properties and Covariance Functions of a New Class of Generalized Gibbs Random Fields
24 pages; 4 figures Submitted for publication to IEEE Transactions on Information Theory
Information Theory, IEEE Transactions on Volume: 53 , Issue: 12 , 4667 - 4679 (2007)
10.1109/TIT.2007.909163
null
cs.IT cs.CE math.IT
null
Spartan Spatial Random Fields (SSRFs) are generalized Gibbs random fields, equipped with a coarse-graining kernel that acts as a low-pass filter for the fluctuations. SSRFs are defined by means of physically motivated spatial interactions and a small set of free parameters (interaction couplings). This paper focuses on the FGC-SSRF model, which is defined on the Euclidean space $\mathbb{R}^{d}$ by means of interactions proportional to the squares of the field realizations, as well as their gradient and curvature. The permissibility criteria of FGC-SSRFs are extended by considering the impact of a finite-bandwidth kernel. It is proved that the FGC-SSRFs are almost surely differentiable in the case of finite bandwidth. Asymptotic explicit expressions for the Spartan covariance function are derived for $d=1$ and $d=3$; both known and new covariance functions are obtained depending on the value of the FGC-SSRF shape parameter. Nonlinear dependence of the covariance integral scale on the FGC-SSRF characteristic length is established, and it is shown that the relation becomes linear asymptotically. The results presented in this paper are useful in random field parameter inference, as well as in spatial interpolation of irregularly-spaced samples.
[ { "version": "v1", "created": "Wed, 17 May 2006 12:02:01 GMT" } ]
2012-04-12T00:00:00
[ [ "Hristopulos", "Dionissios T.", "" ], [ "Elogne", "Samuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605074
Michael Codish
Michael Codish (1), Peter Schneider-Kamp (2), Vitaly Lagoon (3), Ren\'e Thiemann (2), J\"urgen Giesl (2) ((1) Department of Computer Science, Ben-Gurion University, Israel (2) LuFG Informatik 2, RWTH Aachen, Germany (3) Department of Computer Science and Software Engineering, University of Melbourne, Australia)
SAT Solving for Argument Filterings
null
null
null
null
cs.LO
null
This paper introduces a propositional encoding for lexicographic path orders in connection with dependency pairs. This facilitates the application of SAT solvers for termination analysis of term rewrite systems based on the dependency pair method. We address two main inter-related issues and encode them as satisfiability problems of propositional formulas that can be efficiently handled by SAT solving: (1) the combined search for a lexicographic path order together with an \emph{argument filtering} to orient a set of inequalities; and (2) how the choice of the argument filtering influences the set of inequalities that have to be oriented. We have implemented our contributions in the termination prover AProVE. Extensive experiments show that by our encoding and the application of SAT solvers one obtains speedups in orders of magnitude as well as increased termination proving power.
[ { "version": "v1", "created": "Wed, 17 May 2006 12:47:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Codish", "Michael", "" ], [ "Schneider-Kamp", "Peter", "" ], [ "Lagoon", "Vitaly", "" ], [ "Thiemann", "René", "" ], [ "Giesl", "Jürgen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0605075
Sebastien de la Kethulle de Ryhove
Sebastien de la Kethulle de Ryhove, Ninoslav Marina, and Geir E. Oien
On the Capacity and Mutual Information of Memoryless Noncoherent Rayleigh-Fading Channels
20 pages, 3 figures. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The memoryless noncoherent single-input single-output (SISO) Rayleigh-fading channel is considered. Closed-form expressions for the mutual information between the output and the input of this channel when the input magnitude distribution is discrete and restricted to having two mass points are derived, and it is subsequently shown how these expressions can be used to obtain closed-form expressions for the capacity of this channel for signal to noise ratio (SNR) values of up to approximately 0 dB, and a tight capacity lower bound for SNR values between 0 dB and 10 dB. The expressions for the channel capacity and its lower bound are given as functions of a parameter which can be obtained via numerical root-finding algorithms.
[ { "version": "v1", "created": "Wed, 17 May 2006 16:22:09 GMT" } ]
2007-07-16T00:00:00
[ [ "de Ryhove", "Sebastien de la Kethulle", "" ], [ "Marina", "Ninoslav", "" ], [ "Oien", "Geir E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605076
J. F. J. Laros
J. F. J. Laros
Numeration-automatic sequences
25 pages, 22 figures
null
null
null
cs.CL cs.DM
null
We present a base class of automata that induce a numeration system and we give an algorithm to give the n-th word in the language of the automaton when the expansion of n in the induced numeration system is feeded to the automaton. Furthermore we give some algorithms for reverse reading of this expansion and a way to combine automata to other automata having the same properties.
[ { "version": "v1", "created": "Wed, 17 May 2006 17:12:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Laros", "J. F. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0605077
Taesup Moon
Taesup Moon, Tsachy Weissman
Universal Filtering via Hidden Markov Modeling
29 pages
null
null
null
cs.IT math.IT
null
The problem of discrete universal filtering, in which the components of a discrete signal emitted by an unknown source and corrupted by a known DMC are to be causally estimated, is considered. A family of filters are derived, and are shown to be universally asymptotically optimal in the sense of achieving the optimum filtering performance when the clean signal is stationary, ergodic, and satisfies an additional mild positivity condition. Our schemes are comprised of approximating the noisy signal using a hidden Markov process (HMP) via maximum-likelihood (ML) estimation, followed by the use of the forward recursions for HMP state estimation. It is shown that as the data length increases, and as the number of states in the HMP approximation increases, our family of filters attain the performance of the optimal distribution-dependent filter.
[ { "version": "v1", "created": "Wed, 17 May 2006 18:00:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Moon", "Taesup", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605078
Christoph D\"urr
Philippe Baptiste, Peter Brucker, Marek Chrobak, Christoph Durr, Svetlana A. Kravchenko, Francis Sourd
The Complexity of Mean Flow Time Scheduling Problems with Release Times
Subsumes and replaces cs.DS/0412094 and "Complexity of mean flow time scheduling problems with release dates" by P.B, S.K
null
null
null
cs.DS
null
We study the problem of preemptive scheduling n jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. We show that when all jobs have equal processing times then the problem can be solved in polynomial time using linear programming. Our algorithm can also be applied to the open-shop problem with release times and unit processing times. For the general case (when processing times are arbitrary), we show that the problem is unary NP-hard.
[ { "version": "v1", "created": "Wed, 17 May 2006 22:07:17 GMT" } ]
2007-05-23T00:00:00
[ [ "Baptiste", "Philippe", "" ], [ "Brucker", "Peter", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ], [ "Kravchenko", "Svetlana A.", "" ], [ "Sourd", "Francis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0605079
Amos Lapidoth
Amos Lapidoth, Shlomo Shamai, Michele Wigger
On the Capacity of Fading MIMO Broadcast Channels with Imperfect Transmitter Side-Information
Extended version of a paper of the same title that appeared in the Proceedings of the 43rd Annual Allerton Conference on Communication, Control, and Computing, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
A fading broadcast channel is considered where the transmitter employs two antennas and each of the two receivers employs a single receive antenna. It is demonstrated that even if the realization of the fading is precisely known to the receivers, the high signal-to-noise (SNR) throughput is greatly reduced if, rather than knowing the fading realization \emph{precisely}, the trasmitter only knows the fading realization \emph{approximately}. The results are general and are not limited to memoryless Gaussian fading.
[ { "version": "v1", "created": "Wed, 17 May 2006 22:29:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Shamai", "Shlomo", "" ], [ "Wigger", "Michele", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605080
Mohamed Ali Kaafar
Mohamed Ali Dali Kaafar (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Thierry Turletti (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Walid Dabbous (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes)
A Locating-First Approach for Scalable Overlay Multicast
null
Dans IEEE IWQoS 2006
null
null
cs.NI
null
Recent proposals in multicast overlay construction have demonstrated the importance of exploiting underlying network topology. However, these topology-aware proposals often rely on incremental and periodic refinements to improve the system performance. These approaches are therefore neither scalable, as they induce high communication cost due to refinement overhead, nor efficient because long convergence time is necessary to obtain a stabilized structure. In this paper, we propose a highly scalable locating algorithm that gradually directs newcomers to their a set of their closest nodes without inducing high overhead. On the basis of this locating process, we build a robust and scalable topology-aware clustered hierarchical overlay scheme, called LCC. We conducted both simulations and PlanetLab experiments to evaluate the performance of LCC. Results show that the locating process entails modest resources in terms of time and bandwidth. Moreover, LCC demonstrates promising performance to support large scale multicast applications.
