id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0606093
Vladimir Vovk
Vladimir Vovk
Predictions as statements and decisions
48 pages
null
null
null
cs.LG
null
Prediction is a complex notion, and different predictors (such as people, computer programs, and probabilistic theories) can pursue very different goals. In this paper I will review some popular kinds of prediction and argue that the theory of competitive on-line learning can benefit from the kinds of prediction that are now foreign to it.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 04:31:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0606094
Frank Neven
Wim Martens, Frank Neven, and Marc Gyssens
On Typechecking Top-Down XML Tranformations: Fixed Input or Output Schemas
null
null
null
null
cs.DB cs.PL
null
Typechecking consists of statically verifying whether the output of an XML transformation always conforms to an output type for documents satisfying a given input type. In this general setting, both the input and output schema as well as the transformation are part of the input for the problem. However, scenarios where the input or output schema can be considered to be fixed, are quite common in practice. In the present work, we investigate the computational complexity of the typechecking problem in the latter setting.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 09:46:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Martens", "Wim", "" ], [ "Neven", "Frank", "" ], [ "Gyssens", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0606095
Jean Krivine
Jean Krivine (INRIA Rocquencourt)
A verification algorithm for Declarative Concurrent Programming
null
null
null
null
cs.DC
null
A verification method for distributed systems based on decoupling forward and backward behaviour is proposed. This method uses an event structure based algorithm that, given a CCS process, constructs its causal compression relative to a choice of observable actions. Verifying the original process equipped with distributed backtracking on non-observable actions, is equivalent to verifying its relative compression which in general is much smaller. We call this method Declarative Concurrent Programming (DCP). DCP technique compares well with direct bisimulation based methods. Benchmarks for the classic dining philosophers problem show that causal compression is rather efficient both time- and space-wise. State of the art verification tools can successfully handle more than 15 agents, whereas they can handle no more than 5 following the traditional direct method; an altogether spectacular improvement, since in this example the specification size is exponential in the number of agents.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 13:23:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Krivine", "Jean", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0606096
Hendrik Feddes
Lea Cyrus
Building a resource for studying translation shifts
6 pages, 1 figure
Proc. LREC 2006, Genoa, May 24-26, 2006; pp. 1240-1245
null
null
cs.CL
null
This paper describes an interdisciplinary approach which brings together the fields of corpus linguistics and translation studies. It presents ongoing work on the creation of a corpus resource in which translation shifts are explicitly annotated. Translation shifts denote departures from formal correspondence between source and target text, i.e. deviations that have occurred during the translation process. A resource in which such shifts are annotated in a systematic way will make it possible to study those phenomena that need to be addressed if machine translation output is to resemble human translation. The resource described in this paper contains English source texts (parliamentary proceedings) and their German translations. The shift annotation is based on predicate-argument structures and proceeds in two steps: first, predicates and their arguments are annotated monolingually in a straightforward manner. Then, the corresponding English and German predicates and arguments are aligned with each other. Whenever a shift - mainly grammatical or semantic -has occurred, the alignment is tagged accordingly.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 13:26:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Cyrus", "Lea", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0606097
Andrew Krizhanovsky A
A. Krizhanovsky
Synonym search in Wikipedia: Synarcher
4 pages, 2 figures, Synarcher program is available at http://synarcher.sourceforge.net
null
null
null
cs.IR cs.DM
null
The program Synarcher for synonym (and related terms) search in the text corpus of special structure (Wikipedia) was developed. The results of the search are presented in the form of graph. It is possible to explore the graph and search for graph elements interactively. Adapted HITS algorithm for synonym search, program architecture, and program work evaluation with test examples are presented in the paper. The proposed algorithm can be applied to a query expansion by synonyms (in a search engine) and a synonym dictionary forming.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 14:17:26 GMT" }, { "version": "v2", "created": "Fri, 23 Jun 2006 05:10:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Krizhanovsky", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0606098
Jeff M Phillips
Jeff M. Phillips and Ran Liu and Carlo Tomasi
Outlier Robust ICP for Minimizing Fractional RMSD
22 pages, 7 Figures, 9 Tables
null
null
Duke University Technical Report: CS-2006-05
cs.GR cs.CG
null
We describe a variation of the iterative closest point (ICP) algorithm for aligning two point sets under a set of transformations. Our algorithm is superior to previous algorithms because (1) in determining the optimal alignment, it identifies and discards likely outliers in a statistically robust manner, and (2) it is guaranteed to converge to a locally optimal solution. To this end, we formalize a new distance measure, fractional root mean squared distance (frmsd), which incorporates the fraction of inliers into the distance function. We lay out a specific implementation, but our framework can easily incorporate most techniques and heuristics from modern registration algorithms. We experimentally validate our algorithm against previous techniques on 2 and 3 dimensional data exposed to a variety of outlier types.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 15:35:56 GMT" } ]
2009-09-29T00:00:00
[ [ "Phillips", "Jeff M.", "" ], [ "Liu", "Ran", "" ], [ "Tomasi", "Carlo", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0606099
Mohammad Ali Maddah-Ali Mr.
Mohammad A. Maddah-Ali, Amin Mobasher, and Amir Kayvan Khandani
Fairness in Multiuser Systems with Polymatroid Capacity Region
Submitted To IEEE Transactions on Information Theory, June 2006
null
10.1109/TIT.2009.2016058
null
cs.IT math.IT
null
For a wide class of multi-user systems, a subset of capacity region which includes the corner points and the sum-capacity facet has a special structure known as polymatroid. Multiaccess channels with fixed input distributions and multiple-antenna broadcast channels are examples of such systems. Any interior point of the sum-capacity facet can be achieved by time-sharing among corner points or by an alternative method known as rate-splitting. The main purpose of this paper is to find a point on the sum-capacity facet which satisfies a notion of fairness among active users. This problem is addressed in two cases: (i) where the complexity of achieving interior points is not feasible, and (ii) where the complexity of achieving interior points is feasible. For the first case, the corner point for which the minimum rate of the active users is maximized (max-min corner point) is desired for signaling. A simple greedy algorithm is introduced to find the optimum max-min corner point. For the second case, the polymatroid properties are exploited to locate a rate-vector on the sum-capacity facet which is optimally fair in the sense that the minimum rate among all users is maximized (max-min rate). In the case that the rate of some users can not increase further (attain the max-min value), the algorithm recursively maximizes the minimum rate among the rest of the users. It is shown that the problems of deriving the time-sharing coefficients or rate-spitting scheme can be solved by decomposing the problem to some lower-dimensional subproblems. In addition, a fast algorithm to compute the time-sharing coefficients to attain a general point on the sum-capacity facet is proposed.
[ { "version": "v1", "created": "Thu, 22 Jun 2006 21:31:23 GMT" } ]
2016-11-15T00:00:00
[ [ "Maddah-Ali", "Mohammad A.", "" ], [ "Mobasher", "Amin", "" ], [ "Khandani", "Amir Kayvan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0606100
Marco Cuturi
Marco Cuturi
The generating function of the polytope of transport matrices $U(r,c)$ as a positive semidefinite kernel of the marginals $r$ and $c$
This paper has been withdrawn
null
null
null
cs.LG cs.DM
null
This paper has been withdrawn by the author due to a crucial error in the proof of Lemma 5.
[ { "version": "v1", "created": "Fri, 23 Jun 2006 10:19:40 GMT" }, { "version": "v2", "created": "Mon, 26 Jun 2006 05:46:00 GMT" }, { "version": "v3", "created": "Tue, 4 Jan 2011 08:26:13 GMT" }, { "version": "v4", "created": "Tue, 11 Oct 2011 10:21:45 GMT" } ]
2011-10-12T00:00:00
[ [ "Cuturi", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0606101
Marc Daumas
Marc Daumas (LIRMM, Lp2a), David Lester (LP2A, University of Manchester)
Stochastic Formal Methods: An application to accuracy of numeric software
null
null
null
null
cs.MS
null
This paper provides a bound on the number of numeric operations (fixed or floating point) that can safely be performed before accuracy is lost. This work has important implications for control systems with safety-critical software, as these systems are now running fast enough and long enough for their errors to impact on their functionality. Furthermore, worst-case analysis would blindly advise the replacement of existing systems that have been successfully running for years. We present here a set of formal theorems validated by the PVS proof assistant. These theorems will allow code analyzing tools to produce formal certificates of accurate behavior. For example, FAA regulations for aircraft require that the probability of an error be below $10^{-9}$ for a 10 hour flight.
[ { "version": "v1", "created": "Fri, 23 Jun 2006 08:26:56 GMT" }, { "version": "v2", "created": "Thu, 14 Sep 2006 11:51:28 GMT" }, { "version": "v3", "created": "Wed, 18 Oct 2006 19:41:07 GMT" }, { "version": "v4", "created": "Tue, 19 Dec 2006 17:10:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Daumas", "Marc", "", "LIRMM, Lp2a" ], [ "Lester", "David", "", "LP2A, University of\n Manchester" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0606102
Chengpu Wang
Chengpu Wang
Toward Functionality Oriented Programming
This paper has been withdrawn by the author. 21 Pages, 7 Figures
null
null
null
cs.PL cs.HC
null
The concept of functionality oriented programming is proposed, and some of its aspects are discussed, such as: (1) implementation independent basic types and generic collection types; (2) syntax requirements and recommendations for implementation independence; (3) unified documentation and code; (4) cross-module interface; and (5) cross-language program making scheme. A prototype example is given to demonstrate functionality oriented programming.
[ { "version": "v1", "created": "Sat, 24 Jun 2006 18:51:54 GMT" }, { "version": "v2", "created": "Wed, 19 May 2010 03:17:12 GMT" }, { "version": "v3", "created": "Fri, 18 Feb 2011 00:41:26 GMT" } ]
2011-02-21T00:00:00
[ [ "Wang", "Chengpu", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0606103
Chengpu Wang
Chengpu Wang
Precision Arithmetic: A New Floating-Point Arithmetic
54 Pages, 32 Figures
null
null
null
cs.DM cs.DS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new deterministic floating-point arithmetic called precision arithmetic is developed to track precision for arithmetic calculations. It uses a novel rounding scheme to avoid excessive rounding error propagation of conventional floating-point arithmetic. Unlike interval arithmetic, its uncertainty tracking is based on statistics and the central limit theorem, with a much tighter bounding range. Its stable rounding error distribution is approximated by a truncated normal distribution. Generic standards and systematic methods for validating uncertainty-bearing arithmetics are discussed. The precision arithmetic is found to be better than interval arithmetic in both uncertainty-tracking and uncertainty-bounding for normal usages. The precision arithmetic is available publicly at http://precisionarithm.sourceforge.net.
