id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0606093
|
Vladimir Vovk
|
Vladimir Vovk
|
Predictions as statements and decisions
|
48 pages
| null | null | null |
cs.LG
| null |
Prediction is a complex notion, and different predictors (such as people,
computer programs, and probabilistic theories) can pursue very different goals.
In this paper I will review some popular kinds of prediction and argue that the
theory of competitive on-line learning can benefit from the kinds of prediction
that are now foreign to it.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2006 04:31:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vovk",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0606094
|
Frank Neven
|
Wim Martens, Frank Neven, and Marc Gyssens
|
On Typechecking Top-Down XML Tranformations: Fixed Input or Output
Schemas
| null | null | null | null |
cs.DB cs.PL
| null |
Typechecking consists of statically verifying whether the output of an XML
transformation always conforms to an output type for documents satisfying a
given input type. In this general setting, both the input and output schema as
well as the transformation are part of the input for the problem. However,
scenarios where the input or output schema can be considered to be fixed, are
quite common in practice. In the present work, we investigate the computational
complexity of the typechecking problem in the latter setting.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2006 09:46:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Martens",
"Wim",
""
],
[
"Neven",
"Frank",
""
],
[
"Gyssens",
"Marc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0606095
|
Jean Krivine
|
Jean Krivine (INRIA Rocquencourt)
|
A verification algorithm for Declarative Concurrent Programming
| null | null | null | null |
cs.DC
| null |
A verification method for distributed systems based on decoupling forward and
backward behaviour is proposed. This method uses an event structure based
algorithm that, given a CCS process, constructs its causal compression relative
to a choice of observable actions. Verifying the original process equipped with
distributed backtracking on non-observable actions, is equivalent to verifying
its relative compression which in general is much smaller. We call this method
Declarative Concurrent Programming (DCP). DCP technique compares well with
direct bisimulation based methods. Benchmarks for the classic dining
philosophers problem show that causal compression is rather efficient both
time- and space-wise. State of the art verification tools can successfully
handle more than 15 agents, whereas they can handle no more than 5 following
the traditional direct method; an altogether spectacular improvement, since in
this example the specification size is exponential in the number of agents.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2006 13:23:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Krivine",
"Jean",
"",
"INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0606096
|
Hendrik Feddes
|
Lea Cyrus
|
Building a resource for studying translation shifts
|
6 pages, 1 figure
|
Proc. LREC 2006, Genoa, May 24-26, 2006; pp. 1240-1245
| null | null |
cs.CL
| null |
This paper describes an interdisciplinary approach which brings together the
fields of corpus linguistics and translation studies. It presents ongoing work
on the creation of a corpus resource in which translation shifts are explicitly
annotated. Translation shifts denote departures from formal correspondence
between source and target text, i.e. deviations that have occurred during the
translation process. A resource in which such shifts are annotated in a
systematic way will make it possible to study those phenomena that need to be
addressed if machine translation output is to resemble human translation. The
resource described in this paper contains English source texts (parliamentary
proceedings) and their German translations. The shift annotation is based on
predicate-argument structures and proceeds in two steps: first, predicates and
their arguments are annotated monolingually in a straightforward manner. Then,
the corresponding English and German predicates and arguments are aligned with
each other. Whenever a shift - mainly grammatical or semantic -has occurred,
the alignment is tagged accordingly.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2006 13:26:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cyrus",
"Lea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0606097
|
Andrew Krizhanovsky A
|
A. Krizhanovsky
|
Synonym search in Wikipedia: Synarcher
|
4 pages, 2 figures, Synarcher program is available at
http://synarcher.sourceforge.net
| null | null | null |
cs.IR cs.DM
| null |
The program Synarcher for synonym (and related terms) search in the text
corpus of special structure (Wikipedia) was developed. The results of the
search are presented in the form of graph. It is possible to explore the graph
and search for graph elements interactively. Adapted HITS algorithm for synonym
search, program architecture, and program work evaluation with test examples
are presented in the paper. The proposed algorithm can be applied to a query
expansion by synonyms (in a search engine) and a synonym dictionary forming.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2006 14:17:26 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 05:10:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Krizhanovsky",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0606098
|
Jeff M Phillips
|
Jeff M. Phillips and Ran Liu and Carlo Tomasi
|
Outlier Robust ICP for Minimizing Fractional RMSD
|
22 pages, 7 Figures, 9 Tables
| null | null |
Duke University Technical Report: CS-2006-05
|
cs.GR cs.CG
| null |
We describe a variation of the iterative closest point (ICP) algorithm for
aligning two point sets under a set of transformations. Our algorithm is
superior to previous algorithms because (1) in determining the optimal
alignment, it identifies and discards likely outliers in a statistically robust
manner, and (2) it is guaranteed to converge to a locally optimal solution. To
this end, we formalize a new distance measure, fractional root mean squared
distance (frmsd), which incorporates the fraction of inliers into the distance
function. We lay out a specific implementation, but our framework can easily
incorporate most techniques and heuristics from modern registration algorithms.