[ { "version": "v1", "created": "Thu, 18 May 2006 15:40:04 GMT" } ]
2016-08-16T00:00:00
[ [ "Kaafar", "Mohamed Ali Dali", "", "INRIA Sophia Antipolis / INRIA\n Rhône-Alpes" ], [ "Turletti", "Thierry", "", "INRIA Sophia Antipolis / INRIA\n Rhône-Alpes" ], [ "Dabbous", "Walid", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605081
Marc Daumas
Marc Daumas (LP2A, LIRMM), Guillaume Da Gra\c{c}a (LP2A), David Defour (LP2A)
Caract\'{e}ristiques arithm\'{e}tiques des processeurs graphiques
null
null
null
null
cs.MS
null
Les unit\'{e}s graphiques (Graphic Processing Units- GPU) sont d\'{e}sormais des processeurs puissants et flexibles. Les derni\`{e}res g\'{e}n\'{e}rations de GPU contiennent des unit\'{e}s programmables de traitement des sommets (vertex shader) et des pixels (pixel shader) supportant des op\'{e}rations en virgule flottante sur 8, 16 ou 32 bits. La repr\'{e}sentation flottante sur 32 bits correspond \`{a} la simple pr\'{e}cision de la norme IEEE sur l'arithm\'{e}tique en virgule flottante (IEEE-754). Les GPU sont bien adapt\'{e}s aux applications avec un fort parall\'{e}lisme de donn\'{e}es. Cependant ils ne sont que peu utilis\'{e}s en dehors des calculs graphiques (General Purpose computation on GPU -- GPGPU). Une des raisons de cet \'{e}tat de faits est la pauvret\'{e} des documentations techniques fournies par les fabricants (ATI et Nvidia), particuli\`{e}rement en ce qui concerne l'implantation des diff\'{e}rents op\'{e}rateurs arithm\'{e}tiques embarqu\'{e}s dans les diff\'{e}rentes unit\'{e}s de traitement. Or ces informations sont essentielles pour estimer et contr\^{o}ler les erreurs d'arrondi ou pour mettre en oeuvre des techniques de r\'{e}duction ou de compensation afin de travailler en pr\'{e}cision double, quadruple ou arbitrairement \'{e}tendue. Nous proposons dans cet article un ensemble de programmes qui permettent de d\'{e}couvrir les caract\'{e}ristiques principales des GPU en ce qui concerne l'arithm\'{e}tique \`{a} virgule flottante. Nous donnons les r\'{e}sultats obtenus sur deux cartes graphiques r\'{e}centes: la Nvidia 7800GTX et l'ATI RX1800XL.
[ { "version": "v1", "created": "Thu, 18 May 2006 15:49:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Daumas", "Marc", "", "LP2A, LIRMM" ], [ "Da Graça", "Guillaume", "", "LP2A" ], [ "Defour", "David", "", "LP2A" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0605082
Saugata Basu
Saugata Basu
Efficient algorithm for computing the Euler-Poincar\'e characteristic of a semi-algebraic set defined by few quadratic inequalities
17 pages, accepted for publication in Computational Complexity
null
null
null
cs.SC cs.CG
null
We present an algorithm which takes as input a closed semi-algebraic set, $S \subset \R^k$, defined by \[ P_1 \leq 0, ..., P_\ell \leq 0, P_i \in \R[X_1,...,X_k], \deg(P_i) \leq 2, \] and computes the Euler-Poincar\'e characteristic of $S$. The complexity of the algorithm is $k^{O(\ell)}$.
[ { "version": "v1", "created": "Thu, 18 May 2006 18:03:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Basu", "Saugata", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0605083
Partha Basuchowdhuri
Partha Basuchowdhuri
Classical Authentication Aided Three-Stage Quantum Protocol
7 pages, 3 figures
null
null
null
cs.CR
null
This paper modifies Kak's three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key distribution center, session key, time-stamp, and nonce, within the quantum cryptography protocol.
[ { "version": "v1", "created": "Thu, 18 May 2006 21:41:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Basuchowdhuri", "Partha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0605084
Yingbin Liang
Yingbin Liang and H. Vincent Poor
The Generalized Multiple Access Channel with Confidential Messages
To appear in the Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, July 9 - 14, 2006
null
null
null
cs.IT math.IT
null
A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs. It is assumed that each user views the other user as a wire-tapper, and wishes to keep its confidential information as secret as possible from the other user. The level of secrecy of the confidential information is measured by the equivocation rate. The performance measure of interest is the rate-equivocation tuple that includes the common rate, two private rates and two equivocation rates as components. The set that includes all achievable rate-equivocation tuples is referred to as the capacity-equivocation region. For the GMAC with one confidential message set, where only one user (user 1) has private (confidential) information for the destination, inner and outer bounds on the capacity-equivocation region are derived. The secrecy capacity region is established, which is the set of all achievable rates with user 2 being perfectly ignorant of confidential messages of user 1. Furthermore, the capacity-equivocation region and the secrecy capacity region are established for the degraded GMAC with one confidential message set. For the GMAC with two confidential message sets, where both users have confidential messages for the destination, inner bounds on the capacity-equivocation region and the secrecy capacity region are obtained.
[ { "version": "v1", "created": "Fri, 19 May 2006 05:02:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605085
Nachum Dershowitz
Nachum Dershowitz, Ziyad Hanna and Alexander Nadel
A Scalable Algorithm for Minimal Unsatisfiable Core Extraction
null
Proceedings of the 9th International Conference Theory and Applications of Satisfiability Testing (SAT 2006), Lecture Notes in Computer Science, volume 4121, Springer-Verlag, Berlin, pp. 36-41
null
null
cs.LO
null
We propose a new algorithm for minimal unsatisfiable core extraction, based on a deeper exploration of resolution-refutation properties. We provide experimental results on formal verification benchmarks confirming that our algorithm finds smaller cores than suboptimal algorithms; and that it runs faster than those algorithms that guarantee minimality of the core.
[ { "version": "v1", "created": "Fri, 19 May 2006 08:19:37 GMT" }, { "version": "v2", "created": "Sun, 28 May 2006 13:21:30 GMT" } ]
2020-06-11T00:00:00
[ [ "Dershowitz", "Nachum", "" ], [ "Hanna", "Ziyad", "" ], [ "Nadel", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0605086
Chih-Chun Wang
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1) Purdue University, (2) Princeton University)
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels
To appear in the Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, July 9 - 14, 2006
null
null
null
cs.IT math.IT
null
Assuming iterative decoding for binary erasure channels (BECs), a novel tree-based technique for upper bounding the bit error rates (BERs) of arbitrary, finite low-density parity-check (LDPC) codes is provided and the resulting bound can be evaluated for all operating erasure probabilities, including both the waterfall and the error floor regions. This upper bound can also be viewed as a narrowing search of stopping sets, which is an approach different from the stopping set enumeration used for lower bounding the error floor. When combined with optimal leaf-finding modules, this upper bound is guaranteed to be tight in terms of the asymptotic order. The Boolean framework proposed herein further admits a composite search for even tighter results. For comparison, a refinement of the algorithm is capable of exhausting all stopping sets of size <14 for irregular LDPC codes of length n=500, which requires approximately 1.67*10^25 trials if a brute force approach is taken. These experiments indicate that this upper bound can be used both as an analytical tool and as a deterministic worst-performance (error floor) guarantee, the latter of which is crucial to optimizing LDPC codes for extremely low BER applications, e.g., optical/satellite communications.
[ { "version": "v1", "created": "Fri, 19 May 2006 17:55:08 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605087
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
Error Exponents and Cutoff Rate for Noncoherent Rician Fading Channels
To appear in the IEEE International Conference on Communications, 2006
null
10.1109/ICC.2006.254944
null
cs.IT math.IT
null
In this paper, random coding error exponents and cutoff rate are studied for noncoherent Rician fading channels, where neither the receiver nor the transmitter has channel side information. First, it is assumed that the input is subject only to an average power constraint. In this case, a lower bound to the random coding error exponent is considered and the optimal input achieving this lower bound is shown to have a discrete amplitude and uniform phase. If the input is subject to both average and peak power constraints, it is proven that the optimal input achieving the random coding error exponent has again a discrete nature. Finally, the cutoff rate is analyzed, and the optimality of the single-mass input amplitude distribution in the low-power regime is discussed.
[ { "version": "v1", "created": "Fri, 19 May 2006 20:25:27 GMT" } ]
2016-11-18T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605088
Ke Liu
Ke Liu, Adnan Majeed and Nael B. Abu-Ghazaleh
TARMAC: Traffic-Analysis Reslient MAC Protocol for Multi-Hop Wireless Networks
null
null
null
null
cs.NI cs.CR
null
Traffic analysis in Multi-hop Wireless Networks can expose the structure of the network allowing attackers to focus their efforts on critical nodes. For example, jamming the only data sink in a sensor network can cripple the network. We propose a new communication protocol that is part of the MAC layer, but resides conceptually between the routing layer and MAC, that is resilient to traffic analysis. Each node broadcasts the data that it has to transmit according to a fixed transmission schedule that is independent of the traffic being generated, making the network immune to time correlation analysis. The transmission pattern is identical, with the exception of a possible time shift, at all nodes, removing spatial correlation of transmissions to network strucutre. Data for all neighbors resides in the same encrypted packet. Each neighbor then decides which subset of the data in a packet to forward onwards using a routing protocol whose details are orthogonal to the proposed scheme. We analyze the basic scheme, exploring the tradeoffs in terms of frequency of transmission and packet size. We also explore adaptive and time changing patterns and analyze their performance under a number of representative scenarios.
[ { "version": "v1", "created": "Fri, 19 May 2006 22:42:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Liu", "Ke", "" ], [ "Majeed", "Adnan", "" ], [ "Abu-Ghazaleh", "Nael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0605089
Ke Liu
Ke Liu and Nael Abu-Ghazaleh
Aligned Virtual Coordinates for Greedy Routing in WSNs
null
MASS 2006
null
null
cs.NI
null
Geographic routing provides relatively good performance at a much lower overhead than conventional routing protocols such as AODV. However, the performance of these protocols is impacted by physical voids, and localization errors. Accordingly, virtual coordinate systems (VCS) were proposed as an alternative approach that is resilient to localization errors and that naturally routes around physical voids. However, we show that VCS is vulnerable to different forms of the void problem and the performance of greedy routing on VCS is worse than that of geographic forwarding. We show that these anomalies are due to the integral nature of VCS, which causes quantization noise in the estimate of connectivity and node location. We propose an aligned virtual coordinate system (AVCS) on which the greedy routing success can be significantly improved. With our approach, and for the first time, we show that greedy routing on VCS out-performs that on physical coordinate systems even in the absence of localization errors. We compare AVCS against some of the most popular geographical routing protocols both on physical coordinate system and the virtual coordinate systems and show that AVCS significantly improves performance over the best known solutions.