[ { "version": "v1", "created": "Sun, 25 Jun 2006 18:56:28 GMT" }, { "version": "v10", "created": "Wed, 13 Oct 2010 02:39:44 GMT" }, { "version": "v11", "created": "Sat, 30 Oct 2010 03:49:06 GMT" }, { "version": "v12", "created": "Thu, 11 Nov 2010 20:25:56 GMT" }, { "version": "v13", "created": "Mon, 6 Dec 2010 21:56:48 GMT" }, { "version": "v14", "created": "Wed, 5 Jan 2011 04:43:49 GMT" }, { "version": "v15", "created": "Mon, 21 Feb 2011 02:07:43 GMT" }, { "version": "v16", "created": "Mon, 14 Mar 2011 20:40:47 GMT" }, { "version": "v17", "created": "Tue, 26 Jul 2011 02:22:36 GMT" }, { "version": "v18", "created": "Sat, 10 Dec 2011 19:13:43 GMT" }, { "version": "v19", "created": "Wed, 12 Sep 2012 01:57:05 GMT" }, { "version": "v2", "created": "Tue, 15 Aug 2006 01:33:34 GMT" }, { "version": "v20", "created": "Tue, 18 Mar 2014 04:17:22 GMT" }, { "version": "v21", "created": "Thu, 3 Apr 2014 11:40:24 GMT" }, { "version": "v22", "created": "Sat, 12 Apr 2014 02:02:06 GMT" }, { "version": "v3", "created": "Wed, 19 May 2010 03:16:25 GMT" }, { "version": "v4", "created": "Thu, 20 May 2010 21:42:30 GMT" }, { "version": "v5", "created": "Fri, 9 Jul 2010 18:50:07 GMT" }, { "version": "v6", "created": "Wed, 21 Jul 2010 02:26:26 GMT" }, { "version": "v7", "created": "Sun, 25 Jul 2010 22:54:13 GMT" }, { "version": "v8", "created": "Mon, 27 Sep 2010 15:35:14 GMT" }, { "version": "v9", "created": "Wed, 6 Oct 2010 01:21:06 GMT" } ]
2014-04-15T00:00:00
[ [ "Wang", "Chengpu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0606104
Te Sun Han
Te Sun Han
An information-spectrum approach to large deviation theorems
null
null
null
null
cs.IT math.IT
null
In this paper we show a some new look at large deviation theorems from the viewpoint of the information-spectrum (IS) methods, which has been first exploited in information theory, and also demonstrate a new basic formula for the large deviation rate function in general, which is a pair of the lower and upper IS rate functions. In particular, we are interested in establishing the general large deviation rate functions that can be derivable as the Fenchel-Legendre transform of the cumulant generating function. The final goal is to show a necessary and sufficient condition for the rate function to be of Cram\'er-G\"artner-Ellis type.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 09:16:40 GMT" }, { "version": "v2", "created": "Fri, 30 Jun 2006 05:11:36 GMT" }, { "version": "v3", "created": "Mon, 10 Jul 2006 07:13:23 GMT" }, { "version": "v4", "created": "Tue, 11 Jul 2006 04:39:19 GMT" }, { "version": "v5", "created": "Wed, 12 Jul 2006 06:23:02 GMT" }, { "version": "v6", "created": "Fri, 14 Jul 2006 10:51:11 GMT" }, { "version": "v7", "created": "Mon, 17 Jul 2006 09:25:07 GMT" }, { "version": "v8", "created": "Fri, 28 Jul 2006 06:59:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Han", "Te Sun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0606105
Salah Deeb
Salah Deeb (CRAN), Beno\^it Iung (CRAN)
Iso9000 Based Advanced Quality Approach for Continuous Improvement of Manufacturing Processes
null
12th IFAC Symposium on Information Control Problems in Manufacturing, St-Etienne, France (17/05/2006) CDROM
null
null
cs.IR
null
The continuous improvement in TQM is considered as the core value by which organisation could maintain a competitive edge. Several techniques and tools are known to support this core value but most of the time these techniques are informal and without modelling the interdependence between the core value and tools. Thus, technique formalisation is one of TQM challenges for increasing efficiency of quality process implementation. In that way, the paper proposes and experiments an advanced quality modelling approach based on meta-modelling the "process approach" as advocated by the standard ISO9000:2000. This meta-model allows formalising the interdependence between technique, tools and core value
[ { "version": "v1", "created": "Mon, 26 Jun 2006 11:51:41 GMT" } ]
2016-08-16T00:00:00
[ [ "Deeb", "Salah", "", "CRAN" ], [ "Iung", "Benoît", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0606106
Andrew Thangaraj
Sundeep B and Andrew Thangaraj
Self-orthogonality of $q$-ary Images of $q^m$-ary Codes and Quantum Code Construction
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A code over GF$(q^m)$ can be imaged or expanded into a code over GF$(q)$ using a basis for the extension field over the base field. The properties of such an image depend on the original code and the basis chosen for imaging. Problems relating the properties of a code and its image with respect to a basis have been of great interest in the field of coding theory. In this work, a generalized version of the problem of self-orthogonality of the $q$-ary image of a $q^m$-ary code has been considered. Given an inner product (more generally, a biadditive form), necessary and sufficient conditions have been derived for a code over a field extension and an expansion basis so that an image of that code is self-orthogonal. The conditions require that the original code be self-orthogonal with respect to several related biadditive forms whenever certain power sums of the dual basis elements do not vanish. Numerous interesting corollaries have been derived by specializing the general conditions. An interesting result for the canonical or regular inner product in fields of characteristic two is that only self-orthogonal codes result in self-orthogonal images. Another result is that image of a code is self-orthogonal for all bases if and only if trace of the code is self-orthogonal, except for the case of binary images of 4-ary codes. The conditions are particularly simple to state and apply for cyclic codes. To illustrate a possible application, new quantum error-correcting codes have been constructed with larger minimum distance than previously known.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 12:05:44 GMT" }, { "version": "v2", "created": "Tue, 27 Jun 2006 05:45:58 GMT" }, { "version": "v3", "created": "Sat, 6 Jan 2007 06:44:21 GMT" } ]
2007-07-13T00:00:00
[ [ "B", "Sundeep", "" ], [ "Thangaraj", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0606107
Uma Murthy
Ingrid Burbey, Gyuhyun Kwon, Uma Murthy, Nicholas Polys and Prince Vincent
Human Information Processing with the Personal Memex
null
null
null
null
cs.HC
null
In this report, we describe the work done in a project that explored the human information processing aspects of a personal memex (a memex to organize personal information). In the project, we considered the use of the personal memex, focusing on information recall, by three populations: people with Mild Cognitive Impairment, those diagnosed with Macular Degeneration, and a high-functioning population. The outcomes of the project included human information processing-centered design guidelines for the memex interface, a low-fidelity prototype, and an annotated bibliography for human information processing, usability and design literature relating to the memex and the populations we explored.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 15:58:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Burbey", "Ingrid", "" ], [ "Kwon", "Gyuhyun", "" ], [ "Murthy", "Uma", "" ], [ "Polys", "Nicholas", "" ], [ "Vincent", "Prince", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0606108
Herve Panetto
Salah Ba\"ina (CRAN), Herv\'e Panetto (CRAN), Khalid Benali (LORIA)
A Product Oriented Modelling Concept: Holons for systems synchronisation and interoperability
null
8th International Conference on Enterprise Information Systems, ICEIS'2006, Paphos, Chypre (23/05/2006) -
null
null
cs.SE
null
Nowadays, enterprises are confronted to growing needs for traceability, product genealogy and product life cycle management. To meet those needs, the enterprise and applications in the enterprise environment have to manage flows of information that relate to flows of material and that are managed in shop floor level. Nevertheless, throughout product lifecycle coordination needs to be established between reality in the physical world (physical view) and the virtual world handled by manufacturing information systems (informational view). This paper presents the "Holon" modelling concept as a means for the synchronisation of both physical view and informational views. Afterwards, we show how the concept of holon can play a major role in ensuring interoperability in the enterprise context.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 19:24:14 GMT" } ]
2016-08-16T00:00:00
[ [ "Baïna", "Salah", "", "CRAN" ], [ "Panetto", "Hervé", "", "CRAN" ], [ "Benali", "Khalid", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0606109
Manor Mendel
Manor Mendel, Assaf Naor
Maximum gradient embeddings and monotone clustering
25 pages, 2 figures. Final version, minor revision of the previous one. To appear in "Combinatorica"
Combinatorica 30(5) (2010), 581--615
10.1007/s00493-010-2302-z
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let (X,d_X) be an n-point metric space. We show that there exists a distribution D over non-contractive embeddings into trees f:X-->T such that for every x in X, the expectation with respect to D of the maximum over y in X of the ratio d_T(f(x),f(y)) / d_X(x,y) is at most C (log n)^2, where C is a universal constant. Conversely we show that the above quadratic dependence on log n cannot be improved in general. Such embeddings, which we call maximum gradient embeddings, yield a framework for the design of approximation algorithms for a wide range of clustering problems with monotone costs, including fault-tolerant versions of k-median and facility location.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 19:32:29 GMT" }, { "version": "v2", "created": "Mon, 1 Dec 2008 20:05:52 GMT" }, { "version": "v3", "created": "Wed, 29 Apr 2009 03:13:43 GMT" }, { "version": "v4", "created": "Sun, 29 Aug 2010 19:27:14 GMT" } ]
2012-11-15T00:00:00
[ [ "Mendel", "Manor", "" ], [ "Naor", "Assaf", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0606110
Richard Weber
Jochen Mundinger, Richard R. Weber and Gideon Weiss
Optimal Scheduling of Peer-to-Peer File Dissemination
27 pages, 3 figures. (v2) added a note about possible strengthening of Theorem 5 at end of proof; updated some references
null
null
null
cs.NI cs.DS math.OC
null
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are increasingly used for disseminating potentially large files from a server to many end users via the Internet. The key idea is to divide the file into many equally-sized parts and then let users download each part (or, for network coding based systems such as Avalanche, linear combinations of the parts) either from the server or from another user who has already downloaded it. However, their performance evaluation has typically been limited to comparing one system relative to another and typically been realized by means of simulation and measurements. In contrast, we provide an analytic performance analysis that is based on a new uplink-sharing version of the well-known broadcasting problem. Assuming equal upload capacities, we show that the minimal time to disseminate the file is the same as for the simultaneous send/receive version of the broadcasting problem. For general upload capacities, we provide a mixed integer linear program (MILP) solution and a complementary fluid limit solution. We thus provide a lower bound which can be used as a performance benchmark for any P2P file dissemination system. We also investigate the performance of a decentralized strategy, providing evidence that the performance of necessarily decentralized P2P file dissemination systems should be close to this bound and therefore that it is useful in practice.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 08:11:57 GMT" }, { "version": "v2", "created": "Fri, 30 Jun 2006 07:17:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Mundinger", "Jochen", "" ], [ "Weber", "Richard R.", "" ], [ "Weiss", "Gideon", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
cs/0606111
Hind El Haouzi
Hind El Haouzi (CRAN)
Models simulation and interoperability using MDA and HLA
8 pages
Doctoral Symposium, IFAC/IFIP International conference on Interoperability for Enterprise Applications and Software (I-ESA'2006), March 22-24, 2006,, France (2006)
null
null
cs.OH
null
In the manufacturing context, there have been numerous efforts to use modeling and simulation tools and techniques to improve manufacturing efficiency over the last four decades. While an increasing number of manufacturing system decisions are being made based on the use of models, their use is still sporadic in many manufacturing environments. Our paper advocates for an approach combining MDA (model driven architecture) and HLA (High Level Architecture), the IEEE standard for modeling and simulation, in order to overcome the deficiencies of current simulation methods at the level of interoperability and reuse.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 14:55:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Haouzi", "Hind El", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0606112
Salah Baina
Salah Baina (CRAN), G\'erard Morel (CRAN)
Product Centric Holons for Synchronisation and Interoperability in Manufacturing Environments
null
12th IFAC Symposium on Information Control Problems in Manufacturing, INCOM'2006, St-Etienne, France (17/05/2006) CDROM
null
null
cs.SE
null
In the last few years, lot of work has been done in order to ensure enterprise applications interoperability; however, proposed solutions focus mainly on enterprise processes. Indeed, throughout product lifecycle coordination needs to be established between reality in the physical world (physical view) and the virtual world handled by manufacturing information systems (informational view). This paper presents a holonic approach that enables synchronisation of both physical and informational views. A model driven approach for interoperability is proposed to ensure interoperability of holon based models with other applications in the enterprise.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 11:21:23 GMT" } ]
2016-08-16T00:00:00
[ [ "Baina", "Salah", "", "CRAN" ], [ "Morel", "Gérard", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0606113
Leon Moonen
Marius Marin, Leon Moonen and Arie van Deursen
A common framework for aspect mining based on crosscutting concern sorts
14 pages
Proceedings Working Conference on Reverse Engineering (WCRE), IEEE Computer Society, 2006, pages 29-38
10.1109/WCRE.2006.6
TUD-SERG-2006-009
cs.SE cs.PL
null
The increasing number of aspect mining techniques proposed in literature calls for a methodological way of comparing and combining them in order to assess, and improve on, their quality. This paper addresses this situation by proposing a common framework based on crosscutting concern sorts which allows for consistent assessment, comparison and combination of aspect mining techniques. The framework identifies a set of requirements that ensure homogeneity in formulating the mining goals, presenting the results and assessing their quality. We demonstrate feasibility of the approach by retrofitting an existing aspect mining technique to the framework, and by using it to design and implement two new mining techniques. We apply the three techniques to a known aspect mining benchmark and show how they can be consistently assessed and combined to increase the quality of the results. The techniques and combinations are implemented in FINT, our publicly available free aspect mining tool.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 12:40:04 GMT" } ]
2007-06-27T00:00:00
[ [ "Marin", "Marius", "" ], [ "Moonen", "Leon", "" ], [ "van Deursen", "Arie", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0606114
Mohammad Rezaeian
Mohammad Rezaeian
Hidden Markov Process: A New Representation, Entropy Rate and Estimation Entropy
7 pages. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We consider a pair of correlated processes {Z_n} and {S_n} (two sided), where the former is observable and the later is hidden. The uncertainty in the estimation of Z_n upon its finite past history is H(Z_n|Z_0^{n-1}), and for estimation of S_n upon this observation is H(S_n|Z_0^{n-1}), which are both sequences of n. The limits of these sequences (and their existence) are of practical and theoretical interest. The first limit, if exists, is the entropy rate. We call the second limit the estimation entropy. An example of a process jointly correlated to another one is the hidden Markov process. It is the memoryless observation of the Markov state process where state transitions are independent of past observations. We consider a new representation of hidden Markov process using iterated function system. In this representation the state transitions are deterministically related to the process. This representation provides a unified framework for the analysis of the two limiting entropies for this process, resulting in integral expressions for the limits. This analysis shows that under mild conditions the limits exist and provides a simple method for calculating the elements of the corresponding sequences.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 15:00:12 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 16:15:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Rezaeian", "Mohammad", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0606115