We experimentally validate our algorithm against previous techniques on 2 and 3
dimensional data exposed to a variety of outlier types.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2006 15:35:56 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Phillips",
"Jeff M.",
""
],
[
"Liu",
"Ran",
""
],
[
"Tomasi",
"Carlo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0606099
|
Mohammad Ali Maddah-Ali Mr.
|
Mohammad A. Maddah-Ali, Amin Mobasher, and Amir Kayvan Khandani
|
Fairness in Multiuser Systems with Polymatroid Capacity Region
|
Submitted To IEEE Transactions on Information Theory, June 2006
| null |
10.1109/TIT.2009.2016058
| null |
cs.IT math.IT
| null |
For a wide class of multi-user systems, a subset of capacity region which
includes the corner points and the sum-capacity facet has a special structure
known as polymatroid. Multiaccess channels with fixed input distributions and
multiple-antenna broadcast channels are examples of such systems. Any interior
point of the sum-capacity facet can be achieved by time-sharing among corner
points or by an alternative method known as rate-splitting. The main purpose of
this paper is to find a point on the sum-capacity facet which satisfies a
notion of fairness among active users. This problem is addressed in two cases:
(i) where the complexity of achieving interior points is not feasible, and (ii)
where the complexity of achieving interior points is feasible. For the first
case, the corner point for which the minimum rate of the active users is
maximized (max-min corner point) is desired for signaling. A simple greedy
algorithm is introduced to find the optimum max-min corner point. For the
second case, the polymatroid properties are exploited to locate a rate-vector
on the sum-capacity facet which is optimally fair in the sense that the minimum
rate among all users is maximized (max-min rate). In the case that the rate of
some users can not increase further (attain the max-min value), the algorithm
recursively maximizes the minimum rate among the rest of the users. It is shown
that the problems of deriving the time-sharing coefficients or rate-spitting
scheme can be solved by decomposing the problem to some lower-dimensional
subproblems. In addition, a fast algorithm to compute the time-sharing
coefficients to attain a general point on the sum-capacity facet is proposed.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2006 21:31:23 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Maddah-Ali",
"Mohammad A.",
""
],
[
"Mobasher",
"Amin",
""
],
[
"Khandani",
"Amir Kayvan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606100
|
Marco Cuturi
|
Marco Cuturi
|
The generating function of the polytope of transport matrices $U(r,c)$
as a positive semidefinite kernel of the marginals $r$ and $c$
|
This paper has been withdrawn
| null | null | null |
cs.LG cs.DM
| null |
This paper has been withdrawn by the author due to a crucial error in the
proof of Lemma 5.
|
[
{
"version": "v1",
"created": "Fri, 23 Jun 2006 10:19:40 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jun 2006 05:46:00 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Jan 2011 08:26:13 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Oct 2011 10:21:45 GMT"
}
] | 2011-10-12T00:00:00 |
[
[
"Cuturi",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0606101
|
Marc Daumas
|
Marc Daumas (LIRMM, Lp2a), David Lester (LP2A, University of
Manchester)
|
Stochastic Formal Methods: An application to accuracy of numeric
software
| null | null | null | null |
cs.MS
| null |
This paper provides a bound on the number of numeric operations (fixed or
floating point) that can safely be performed before accuracy is lost. This work
has important implications for control systems with safety-critical software,
as these systems are now running fast enough and long enough for their errors
to impact on their functionality. Furthermore, worst-case analysis would
blindly advise the replacement of existing systems that have been successfully
running for years. We present here a set of formal theorems validated by the
PVS proof assistant. These theorems will allow code analyzing tools to produce
formal certificates of accurate behavior. For example, FAA regulations for
aircraft require that the probability of an error be below $10^{-9}$ for a 10
hour flight.