[ { "version": "v1", "created": "Sat, 20 May 2006 04:50:09 GMT" } ]
2009-09-29T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605090
Santanu Maiti K.
Santanu K. Maiti
Mathematica: A System of Computer Programs
17 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:cs/0603005, arXiv:cs/0604088
null
null
null
cs.MS cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Starting from the basic level of mathematica here we illustrate how to use a mathematica notebook and write a program in the notebook. Next, we investigate elaborately the way of linking of external programs with mathematica, so-called the mathlink operation. Using this technique we can run very tedious jobs quite efficiently, and the operations become extremely fast. Sometimes it is quite desirable to run jobs in background of a computer which can take considerable amount of time to finish, and this allows us to do work on other tasks, while keeping the jobs running. The way of running jobs, written in a mathematica notebook, in background is quite different from the conventional methods i.e., the techniques for the programs written in other languages like C, C++, F77, F90, F95, etc. To illustrate it, in the present article we study how to create a mathematica batch-file from a mathematica notebook and run it in the background. Finally, we explore the most significant issue of this article. Here we describe the basic ideas for parallelizing a mathematica program by sharing its independent parts into all other remote computers available in the network. Doing the parallelization, we can perform large computational operations within a very short period of time, and therefore, the efficiency of the numerical works can be achieved. Parallel computation supports any version of mathematica and it also works significantly well even if different versions of mathematica are installed in different computers. All the operations studied in this article run under any supported operating system like Unix, Windows, Macintosh, etc. For the sake of our illustrations, here we concentrate all the discussions only for the Unix based operating system.
[ { "version": "v1", "created": "Sat, 20 May 2006 05:43:55 GMT" }, { "version": "v2", "created": "Mon, 13 Oct 2008 09:34:17 GMT" }, { "version": "v3", "created": "Fri, 17 Oct 2008 06:27:19 GMT" }, { "version": "v4", "created": "Wed, 28 Oct 2015 06:58:04 GMT" } ]
2015-10-29T00:00:00
[ [ "Maiti", "Santanu K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0605091
Martin Wainwright
Emin Martinian, Martin J. Wainwright
Low-density constructions can achieve the Wyner-Ziv and Gelfand-Pinsker bounds
To appear at International Symposium on Information Theory, Seattle, WA. July 2006
null
null
null
cs.IT math.IT
null
We describe and analyze sparse graphical code constructions for the problems of source coding with decoder side information (the Wyner-Ziv problem), and channel coding with encoder side information (the Gelfand-Pinsker problem). Our approach relies on a combination of low-density parity check (LDPC) codes and low-density generator matrix (LDGM) codes, and produces sparse constructions that are simultaneously good as both source and channel codes. In particular, we prove that under maximum likelihood encoding/decoding, there exist low-density codes (i.e., with finite degrees) from our constructions that can saturate both the Wyner-Ziv and Gelfand-Pinsker bounds.
[ { "version": "v1", "created": "Sun, 21 May 2006 19:36:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Martinian", "Emin", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605092
Lawrence Ong
Lawrence Ong and Mehul Motani
The Multiple Access Channel with Feedback and Correlated Sources
Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT 2006), The Westin Seattle, Seattle, Washington, July 9-14 2006
Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT 2006), The Westin Seattle, Seattle, WA, pp. 2129-2133, Jul. 9-14 2006.
10.1109/ISIT.2006.261927
null
cs.IT math.IT
null
In this paper, we investigate communication strategies for the multiple access channel with feedback and correlated sources (MACFCS). The MACFCS models a wireless sensor network scenario in which sensors distributed throughout an arbitrary random field collect correlated measurements and transmit them to a common sink. We derive achievable rate regions for the three-node MACFCS. First, we study the strategy when source coding and channel coding are combined, which we term full decoding at sources. Second, we look at several strategies when source coding and channel coding are separated, which we term full decoding at destination. From numerical computations on Gaussian channels, we see that different strategies perform better under certain source correlations and channel setups.
[ { "version": "v1", "created": "Mon, 22 May 2006 06:43:41 GMT" } ]
2010-04-15T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Motani", "Mehul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605093
Lawrence Ong
Lawrence Ong and Mehul Motani
The Capacity of the Single Source Multiple Relay Single Destination Mesh Network
Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT 2006), The Westin Seattle, Seattle, Washington, July 9-14 2006
Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT 2006), The Westin Seattle, Seattle, WA, pp. 1673-1677, Jul. 9-14 2006.
10.1109/ISIT.2006.261639
null
cs.IT math.IT
null
In this paper, we derive the capacity of a special class of mesh networks. A mesh network is defined as a heterogeneous wireless network in which the transmission among power limited nodes is assisted by powerful relays, which use the same wireless medium. We find the capacity of the mesh network when there is one source, one destination, and multiple relays. We call this channel the single source multiple relay single destination (SSMRSD) mesh network. Our approach is as follows. We first look at an upper bound on the information theoretic capacity of these networks in the Gaussian setting. We then show that the bound is achievable asymptotically using the compress-forward strategy for the multiple relay channel. Theoretically, the results indicate the value of cooperation and the utility of carefully deployed relays in wireless ad-hoc and sensor networks. The capacity characterization quantifies how the relays can be used to either conserve node energy or to increase transmission rate.
[ { "version": "v1", "created": "Mon, 22 May 2006 06:57:53 GMT" } ]
2010-04-15T00:00:00
[ [ "Ong", "Lawrence", "" ], [ "Motani", "Mehul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605094
Simone Bova
S. Bova (1) and F. Montagna (1) ((1) University of Siena, Italy)
Proof Search in Hajek's Basic Logic
26 pages
null
null
null
cs.LO cs.CC
null
We introduce a proof system for Hajek's logic BL based on a relational hypersequents framework. We prove that the rules of our logical calculus, called RHBL, are sound and invertible with respect to any valuation of BL into a suitable algebra, called omega[0,1]. Refining the notion of reduction tree that arises naturally from RHBL, we obtain a decision algorithm for BL provability whose running time upper bound is 2^O(n), where n is the number of connectives of the input formula. Moreover, if a formula is unprovable, we exploit the constructiveness of a polynomial time algorithm for leaves validity for providing a procedure to build countermodels in omega[0,1]. Finally, since the size of the reduction tree branches is O(n^3), we can describe a polynomial time verification algorithm for BL unprovability.
[ { "version": "v1", "created": "Mon, 22 May 2006 08:18:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Bova", "S.", "", "University of Siena, Italy" ], [ "Montagna", "F.", "", "University of Siena, Italy" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0605095
Chau Yuen
Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung
Single-Symbol-Decodable Differential Space-Time Modulation Based on QO-STBC
Accepted for IEEE Trans Wireless Comms
null
10.1109/TWC.2006.256950
null
cs.IT math.IT
null
We present a novel differential space-time modulation (DSTM) scheme that is single-symbol decodable and can provide full transmit diversity. It is the first known singlesymbol- decodable DSTM scheme not based on Orthogonal STBC (O-STBC), and it is constructed based on the recently proposed Minimum-Decoding-Complexity Quasi-Orthogonal Space-Time Block Code (MDC-QOSTBC). We derive the code design criteria and present systematic methodology to find the solution sets. The proposed DSTM scheme can provide higher code rate than DSTM schemes based on O-STBC. Its decoding complexity is also considerably lower than DSTM schemes based on Sp(2) and double-symbol-decodable QOSTBC, with negligible or slight trade-off in decoding error probability performance.
[ { "version": "v1", "created": "Mon, 22 May 2006 08:51:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Yuen", "Chau", "" ], [ "Guan", "Yong Liang", "" ], [ "Tjhung", "Tjeng Thiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605096
Franck Petit
Yoann Dieudonn\'e (LaRIA), Franck Petit (LaRIA)
Circle Formation of Weak Robots and Lyndon Words
13 pages
null
null
LaRIA-2006-05
cs.DC cs.RO
null
A Lyndon word is a non-empty word strictly smaller in the lexicographic order than any of its suffixes, except itself and the empty word. In this paper, we show how Lyndon words can be used in the distributed control of a set of n weak mobile robots. By weak, we mean that the robots are anonymous, memoryless, without any common sense of direction, and unable to communicate in an other way than observation. An efficient and simple deterministic protocol to form a regular n-gon is presented and proven for n prime.
[ { "version": "v1", "created": "Mon, 22 May 2006 12:09:33 GMT" } ]
2016-08-16T00:00:00
[ [ "Dieudonné", "Yoann", "", "LaRIA" ], [ "Petit", "Franck", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0605097
Emina Torlak
Marten van Dijk, Emina Torlak, Blaise Gassend, and Srinivas Devadas
A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols
16 pages
null
null
null
cs.CR
null
We introduce knowledge flow analysis, a simple and flexible formalism for checking cryptographic protocols. Knowledge flows provide a uniform language for expressing the actions of principals, assump- tions about intruders, and the properties of cryptographic primitives. Our approach enables a generalized two-phase analysis: we extend the two-phase theory by identifying the necessary and sufficient proper- ties of a broad class of cryptographic primitives for which the theory holds. We also contribute a library of standard primitives and show that they satisfy our criteria.