Jos\'e Borges
Jose Borges and Mark Levene
Evaluating Variable Length Markov Chain Models for Analysis of User Web Navigation Sessions
null
null
null
null
cs.AI cs.IR
null
Markov models have been widely used to represent and analyse user web navigation data. In previous work we have proposed a method to dynamically extend the order of a Markov chain model and a complimentary method for assessing the predictive power of such a variable length Markov chain. Herein, we review these two methods and propose a novel method for measuring the ability of a variable length Markov model to summarise user web navigation sessions up to a given length. While the summarisation ability of a model is important to enable the identification of user navigation patterns, the ability to make predictions is important in order to foresee the next link choice of a user after following a given trail so as, for example, to personalise a web site. We present an extensive experimental evaluation providing strong evidence that prediction accuracy increases linearly with summarisation ability.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 08:26:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Borges", "Jose", "" ], [ "Levene", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0606116
Philip Bille
Philip Bille
New Algorithms for Regular Expression Matching
null
null
null
null
cs.DS
null
In this paper we revisit the classical regular expression matching problem, namely, given a regular expression $R$ and a string $Q$, decide if $Q$ matches one of the strings specified by $R$. Let $m$ and $n$ be the length of $R$ and $Q$, respectively. On a standard unit-cost RAM with word length $w \geq \log n$, we show that the problem can be solved in $O(m)$ space with the following running times: \begin{equation*} \begin{cases} O(n\frac{m \log w}{w} + m \log w) & \text{if $m > w$} \\ O(n\log m + m\log m) & \text{if $\sqrt{w} < m \leq w$} \\ O(\min(n+ m^2, n\log m + m\log m)) & \text{if $m \leq \sqrt{w}$.} \end{cases} \end{equation*} This improves the best known time bound among algorithms using $O(m)$ space. Whenever $w \geq \log^2 n$ it improves all known time bounds regardless of how much space is used.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 10:51:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Bille", "Philip", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0606117
Fabrice Portier
Fabrice Portier (IETR), R. Legouable (FT R&D), L. Maret (LETI), F. Bauer (NOKIA Research Center), N. Neda (UNIS), J.-F. H\'elard (IETR), E. Hemming (NOKIA Research Center), M. Des Noes (LETI), M. H\'elard (FT R&D), the projet europ\'een Matrice Collaboration
Performance comparison of multi-user detectors for the downlink of a broadband MC-CDMA system
null
Proceedings IST Mobile & Wireless Communications Summit (IST Summit 2004) (2004) 1
null
null
cs.IT math.IT
null
In this paper multi-user detection techniques, such as Parallel and Serial Interference Cancellations (PIC & SIC), General Minimum Mean Square Error (GMMSE) and polynomial MMSE, for the downlink of a broadband Multi-Carrier Code Division Multiple Access (MCCDMA) system are investigated. The Bit Error Rate (BER) and Frame Error Rate (FER) results are evaluated, and compared with single-user detection (MMSEC, EGC) approaches, as well. The performance evaluation takes into account the system load, channel coding and modulation schemes.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 15:51:04 GMT" } ]
2016-08-16T00:00:00
[ [ "Portier", "Fabrice", "", "IETR" ], [ "Legouable", "R.", "", "FT R&D" ], [ "Maret", "L.", "", "LETI" ], [ "Bauer", "F.", "", "NOKIA Research Center" ], [ "Neda", "N.", "", "UNIS" ], [ "Hélard", "J. -F.", "", "IETR" ], [ "Hemming", "E.", "", "NOKIA Research Center" ], [ "Noes", "M. Des", "", "LETI" ], [ "Hélard", "M.", "", "FT R&D" ], [ "Collaboration", "the projet européen Matrice", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0606118
Sophie Aubin
Sophie Aubin (LIPN), Adeline Nazarenko (LIPN), Claire N\'edellec (MIG)
Adapting a general parser to a sublanguage
null
Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP'05) (2005) 89-93
null
null
cs.CL cs.IR
null
In this paper, we propose a method to adapt a general parser (Link Parser) to sublanguages, focusing on the parsing of texts in biology. Our main proposal is the use of terminology (identication and analysis of terms) in order to reduce the complexity of the text to be parsed. Several other strategies are explored and finally combined among which text normalization, lexicon and morpho-guessing module extensions and grammar rules adaptation. We compare the parsing results before and after these adaptations.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 14:43:42 GMT" } ]
2016-08-16T00:00:00
[ [ "Aubin", "Sophie", "", "LIPN" ], [ "Nazarenko", "Adeline", "", "LIPN" ], [ "Nédellec", "Claire", "", "MIG" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0606119
Sophie Aubin
Sampo Pyysalo, Tapio Salakoski, Sophie Aubin (LIPN), Adeline Nazarenko (LIPN)
Lexical Adaptation of Link Grammar to the Biomedical Sublanguage: a Comparative Evaluation of Three Approaches
null
Proceedings of the Second International Symposium on Semantic Mining in Biomedicine (SMBM 2006) (2006) 60-67
null
null
cs.CL cs.IR
null
We study the adaptation of Link Grammar Parser to the biomedical sublanguage with a focus on domain terms not found in a general parser lexicon. Using two biomedical corpora, we implement and evaluate three approaches to addressing unknown words: automatic lexicon expansion, the use of morphological clues, and disambiguation using a part-of-speech tagger. We evaluate each approach separately for its effect on parsing performance and consider combinations of these approaches. In addition to a 45% increase in parsing efficiency, we find that the best approach, incorporating information from a domain part-of-speech tagger, offers a statistically signicant 10% relative decrease in error. The adapted parser is available under an open-source license at http://www.it.utu.fi/biolg.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 14:44:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Pyysalo", "Sampo", "", "LIPN" ], [ "Salakoski", "Tapio", "", "LIPN" ], [ "Aubin", "Sophie", "", "LIPN" ], [ "Nazarenko", "Adeline", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0606120
Benoit Masson
Enrico Formenti (I3S), Beno\^it Masson (I3S), Theophilos Pisokas (I3S)
On symmetric sandpiles
Will be presented at ACRI2006 conference
null
null
null
cs.CC cs.PF
null
A symmetric version of the well-known SPM model for sandpiles is introduced. We prove that the new model has fixed point dynamics. Although there might be several fixed points, a precise description of the fixed points is given. Moreover, we provide a simple closed formula for counting the number of fixed points originated by initial conditions made of a single column of grains.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 09:53:05 GMT" } ]
2016-08-16T00:00:00
[ [ "Formenti", "Enrico", "", "I3S" ], [ "Masson", "Benoît", "", "I3S" ], [ "Pisokas", "Theophilos", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0606121
Kaibin Huang
Kaibin Huang, Jeffrey G. Andrews, and Robert W. Heath Jr
Performance of Orthogonal Beamforming for SDMA with Limited Feedback
27 pages; to appear in IEEE Transactions on Vehicular Technology
null
null
null
cs.IT math.IT
null
On the multi-antenna broadcast channel, the spatial degrees of freedom support simultaneous transmission to multiple users. The optimal multiuser transmission, known as dirty paper coding, is not directly realizable. Moreover, close-to-optimal solutions such as Tomlinson-Harashima precoding are sensitive to CSI inaccuracy. This paper considers a more practical design called per user unitary and rate control (PU2RC), which has been proposed for emerging cellular standards. PU2RC supports multiuser simultaneous transmission, enables limited feedback, and is capable of exploiting multiuser diversity. Its key feature is an orthogonal beamforming (or precoding) constraint, where each user selects a beamformer (or precoder) from a codebook of multiple orthonormal bases. In this paper, the asymptotic throughput scaling laws for PU2RC with a large user pool are derived for different regimes of the signal-to-noise ratio (SNR). In the multiuser-interference-limited regime, the throughput of PU2RC is shown to scale logarithmically with the number of users. In the normal SNR and noise-limited regimes, the throughput is found to scale double logarithmically with the number of users and also linearly with the number of antennas at the base station. In addition, numerical results show that PU2RC achieves higher throughput and is more robust against CSI quantization errors than the popular alternative of zero-forcing beamforming if the number of users is sufficiently large.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 19:56:00 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2006 20:36:29 GMT" }, { "version": "v3", "created": "Sat, 3 May 2008 07:24:35 GMT" } ]
2008-05-05T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0606122
P. Oscar Boykin
Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury
Comparison of Image Similarity Queries in P2P Systems
To appear in IEEE P2P2006
null
null
null
cs.DC cs.NI
null
Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured queries are still necessary (i.e., the underlying queries do not efficiently map onto any structured framework), and are there unstructured P2P systems that can deliver the high bandwidth and computing performance necessary to support such applications. Toward this end, we consider an image search application which supports queries based on image similarity metrics, such as color histogram intersection, and discuss why in this setting, standard DHT approaches are not directly applicable. We then study the feasibility of implementing such an image search system on two different unstructured P2P systems: power-law topology with percolation search, and an optimized super-node topology using structured broadcasts. We examine the average and maximum values for node bandwidth, storage and processing requirements in the percolation and super-node models, and show that current high-end computers and high-speed links have sufficient resources to enable deployments of large-scale complex image search systems.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 14:28:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Mueller", "Wolfgang", "" ], [ "Boykin", "P. Oscar", "" ], [ "Sarshar", "Nima", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0606123
Atos Alves
Atos Ramos Alves
Use MPLS in Lan's
9 pages, 0 figures tests in laboratory
null
null
null
cs.NI cs.CR
null
To demonstrate the result of researches in laboratory with the focus in exhibiting the real impact of the use of the technology MPLS in LAN. Through these researches we will verify that the investment in this technology is shown, of the point of view cost/benefit, very interesting, being necessary, however, the adoption of another measured, in order to settle down a satisfactory level in the items Quality and safety in the sending of packages in VPN but assisting to the requirement latency of the net very well being shown in the tests that it consumes on average one Tuesday leaves of the time spend for the same function in routing IP.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 14:44:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Alves", "Atos Ramos", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0606124
Sean Falconer
Sean M. Falconer and Dmitri Maslov
Weighted hierarchical alignment of directed acyclic graph
null
null
null
null
cs.DS
null
In some applications of matching, the structural or hierarchical properties of the two graphs being aligned must be maintained. The hierarchical properties are induced by the direction of the edges in the two directed graphs. These structural relationships defined by the hierarchy in the graphs act as a constraint on the alignment. In this paper, we formalize the above problem as the weighted alignment between two directed acyclic graphs. We prove that this problem is NP-complete, show several upper bounds for approximating the solution, and finally introduce polynomial time algorithms for sub-classes of directed acyclic graphs.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 18:07:49 GMT" }, { "version": "v2", "created": "Fri, 11 May 2007 18:44:43 GMT" } ]
2009-09-29T00:00:00
[ [ "Falconer", "Sean M.", "" ], [ "Maslov", "Dmitri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0606125
Leon Moonen
Marius Marin
Formalizing typical crosscutting concerns
24 pages
null
null
TUD-SERG-2006-010
cs.SE cs.PL
null
We present a consistent system for referring crosscutting functionality, relating crosscutting concerns to specific implementation idioms, and formalizing their underlying relations through queries. The system is based on generic crosscutting concerns that we organize and describe in a catalog. We have designed and implemented a tool support for querying source code for instances of the proposed generic concerns and organizing them in composite concern models. The composite concern model adds a new dimension to the dominant decomposition of the system for describing and making explicit source code relations specific to crosscutting concerns implementations. We use the proposed approach to describe crosscutting concerns in design patterns and apply the tool to an opensource system (JHotDraw).
[ { "version": "v1", "created": "Thu, 29 Jun 2006 20:04:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Marin", "Marius", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0606126
Eldan Goldenberg
Eldan Goldenberg, Jacob R. Garcowski, Randall D. Beer
May We Have Your Attention: Analysis of a Selective Attention Task
In S. Schaal, A. Ijspeert, A. Billard, S. Vijayakumar, J. Hallam & J-A. Meyer (Eds.), From Animals to Animats 8: Proceedings of the Eighth International Conference on the Simulation of Adaptive Behavior (pp 49-56). MIT Press
null
null
null
cs.NE cs.AI
null
In this paper we present a deeper analysis than has previously been carried out of a selective attention problem, and the evolution of continuous-time recurrent neural networks to solve it. We show that the task has a rich structure, and agents must solve a variety of subproblems to perform well. We consider the relationship between the complexity of an agent and the ease with which it can evolve behavior that generalizes well across subproblems, and demonstrate a shaping protocol that improves generalization.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 22:33:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Goldenberg", "Eldan", "" ], [ "Garcowski", "Jacob R.", "" ], [ "Beer", "Randall D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0606127
Mukund Sundararajan
Tim Roughgarden (Stanford University) and Mukund Sundararajan (Stanford University)
Approximately Efficient Cost-Sharing Mechanisms
latex source, 22 pages, 1 figure
null
null
null
cs.GT
null
We make three different types of contributions to cost-sharing: First, we identify several new classes of combinatorial cost functions that admit incentive-compatible mechanisms achieving both a constant-factor approximation of budget-balance and a polylogarithmic approximation of the social cost formulation of efficiency. Second, we prove a new, optimal lower bound on the approximate efficiency of every budget-balanced Moulin mechanism for Steiner tree or SSRoB cost functions. This lower bound exposes a latent approximation hierarchy among different cost-sharing problems. Third, we show that weakening the definition of incentive-compatibility to strategyproofness can permit exponentially more efficient approximately budget-balanced mechanisms, in particular for set cover cost-sharing problems.
[ { "version": "v1", "created": "Fri, 30 Jun 2006 02:24:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Roughgarden", "Tim", "", "Stanford University" ], [ "Sundararajan", "Mukund", "", "Stanford University" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0606128
Andrew Krizhanovsky A
A. Krizhanovsky
Automatic forming lists of semantically related terms based on texts rating in the corpus with hyperlinks and categories (In Russian)
6 pages, 1 figure, in Russian, PDF, for other formats see http://whinger.narod.ru/paper/index.html
null
null
null
cs.IR cs.DM
null
HITS adapted algorithm for synonym search, the program architecture, and the program work evaluation with test examples are presented in the paper. Synarcher program for synonym (and related terms) search in the text corpus of special structure (Wikipedia) was developed. The results of search are presented in the form of a graph. It is possible to explore the graph and search graph elements interactively. The proposed algorithm could be applied to the search request extending and for synonym dictionary forming.