|
[
{
"version": "v1",
"created": "Fri, 23 Jun 2006 08:26:56 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Sep 2006 11:51:28 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Oct 2006 19:41:07 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Dec 2006 17:10:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Daumas",
"Marc",
"",
"LIRMM, Lp2a"
],
[
"Lester",
"David",
"",
"LP2A, University of\n Manchester"
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0606102
|
Chengpu Wang
|
Chengpu Wang
|
Toward Functionality Oriented Programming
|
This paper has been withdrawn by the author. 21 Pages, 7 Figures
| null | null | null |
cs.PL cs.HC
| null |
The concept of functionality oriented programming is proposed, and some of
its aspects are discussed, such as: (1) implementation independent basic types
and generic collection types; (2) syntax requirements and recommendations for
implementation independence; (3) unified documentation and code; (4)
cross-module interface; and (5) cross-language program making scheme. A
prototype example is given to demonstrate functionality oriented programming.
|
[
{
"version": "v1",
"created": "Sat, 24 Jun 2006 18:51:54 GMT"
},
{
"version": "v2",
"created": "Wed, 19 May 2010 03:17:12 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Feb 2011 00:41:26 GMT"
}
] | 2011-02-21T00:00:00 |
[
[
"Wang",
"Chengpu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0606103
|
Chengpu Wang
|
Chengpu Wang
|
Precision Arithmetic: A New Floating-Point Arithmetic
|
54 Pages, 32 Figures
| null | null | null |
cs.DM cs.DS cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new deterministic floating-point arithmetic called precision arithmetic is
developed to track precision for arithmetic calculations. It uses a novel
rounding scheme to avoid excessive rounding error propagation of conventional
floating-point arithmetic. Unlike interval arithmetic, its uncertainty tracking
is based on statistics and the central limit theorem, with a much tighter
bounding range. Its stable rounding error distribution is approximated by a
truncated normal distribution. Generic standards and systematic methods for
validating uncertainty-bearing arithmetics are discussed. The precision
arithmetic is found to be better than interval arithmetic in both
uncertainty-tracking and uncertainty-bounding for normal usages.
The precision arithmetic is available publicly at
http://precisionarithm.sourceforge.net.
|
[
{
"version": "v1",
"created": "Sun, 25 Jun 2006 18:56:28 GMT"
},
{
"version": "v10",
"created": "Wed, 13 Oct 2010 02:39:44 GMT"
},
{
"version": "v11",
"created": "Sat, 30 Oct 2010 03:49:06 GMT"
},
{
"version": "v12",
"created": "Thu, 11 Nov 2010 20:25:56 GMT"
},
{
"version": "v13",
"created": "Mon, 6 Dec 2010 21:56:48 GMT"
},
{
"version": "v14",
"created": "Wed, 5 Jan 2011 04:43:49 GMT"
},
{
"version": "v15",
"created": "Mon, 21 Feb 2011 02:07:43 GMT"
},
{
"version": "v16",
"created": "Mon, 14 Mar 2011 20:40:47 GMT"
},
{
"version": "v17",
"created": "Tue, 26 Jul 2011 02:22:36 GMT"
},
{
"version": "v18",
"created": "Sat, 10 Dec 2011 19:13:43 GMT"
},
{
"version": "v19",
"created": "Wed, 12 Sep 2012 01:57:05 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Aug 2006 01:33:34 GMT"
},
{
"version": "v20",
"created": "Tue, 18 Mar 2014 04:17:22 GMT"
},
{
"version": "v21",
"created": "Thu, 3 Apr 2014 11:40:24 GMT"
},
{
"version": "v22",
"created": "Sat, 12 Apr 2014 02:02:06 GMT"
},
{
"version": "v3",
"created": "Wed, 19 May 2010 03:16:25 GMT"
},
{
"version": "v4",
"created": "Thu, 20 May 2010 21:42:30 GMT"
},
{
"version": "v5",
"created": "Fri, 9 Jul 2010 18:50:07 GMT"
},
{
"version": "v6",
"created": "Wed, 21 Jul 2010 02:26:26 GMT"
},
{
"version": "v7",
"created": "Sun, 25 Jul 2010 22:54:13 GMT"
},
{
"version": "v8",
"created": "Mon, 27 Sep 2010 15:35:14 GMT"
},
{
"version": "v9",
"created": "Wed, 6 Oct 2010 01:21:06 GMT"
}
] | 2014-04-15T00:00:00 |
[
[
"Wang",
"Chengpu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0606104
|
Te Sun Han
|
Te Sun Han
|
An information-spectrum approach to large deviation theorems
| null | null | null | null |
cs.IT math.IT
| null |
In this paper we show a some new look at large deviation theorems from the
viewpoint of the information-spectrum (IS) methods, which has been first
exploited in information theory, and also demonstrate a new basic formula for
the large deviation rate function in general, which is a pair of the lower and
upper IS rate functions. In particular, we are interested in establishing the
general large deviation rate functions that can be derivable as the