[ { "version": "v1", "created": "Mon, 22 May 2006 15:51:35 GMT" } ]
2007-05-23T00:00:00
[ [ "van Dijk", "Marten", "" ], [ "Torlak", "Emina", "" ], [ "Gassend", "Blaise", "" ], [ "Devadas", "Srinivas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0605098
Sharon Betz
Sharon Betz and H. Vincent Poor
Energy Efficiency in Multi-hop CDMA Networks: A Game Theoretic Analysis
To appear in the Proceedings of the Workshop on Multi-Layer Modelling and Design of Multi-Hop Wireless Networks (MLMD 06), Minneapolis, MN, July 12 - 15, 2006
null
null
null
cs.IT math.IT
null
A game-theoretic analysis is used to study the effects of receiver choice on the energy efficiency of multi-hop networks in which the nodes communicate using Direct-Sequence Code Division Multiple Access (DS-CDMA). A Nash equilibrium of the game in which the network nodes can choose their receivers as well as their transmit powers to maximize the total number of bits they transmit per unit of energy is derived. The energy efficiencies resulting from the use of different linear multiuser receivers in this context are compared, looking at both the non-cooperative game and the Pareto optimal solution. For analytical ease, particular attention is paid to asymptotically large networks. Significant gains in energy efficiency are observed when multiuser receivers, particularly the linear minimum mean-square error (MMSE) receiver, are used instead of conventional matched filter receivers.
[ { "version": "v1", "created": "Mon, 22 May 2006 16:47:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Betz", "Sharon", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605099
Michael Baer
Michael B. Baer
Alphabetic Coding with Exponential Costs
7 pages, submitted to Elsevier
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An alphabetic binary tree formulation applies to problems in which an outcome needs to be determined via alphabetically ordered search prior to the termination of some window of opportunity. Rather than finding a decision tree minimizing $\sum_{i=1}^n w(i) l(i)$, this variant involves minimizing $\log_a \sum_{i=1}^n w(i) a^{l(i)}$ for a given $a \in (0,1)$. This note introduces a dynamic programming algorithm that finds the optimal solution in polynomial time and space, and shows that methods traditionally used to improve the speed of optimizations in related problems, such as the Hu-Tucker procedure, fail for this problem. This note thus also introduces two approximation algorithms which can find a suboptimal solution in linear time (for one) or $\order(n \log n)$ time (for the other), with associated coding redundancy bounds.
[ { "version": "v1", "created": "Tue, 23 May 2006 19:55:47 GMT" }, { "version": "v2", "created": "Sat, 27 May 2006 17:07:32 GMT" }, { "version": "v3", "created": "Sat, 28 Mar 2009 01:06:51 GMT" } ]
2009-03-28T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605100
Michael Rabbat
Michael Rabbat, Mario Figueiredo, and Robert Nowak
Network Inference from Co-Occurrences
Submitted to IEEE Transactions on Information Theory. An extended version is available as University of Wisconsin Technical Report ECE-06-2
null
10.1109/TIT.2008.926315
null
cs.IT math.IT
null
The recovery of network structure from experimental data is a basic and fundamental problem. Unfortunately, experimental data often do not directly reveal structure due to inherent limitations such as imprecision in timing or other observation mechanisms. We consider the problem of inferring network structure in the form of a directed graph from co-occurrence observations. Each observation arises from a transmission made over the network and indicates which vertices carry the transmission without explicitly conveying their order in the path. Without order information, there are an exponential number of feasible graphs which agree with the observed data equally well. Yet, the basic physical principles underlying most networks strongly suggest that all feasible graphs are not equally likely. In particular, vertices that co-occur in many observations are probably closely connected. Previous approaches to this problem are based on ad hoc heuristics. We model the experimental observations as independent realizations of a random walk on the underlying graph, subjected to a random permutation which accounts for the lack of order information. Treating the permutations as missing data, we derive an exact expectation-maximization (EM) algorithm for estimating the random walk parameters. For long transmission paths the exact E-step may be computationally intractable, so we also describe an efficient Monte Carlo EM (MCEM) algorithm and derive conditions which ensure convergence of the MCEM algorithm with high probability. Simulations and experiments with Internet measurements demonstrate the promise of this approach.
[ { "version": "v1", "created": "Tue, 23 May 2006 16:20:22 GMT" } ]
2016-11-17T00:00:00
[ [ "Rabbat", "Michael", "" ], [ "Figueiredo", "Mario", "" ], [ "Nowak", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605101
Victor Kryssanov
Victor V. Kryssanov, Frank J. Rinaldo, Evgeny L. Kuleshov, Hitoshi Ogawa
Modeling the Dynamics of Social Networks
8 pages, 3 figures. Preprint (as of May 24, 2006)
null
null
null
cs.CY cs.CE cs.CL cs.HC cs.NI physics.data-an
null
Modeling human dynamics responsible for the formation and evolution of the so-called social networks - structures comprised of individuals or organizations and indicating connectivities existing in a community - is a topic recently attracting a significant research interest. It has been claimed that these dynamics are scale-free in many practically important cases, such as impersonal and personal communication, auctioning in a market, accessing sites on the WWW, etc., and that human response times thus conform to the power law. While a certain amount of progress has recently been achieved in predicting the general response rate of a human population, existing formal theories of human behavior can hardly be found satisfactory to accommodate and comprehensively explain the scaling observed in social networks. In the presented study, a novel system-theoretic modeling approach is proposed and successfully applied to determine important characteristics of a communication network and to analyze consumer behavior on the WWW.
[ { "version": "v1", "created": "Wed, 24 May 2006 02:13:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "Victor V.", "" ], [ "Rinaldo", "Frank J.", "" ], [ "Kuleshov", "Evgeny L.", "" ], [ "Ogawa", "Hitoshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
cs/0605102
Shaili Jain
Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian and Ke Yi
Restricted Strip Covering and the Sensor Cover Problem
14 pages, 6 figures
null
null
null
cs.DS cs.CG
null
Given a set of objects with durations (jobs) that cover a base region, can we schedule the jobs to maximize the duration the original region remains covered? We call this problem the sensor cover problem. This problem arises in the context of covering a region with sensors. For example, suppose you wish to monitor activity along a fence by sensors placed at various fixed locations. Each sensor has a range and limited battery life. The problem is to schedule when to turn on the sensors so that the fence is fully monitored for as long as possible. This one dimensional problem involves intervals on the real line. Associating a duration to each yields a set of rectangles in space and time, each specified by a pair of fixed horizontal endpoints and a height. The objective is to assign a position to each rectangle to maximize the height at which the spanning interval is fully covered. We call this one dimensional problem restricted strip covering. If we replace the covering constraint by a packing constraint, the problem is identical to dynamic storage allocation, a scheduling problem that is a restricted case of the strip packing problem. We show that the restricted strip covering problem is NP-hard and present an O(log log n)-approximation algorithm. We present better approximations or exact algorithms for some special cases. For the uniform-duration case of restricted strip covering we give a polynomial-time, exact algorithm but prove that the uniform-duration case for higher-dimensional regions is NP-hard. Finally, we consider regions that are arbitrary sets, and we present an O(log n)-approximation algorithm.
[ { "version": "v1", "created": "Wed, 24 May 2006 03:27:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Buchsbaum", "Adam L.", "" ], [ "Efrat", "Alon", "" ], [ "Jain", "Shaili", "" ], [ "Venkatasubramanian", "Suresh", "" ], [ "Yi", "Ke", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0605103
Daniel Lemire
Daniel Lemire
A Better Alternative to Piecewise Linear Time Series Segmentation
to appear in SIAM Data Mining 2007
null
null
null
cs.DB cs.CV
null
Time series are difficult to monitor, summarize and predict. Segmentation organizes time series into few intervals having uniform characteristics (flatness, linearity, modality, monotonicity and so on). For scalability, we require fast linear time algorithms. The popular piecewise linear model can determine where the data goes up or down and at what rate. Unfortunately, when the data does not follow a linear model, the computation of the local slope creates overfitting. We propose an adaptive time series model where the polynomial degree of each interval vary (constant, linear and so on). Given a number of regressors, the cost of each interval is its polynomial degree: constant intervals cost 1 regressor, linear intervals cost 2 regressors, and so on. Our goal is to minimize the Euclidean (l_2) error for a given model complexity. Experimentally, we investigate the model where intervals can be either constant or linear. Over synthetic random walks, historical stock market prices, and electrocardiograms, the adaptive model provides a more accurate segmentation than the piecewise linear model without increasing the cross-validation error or the running time, while providing a richer vocabulary to applications. Implementation issues, such as numerical stability and real-world performance, are discussed.
[ { "version": "v1", "created": "Wed, 24 May 2006 04:42:53 GMT" }, { "version": "v2", "created": "Sat, 27 May 2006 00:32:03 GMT" }, { "version": "v3", "created": "Wed, 31 May 2006 01:28:40 GMT" }, { "version": "v4", "created": "Sun, 25 Jun 2006 14:21:45 GMT" }, { "version": "v5", "created": "Tue, 3 Oct 2006 17:04:41 GMT" }, { "version": "v6", "created": "Thu, 4 Jan 2007 18:36:01 GMT" }, { "version": "v7", "created": "Mon, 23 Apr 2007 01:24:44 GMT" }, { "version": "v8", "created": "Sat, 28 Apr 2007 23:13:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0605104
Blake Hegerle
Blake Hegerle
Parsing Transformative LR(1) Languages
68 pages, 4 figures. Numerous stylistic and grammatical fixes; new material in Sections 2.2 and 4.2
null
null
null
cs.PL
null
We consider, as a means of making programming languages more flexible and powerful, a parsing algorithm in which the parser may freely modify the grammar while parsing. We are particularly interested in a modification of the canonical LR(1) parsing algorithm in which, after the reduction of certain productions, we examine the source sentence seen so far to determine the grammar to use to continue parsing. A naive modification of the canonical LR(1) parsing algorithm along these lines cannot be guaranteed to halt; as a result, we develop a test which examines the grammar as it changes, stopping the parse if the grammar changes in a way that would invalidate earlier assumptions made by the parser. With this test in hand, we can develop our parsing algorithm and prove that it is correct. That being done, we turn to earlier, related work; the idea of programming languages which can be extended to include new syntactic constructs has existed almost as long as the idea of high-level programming languages. Early efforts to construct such a programming language were hampered by an immature theory of formal languages. More recent efforts to construct transformative languages relied either on an inefficient chain of source-to-source translators; or they have a defect, present in our naive parsing algorithm, in that they cannot be known to halt. The present algorithm does not have these undesirable properties, and as such, it should prove a useful foundation for a new kind of programming language.