[ { "version": "v1", "created": "Fri, 30 Jun 2006 15:17:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Krizhanovsky", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607001
Chinmoy Bhattacharya
Chinmoy Bhattacharya and P.R.Mahapatra
A Novel Application of Lifting Scheme for Multiresolution Correlation of Complex Radar Signals
null
null
null
null
cs.DC cs.CC
null
The lifting scheme of discrete wavelet transform (DWT) is now quite well established as an efficient technique for image compression, and has been incorporated into the JPEG2000 standards. However, the potential of the lifting scheme has not been exploited in the context of correlationbased processing, such as encountered in radar applications. This paper presents a complete and consistent framework for the application of DWT for correlation of complex signals. In particular, lifting scheme factorization of biorthogonal filterbanks is carried out in dual analysis basis spaces for multiresolution correlation of complex radar signals in the DWT domain only. A causal formulation of lifting for orthogonal filterbank is also developed. The resulting parallel algorithms and consequent saving of computational effort are briefly dealt with.
[ { "version": "v1", "created": "Sat, 1 Jul 2006 16:58:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Bhattacharya", "Chinmoy", "" ], [ "Mahapatra", "P. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0607002
Igal Sason
I. Sason and I. Goldenberg
Coding for Parallel Channels: Gallager Bounds for Binary Linear Codes with Applications to Repeat-Accumulate Codes and Variations
Submitted to IEEE Trans. on Information Theory, June 2006 (57 pages, 9 figures)
null
null
null
cs.IT math.IT
null
This paper is focused on the performance analysis of binary linear block codes (or ensembles) whose transmission takes place over independent and memoryless parallel channels. New upper bounds on the maximum-likelihood (ML) decoding error probability are derived. These bounds are applied to various ensembles of turbo-like codes, focusing especially on repeat-accumulate codes and their recent variations which possess low encoding and decoding complexity and exhibit remarkable performance under iterative decoding. The framework of the second version of the Duman and Salehi (DS2) bounds is generalized to the case of parallel channels, along with the derivation of their optimized tilting measures. The connection between the generalized DS2 and the 1961 Gallager bounds, addressed by Divsalar and by Sason and Shamai for a single channel, is explored in the case of an arbitrary number of independent parallel channels. The generalization of the DS2 bound for parallel channels enables to re-derive specific bounds which were originally derived by Liu et al. as special cases of the Gallager bound. In the asymptotic case where we let the block length tend to infinity, the new bounds are used to obtain improved inner bounds on the attainable channel regions under ML decoding. The tightness of the new bounds for independent parallel channels is exemplified for structured ensembles of turbo-like codes. The improved bounds with their optimized tilting measures show, irrespectively of the block length of the codes, an improvement over the union bound and other previously reported bounds for independent parallel channels; this improvement is especially pronounced for moderate to large block lengths.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 08:39:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Sason", "I.", "" ], [ "Goldenberg", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607003
Igal Sason
M. Twitto, I. Sason and S. Shamai
Tightened Upper Bounds on the ML Decoding Error Probability of Binary Linear Block Codes
Submitted to the IEEE Trans. on Information Theory (as a correspondence), February 2006
null
null
null
cs.IT math.IT
null
The performance of maximum-likelihood (ML) decoded binary linear block codes is addressed via the derivation of tightened upper bounds on their decoding error probability. The upper bounds on the block and bit error probabilities are valid for any memoryless, binary-input and output-symmetric communication channel, and their effectiveness is exemplified for various ensembles of turbo-like codes over the AWGN channel. An expurgation of the distance spectrum of binary linear block codes further tightens the resulting upper bounds.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 09:03:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Twitto", "M.", "" ], [ "Sason", "I.", "" ], [ "Shamai", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607004
Igal Sason
M. Twitto and I. Sason
On the Error Exponents of Some Improved Tangential-Sphere Bounds
Submitted to the IEEE Trans. on Information Theory (as a correspondence), March 2006. Revised (August 2006)
null
null
null
cs.IT math.IT
null
The performance of maximum-likelihood (ML) decoded binary linear block codes over the AWGN channel is addressed via the tangential-sphere bound (TSB) and two of its recent improved versions. The paper is focused on the derivation of the error exponents of these bounds. Although it was exemplified that some recent improvements of the TSB tighten this bound for finite-length codes, it is demonstrated in this paper that their error exponents coincide. For an arbitrary ensemble of binary linear block codes, the common value of these error exponents is explicitly expressed in terms of the asymptotic growth rate of the average distance spectrum.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 09:15:39 GMT" }, { "version": "v2", "created": "Sat, 2 Sep 2006 21:27:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Twitto", "M.", "" ], [ "Sason", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607005
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Belief Conditioning Rules (BCRs)
26 pages
null
null
null
cs.AI
null
In this paper we propose a new family of Belief Conditioning Rules (BCRs) for belief revision. These rules are not directly related with the fusion of several sources of evidence but with the revision of a belief assignment available at a given time according to the new truth (i.e. conditioning constraint) one has about the space of solutions of the problem.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 14:54:54 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2006 19:14:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607006
Leon Moonen
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella, and Tom Tourwe
Applying and Combining Three Different Aspect Mining Techniques
28 pages
null
null
TUD-SERG-2006-002
cs.SE cs.PL
null
Understanding a software system at source-code level requires understanding the different concerns that it addresses, which in turn requires a way to identify these concerns in the source code. Whereas some concerns are explicitly represented by program entities (like classes, methods and variables) and thus are easy to identify, crosscutting concerns are not captured by a single program entity but are scattered over many program entities and are tangled with the other concerns. Because of their crosscutting nature, such crosscutting concerns are difficult to identify, and reduce the understandability of the system as a whole. In this paper, we report on a combined experiment in which we try to identify crosscutting concerns in the JHotDraw framework automatically. We first apply three independently developed aspect mining techniques to JHotDraw and evaluate and compare their results. Based on this analysis, we present three interesting combinations of these three techniques, and show how these combinations provide a more complete coverage of the detected concerns as compared to the original techniques individually. Our results are a first step towards improving the understandability of a system that contains crosscutting concerns, and can be used as a basis for refactoring the identified crosscutting concerns into aspects.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 17:16:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Ceccato", "Mariano", "" ], [ "Marin", "Marius", "" ], [ "Mens", "Kim", "" ], [ "Moonen", "Leon", "" ], [ "Tonella", "Paolo", "" ], [ "Tourwe", "Tom", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0607007
Boris D. Lubachevsky
Boris D. Lubachevsky
Theory of sexes by Geodakian as it is advanced by Iskrin
9 pages
null
null
null
cs.NE cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1960s V.Geodakian proposed a theory that explains sexes as a mechanism for evolutionary adaptation of the species to changing environmental conditions. In 2001 V.Iskrin refined and augmented the concepts of Geodakian and gave a new and interesting explanation to several phenomena which involve sex, and sex ratio, including the war-years phenomena. He also introduced a new concept of the "catastrophic sex ratio." This note is an attempt to digest technical aspects of the new ideas by Iskrin.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 04:03:23 GMT" }, { "version": "v2", "created": "Mon, 3 Jul 2006 22:15:57 GMT" }, { "version": "v3", "created": "Wed, 5 Jul 2006 01:59:00 GMT" }, { "version": "v4", "created": "Sun, 4 Oct 2009 15:23:16 GMT" } ]
2009-10-04T00:00:00
[ [ "Lubachevsky", "Boris D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
cs/0607008
Jean-Sebastien Sereni
F\'ed\'eric Havet (INRIA Sophia Antipolis), Jean-S\'ebastien Sereni (INRIA Sophia Antipolis), Riste Skrekovski
3-facial colouring of plane graphs
null
null
null
null
cs.DM
null
A plane graph is l-facially k-colourable if its vertices can be coloured with k colours such that any two distinct vertices on a facial segment of length at most l are coloured differently. We prove that every plane graph is 3-facially 11-colourable. As a consequence, we derive that every 2-connected plane graph with maximum face-size at most 7 is cyclically 11-colourable. These two bounds are for one off from those that are proposed by the (3l+1)-Conjecture and the Cyclic Conjecture.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 06:38:48 GMT" } ]
2016-08-16T00:00:00
[ [ "Havet", "Fédéric", "", "INRIA Sophia Antipolis" ], [ "Sereni", "Jean-Sébastien", "", "INRIA Sophia Antipolis" ], [ "Skrekovski", "Riste", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607009
Yuri Pritykin
Yuri Pritykin
Almost Periodicity, Finite Automata Mappings and Related Effectiveness Issues
12 pages. Continuation of the results from the paper "Strongly Almost Periodic Sequences under Finite Automata Mappings" on cs.DM/0605026 Enhanced version of the talk on Workshop on Words and Automata, St Petersburg, Russia, June 7th, 2006 (satellite to CSR'06)
null
null
null
cs.DM
null
The paper studies different variants of almost periodicity notion. We introduce the class of eventually strongly almost periodic sequences where some suffix is strongly almost periodic (=uniformly recurrent). The class of almost periodic sequences includes the class of eventually strongly almost periodic sequences, and we prove this inclusion to be strict. We prove that the class of eventually strongly almost periodic sequences is closed under finite automata mappings and finite transducers. Moreover, an effective form of this result is presented. Finally we consider some algorithmic questions concerning almost periodicity.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 08:27:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Pritykin", "Yuri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607010
Samuel Sattath
Samuel Sattath
ITs, a structure sensitive information theory
null
null
null
null
cs.IT math.IT
null
Broadly speaking Information theory (IT) assumes no structure of the underlying states. But what about contexts where states do have a clear structure - how should IT cope with such situations? And if such coping is at all possible then - how should structure be expressed so that it can be coped with? A possible answer to these questions is presented here. Noting that IT can cope well with a structure expressed as an accurate clustering (by shifting to the implied reduced alphabet), a generalization is suggested in which structure is expressed as a measure on reduced alphabets. Given such structure an extension of IT is presented where the reduced alphabets are treated simultaneously. This structure-sensitive IT, called ITs, extends traditional IT in the sense that: a)there are structure-sensitive analogs to the notions of traditional IT and b)translating a theorem in IT by replacing its notions with their structure-sensitive counterparts, yields a (provable) theorem of ITs. Seemingly paradoxically, ITs extends IT but it's completely within the framework of IT. The richness of the suggested structures is demonstrated by two disparate families studied in more detail: the family of hierarchical structures and the family of linear structures. The formal findings extend the scope of cases to which a rigorous application of IT can be applied (with implications on quantization, for example). The implications on the foundations of IT are that the assumption regarding no underlying structure of states is not mandatory and that there is a framework for expressing such underlying structure.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 10:23:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Sattath", "Samuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607011
Ayan Mahalanobis
Ayan Mahalanobis
A simple generalization of El-Gamal cryptosystem to non-abelian groups
null
null
null
null
cs.CR math.GR
null
In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equivalent to the El-Gamal cryptosystem over finite fields.
[ { "version": "v1", "created": "Tue, 4 Jul 2006 11:28:38 GMT" }, { "version": "v2", "created": "Thu, 6 Jul 2006 11:32:31 GMT" }, { "version": "v3", "created": "Tue, 11 Jul 2006 12:56:43 GMT" }, { "version": "v4", "created": "Thu, 20 Jul 2006 06:07:39 GMT" }, { "version": "v5", "created": "Mon, 7 May 2007 14:56:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
cs/0607012
Anne-Marie Vercoustre
Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis), Mounir Fegas (INRIA Rocquencourt / INRIA Sophia Antipolis), Saba Gul (INRIA Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt / INRIA Sophia Antipolis)
A Flexible Structured-based Representation for XML Document Mining
This is the authors' version. To access the final version go to the editor's site through the DOI
Dans The Fourth International Workshop of the Initiative for the Evaluation of XML Retrieval (INEX 2005)
10.1007/11766278\_34
null
cs.IR
null
This paper reports on the INRIA group's approach to XML mining while participating in the INEX XML Mining track 2005. We use a flexible representation of XML documents that allows taking into account the structure only or both the structure and content. Our approach consists of representing XML documents by a set of their sub-paths, defined according to some criteria (length, root beginning, leaf ending). By considering those sub-paths as words, we can use standard methods for vocabulary reduction, and simple clustering methods such as K-means that scale well. We actually use an implementation of the clustering algorithm known as "dynamic clouds" that can work with distinct groups of independent variables put in separate variables. This is useful in our model since embedded sub-paths are not independent: we split potentially dependant paths into separate variables, resulting in each of them containing independant paths. Experiments with the INEX collections show good results for the structure-only collections, but our approach could not scale well for large structure-and-content collections.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 12:07:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Vercoustre", "Anne-Marie", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Fegas", "Mounir", "", "INRIA Rocquencourt / INRIA Sophia Antipolis" ], [ "Gul", "Saba", "", "INRIA\n Rocquencourt / INRIA Sophia Antipolis" ], [ "Lechevallier", "Yves", "", "INRIA Rocquencourt\n / INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0607013
Jan Chomicki
Jan Chomicki
Database Querying under Changing Preferences
Submitted to a journal
null
null
null
cs.DB cs.AI
null
We present here a formal foundation for an iterative and incremental approach to constructing and evaluating preference queries. Our main focus is on query modification: a query transformation approach which works by revising the preference relation in the query. We provide a detailed analysis of the cases where the order-theoretic properties of the preference relation are preserved by the revision. We consider a number of different revision operators: union, prioritized and Pareto composition. We also formulate algebraic laws that enable incremental evaluation of preference queries. Finally, we consider two variations of the basic framework: finite restrictions of preference relations and weak-order extensions of strict partial order preference relations.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 18:37:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Chomicki", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607014
Aaron Wagner
Aaron B. Wagner, Pramod Viswanath, and Sanjeev R. Kulkarni
Strong Consistency of the Good-Turing Estimator
To appear at IEEE ISIT 2006
null
10.1109/ISIT.2006.262066
null
cs.IT math.IT
null
We consider the problem of estimating the total probability of all symbols that appear with a given frequency in a string of i.i.d. random variables with unknown distribution. We focus on the regime in which the block length is large yet no symbol appears frequently in the string. This is accomplished by allowing the distribution to change with the block length. Under a natural convergence assumption on the sequence of underlying distributions, we show that the total probabilities converge to a deterministic limit, which we characterize. We then show that the Good-Turing total probability estimator is strongly consistent.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 19:09:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Wagner", "Aaron B.", "" ], [ "Viswanath", "Pramod", "" ], [ "Kulkarni", "Sanjeev R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607015
Juan Valle-Lisboa C
Juan C. Valle-Lisboa (1), Eduardo Mizraji (1) ((1) Seccion Biofisica, Facultad de Ciencias, Universidad de la Republica)
The uncovering of hidden structures by Latent Semantic Analysis
51 pages, 7 figures, pdf
null
null
null
cs.IR
null
Latent Semantic Analysis (LSA) is a well known method for information retrieval. It has also been applied as a model of cognitive processing and word-meaning acquisition. This dual importance of LSA derives from its capacity to modulate the meaning of words by contexts, dealing successfully with polysemy and synonymy. The underlying reasons that make the method work are not clear enough. We propose that the method works because it detects an underlying block structure (the blocks corresponding to topics) in the term by document matrix. In real cases this block structure is hidden because of perturbations. We propose that the correct explanation for LSA must be searched in the structure of singular vectors rather than in the profile of singular values. Using Perron-Frobenius theory we show that the presence of disjoint blocks of documents is marked by sign-homogeneous entries in the vectors corresponding to the documents of one block and zeros elsewhere. In the case of nearly disjoint blocks, perturbation theory shows that if the perturbations are small the zeros in the leading vectors are replaced by small numbers (pseudo-zeros). Since the singular values of each block might be very different in magnitude, their order does not mirror the order of blocks. When the norms of the blocks are similar, LSA works fine, but we propose that when the topics have different sizes, the usual procedure of selecting the first k singular triplets (k being the number of blocks) should be replaced by a method that selects the perturbed Perron vectors for each block.