Fenchel-Legendre transform of the cumulant generating function. The final goal
is to show a necessary and sufficient condition for the rate function to be of
Cram\'er-G\"artner-Ellis type.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 09:16:40 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2006 05:11:36 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Jul 2006 07:13:23 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Jul 2006 04:39:19 GMT"
},
{
"version": "v5",
"created": "Wed, 12 Jul 2006 06:23:02 GMT"
},
{
"version": "v6",
"created": "Fri, 14 Jul 2006 10:51:11 GMT"
},
{
"version": "v7",
"created": "Mon, 17 Jul 2006 09:25:07 GMT"
},
{
"version": "v8",
"created": "Fri, 28 Jul 2006 06:59:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Han",
"Te Sun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606105
|
Salah Deeb
|
Salah Deeb (CRAN), Beno\^it Iung (CRAN)
|
Iso9000 Based Advanced Quality Approach for Continuous Improvement of
Manufacturing Processes
| null |
12th IFAC Symposium on Information Control Problems in
Manufacturing, St-Etienne, France (17/05/2006) CDROM
| null | null |
cs.IR
| null |
The continuous improvement in TQM is considered as the core value by which
organisation could maintain a competitive edge. Several techniques and tools
are known to support this core value but most of the time these techniques are
informal and without modelling the interdependence between the core value and
tools. Thus, technique formalisation is one of TQM challenges for increasing
efficiency of quality process implementation. In that way, the paper proposes
and experiments an advanced quality modelling approach based on meta-modelling
the "process approach" as advocated by the standard ISO9000:2000. This
meta-model allows formalising the interdependence between technique, tools and
core value
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 11:51:41 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Deeb",
"Salah",
"",
"CRAN"
],
[
"Iung",
"Benoît",
"",
"CRAN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0606106
|
Andrew Thangaraj
|
Sundeep B and Andrew Thangaraj
|
Self-orthogonality of $q$-ary Images of $q^m$-ary Codes and Quantum Code
Construction
|
submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
A code over GF$(q^m)$ can be imaged or expanded into a code over GF$(q)$
using a basis for the extension field over the base field. The properties of
such an image depend on the original code and the basis chosen for imaging.
Problems relating the properties of a code and its image with respect to a
basis have been of great interest in the field of coding theory. In this work,
a generalized version of the problem of self-orthogonality of the $q$-ary image
of a $q^m$-ary code has been considered. Given an inner product (more
generally, a biadditive form), necessary and sufficient conditions have been
derived for a code over a field extension and an expansion basis so that an
image of that code is self-orthogonal. The conditions require that the original
code be self-orthogonal with respect to several related biadditive forms
whenever certain power sums of the dual basis elements do not vanish. Numerous
interesting corollaries have been derived by specializing the general
conditions. An interesting result for the canonical or regular inner product in
fields of characteristic two is that only self-orthogonal codes result in
self-orthogonal images. Another result is that image of a code is
self-orthogonal for all bases if and only if trace of the code is
self-orthogonal, except for the case of binary images of 4-ary codes. The
conditions are particularly simple to state and apply for cyclic codes. To
illustrate a possible application, new quantum error-correcting codes have been
constructed with larger minimum distance than previously known.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 12:05:44 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jun 2006 05:45:58 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Jan 2007 06:44:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"B",
"Sundeep",
""
],
[
"Thangaraj",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606107
|
Uma Murthy
|
Ingrid Burbey, Gyuhyun Kwon, Uma Murthy, Nicholas Polys and Prince
Vincent
|
Human Information Processing with the Personal Memex
| null | null | null | null |
cs.HC
| null |
In this report, we describe the work done in a project that explored the
human information processing aspects of a personal memex (a memex to organize
personal information). In the project, we considered the use of the personal