[ { "version": "v1", "created": "Wed, 24 May 2006 19:09:39 GMT" }, { "version": "v2", "created": "Wed, 26 Jul 2006 14:39:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Hegerle", "Blake", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0605105
Chandra Nair
Chandra Nair, Abbas El Gamal
An outer bound to the capacity region of the broadcast channel
12 pages, 1 figure ISIT 2006
null
null
null
cs.IT math.IT
null
An outer bound to the capacity region of the two-receiver discrete memoryless broadcast channel is given. The outer bound is tight for all cases where the capacity region is known. When specialized to the case of no common information, this outer bound is contained in the Korner-Marton outer bound. This containment is shown to be strict for the binary skew-symmetric broadcast channel. Thus, this outer bound is in general tighter than all other known outer bounds on the discrete memoryless broadcast channel.
[ { "version": "v1", "created": "Wed, 24 May 2006 14:40:45 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2006 16:58:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Nair", "Chandra", "" ], [ "Gamal", "Abbas El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605106
Daowen Qiu
Daowen Qiu
Supervisory Control of Fuzzy Discrete Event Systems: A Formal Approach
null
IEEE Trans. SMC-Part B, VOL.35, NO. 1, February 2005, pp. 72-88
10.1109/TSMCB.2004.840457
null
cs.LO cs.AI
null
Fuzzy {\it discrete event systems} (DESs) were proposed recently by Lin and Ying [19], which may better cope with the real-world problems with fuzziness, impreciseness, and subjectivity such as those in biomedicine. As a continuation of [19], in this paper we further develop fuzzy DESs by dealing with supervisory control of fuzzy DESs. More specifically, (i) we reformulate the parallel composition of crisp DESs, and then define the parallel composition of fuzzy DESs that is equivalent to that in [19]; {\it max-product} and {\it max-min} automata for modeling fuzzy DESs are considered; (ii) we deal with a number of fundamental problems regarding supervisory control of fuzzy DESs, particularly demonstrate controllability theorem and nonblocking controllability theorem of fuzzy DESs, and thus present the conditions for the existence of supervisors in fuzzy DESs; (iii) we analyze the complexity for presenting a uniform criterion to test the fuzzy controllability condition of fuzzy DESs modeled by max-product automata; in particular, we present in detail a general computing method for checking whether or not the fuzzy controllability condition holds, if max-min automata are used to model fuzzy DESs, and by means of this method we can search for all possible fuzzy states reachable from initial fuzzy state in max-min automata; also, we introduce the fuzzy $n$-controllability condition for some practical problems; (iv) a number of examples serving to illustrate the applications of the derived results and methods are described; some basic properties related to supervisory control of fuzzy DESs are investigated. To conclude, some related issues are raised for further consideration.
[ { "version": "v1", "created": "Wed, 24 May 2006 15:23:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Qiu", "Daowen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0605107
Daowen Qiu
Daowen Qiu, Fuchun Liu
Fuzzy Discrete Event Systems under Fuzzy Observability and a test-algorithm
A further revised version to appear in IEEE Trans. Fuzzy Systems
IEEE Transactions on Fuzzy Systems, 2009, 17 (3): 578-589.
null
null
cs.LO
null
In order to more effectively cope with the real-world problems of vagueness, impreciseness, and subjectivity, fuzzy discrete event systems (FDESs) were proposed recently. Notably, FDESs have been applied to biomedical control for HIV/AIDS treatment planning and sensory information processing for robotic control. Qiu, Cao and Ying independently developed supervisory control theory of FDESs. We note that the controllability of events in Qiu's work is fuzzy but the observability of events is crisp, and, the observability of events in Cao and Ying's work is also crisp although the controllability is not completely crisp since the controllable events can be disabled with any degrees. Motivated by the necessity to consider the situation that the events may be observed or controlled with some membership degrees, in this paper, we establish the supervisory control theory of FDESs with partial observations, in which both the observability and controllability of events are fuzzy instead. We formalize the notions of fuzzy controllability condition and fuzzy observability condition. And Controllability and Observability Theorem of FDESs is set up in a more generic framework. In particular, we present a detailed computing flow to verify whether the controllability and observability conditions hold. Thus, this result can decide the existence of supervisors. Also, we use this computing method to check the existence of supervisors in the Controllability and Observability Theorem of classical discrete event systems (DESs), which is a new method and different from classical case. A number of examples are elaborated on to illustrate the presented results.
[ { "version": "v1", "created": "Wed, 24 May 2006 15:41:00 GMT" }, { "version": "v2", "created": "Tue, 24 Apr 2007 04:27:12 GMT" }, { "version": "v3", "created": "Sun, 7 Oct 2007 02:32:38 GMT" } ]
2010-03-10T00:00:00
[ [ "Qiu", "Daowen", "" ], [ "Liu", "Fuchun", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0605108
Daowen Qiu
Fuchun Liu, Daowen Qiu, Hongyan Xing, and Zhujun Fan
Diagnosability of Fuzzy Discrete Event Systems
14 pages; revisions have been made
null
10.1007/978-3-540-74205-0_73
null
cs.AI
null
In order to more effectively cope with the real-world problems of vagueness, {\it fuzzy discrete event systems} (FDESs) were proposed recently, and the supervisory control theory of FDESs was developed. In view of the importance of failure diagnosis, in this paper, we present an approach of the failure diagnosis in the framework of FDESs. More specifically: (1) We formalize the definition of diagnosability for FDESs, in which the observable set and failure set of events are {\it fuzzy}, that is, each event has certain degree to be observable and unobservable, and, also, each event may possess different possibility of failure occurring. (2) Through the construction of observability-based diagnosers of FDESs, we investigate its some basic properties. In particular, we present a necessary and sufficient condition for diagnosability of FDESs. (3) Some examples serving to illuminate the applications of the diagnosability of FDESs are described. To conclude, some related issues are raised for further consideration.
[ { "version": "v1", "created": "Wed, 24 May 2006 15:49:06 GMT" }, { "version": "v2", "created": "Mon, 18 Dec 2006 04:04:13 GMT" } ]
2015-06-25T00:00:00
[ [ "Liu", "Fuchun", "" ], [ "Qiu", "Daowen", "" ], [ "Xing", "Hongyan", "" ], [ "Fan", "Zhujun", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0605109
Emina Torlak
Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, and Srinivas Devadas
Knowledge Flow Analysis for Security Protocols
20 pages
null
null
MIT-CSAIL-TR-2005-066
cs.CR cs.SE
null
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely to informal descriptions of protocols, it allows a succinct and natural formalization; because it abstracts away message ordering, and handles communications between principals and applications of cryptographic primitives uniformly, it is readily represented in a standard logic. A generic framework in the Alloy modelling language is presented, and instantiated for two standard protocols, and a new key management scheme.
[ { "version": "v1", "created": "Wed, 24 May 2006 15:58:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Torlak", "Emina", "" ], [ "van Dijk", "Marten", "" ], [ "Gassend", "Blaise", "" ], [ "Jackson", "Daniel", "" ], [ "Devadas", "Srinivas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0605110
Marko Antonio Rodriguez
Marko A. Rodriguez, Johan Bollen, Herbert Van de Sompel
Mapping the Bid Behavior of Conference Referees
null
Journal of Informetrics, volume 1, number 1, pp. 62-82, ISSN: 1751-1577, January 2007
10.1016/j.joi.2006.09.006
LA-UR-06-0749
cs.DL cs.CY
null
The peer-review process, in its present form, has been repeatedly criticized. Of the many critiques ranging from publication delays to referee bias, this paper will focus specifically on the issue of how submitted manuscripts are distributed to qualified referees. Unqualified referees, without the proper knowledge of a manuscript's domain, may reject a perfectly valid study or potentially more damaging, unknowingly accept a faulty or fraudulent result. In this paper, referee competence is analyzed with respect to referee bid data collected from the 2005 Joint Conference on Digital Libraries (JCDL). The analysis of the referee bid behavior provides a validation of the intuition that referees are bidding on conference submissions with regards to the subject domain of the submission. Unfortunately, this relationship is not strong and therefore suggests that there exists other factors beyond subject domain that may be influencing referees to bid for particular submissions.
[ { "version": "v1", "created": "Wed, 24 May 2006 16:45:08 GMT" } ]
2021-08-23T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0605111
Jon Phipps
Diane I. Hillmann (1), Stuart A. Sutton (2), Jon Phipps (1), Ryan Laundry (2) ((1) Cornell University, (2) University of Washington)
A Metadata Registry from Vocabularies UP: The NSDL Registry Project
Submitted to Dublin Core 2006 Conference (DC2006)
null
null
null
cs.DL
null
The NSDL Metadata Registry is designed to provide humans and machines with the means to discover, create, access and manage metadata schemes, schemas, application profiles, crosswalks and concept mappings. This paper describes the general goals and architecture of the NSDL Metadata Registry as well as issues encountered during the first year of the project's implementation.