[ { "version": "v1", "created": "Wed, 5 Jul 2006 22:56:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Valle-Lisboa", "Juan C.", "" ], [ "Mizraji", "Eduardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0607016
Krzysztof R. Apt
Krzysztof R. Apt and Peter Zoeteweij
An Analysis of Arithmetic Constraints on Integer Intervals
44 pages, to appear in 'Constraints' journal
null
null
null
cs.AI cs.PL
null
Arithmetic constraints on integer intervals are supported in many constraint programming systems. We study here a number of approaches to implement constraint propagation for these constraints. To describe them we introduce integer interval arithmetic. Each approach is explained using appropriate proof rules that reduce the variable domains. We compare these approaches using a set of benchmarks. For the most promising approach we provide results that characterize the effect of constraint propagation. This is a full version of our earlier paper, cs.PL/0403016.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 10:09:43 GMT" }, { "version": "v2", "created": "Wed, 21 Mar 2007 13:51:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Zoeteweij", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0607017
Fabrice Portier
Fabrice Portier (IETR), Jean-Yves Baudais (IETR), Jean-Fran\c{c}ois H\'elard (IETR), the Projet europeen IST-MATRICE Collaboration
Performance of STBC MC-CDMA systems over outdoor realistic MIMO channels
null
Proceedings IEEE 60th Vehicular Technology Conference (VTC 2004-Fall) (2004) 2409-2413
null
null
cs.IT math.IT
null
The paper deals with orthogonal space-time block coded MC-CDMA systems in outdoor realistic downlink scenarios with up to two transmit and receive antennas. Assuming no channel state information at the transmitter, we compare several linear single-user detection and spreading schemes, with or without channel coding, achieving a spectral efficiency of 1-2 bits/s/Hz. The different results obtained demonstrate that spatial diversity significantly improves the performance of MC-CDMA systems, and allows different chip-mapping without notably decreasing performance. Moreover, the global system exhibits a good trade-off between complexity at mobile stations and performance. Then, Alamouti's STBC MC-CDMA schemes derive full benefit from the frequency and spatial diversities and can be considered as a very realistic and promising candidate for the air interface downlink of the 4/sup th/ generation mobile radio systems.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 15:52:36 GMT" } ]
2016-08-16T00:00:00
[ [ "Portier", "Fabrice", "", "IETR" ], [ "Baudais", "Jean-Yves", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ], [ "Collaboration", "the Projet europeen IST-MATRICE", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607018
Edward Hanna
Edward Hanna
Feynman Checkerboard as a Model of Discrete Space-Time
10 pages, 14 figures - changed section 6 title
null
null
null
cs.CE
null
In 1965, Feynman wrote of using a lattice containing one dimension of space and one dimension of time to derive aspects of quantum mechanics. Instead of summing the behavior of all possible paths as he did, this paper will consider the motion of single particles within this discrete Space-Time lattice, sometimes called Feynman's Checkerboard. This empirical approach yielded several predicted emergent properties for a discrete Space-Time lattice, one of which is novel and testable.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 16:35:38 GMT" }, { "version": "v2", "created": "Sat, 12 Aug 2006 19:10:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Hanna", "Edward", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0607019
Stephen Luttrell
Stephen Luttrell
Modelling the Probability Density of Markov Sources
26 pages
null
null
null
cs.NE
null
This paper introduces an objective function that seeks to minimise the average total number of bits required to encode the joint state of all of the layers of a Markov source. This type of encoder may be applied to the problem of optimising the bottom-up (recognition model) and top-down (generative model) connections in a multilayer neural network, and it unifies several previous results on the optimisation of multilayer neural networks.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 18:49:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Luttrell", "Stephen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0607020
Chun-Hao Hsu
Chun-Hao Hsu and Achilleas Anastasopoulos
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
10 pages, no figures. This paper is submitted to the 44rd Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, Sept. 27-29, 2006
null
null
null
cs.IT math.IT
null
The asymptotic iterative decoding performances of low-density parity-check (LDPC) codes using min-sum (MS) and sum-product (SP) decoding algorithms on memoryless binary-input output-symmetric (MBIOS) channels are analyzed in this paper. For MS decoding, the analysis is done by upper bounding the bit error probability of the root bit of a tree code by the sequence error probability of a subcode of the tree code assuming the transmission of the all-zero codeword. The result is a recursive upper bound on the bit error probability after each iteration. For SP decoding, we derive a recursively determined lower bound on the bit error probability after each iteration. This recursive lower bound recovers the density evolution equation of LDPC codes on the binary erasure channel (BEC) with inequalities satisfied with equalities. A significant implication of this result is that the performance of LDPC codes under SP decoding on the BEC is an upper bound of the performance on all MBIOS channels with the same uncoded bit error probability. All results hold for the more general multi-edge type LDPC codes.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 19:08:26 GMT" }, { "version": "v2", "created": "Fri, 7 Jul 2006 18:33:57 GMT" }, { "version": "v3", "created": "Wed, 12 Jul 2006 19:02:24 GMT" }, { "version": "v4", "created": "Tue, 18 Jul 2006 15:25:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Hsu", "Chun-Hao", "" ], [ "Anastasopoulos", "Achilleas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607021
Jun Chen
Jun Chen, Da-ke He, and Ashish Jagmohan
Slepian-Wolf Code Design via Source-Channel Correspondence
to appear at ISIT 2006
null
null
null
cs.IT math.IT
null
We consider Slepian-Wolf code design based on LDPC (low-density parity-check) coset codes for memoryless source-side information pairs. A density evolution formula, equipped with a concentration theorem, is derived for Slepian- Wolf coding based on LDPC coset codes. As a consequence, an intimate connection between Slepian-Wolf coding and channel coding is established. Specifically we show that, under density evolution, design of binary LDPC coset codes for Slepian-Wolf coding of an arbitrary memoryless source-side information pair reduces to design of binary LDPC codes for binary-input output-symmetric channels without loss of optimality. With this connection, many classic results in channel coding can be easily translated into the Slepian-Wolf setting.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 22:14:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Jun", "" ], [ "He", "Da-ke", "" ], [ "Jagmohan", "Ashish", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607022
George Maney Mr.
G. A. Maney
Ten Incredibly Dangerous Software Ideas
14 page software industry interest book synopsis
null
null
null
cs.GL
null
This is a rough draft synopsis of a book presently in preparation. This book provides a systematic critique of the software industry. This critique is accomplished using classical methods in practical design science.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 01:17:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Maney", "G. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
cs/0607023
Josep Diaz Prof
J. Diaz, D. Mitsche, X. Perez
Sharp threshold for hamiltonicity of random geometric graphs
10 pages, 2 figures
null
null
null
cs.DM
null
We show for an arbitrary $\ell_p$ norm that the property that a random geometric graph $\mathcal G(n,r)$ contains a Hamiltonian cycle exhibits a sharp threshold at $r=r(n)=\sqrt{\frac{\log n}{\alpha_p n}}$, where $\alpha_p$ is the area of the unit disk in the $\ell_p$ norm. The proof is constructive and yields a linear time algorithm for finding a Hamiltonian cycle of $\RG$ a.a.s., provided $r=r(n)\ge\sqrt{\frac{\log n}{(\alpha_p -\epsilon)n}}$ for some fixed $\epsilon > 0$.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 18:16:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Diaz", "J.", "" ], [ "Mitsche", "D.", "" ], [ "Perez", "X.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607024
Jos Weber
Jos H. Weber and Khaled A.S. Abdel-Ghaffar
Results on Parity-Check Matrices with Optimal Stopping and/or Dead-End Set Enumerators
8 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The performance of iterative decoding techniques for linear block codes correcting erasures depends very much on the sizes of the stopping sets associated with the underlying Tanner graph, or, equivalently, the parity-check matrix representing the code. In this paper, we introduce the notion of dead-end sets to explicitly demonstrate this dependency. The choice of the parity-check matrix entails a trade-off between performance and complexity. We give bounds on the complexity of iterative decoders achieving optimal performance in terms of the sizes of the underlying parity-check matrices. Further, we fully characterize codes for which the optimal stopping set enumerator equals the weight enumerator.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 09:04:43 GMT" } ]
2007-07-13T00:00:00
[ [ "Weber", "Jos H.", "" ], [ "Abdel-Ghaffar", "Khaled A. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607025
Oskar Sandberg
Oskar Sandberg and Ian Clarke
The evolution of navigable small-world networks
null
null
null
null
cs.DS cs.DC
null
Small-world networks, which combine randomized and structured elements, are seen as prevalent in nature. Several random graph models have been given for small-world networks, with one of the most fruitful, introduced by Jon Kleinberg, showing in which type of graphs it is possible to route, or navigate, between vertices with very little knowledge of the graph itself. Kleinberg's model is static, with random edges added to a fixed grid. In this paper we introduce, analyze and test a randomized algorithm which successively rewires a graph with every application. The resulting process gives a model for the evolution of small-world networks with properties similar to those studied by Kleinberg.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 13:21:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Sandberg", "Oskar", "" ], [ "Clarke", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607026
James Aspnes
James Aspnes and Yang Richard Yang and Yitong Yin
Path-independent load balancing with unreliable machines
Full version of paper submitted to SODA 2007
null
null
null
cs.DS cs.NI
null
We consider algorithms for load balancing on unreliable machines. The objective is to optimize the two criteria of minimizing the makespan and minimizing job reassignments in response to machine failures. We assume that the set of jobs is known in advance but that the pattern of machine failures is unpredictable. Motivated by the requirements of BGP routing, we consider path-independent algorithms, with the property that the job assignment is completely determined by the subset of available machines and not the previous history of the assignments. We examine first the question of performance measurement of path-independent load-balancing algorithms, giving the measure of makespan and the normalized measure of reassignments cost. We then describe two classes of algorithms for optimizing these measures against an oblivious adversary for identical machines. The first, based on independent random assignments, gives expected reassignment costs within a factor of 2 of optimal and gives a makespan within a factor of O(log m/log log m) of optimal with high probability, for unknown job sizes. The second, in which jobs are first grouped into bins and at most one bin is assigned to each machine, gives constant-factor ratios on both reassignment cost and makespan, for known job sizes. Several open problems are discussed.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 14:01:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Aspnes", "James", "" ], [ "Yang", "Yang Richard", "" ], [ "Yin", "Yitong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0607027
Hans-Andrea Loeliger
Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, and Frank Kschischang
A general computation rule for lossy summaries/messages with examples from equalization
Proc. of the 44th Allerton Conference on Communication, Control, and Computing, Monticello, Ill., USA, Sept. 2006
null
null
null
cs.IT math.IT
null
Elaborating on prior work by Minka, we formulate a general computation rule for lossy messages. An important special case (with many applications in communications) is the conversion of "soft-bit" messages to Gaussian messages. By this method, the performance of a Kalman equalizer is improved, both for uncoded and coded transmission.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 17:03:46 GMT" }, { "version": "v2", "created": "Sun, 1 Oct 2006 14:33:19 GMT" } ]
2007-07-13T00:00:00
[ [ "Hu", "Junli", "" ], [ "Loeliger", "Hans-Andrea", "" ], [ "Dauwels", "Justin", "" ], [ "Kschischang", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607028
Christian Lavault
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady Ravelomanana (LIPN)
A Quasi-Optimal Leader Election Algorithm in Radio Networks with Log-Logarithmic Awake Time Slots
null
null
null
null
cs.DC cs.NI
null
Radio networks (RN) are distributed systems (\textit{ad hoc networks}) consisting in $n \ge 2$ radio stations. Assuming the number $n$ unknown, two distinct models of RN without collision detection (\textit{no-CD}) are addressed: the model with \textit{weak no-CD} RN and the one with \textit{strong no-CD} RN. We design and analyze two distributed leader election protocols, each one running in each of the above two (no-CD RN) models, respectively. Both randomized protocols are shown to elect a leader within $\BO(\log{(n)})$ expected time, with no station being awake for more than $\BO(\log{\log{(n)}})$ time slots (such algorithms are said to be \textit{energy-efficient}). Therefore, a new class of efficient algorithms is set up that matchthe $\Omega(\log{(n)})$ time lower-bound established by Kushilevitz and Mansour.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 17:42:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0607029
Vaneet Aggarwal
Vaneet Aggarwal, R.K. Bansal
A Coding Theorem Characterizing Renyi's Entropy through Variable-to-Fixed Length Codes
This paper has been withdrawn
null
null
null
cs.IT math.IT
null
This paper has been withdrawn
[ { "version": "v1", "created": "Sat, 8 Jul 2006 04:42:41 GMT" }, { "version": "v2", "created": "Mon, 18 Sep 2006 06:57:50 GMT" }, { "version": "v3", "created": "Sat, 28 Oct 2006 06:28:57 GMT" } ]
2009-10-06T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Bansal", "R. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607030
Michael Vielhaber
Michael Vielhaber, Monica del Pilar Canales
Towards a General Theory of Simultaneous Diophantine Approximation of Formal Power Series: Multidimensional Linear Complexity
28 pages, 1 figure
null
null
null
cs.IT math.IT
null
We model the development of the linear complexity of multisequences by a stochastic infinite state machine, the Battery-Discharge-Model, BDM. The states s in S of the BDM have asymptotic probabilities or mass Pr(s)=1/(P(q,M) q^K(s)), where K(s) in N_0 is the class of the state s, and P(q,M)=\sum_(K in\N0) P_M(K)q^(-K)=\prod_(i=1..M) q^i/(q^i-1) is the generating function of the number of partitions into at most M parts. We have (for each timestep modulo M+1) just P_M(K) states of class K \. We obtain a closed formula for the asymptotic probability for the linear complexity deviation d(n) := L(n)-\lceil n\cdot M/(M+1)\rceil with Pr(d)=O(q^(-|d|(M+1))), for M in N, for d in Z. The precise formula is given in the text. It has been verified numerically for M=1..8, and is conjectured to hold for all M in N. From the asymptotic growth (proven for all M in N), we infer the Law of the Logarithm for the linear complexity deviation, -liminf_{n\to\infty} d_a(n) / log n = 1 /((M+1)log q) = limsup_{n\to\infty} d_a(n) / log n, which immediately yields L_a(n)/n \to M/(M+1) with measure one, for all M in N, a result recently shown already by Niederreiter and Wang. Keywords: Linear complexity, linear complexity deviation, multisequence, Battery Discharge Model, isometry.