[ { "version": "v1", "created": "Wed, 24 May 2006 16:51:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Hillmann", "Diane I.", "", "Cornell University" ], [ "Sutton", "Stuart A.", "", "University of Washington" ], [ "Phipps", "Jon", "", "Cornell University" ], [ "Laundry", "Ryan", "", "University of Washington" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0605112
Marko Antonio Rodriguez
Marko A. Rodriguez, Johan Bollen
An Algorithm to Determine Peer-Reviewers
Rodriguez, M.A., Bollen, J., "An Algorithm to Determine Peer-Reviewers", Conference on Information and Knowledge Management, in press, ACM, LA-UR-06-2261, October 2008; ISBN:978-1-59593-991-3
Conference on Information and Knowledge Management (CIKM), ACM, pages 319-328, (October 2008)
10.1145/1458082.1458127
LA-UR-06-2261
cs.DL cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The peer-review process is the most widely accepted certification mechanism for officially accepting the written results of researchers within the scientific community. An essential component of peer-review is the identification of competent referees to review a submitted manuscript. This article presents an algorithm to automatically determine the most appropriate reviewers for a manuscript by way of a co-authorship network data structure and a relative-rank particle-swarm algorithm. This approach is novel in that it is not limited to a pre-selected set of referees, is computationally efficient, requires no human-intervention, and, in some instances, can automatically identify conflict of interest situations. A useful application of this algorithm would be to open commentary peer-review systems because it provides a weighting for each referee with respects to their expertise in the domain of a manuscript. The algorithm is validated using referee bid data from the 2005 Joint Conference on Digital Libraries.
[ { "version": "v1", "created": "Wed, 24 May 2006 17:06:32 GMT" }, { "version": "v2", "created": "Tue, 15 Jul 2008 22:24:28 GMT" } ]
2008-12-02T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Bollen", "Johan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0605113
Johan Bollen
Johan Bollen and Herbert Van de Sompel
An Architecture for the Aggregation and Analysis of Scholarly Usage Data
to be published in Proceedings of the Joint Conference on Digital Libraries, 2006
null
null
null
cs.DL
null
Although recording of usage data is common in scholarly information services, its exploitation for the creation of value-added services remains limited due to concerns regarding, among others, user privacy, data validity, and the lack of accepted standards for the representation, sharing and aggregation of usage data. This paper presents a technical, standards-based architecture for sharing usage information, which we have designed and implemented. In this architecture, OpenURL-compliant linking servers aggregate usage information of a specific user community as it navigates the distributed information environment that it has access to. This usage information is made OAI-PMH harvestable so that usage information exposed by many linking servers can be aggregated to facilitate the creation of value-added services with a reach beyond that of a single community or a single information service. This paper also discusses issues that were encountered when implementing the proposed approach, and it presents preliminary results obtained from analyzing a usage data set containing about 3,500,000 requests aggregated by a federation of linking servers at the California State University system over a 20 month period.
[ { "version": "v1", "created": "Wed, 24 May 2006 18:06:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bollen", "Johan", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0605114
Abhishek Parakh
Abhishek Parakh
Oblivious Transfer using Elliptic Curves
10 pages
Cryptologia, Volume 31, Issue 2 April 2007, pages 125 - 132
null
null
cs.CR
null
This paper proposes an algorithm for oblivious transfer using elliptic curves. Also, we present its application to chosen one-out-of-two oblivious transfer.
[ { "version": "v1", "created": "Wed, 24 May 2006 17:58:59 GMT" } ]
2007-06-13T00:00:00
[ [ "Parakh", "Abhishek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0605115
Nick Jones
Nick S. Jones, Lluis Masanes
Key Distillation and the Secret-Bit Fraction
12 pages
IEEE Trans. Inf. Theory, Vol. 54, No. 2, pp 680-691 (2008)
10.1109/TIT.2007.913264
null
cs.CR cs.IT math.IT quant-ph
null
We consider distillation of secret bits from partially secret noisy correlations P_ABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario consists of joint operations on a large number of copies of the distribution (P_ABE)^N, assisted with public communication. Here we consider distillation with only one copy of the distribution, and instead of rates, the 'quality' of the distilled secret bits is optimized, where the 'quality' is quantified by the secret-bit fraction of the result. The secret-bit fraction of a binary distribution is the proportion which constitutes a secret bit between Alice and Bob. With local operations and public communication the maximal extractable secret-bit fraction from a distribution P_ABE is found, and is denoted by Lambda[P_ABE]. This quantity is shown to be nonincreasing under local operations and public communication, and nondecreasing under eavesdropper's local operations: it is a secrecy monotone. It is shown that if Lambda[P_ABE]>1/2 then P_ABE is distillable, thus providing a sufficient condition for distillability. A simple expression for Lambda[P_ABE] is found when the eavesdropper is decoupled, and when the honest parties' information is binary and the local operations are reversible. Intriguingly, for general distributions the (optimal) operation requires local degradation of the data.
[ { "version": "v1", "created": "Wed, 24 May 2006 18:56:15 GMT" }, { "version": "v2", "created": "Mon, 12 May 2008 14:21:30 GMT" } ]
2008-05-12T00:00:00
[ [ "Jones", "Nick S.", "" ], [ "Masanes", "Lluis", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0605116
Nan Liu
Nan Liu and Sennur Ulukus
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks
5 pages, 0 figure, To appear in ISIT 2006
null
null
null
cs.IT math.IT
null
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements from an underlying random process, code and transmit those measurement samples to a collector node in a cooperative multiple access channel with imperfect feedback, and reconstruct the entire random process at the collector node. We provide lower and upper bounds for the minimum achievable expected distortion when the underlying random process is Gaussian. In the case where the random process satisfies some general conditions, we evaluate the lower and upper bounds explicitly and show that they are of the same order for a wide range of sum power constraints. Thus, for these random processes, under these sum power constraints, we determine the achievability scheme that is order-optimal, and express the minimum achievable expected distortion as a function of the sum power constraint.
[ { "version": "v1", "created": "Wed, 24 May 2006 20:58:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605117
Seijoon Shim
Seijoon Shim, Chan-Byoung Chae, and Robert W. Heath Jr
A Lattice-Based MIMO Broadcast Precoder for Multi-Stream Transmission
30 pages, 9 figures, submitted to IEEE Trans. on Communications and partly submitted to the Globecomm 2006
null
null
null
cs.IT math.IT
null
Precoding with block diagonalization is an attractive scheme for approaching sum capacity in multiuser multiple input multiple output (MIMO) broadcast channels. This method requires either global channel state information at every receiver or an additional training phase, which demands additional system planning. In this paper we propose a lattice based multi-user precoder that uses block diagonalization combined with pre-equalization and perturbation for the multiuser MIMO broadcast channel. An achievable sum rate of the proposed scheme is derived and used to show that the proposed technique approaches the achievable sum rate of block diagonalization with water-filling but does not require the additional information at the receiver. Monte Carlo simulations with equal power allocation show that the proposed method provides better bit error rate and diversity performance than block diagonalization with a zero-forcing receiver. Additionally, the proposed method shows similar performance to the maximum likelihood receiver but with much lower receiver complexity.
[ { "version": "v1", "created": "Thu, 25 May 2006 02:32:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Shim", "Seijoon", "" ], [ "Chae", "Chan-Byoung", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605118
Deepak Sridhara
Christine A. Kelley, Deepak Sridhara, and Joachim Rosenthal
Pseudocodeword weights for non-binary LDPC codes
5 pages, 3 figures. To appear in Proceedings of the 2006 IEEE International Symposium on Information Theory, July 9-14, 2006, Seattle, USA
null
10.1109/ISIT.2006.262072
null
cs.IT math.IT
null
Pseudocodewords of q-ary LDPC codes are examined and the weight of a pseudocodeword on the q-ary symmetric channel is defined. The weight definition of a pseudocodeword on the AWGN channel is also extended to two-dimensional q-ary modulation such as q-PAM and q-PSK. The tree-based lower bounds on the minimum pseudocodeword weight are shown to also hold for q-ary LDPC codes on these channels.
[ { "version": "v1", "created": "Wed, 24 May 2006 22:03:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Kelley", "Christine A.", "" ], [ "Sridhara", "Deepak", "" ], [ "Rosenthal", "Joachim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605119
Victor Kryssanov
V.V. Kryssanov, H. Tamaki, and K. Ueda
An Internet-enabled technology to support Evolutionary Design
23 pages, 3 figures. Preprint completed in 2000
Journal of Engineering Manufacture. 2001, Vol.215, No.B5, 647-655
null
null
cs.CE cs.AI cs.AR cs.MA cs.NI
null
This paper discusses the systematic use of product feedback information to support life-cycle design approaches and provides guidelines for developing a design at both the product and the system levels. Design activities are surveyed in the light of the product life cycle, and the design information flow is interpreted from a semiotic perspective. The natural evolution of a design is considered, the notion of design expectations is introduced, and the importance of evaluation of these expectations in dynamic environments is argued. Possible strategies for reconciliation of the expectations and environmental factors are described. An Internet-enabled technology is proposed to monitor product functionality, usage, and operational environment and supply the designer with relevant information. A pilot study of assessing design expectations of a refrigerator is outlined, and conclusions are drawn.