[ { "version": "v1", "created": "Mon, 10 Jul 2006 18:03:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Vielhaber", "Michael", "" ], [ "Canales", "Monica del Pilar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607031
Christian Lavault
Christian Lavault (LIPN), Mario Valencia-Pabon (LIPN)
A distributed approximation algorithm for the minimum degree minimum weight spanning trees
null
null
null
null
cs.DC cs.DM
null
Fischer has shown how to compute a minimum weight spanning tree of degree at most $b \Delta^* + \lceil \log\_b n\rceil$ in time $O(n^{4 + 1/\ln b})$ for any constant $b > 1$, where $\Delta^*$ is the value of an optimal solution and $n$ is the number of nodes in the network. In this paper, we propose a distributed version of Fischer's algorithm that requires messages and time complexity $O(n^{2 + 1/\ln b})$, and O(n) space per node.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 08:42:59 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Valencia-Pabon", "Mario", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607032
Christian Lavault
Christian Lavault (LIPN), Guy Louchard (ULB)
Asymptotic Analysis of a Leader Election Algorithm
null
null
null
null
cs.DC cs.NA
null
Itai and Rodeh showed that, on the average, the communication of a leader election algorithm takes no more than $LN$ bits, where $L \simeq 2.441716$ and $N$ denotes the size of the ring. We give a precise asymptotic analysis of the average number of rounds M(n) required by the algorithm, proving for example that $\dis M(\infty) := \lim\_{n\to \infty} M(n) = 2.441715879...$, where $n$ is the number of starting candidates in the election. Accurate asymptotic expressions of the second moment $M^{(2)}(n)$ of the discrete random variable at hand, its probability distribution, and the generalization to all moments are given. Corresponding asymptotic expansions $(n\to \infty)$ are provided for sufficiently large $j$, where $j$ counts the number of rounds. Our numerical results show that all computations perfectly fit the observed values. Finally, we investigate the generalization to probability $t/n$, where $t$ is a non negative real parameter. The real function $\dis M(\infty,t) := \lim\_{n\to \infty} M(n,t)$ is shown to admit \textit{one unique minimum} $M(\infty,t^{*})$ on the real segment $(0,2)$. Furthermore, the variations of $M(\infty,t)$ on thewhole real line are also studied in detail.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 08:46:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Louchard", "Guy", "", "ULB" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0607033
Oleg Verbitsky
Oleg Verbitsky
Planar Graphs: Logical Complexity and Parallel Isomorphism Tests
36 pages
null
null
null
cs.CC cs.LO
null
We prove that every triconnected planar graph is definable by a first order sentence that uses at most 15 variables and has quantifier depth at most $11\log_2 n+43$. As a consequence, a canonic form of such graphs is computable in $AC^1$ by the 14-dimensional Weisfeiler-Lehman algorithm. This provides another way to show that the planar graph isomorphism is solvable in $AC^1$.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 10:37:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Verbitsky", "Oleg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0607034
Christian Lavault
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady Ravelomanana (LIPN)
Quasi-Optimal Leader Election Algorithms in Radio Networks with Loglogarithmic Awake Time Slots
null
10th IEEE International Conference on Telecommunications (2003) 1113-1119
null
null
cs.DC cs.NI
null
A radio network (RN) is a distributed system consisting of $n$ radio stations. We design and analyze two distributed leader election protocols in RN where the number $n$ of radio stations is unknown. The first algorithm runs under the assumption of {\it limited collision detection}, while the second assumes that {\it no collision detection} is available. By ``limited collision detection'', we mean that if exactly one station sends (broadcasts) a message, then all stations (including the transmitter) that are listening at this moment receive the sent message. By contrast, the second no-collision-detection algorithm assumes that a station cannot simultaneously send and listen signals. Moreover, both protocols allow the stations to keep asleep as long as possible, thus minimizing their awake time slots (such algorithms are called {\it energy-efficient}). Both randomized protocols in RN areshown to elect a leader in $O(\log{(n)})$ expected time, with no station being awake for more than $O(\log{\log{(n)}})$ time slots. Therefore, a new class of efficient algorithms is set up that match the $\Omega(\log{(n)})$ time lower-bound established by Kushilevitz and Mansour.
[ { "version": "v1", "created": "Sat, 8 Jul 2006 12:04:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Lavault", "Christian", "", "LIPN" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Ravelomanana", "Vlady", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0607035
Yi Deng
Yi Deng, Dongdai Lin
Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption
19 page
null
null
null
cs.CR
null
In this paper we resolve an open problem regarding resettable zero knowledge in the bare public-key (BPK for short) model: Does there exist constant round resettable zero knowledge argument with concurrent soundness for $\mathcal{NP}$ in BPK model without assuming \emph{sub-exponential hardness}? We give a positive answer to this question by presenting such a protocol for any language in $\mathcal{NP}$ in the bare public-key model assuming only collision-resistant hash functions against \emph{polynomial-time} adversaries.
[ { "version": "v1", "created": "Mon, 10 Jul 2006 16:31:03 GMT" }, { "version": "v2", "created": "Thu, 13 Jul 2006 05:20:32 GMT" }, { "version": "v3", "created": "Mon, 24 Jul 2006 14:09:43 GMT" } ]
2009-09-29T00:00:00
[ [ "Deng", "Yi", "" ], [ "Lin", "Dongdai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0607036
Stefano Mancini
Roland Hildebrand, Stefano Mancini, and Simone Severini
Combinatorial laplacians and positivity under partial transpose
19 pages, 7 eps figures, final version accepted for publication in Math. Struct. in Comp. Sci
Math. Struct. in Comp. Sci. Vol.18, pp.205-219 (2008)
null
null
cs.CC quant-ph
null
Density matrices of graphs are combinatorial laplacians normalized to have trace one (Braunstein \emph{et al.} \emph{Phys. Rev. A,} \textbf{73}:1, 012320 (2006)). If the vertices of a graph are arranged as an array, then its density matrix carries a block structure with respect to which properties such as separability can be considered. We prove that the so-called degree-criterion, which was conjectured to be necessary and sufficient for separability of density matrices of graphs, is equivalent to the PPT-criterion. As such it is not sufficient for testing the separability of density matrices of graphs (we provide an explicit example). Nonetheless, we prove the sufficiency when one of the array dimensions has length two (for an alternative proof see Wu, \emph{Phys. Lett. A}\textbf{351} (2006), no. 1-2, 18--22). Finally we derive a rational upper bound on the concurrence of density matrices of graphs and show that this bound is exact for graphs on four vertices.
[ { "version": "v1", "created": "Mon, 10 Jul 2006 10:38:38 GMT" }, { "version": "v2", "created": "Mon, 13 Nov 2006 15:47:38 GMT" }, { "version": "v3", "created": "Sat, 23 Jun 2007 07:11:25 GMT" } ]
2008-07-03T00:00:00
[ [ "Hildebrand", "Roland", "" ], [ "Mancini", "Stefano", "" ], [ "Severini", "Simone", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0607037
Daowen Qiu
Zhujun Fan
The Minimal Cost Algorithm for Off-Line Diagnosability of Discrete Event Systems
12 pages, 7 figures, critical comments and suggestions are welcomed and appreciated
null
null
null
cs.AI cs.CC
null
The failure diagnosis for {\it discrete event systems} (DESs) has been given considerable attention in recent years. Both on-line and off-line diagnostics in the framework of DESs was first considered by Lin Feng in 1994, and particularly an algorithm for diagnosability of DESs was presented. Motivated by some existing problems to be overcome in previous work, in this paper, we investigate the minimal cost algorithm for diagnosability of DESs. More specifically: (i) we give a generic method for judging a system's off-line diagnosability, and the complexity of this algorithm is polynomial-time; (ii) and in particular, we present an algorithm of how to search for the minimal set in all observable event sets, whereas the previous algorithm may find {\it non-minimal} one.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 04:55:03 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2007 16:27:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Fan", "Zhujun", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0607038
Benoit Donnet
Benoit Donnet, Bruno Baynat, Timur Friedman
Retouched Bloom Filters: Allowing Networked Applications to Flexibly Trade Off False Positives Against False Negatives
This is a new version of the technical reports with improved algorithms and theorical analysis of algorithms
null
null
null
cs.NI
null
Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the transmission of Bloom filters, and the error rate, which takes the form of false positives, and which rises the more the filters are compressed. In this paper, we introduce the retouched Bloom filter (RBF), an extension that makes the Bloom filter more flexible by permitting the removal of selected false positives at the expense of generating random false negatives. We analytically show that RBFs created through a random process maintain an overall error rate, expressed as a combination of the false positive rate and the false negative rate, that is equal to the false positive rate of the corresponding Bloom filters. We further provide some simple heuristics and improved algorithms that decrease the false positive rate more than than the corresponding increase in the false negative rate, when creating RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a distributed network topology measurement application, where information about large stop sets must be shared among route tracing monitors.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 10:40:26 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2006 13:52:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Donnet", "Benoit", "" ], [ "Baynat", "Bruno", "" ], [ "Friedman", "Timur", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0607039
M. H. van Emden
M.H. van Emden
Set-Theoretic Preliminaries for Computer Scientists
36 pages, 5 figures
null
null
DCS-304-IR
cs.DM cs.DB
null
The basics of set theory are usually copied, directly or indirectly, by computer scientists from introductions to mathematical texts. Often mathematicians are content with special cases when the general case is of no mathematical interest. But sometimes what is of no mathematical interest is of great practical interest in computer science. For example, non-binary relations in mathematics tend to have numerical indexes and tend to be unsorted. In the theory and practice of relational databases both these simplifications are unwarranted. In response to this situation we present here an alternative to the ``set-theoretic preliminaries'' usually found in computer science texts. This paper separates binary relations from the kind of relations that are needed in relational databases. Its treatment of functions supports both computer science in general and the kind of relations needed in databases. As a sample application this paper shows how the mathematical theory of relations naturally leads to the relational data model and how the operations on relations are by themselves already a powerful vehicle for queries.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 14:27:43 GMT" } ]
2007-05-23T00:00:00
[ [ "van Emden", "M. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0607040
Gopal Gupta
Enrico Pontelli (1), Karen Villaverde (1), Hai-Feng Guo (2), Gopal Gupta (3) ((1) New Mexico State University, (2) University of Nebraska at Omaha, (3) University of Texas at Dallas)
PALS: Efficient Or-Parallelism on Beowulf Clusters
63 pages, 32 figures, 5 tabels. Theory and Practice of Logic Programming (to appear)
null
null
null
cs.DC cs.PL
null
This paper describes the development of the PALS system, an implementation of Prolog capable of efficiently exploiting or-parallelism on distributed-memory platforms--specifically Beowulf clusters. PALS makes use of a novel technique, called incremental stack-splitting. The technique proposed builds on the stack-splitting approach, previously described by the authors and experimentally validated on shared-memory systems, which in turn is an evolution of the stack-copying method used in a variety of parallel logic and constraint systems--e.g., MUSE, YAP, and Penny. The PALS system is the first distributed or-parallel implementation of Prolog based on the stack-splitting method ever realized. The results presented confirm the superiority of this method as a simple yet effective technique to transition from shared-memory to distributed-memory systems. PALS extends stack-splitting by combining it with incremental copying; the paper provides a description of the implementation of PALS, including details of how distributed scheduling is handled. We also investigate methodologies to effectively support order-sensitive predicates (e.g., side-effects) in the context of the stack-splitting scheme. Experimental results obtained from running PALS on both Shared Memory and Beowulf systems are presented and analyzed.
[ { "version": "v1", "created": "Sun, 9 Jul 2006 19:56:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Pontelli", "Enrico", "" ], [ "Villaverde", "Karen", "" ], [ "Guo", "Hai-Feng", "" ], [ "Gupta", "Gopal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0607041
Jean-Christophe Dubacq
Christophe C\'erin (LIPN), Jean-Christophe Dubacq (LIPN), Jean-Louis Roch (INRIA Rh\^one-Alpes / ID-IMAG), the SafeScale Collaboration
Methods for Partitioning Data to Improve Parallel Execution Time for Sorting on Heterogeneous Clusters
null
Advances in Grid and Pervasive Computing (2006) 175-186
null
null
cs.DC cs.PF
null
The aim of the paper is to introduce general techniques in order to optimize the parallel execution time of sorting on a distributed architectures with processors of various speeds. Such an application requires a partitioning step. For uniformly related processors (processors speeds are related by a constant factor), we develop a constant time technique for mastering processor load and execution time in an heterogeneous environment and also a technique to deal with unknown cost functions. For non uniformly related processors, we use a technique based on dynamic programming. Most of the time, the solutions are in O(p) (p is the number of processors), independent of the problem size n. Consequently, there is a small overhead regarding the problem we deal with but it is inherently limited by the knowing of time complexity of the portion of code following the partitioning.
[ { "version": "v1", "created": "Mon, 10 Jul 2006 19:46:47 GMT" } ]
2016-08-16T00:00:00
[ [ "Cérin", "Christophe", "", "LIPN" ], [ "Dubacq", "Jean-Christophe", "", "LIPN" ], [ "Roch", "Jean-Louis", "", "INRIA Rhône-Alpes / ID-IMAG" ], [ "Collaboration", "the SafeScale", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0607042
Rahul Jain
Rahul Jain
Towards a classical proof of exponential lower bound for 2-probe smooth codes
7 pages, no figure
null
null
null
cs.CR cs.IT math.IT
null
Let C: {0,1}^n -> {0,1}^m be a code encoding an n-bit string into an m-bit string. Such a code is called a (q, c, e) smooth code if there exists a decoding algorithm which while decoding any bit of the input, makes at most q probes on the code word and the probability that it looks at any location is at most c/m. The error made by the decoding algorithm is at most e. Smooth codes were introduced by Katz and Trevisan in connection with Locally decodable codes. For 2-probe smooth codes Kerenedis and de Wolf have shown exponential in n lower bound on m in case c and e are constants. Their lower bound proof went through quantum arguments and interestingly there is no completely classical argument as yet for the same (albeit completely classical !) statement. We do not match the bounds shown by Kerenedis and de Wolf but however show the following. Let C: {0,1}^n -> {0,1}^m be a (2,c,e) smooth code and if e <= c^2/8n^2, then m >= 2^(n/320c^2 - 1)$. We hope that the arguments and techniques used in this paper extend (or are helpful in making similar other arguments), to match the bounds shown using quantum arguments. More so, hopefully they extend to show bounds for codes with greater number of probes where quantum arguments unfortunately do not yield good bounds (even for 3-probe codes).
[ { "version": "v1", "created": "Tue, 11 Jul 2006 02:56:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Jain", "Rahul", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607043
Koujin Takeda
Koujin Takeda, Shinsuke Uda, Yoshiyuki Kabashima
Analysis of CDMA systems that are characterized by eigenvalue spectrum
7 pages, 2 figures
Europhys. Lett. 76 (2006) 1193-1199
10.1209/epl/i2006-10380-5
null
cs.IT cond-mat.dis-nn math.IT
null
An approach by which to analyze the performance of the code division multiple access (CDMA) scheme, which is a core technology used in modern wireless communication systems, is provided. The approach characterizes the objective system by the eigenvalue spectrum of a cross-correlation matrix composed of signature sequences used in CDMA communication, which enables us to handle a wider class of CDMA systems beyond the basic model reported by Tanaka. The utility of the novel scheme is shown by analyzing a system in which the generation of signature sequences is designed for enhancing the orthogonality.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 07:24:55 GMT" }, { "version": "v2", "created": "Wed, 10 Jan 2007 06:44:26 GMT" } ]
2007-07-16T00:00:00
[ [ "Takeda", "Koujin", "" ], [ "Uda", "Shinsuke", "" ], [ "Kabashima", "Yoshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607044
Valdis Vitolins
Audris Kalnins, Valdis Vitolins
Use of UML and Model Transformations for Workflow Process Definitions
12 pages, 7 figures, communications of the conference "Baltic DB&IS 2006", July 3-6, Vilnius, Lithuania
Audris Kalnins, Valdis Vitolins, Databases and Information Systems, BalticDB&IS'2006, edited by Olegas Vasilecas, Johann Eder, Albertas Caplinskas, Vilnius, Technika, 2006, pp. 3.-15
null
null
cs.SE
null
Currently many different modeling languages are used for workflow definitions in BPM systems. Authors of this paper analyze the two most popular graphical languages, with highest possibility of wide practical usage - UML Activity diagrams (AD) and Business Process Modeling Notation (BPMN). The necessary in practice workflow aspects are briefly discussed, and on this basis a natural AD profile is proposed, which covers all of them. A functionally equivalent BPMN subset is also selected. The semantics of both languages in the context of process execution (namely, mapping to BPEL) is also analyzed in the paper. By analyzing AD and BPMN metamodels, authors conclude that an exact transformation from AD to BPMN is not trivial even for the selected subset, though these languages are considered to be similar. Authors show how this transformation could be defined in the MOLA transformation language.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 09:23:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Kalnins", "Audris", "" ], [ "Vitolins", "Valdis", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0607045
Xin Han
Xin Han, Deshi Ye, Yong Zhou
Improved online hypercube packing
13 pages, one figure, accepted in WAOA'06
null
null
null
cs.DS
null
In this paper, we study online multidimensional bin packing problem when all items are hypercubes. Based on the techniques in one dimensional bin packing algorithm Super Harmonic by Seiden, we give a framework for online hypercube packing problem and obtain new upper bounds of asymptotic competitive ratios. For square packing, we get an upper bound of 2.1439, which is better than 2.24437. For cube packing, we also give a new upper bound 2.6852 which is better than 2.9421 by Epstein and van Stee.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 09:43:45 GMT" }, { "version": "v2", "created": "Wed, 6 Sep 2006 03:26:46 GMT" } ]
2016-08-31T00:00:00
[ [ "Han", "Xin", "" ], [ "Ye", "Deshi", "" ], [ "Zhou", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0607046
Xin Han
Xin Han, Kazuo Iwama, Deshi Ye, Guochuan Zhang
Strip Packing vs. Bin Packing
12 pages, 3 figures
null
null
null
cs.DS
null
In this paper we establish a general algorithmic framework between bin packing and strip packing, with which we achieve the same asymptotic bounds by applying bin packing algorithms to strip packing. More precisely we obtain the following results: (1) Any offline bin packing algorithm can be applied to strip packing maintaining the same asymptotic worst-case ratio. Thus using FFD (MFFD) as a subroutine, we get a practical (simple and fast) algorithm for strip packing with an upper bound 11/9 (71/60). A simple AFPTAS for strip packing immediately follows. (2) A class of Harmonic-based algorithms for bin packing can be applied to online strip packing maintaining the same asymptotic competitive ratio. It implies online strip packing admits an upper bound of 1.58889 on the asymptotic competitive ratio, which is very close to the lower bound 1.5401 and significantly improves the previously best bound of 1.6910 and affirmatively answers an open question posed by Csirik et. al.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 09:58:34 GMT" }, { "version": "v2", "created": "Wed, 23 Aug 2006 00:33:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Han", "Xin", "" ], [ "Iwama", "Kazuo", "" ], [ "Ye", "Deshi", "" ], [ "Zhang", "Guochuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0607047
Paul Goldberg
Nick Palmer and Paul W. Goldberg
PAC Classification based on PAC Estimates of Label Class Distributions
14 pages
null
null
null
cs.LG
null
A standard approach in pattern classification is to estimate the distributions of the label classes, and then to apply the Bayes classifier to the estimates of the distributions in order to classify unlabeled examples. As one might expect, the better our estimates of the label class distributions, the better the resulting classifier will be. In this paper we make this observation precise by identifying risk bounds of a classifier in terms of the quality of the estimates of the label class distributions. We show how PAC learnability relates to estimates of the distributions that have a PAC guarantee on their $L_1$ distance from the true distribution, and we bound the increase in negative log likelihood risk in terms of PAC bounds on the KL-divergence. We give an inefficient but general-purpose smoothing method for converting an estimated distribution that is good under the $L_1$ metric into a distribution that is good under the KL-divergence.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 13:52:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Palmer", "Nick", "" ], [ "Goldberg", "Paul W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607048
Emmanuel Viennet
Emmanuel Viennet (LIPN), Fran\c{c}oise Fogelman Souli\'e (KXEN), Benoit Rognier (KXEN)
Evaluation de Techniques de Traitement des Refus\'{e}s pour l'Octroi de Cr\'{e}dit
null
38i\`{e}mes Journ\'{e}es de Statistiques (2006) 105
null
null
cs.NE math.ST stat.TH
null
We present the problem of "Reject Inference" for credit acceptance. Because of the current legal framework (Basel II), credit institutions need to industrialize their processes for credit acceptance, including Reject Inference. We present here a methodology to compare various techniques of Reject Inference and show that it is necessary, in the absence of real theoretical results, to be able to produce and compare models adapted to available data (selection of "best" model conditionnaly on data). We describe some simulations run on a small data set to illustrate the approach and some strategies for choosing the control group, which is the only valid approach to Reject Inference.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 15:25:56 GMT" } ]
2016-08-16T00:00:00
[ [ "Viennet", "Emmanuel", "", "LIPN" ], [ "Soulié", "Françoise Fogelman", "", "KXEN" ], [ "Rognier", "Benoit", "", "KXEN" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
cs/0607049
Pierre Parrend
Pierre Parrend (INRIA Rh\^one-Alpes), St\'ephane Fr\'enot (INRIA Rh\^one-Alpes)
Secure Component Deployment in the OSGi(tm) Release 4 Platform
null
null
null
null
cs.CR cs.OS
null
Last years have seen a dramatic increase in the use of component platforms, not only in classical application servers, but also more and more in the domain of Embedded Systems. The OSGi(tm) platform is one of these platforms dedicated to lightweight execution environments, and one of the most prominent. However, new platforms also imply new security flaws, and a lack of both knowledge and tools for protecting the exposed systems. This technical report aims at fostering the understanding of security mechanisms in component deployment. It focuses on securing the deployment of components. It presents the cryptographic mechanisms necessary for signing OSGi(tm) bundles, as well as the detailed process of bundle signature and validation. We also present the SFelix platform, which is a secure extension to Felix OSGi(tm) framework implementation. It includes our implementation of the bundle signature process, as specified by OSGi(tm) Release 4 Security Layer. Moreover, a tool for signing and publishing bundles, SFelix JarSigner, has been developed to conveniently integrate bundle signature in the bundle deployment process.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 18:54:21 GMT" }, { "version": "v2", "created": "Tue, 1 Aug 2006 07:04:20 GMT" } ]
2016-08-16T00:00:00
[ [ "Parrend", "Pierre", "", "INRIA Rhône-Alpes" ], [ "Frénot", "Stéphane", "", "INRIA\n Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
cs/0607050
Joelle Thollot
Pascal Barla (INRIA Rh\^one-Alpes / GRAVIR-IMAG), Simon Breslav (EECS), Lee Markosian (EECS), Jo\"elle Thollot (INRIA Rh\^one-Alpes / GRAVIR-IMAG)
Interactive Hatching and Stippling by Example
null
null
null
null
cs.GR
null
We describe a system that lets a designer interactively draw patterns of strokes in the picture plane, then guide the synthesis of similar patterns over new picture regions. Synthesis is based on an initial user-assisted analysis phase in which the system recognizes distinct types of strokes (hatching and stippling) and organizes them according to perceptual grouping criteria. The synthesized strokes are produced by combining properties (eg. length, orientation, parallelism, proximity) of the stroke groups extracted from the input examples. We illustrate our technique with a drawing application that allows the control of attributes and scale-dependent reproduction of the synthesized patterns.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:01:41 GMT" }, { "version": "v2", "created": "Tue, 25 Mar 2008 15:53:37 GMT" } ]
2008-03-25T00:00:00
[ [ "Barla", "Pascal", "", "INRIA Rhône-Alpes / GRAVIR-IMAG" ], [ "Breslav", "Simon", "", "EECS" ], [ "Markosian", "Lee", "", "EECS" ], [ "Thollot", "Joëlle", "", "INRIA Rhône-Alpes /\n GRAVIR-IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0607051
Catherine Recanati
Catherine Recanati (LIPN)
Raisonner avec des diagrammes : perspectives cognitives et computationnelles
paru initialement comme Rapport LIPN en 2004
Intellectica 40 (2005) 9-42
null
null
cs.CL
null