[ { "version": "v1", "created": "Thu, 25 May 2006 04:39:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Tamaki", "H.", "" ], [ "Ueda", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605120
Victor Kryssanov
V.V. Kryssanov, H. Tamaki, and S. Kitamura
Understanding Design Fundamentals: How Synthesis and Analysis Drive Creativity, Resulting in Emergence
33pages, 4 figures. Preprint completed in 2000
AI in Engineering. 2001, Vol.15/4, 329-342
null
null
cs.AI cs.CE cs.HC
null
This paper presents results of an ongoing interdisciplinary study to develop a computational theory of creativity for engineering design. Human design activities are surveyed, and popular computer-aided design methodologies are examined. It is argued that semiotics has the potential to merge and unite various design approaches into one fundamental theory that is naturally interpretable and so comprehensible in terms of computer use. Reviewing related work in philosophy, psychology, and cognitive science provides a general and encompassing vision of the creativity phenomenon. Basic notions of algebraic semiotics are given and explained in terms of design. This is to define a model of the design creative process, which is seen as a process of semiosis, where concepts and their attributes represented as signs organized into systems are evolved, blended, and analyzed, resulting in the development of new concepts. The model allows us to formally describe and investigate essential properties of the design process, namely its dynamics and non-determinism inherent in creative thinking. A stable pattern of creative thought - analogical and metaphorical reasoning - is specified to demonstrate the expressive power of the modeling approach; illustrative examples are given. The developed theory is applied to clarify the nature of emergence in design: it is shown that while emergent properties of a product may influence its creative value, emergence can simply be seen as a by-product of the creative process. Concluding remarks summarize the research, point to some unresolved issues, and outline directions for future work.
[ { "version": "v1", "created": "Thu, 25 May 2006 11:35:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Tamaki", "H.", "" ], [ "Kitamura", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0605121
Victor Kryssanov
Victor V. Kryssanov, Masayuki Okabe, Koh Kakusho, and Michihiko Minoh
Communication of Social Agents and the Digital City - A Semiotic Perspective
15 pages, 1 figure. Preprint completed in 2001. An earlier version of the paper was presented at the Second Kyoto Workshop on Digital Cities, Kyoto, Japan in 2001
Lecture Notes in Computer Science. 2002, Vol. 2362, 56-70
null
null
cs.AI cs.CL cs.CY cs.HC
null
This paper investigates the concept of digital city. First, a functional analysis of a digital city is made in the light of the modern study of urbanism; similarities between the virtual and urban constructions are pointed out. Next, a semiotic perspective on the subject matter is elaborated, and a terminological basis is introduced to treat a digital city as a self-organizing meaning-producing system intended to support social or spatial navigation. An explicit definition of a digital city is formulated. Finally, the proposed approach is discussed, conclusions are given, and future work is outlined.
[ { "version": "v1", "created": "Thu, 25 May 2006 11:54:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "Victor V.", "" ], [ "Okabe", "Masayuki", "" ], [ "Kakusho", "Koh", "" ], [ "Minoh", "Michihiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0605122
Victor Kryssanov
V.V. Kryssanov, K. Kakusho, E.L. Kuleshov, and M. Minoh
Modeling Hypermedia-Based Communication
35 pages, 4 figures, 1 table. Preprint completed in 2004
Information Sciences. 2005, Vol. 174/1-2, 37-53
null
null
cs.HC cs.CY cs.IR cs.IT math.IT
null
In this article, we explore two approaches to modeling hypermedia-based communication. It is argued that the classical conveyor-tube framework is not applicable to the case of computer- and Internet- mediated communication. We then present a simple but very general system-theoretic model of the communication process, propose its mathematical interpretation, and derive several formulas, which qualitatively and quantitatively accord with data obtained on-line. The devised theoretical results generalize and correct the Zipf-Mandelbrot law and can be used in information system design. At the paper's end, we give some conclusions and draw implications for future work.
[ { "version": "v1", "created": "Thu, 25 May 2006 12:34:03 GMT" } ]
2007-07-16T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Kakusho", "K.", "" ], [ "Kuleshov", "E. L.", "" ], [ "Minoh", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605123
Jaime Cardoso
Jaime S. Cardoso
Classification of Ordinal Data
62 pages, MSc thesis
null
null
null
cs.AI
null
Classification of ordinal data is one of the most important tasks of relation learning. In this thesis a novel framework for ordered classes is proposed. The technique reduces the problem of classifying ordered classes to the standard two-class problem. The introduced method is then mapped into support vector machines and neural networks. Compared with a well-known approach using pairwise objects as training samples, the new algorithm has a reduced complexity and training time. A second novel model, the unimodal model, is also introduced and a parametric version is mapped into neural networks. Several case studies are presented to assert the validity of the proposed models.
[ { "version": "v1", "created": "Fri, 26 May 2006 09:44:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Cardoso", "Jaime S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0605124
Marcelo Arenas
Jorge Perez, Marcelo Arenas and Claudio Gutierrez
Semantics and Complexity of SPARQL
null
null
null
null
cs.DB
null
SPARQL is the W3C candidate recommendation query language for RDF. In this paper we address systematically the formal study of SPARQL, concentrating in its graph pattern facility. We consider for this study a fragment without literals and a simple version of filters which encompasses all the main issues yet is simple to formalize. We provide a compositional semantics, prove there are normal forms, prove complexity bounds, among others that the evaluation of SPARQL patterns is PSPACE-complete, compare our semantics to an alternative operational semantics, give simple and natural conditions when both semantics coincide and discuss optimizations procedures.
[ { "version": "v1", "created": "Fri, 26 May 2006 16:41:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Perez", "Jorge", "" ], [ "Arenas", "Marcelo", "" ], [ "Gutierrez", "Claudio", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0605125
Germain Drolet
Germain Drolet (Department of Electrical & Computer Engineering, Royal Military College of Canada)
Combinational Logic Circuit Design with the Buchberger Algorithm
15 pages, 1 table
null
null
null
cs.AR
null
We detail a procedure for the computation of the polynomial form of an electronic combinational circuit from the design equations in a truth table. The method uses the Buchberger algorithm rather than current traditional methods based on search algorithms. We restrict the analysis to a single output, but the procedure can be generalized to multiple outputs. The procedure is illustrated with the design of a simple arithmetic and logic unit with two 3-bit operands and two control bits.
[ { "version": "v1", "created": "Fri, 26 May 2006 18:43:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Drolet", "Germain", "", "Department of Electrical & Computer Engineering, Royal\n Military College of Canada" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0605126
David Bunde
David P. Bunde
Power-aware scheduling for makespan and flow
13 pages, 3 figures. To appear in 18th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2006
null
null
null
cs.DS
null
We consider offline scheduling algorithms that incorporate speed scaling to address the bicriteria problem of minimizing energy consumption and a scheduling metric. For makespan, we give linear-time algorithms to compute all non-dominated solutions for the general uniprocessor problem and for the multiprocessor problem when every job requires the same amount of work. We also show that the multiprocessor problem becomes NP-hard when jobs can require different amounts of work. For total flow, we show that the optimal flow corresponding to a particular energy budget cannot be exactly computed on a machine supporting arithmetic and the extraction of roots. This hardness result holds even when scheduling equal-work jobs on a uniprocessor. We do, however, extend previous work by Pruhs et al. to give an arbitrarily-good approximation for scheduling equal-work jobs on a multiprocessor.
[ { "version": "v1", "created": "Fri, 26 May 2006 21:57:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bunde", "David P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0605127
Daniel Lemire
Steven Keith, Owen Kaser, Daniel Lemire
Analyzing Large Collections of Electronic Text Using OLAP
null
null
null
TR-05-001
cs.DB cs.DL
null
Computer-assisted reading and analysis of text has various applications in the humanities and social sciences. The increasing size of many electronic text archives has the advantage of a more complete analysis but the disadvantage of taking longer to obtain results. On-Line Analytical Processing is a method used to store and quickly analyze multidimensional data. By storing text analysis information in an OLAP system, a user can obtain solutions to inquiries in a matter of seconds as opposed to minutes, hours, or even days. This analysis is user-driven allowing various users the freedom to pursue their own direction of research.
[ { "version": "v1", "created": "Sat, 27 May 2006 00:51:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Keith", "Steven", "" ], [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0605128
Riccardo Pucella
Alexander Kurz
Logic Column 15: Coalgebras and Their Logics
21 pages
SIGACT News 37 (2), pp. 57-77, 2006
null
null
cs.LO
null
This article describes recent work on the topic of specifying properties of transition systems. By giving a suitably abstract description of transition systems as coalgebras, it is possible to derive logics for capturing properties of these transition systems in an elegant way.
[ { "version": "v1", "created": "Sun, 28 May 2006 19:30:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Kurz", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0605129
Wei Kang
W. Kang and S. Ulukus
An Outer Bound for the Multi-Terminal Rate-Distortion Region
5 pages, 1 figure, to appear in Proc. IEEE International Symp. on Information Theory (ISIT) 2006
null
null
null
cs.IT math.IT
null
The multi-terminal rate-distortion problem has been studied extensively. Notably, among these, Tung and Housewright have provided the best known inner and outer bounds for the rate region under certain distortion constraints. In this paper, we first propose an outer bound for the rate region, and show that it is tighter than the outer bound of Tung and Housewright. Our outer bound involves some $n$-letter Markov chain constraints, which cause computational difficulties. We utilize a necessary condition for the Markov chain constraints to obtain another outer bound, which is represented in terms of some single-letter mutual information expressions evaluated over probability distributions that satisfy some single-letter conditions.
[ { "version": "v1", "created": "Mon, 29 May 2006 02:57:31 GMT" } ]
2007-07-16T00:00:00
[ [ "Kang", "W.", "" ], [ "Ulukus", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605130
Thierry Mora
Thierry Mora and Olivier Rivoire
Error Exponents of Low-Density Parity-Check Codes on the Binary Erasure Channel
5 pages, 4 figures
Proceeding of the IEEE Information Theory Workshop, 2006 (ITW '06), Chengdu, pp. 81-85
10.1109/ITW2.2006.323761
null
cs.IT cond-mat.dis-nn math.IT
null
We introduce a thermodynamic (large deviation) formalism for computing error exponents in error-correcting codes. Within this framework, we apply the heuristic cavity method from statistical mechanics to derive the average and typical error exponents of low-density parity-check (LDPC) codes on the binary erasure channel (BEC) under maximum-likelihood decoding.
[ { "version": "v1", "created": "Mon, 29 May 2006 09:55:30 GMT" } ]
2007-07-16T00:00:00
[ [ "Mora", "Thierry", "" ], [ "Rivoire", "Olivier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605131
Simon Morgan
Simon P Morgan
Notes on Geometric Measure Theory Applications to Image Processing; De-noising, Segmentation, Pattern, Texture, Lines, Gestalt and Occlusion
9 pages, no figures. This informal discussion paper will be updated periodically
null
null
null
cs.CV
null
Regularization functionals that lower level set boundary length when used with L^1 fidelity functionals on signal de-noising on images create artifacts. These are (i) rounding of corners, (ii) shrinking of radii, (iii) shrinking of cusps, and (iv) non-smoothing of staircasing. Regularity functionals based upon total curvature of level set boundaries do not create artifacts (i) and (ii). An adjusted fidelity term based on the flat norm on the current (a distributional graph) representing the density of curvature of level sets boundaries can minimize (iii) by weighting the position of a cusp. A regularity term to eliminate staircasing can be based upon the mass of the current representing the graph of an image function or its second derivatives. Densities on the Grassmann bundle of the Grassmann bundle of the ambient space of the graph can be used to identify patterns, textures, occlusion and lines.
[ { "version": "v1", "created": "Mon, 29 May 2006 13:27:38 GMT" }, { "version": "v2", "created": "Tue, 30 May 2006 05:50:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Morgan", "Simon P", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0605132
Krzysztof R. Apt
Krzysztof R. Apt and Tadeusz Radzik
Stable partitions in coalitional games
18 pages
null
null
null
cs.GT cs.MA
null
We propose a notion of a stable partition in a coalitional game that is parametrized by the concept of a defection function. This function assigns to each partition of the grand coalition a set of different coalition arrangements for a group of defecting players. The alternatives are compared using their social welfare. We characterize the stability of a partition for a number of most natural defection functions and investigate whether and how so defined stable partitions can be reached from any initial partition by means of simple transformations. The approach is illustrated by analyzing an example in which a set of stores seeks an optimal transportation arrangement.
[ { "version": "v1", "created": "Mon, 29 May 2006 16:03:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Radzik", "Tadeusz", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0605133
Benoit Donnet
Benoit Donnet Philippe Raoult Timur Friedman
Efficient Route Tracing from a Single Source
null
null
null
null
cs.NI
null
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as an engineering tool, and also as a scientific tool, such as for discovery of the network topology at the IP level. In prior work, authors on this technical report have shown how to improve the efficiency of route tracing from multiple cooperating monitors. However, it is not unusual for a route tracing monitor to operate in isolation. Somewhat different strategies are required for this case, and this report is the first systematic study of those requirements. Standard traceroute is inefficient when used repeatedly towards multiple destinations, as it repeatedly probes the same interfaces close to the source. Others have recognized this inefficiency and have proposed tracing backwards from the destinations and stopping probing upon encounter with a previously-seen interface. One of this technical report's contributions is to quantify for the first time the efficiency of this approach. Another contribution is to describe the effect of non-responding destinations on this efficiency. Since a large portion of destination machines do not reply to probe packets, backwards probing from the destination is often infeasible. We propose an algorithm to tackle non-responding destinations, and we find that our algorithm can strongly decrease probing redundancy at the cost of a small reduction in node and link discovery.
[ { "version": "v1", "created": "Mon, 29 May 2006 16:08:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Friedman", "Benoit Donnet Philippe Raoult Timur", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605134
Boon-Chong Seet
Boon-Chong Seet, Bu-Sung Lee, and Chiew-Tong Lau
DSR with Non-Optimal Route Suppression for MANETs
10 pages, 17 figures
null
null
null
cs.NI
null
This paper revisits the issue of route discovery in dynamic source routing (DSR) for mobile ad hoc networks (MANETs), and puts forward a proposal of a lightweight non-optimal route suppression technique based on the observation of a rarely noted but commonly occurring phenomenon in route discovery. The technique exploits the observed phenomenon to extract query state information that permits intermediate nodes to identify and suppress the initiation of route replies with non-optimal routes, even if the route query is received for the first time. A detailed evaluation of DSR with non-optimal route suppression is found to yield significant improvements in both protocol efficiency and performance.
[ { "version": "v1", "created": "Mon, 29 May 2006 17:33:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Seet", "Boon-Chong", "" ], [ "Lee", "Bu-Sung", "" ], [ "Lau", "Chiew-Tong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0605135
Sergio Servetto
R. Dabora and S. D. Servetto (Cornell University)
On the Role of Estimate-and-Forward with Time-Sharing in Cooperative Communications
Submitted to the IEEE Transactions on Information Theory, May 2006; Revised, October 2006
null
null
null
cs.IT math.IT
null
In this work we focus on the general relay channel. We investigate the application of estimate-and-forward (EAF) to different scenarios. Specifically, we consider assignments of the auxiliary random variables that always satisfy the feasibility constraints. We first consider the multiple relay channel and obtain an achievable rate without decoding at the relays. We demonstrate the benefits of this result via an explicit discrete memoryless multiple relay scenario where multi-relay EAF is superior to multi-relay decode-and-forward (DAF). We then consider the Gaussian relay channel with coded modulation, where we show that a three-level quantization outperforms the Gaussian quantization commonly used to evaluate the achievable rates in this scenario. Finally we consider the cooperative general broadcast scenario with a multi-step conference. We apply estimate-and-forward to obtain a general multi-step achievable rate region. We then give an explicit assignment of the auxiliary random variables, and use this result to obtain an explicit expression for the single common message broadcast scenario with a two-step conference.
[ { "version": "v1", "created": "Mon, 29 May 2006 18:12:55 GMT" }, { "version": "v2", "created": "Wed, 1 Nov 2006 07:56:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Dabora", "R.", "", "Cornell University" ], [ "Servetto", "S. D.", "", "Cornell University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605136
Bourgeois Gerald
Gerald Bourgeois
Attaque algebrique de NTRU a l'aide des vecteurs de Witt
6 pages; correction of the miscalculations
null
null
null
cs.CR
null
One improves an algebraic attack of NTRU due to Silverman, Smart and Vercauteren; the latter considered the first 2 bits of a Witt vector attached to the research of the secret key; here the first 4 bits are considered, which provides additional equations of degrees 4 and 8.
[ { "version": "v1", "created": "Mon, 29 May 2006 22:42:24 GMT" }, { "version": "v2", "created": "Mon, 5 Jun 2006 22:44:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Bourgeois", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0605137
Jun Chen
Jun Chen, Venugopal V. Veeravalli
Capacity Results for Block-Stationary Gaussian Fading Channels with a Peak Power Constraint
Submitted to the IEEE Transactions on Information Theory
null
10.1109/TIT.2007.909083
null
cs.IT math.IT
null
We consider a peak-power-limited single-antenna block-stationary Gaussian fading channel where neither the transmitter nor the receiver knows the channel state information, but both know the channel statistics. This model subsumes most previously studied Gaussian fading models. We first compute the asymptotic channel capacity in the high SNR regime and show that the behavior of channel capacity depends critically on the channel model. For the special case where the fading process is symbol-by-symbol stationary, we also reveal a fundamental interplay between the codeword length, communication rate, and decoding error probability. Specifically, we show that the codeword length must scale with SNR in order to guarantee that the communication rate can grow logarithmically with SNR with bounded decoding error probability, and we find a necessary condition for the growth rate of the codeword length. We also derive an expression for the capacity per unit energy. Furthermore, we show that the capacity per unit energy is achievable using temporal ON-OFF signaling with optimally allocated ON symbols, where the optimal ON-symbol allocation scheme may depend on the peak power constraint.
[ { "version": "v1", "created": "Tue, 30 May 2006 03:56:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Chen", "Jun", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0605138
Victor Kryssanov
V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi
The meaning of manufacturing know-how
12 pages. Preprint completed in March 1998. Presented in part at PROLAMAT'98
In: G. Jacucci, G.J. Olling, K. Preiss, and M. Wozny (eds), The Globalization of Manufacturing in the Digital Communications Era of the 21st Century: Innovation, Agility and the Virtual Enterprise, pp. 375-387. 1998, Kluwer Academic Publishers
null
null
cs.AI cs.CE
null
This paper investigates the phenomenon of manufacturing know-how. First, the abstract notion of knowledge is discussed, and a terminological basis is introduced to treat know-how as a kind of knowledge. Next, a brief survey of the recently reported works dealt with manufacturing know-how is presented, and an explicit definition of know-how is formulated. Finally, the problem of utilizing know-how with knowledge-based systems is analyzed, and some ideas useful for its solving are given.
[ { "version": "v1", "created": "Tue, 30 May 2006 05:12:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Abramov", "V. A.", "" ], [ "Fukuda", "Y.", "" ], [ "Konishi", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0605139
Na Li
Na Li and Wen-Feng Qi
Construction and Count of Boolean Functions of an Odd Number of Variables with Maximum Algebraic Immunity
This paper has been submitted on March 9, 2006
null
null
null
cs.CR
null
Algebraic immunity has been proposed as an important property of Boolean functions. To resist algebraic attack, a Boolean function should possess high algebraic immunity. It is well known now that the algebraic immunity of an $n$-variable Boolean function is upper bounded by $\left\lceil {\frac{n}{2}} \right\rceil $. In this paper, for an odd integer $n$, we present a construction method which can efficiently generate a Boolean function of $n$ variables with maximum algebraic immunity, and we also show that any such function can be generated by this method. Moreover, the number of such Boolean functions is greater than $2^{2^{n-1}}$.
[ { "version": "v1", "created": "Tue, 30 May 2006 16:54:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Na", "" ], [ "Qi", "Wen-Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]