Diagrammatic, analogical or iconic representations are often contrasted with linguistic or logical representations, in which the shape of the symbols is arbitrary. The aim of this paper is to make a case for the usefulness of diagrams in inferential knowledge representation systems. Although commonly used, diagrams have for a long time suffered from the reputation of being only a heuristic tool or a mere support for intuition. The first part of this paper is an historical background paying tribute to the logicians, psychologists and computer scientists who put an end to this formal prejudice against diagrams. The second part is a discussion of their characteristics as opposed to those of linguistic forms. The last part is aimed at reviving the interest for heterogeneous representation systems including both linguistic and diagrammatic representations.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:13:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Recanati", "Catherine", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0607052
Thierry Poibeau
Thierry Poibeau (LIPN)
Dealing with Metonymic Readings of Named Entities
null
Dans Actes de The 28th Annual Conference of the Cognitive Science Society (CogSci 2006) - The 28th Annual Conference of the Cognitive Science Society (CogSci 2006), Vancouver : Canada (2006)
null
null
cs.AI cs.CL
null
The aim of this paper is to propose a method for tagging named entities (NE), using natural language processing techniques. Beyond their literal meaning, named entities are frequently subject to metonymy. We show the limits of current NE type hierarchies and detail a new proposal aiming at dynamically capturing the semantics of entities in context. This model can analyze complex linguistic phenomena like metonymy, which are known to be difficult for natural language processing but crucial for most applications. We present an implementation and some test using the French ESTER corpus and give significant results.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:14:49 GMT" } ]
2007-12-08T00:00:00
[ [ "Poibeau", "Thierry", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0607053
Thierry Poibeau
Thierry Poibeau (LIPN)
Linguistically Grounded Models of Language Change
null
The 28th Annual Conference of the Cognitive Science Society (CogSci 2006), Canada (2006)
null
null
cs.AI cs.CL
null
Questions related to the evolution of language have recently known an impressive increase of interest (Briscoe, 2002). This short paper aims at questioning the scientific status of these models and their relations to attested data. We show that one cannot directly model non-linguistic factors (exogenous factors) even if they play a crucial role in language evolution. We then examine the relation between linguistic models and attested language data, as well as their contribution to cognitive linguistics.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:17:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Poibeau", "Thierry", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
cs/0607054
Elliott H. Lieb
Elliott H. Lieb, Daniel Osherson and Scott Weinstein
Elementary Proof of a Theorem of Jean Ville
12 pages latex
null
null
null
cs.CC
null
Considerable thought has been devoted to an adequate definition of the class of infinite, random binary sequences (the sort of sequence that almost certainly arises from flipping a fair coin indefinitely). The first mathematical exploration of this problem was due to R. Von Mises, and based on his concept of a "selection function." A decisive objection to Von Mises' idea was formulated in a theorem offered by Jean Ville in 1939. It shows that some sequences admitted by Von Mises as "random" in fact manifest a certain kind of systematicity. Ville's proof is challenging, and an alternative approach has appeared only in condensed form. We attempt to provide an expanded version of the latter, alternative argument.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 19:52:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Lieb", "Elliott H.", "" ], [ "Osherson", "Daniel", "" ], [ "Weinstein", "Scott", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0607055
Akimichi Takemura
Hisayuki Hara and Akimichi Takemura
Boundary cliques, clique trees and perfect sequences of maximal cliques of a chordal graph
null
null
null
null
cs.DM
null
We characterize clique trees of a chordal graph in their relation to simplicial vertices and perfect sequences of maximal cliques. We investigate boundary cliques defined by Shibata and clarify their relation to endpoints of clique trees. Next we define a symmetric binary relation between the set of clique trees and the set of perfect sequences of maximal cliques. We describe the relation as a bipartite graph and prove that the bipartite graph is always connected. Lastly we consider to characterize chordal graphs from the aspect of non-uniqueness of clique trees.
[ { "version": "v1", "created": "Tue, 11 Jul 2006 23:14:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Hara", "Hisayuki", "" ], [ "Takemura", "Akimichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607056
Sylviane Schwer
Sylviane Schwer (LIPN)
Reasoning with Intervals on Granules
null
Journal of Universal Computer Science 8 (8) (2002) 793-808
null
null
cs.AI cs.DM
null
The formalizations of periods of time inside a linear model of Time are usually based on the notion of intervals, that may contain or may not their endpoints. This is not enought when the periods are written in terms of coarse granularities with respect to the event taken into account. For instance, how to express the inter-war period in terms of a {\em years} interval? This paper presents a new type of intervals, neither open, nor closed or open-closed and the extension of operations on intervals of this new type, in order to reduce the gap between the discourse related to temporal relationship and its translation into a discretized model of Time.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 09:16:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Schwer", "Sylviane", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607057
Vlady Ravelomanana
Vlady Ravelomanana (LIPN), the Projet PAI Amadeus Collaboration
The Average Size of Giant Components Between the Double-Jump
A para\^{i}tre dans Algorithmica
Algorithmica Issue sp\'{e}ciale "Analysis of Algorithms" (2006) A para\^{i}tre
null
null
cs.DM math.CO math.PR
null
We study the sizes of connected components according to their excesses during a random graph process built with $n$ vertices. The considered model is the continuous one defined in Janson 2000. An ${\ell}$-component is a connected component with ${\ell}$ edges more than vertices. $\ell$ is also called the \textit{excess} of such component. As our main result, we show that when $\ell$ and ${n \over \ell}$ are both large, the expected number of vertices that ever belong to an $\ell$-component is about ${12}^{1/3} {\ell}^{1/3} n^{2/3}$. We also obtain limit theorems for the number of creations of $\ell$-components.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 09:23:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Collaboration", "the Projet PAI Amadeus", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0607058
Tom Ridge
Tom Ridge
Craig's Interpolation Theorem formalised and mechanised in Isabelle/HOL
null
null
null
null
cs.LO
null
We formalise and mechanise a construtive, proof theoretic proof of Craig's Interpolation Theorem in Isabelle/HOL. We give all the definitions and lemma statements both formally and informally. We also transcribe informally the formal proofs. We detail the main features of our mechanisation, such as the formalisation of binding for first order formulae. We also give some applications of Craig's Interpolation Theorem.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 17:26:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ridge", "Tom", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0607059
Vlady Ravelomanana
Vlady Ravelomanana (LIPN), Alphonse Laza Rijamame (D.M.I)
Creation and Growth of Components in a Random Hypergraph Process
R\'{e}sum\'{e} \'{e}tendu
Proceedings of The Twelfth Annual International Computing and Combinatorics Conference (COCOON'06) -- Lecture Notes in Computer Science (2006) \`{a} para\^{i}tre
null
null
cs.DM math.CO math.PR
null
Denote by an $\ell$-component a connected $b$-uniform hypergraph with $k$ edges and $k(b-1) - \ell$ vertices. We prove that the expected number of creations of $\ell$-component during a random hypergraph process tends to 1 as $\ell$ and $b$ tend to $\infty$ with the total number of vertices $n$ such that $\ell = o(\sqrt[3]{\frac{n}{b}})$. Under the same conditions, we also show that the expected number of vertices that ever belong to an $\ell$-component is approximately $12^{1/3} (b-1)^{1/3} \ell^{1/3} n^{2/3}$. As an immediate consequence, it follows that with high probability the largest $\ell$-component during the process is of size $O((b-1)^{1/3} \ell^{1/3} n^{2/3})$. Our results give insight about the size of giant components inside the phase transition of random hypergraphs.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 09:45:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Ravelomanana", "Vlady", "", "LIPN" ], [ "Rijamame", "Alphonse Laza", "", "D.M.I" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0607060
Gary Hardy
Yoann Dieudonne (LaRIA), Ouiddad Labbani-Igbida (CREA), Franck Petit (LaRIA)
Circle Formation of Weak Mobile Robots
null
null
null
null
cs.RO
null
In this paper we prove the conjecture of D\'{e}fago & Konagaya. Furthermore, we describe a deterministic protocol for forming a regular n-gon in finite time.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 12:57:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Dieudonne", "Yoann", "", "LaRIA" ], [ "Labbani-Igbida", "Ouiddad", "", "CREA" ], [ "Petit", "Franck", "", "LaRIA" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
cs/0607061
Igor Mackarov Dr.
Igor Mackarov (Maharishi University of Management)
On Some Peculiarities of Dynamic Switch between Component Implementations in an Autonomic Computing System
16 pages, 3 figures
null
null
null
cs.DS cs.DC cs.NA
null
Behavior of the delta algorithm of autonomic switch between two component implementations is considered on several examples of a client-server systems involving, in particular, periodic change of intensities of requests for the component. It is shown that in the cases of some specific combinations of elementary requests costs, the number of clients in the system, the number of requests per unit of time, and the cost of switch between the implementations, the algorithm may reveal behavior that is rather far from the desired. A sufficient criterion of a success of the algorithm is proposed based on the analysis of the accumulated implementations costs difference as a function of time. Suggestions are pointed out of practical evaluation of the algorithm functioning regarding the observations made in this paper.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 11:09:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Mackarov", "Igor", "", "Maharishi University of Management" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0607062
Lillian Lee
Matt Thomas, Bo Pang and Lillian Lee
Get out the vote: Determining support or opposition from Congressional floor-debate transcripts
Proceedings of EMNLP 2006. This revision (created Dec 2006) contains clearly-marked updates from the proceedings version. Data available at http://www.cs.cornell.edu/home/llee/data/convote.html
null
null
null
cs.CL cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate whether one can determine from the transcripts of U.S. Congressional floor debates whether the speeches represent support of or opposition to proposed legislation. To address this problem, we exploit the fact that these speeches occur as part of a discussion; this allows us to use sources of information regarding relationships between discourse segments, such as whether a given utterance indicates agreement with the opinion expressed by another. We find that the incorporation of such information yields substantial improvements over classifying speeches in isolation.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 20:03:52 GMT" }, { "version": "v2", "created": "Wed, 12 Jul 2006 20:14:56 GMT" }, { "version": "v3", "created": "Wed, 6 Jun 2012 18:41:56 GMT" } ]
2012-06-08T00:00:00
[ [ "Thomas", "Matt", "" ], [ "Pang", "Bo", "" ], [ "Lee", "Lillian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0607063
Leon Moonen
Cathal Boogerd and Leon Moonen
Prioritizing Software Inspection Results using Static Profiling
14 pages
null
null
TUD-SERG-2006-001
cs.SE
null
Static software checking tools are useful as an additional automated software inspection step that can easily be integrated in the development cycle and assist in creating secure, reliable and high quality code. However, an often quoted disadvantage of these tools is that they generate an overly large number of warnings, including many false positives due to the approximate analysis techniques. This information overload effectively limits their usefulness. In this paper we present ELAN, a technique that helps the user prioritize the information generated by a software inspection tool, based on a demand-driven computation of the likelihood that execution reaches the locations for which warnings are reported. This analysis is orthogonal to other prioritization techniques known from literature, such as severity levels and statistical analysis to reduce false positives. We evaluate feasibility of our technique using a number of case studies and assess the quality of our predictions by comparing them to actual values obtained by dynamic profiling.
[ { "version": "v1", "created": "Wed, 12 Jul 2006 20:35:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Boogerd", "Cathal", "" ], [ "Moonen", "Leon", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0607064
Andrea Montanari
Abdelaziz Amraoui, Andrea Montanari, Ruediger Urbanke
How to Find Good Finite-Length Codes: From Art Towards Science
13 pages, 13 eps figures, enhanced version of an invited paperat the 4th International Symposium on Turbo Codes and Related Topics, Munich, Germany, 2006
null
null
null
cs.IT math.IT
null
We explain how to optimize finite-length LDPC codes for transmission over the binary erasure channel. Our approach relies on an analytic approximation of the erasure probability. This is in turn based on a finite-length scaling result to model large scale erasures and a union bound involving minimal stopping sets to take into account small error events. We show that the performances of optimized ensembles as observed in simulations are well described by our approximation. Although we only address the case of transmission over the binary erasure channel, our method should be applicable to a more general setting.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 09:54:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Amraoui", "Abdelaziz", "" ], [ "Montanari", "Andrea", "" ], [ "Urbanke", "Ruediger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]