memex, focusing on information recall, by three populations: people with Mild
Cognitive Impairment, those diagnosed with Macular Degeneration, and a
high-functioning population. The outcomes of the project included human
information processing-centered design guidelines for the memex interface, a
low-fidelity prototype, and an annotated bibliography for human information
processing, usability and design literature relating to the memex and the
populations we explored.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 15:58:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Burbey",
"Ingrid",
""
],
[
"Kwon",
"Gyuhyun",
""
],
[
"Murthy",
"Uma",
""
],
[
"Polys",
"Nicholas",
""
],
[
"Vincent",
"Prince",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0606108
|
Herve Panetto
|
Salah Ba\"ina (CRAN), Herv\'e Panetto (CRAN), Khalid Benali (LORIA)
|
A Product Oriented Modelling Concept: Holons for systems synchronisation
and interoperability
| null |
8th International Conference on Enterprise Information Systems,
ICEIS'2006, Paphos, Chypre (23/05/2006) -
| null | null |
cs.SE
| null |
Nowadays, enterprises are confronted to growing needs for traceability,
product genealogy and product life cycle management. To meet those needs, the
enterprise and applications in the enterprise environment have to manage flows
of information that relate to flows of material and that are managed in shop
floor level. Nevertheless, throughout product lifecycle coordination needs to
be established between reality in the physical world (physical view) and the
virtual world handled by manufacturing information systems (informational
view). This paper presents the "Holon" modelling concept as a means for the
synchronisation of both physical view and informational views. Afterwards, we
show how the concept of holon can play a major role in ensuring
interoperability in the enterprise context.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 19:24:14 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Baïna",
"Salah",
"",
"CRAN"
],
[
"Panetto",
"Hervé",
"",
"CRAN"
],
[
"Benali",
"Khalid",
"",
"LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0606109
|
Manor Mendel
|
Manor Mendel, Assaf Naor
|
Maximum gradient embeddings and monotone clustering
|
25 pages, 2 figures. Final version, minor revision of the previous
one. To appear in "Combinatorica"
|
Combinatorica 30(5) (2010), 581--615
|
10.1007/s00493-010-2302-z
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let (X,d_X) be an n-point metric space. We show that there exists a
distribution D over non-contractive embeddings into trees f:X-->T such that for
every x in X, the expectation with respect to D of the maximum over y in X of
the ratio d_T(f(x),f(y)) / d_X(x,y) is at most C (log n)^2, where C is a
universal constant. Conversely we show that the above quadratic dependence on
log n cannot be improved in general. Such embeddings, which we call maximum
gradient embeddings, yield a framework for the design of approximation
algorithms for a wide range of clustering problems with monotone costs,
including fault-tolerant versions of k-median and facility location.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 19:32:29 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Dec 2008 20:05:52 GMT"
},
{
"version": "v3",
"created": "Wed, 29 Apr 2009 03:13:43 GMT"
},
{
"version": "v4",
"created": "Sun, 29 Aug 2010 19:27:14 GMT"
}
] | 2012-11-15T00:00:00 |
[
[
"Mendel",
"Manor",
""
],
[
"Naor",
"Assaf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0606110
|
Richard Weber
|
Jochen Mundinger, Richard R. Weber and Gideon Weiss
|
Optimal Scheduling of Peer-to-Peer File Dissemination
|
27 pages, 3 figures. (v2) added a note about possible strengthening
of Theorem 5 at end of proof; updated some references
| null | null | null |
cs.NI cs.DS math.OC
| null |
Peer-to-peer (P2P) overlay networks such as BitTorrent and Avalanche are
increasingly used for disseminating potentially large files from a server to
many end users via the Internet. The key idea is to divide the file into many
equally-sized parts and then let users download each part (or, for network
coding based systems such as Avalanche, linear combinations of the parts)
either from the server or from another user who has already downloaded it.
However, their performance evaluation has typically been limited to comparing
one system relative to another and typically been realized by means of
simulation and measurements. In contrast, we provide an analytic performance
analysis that is based on a new uplink-sharing version of the well-known
broadcasting problem. Assuming equal upload capacities, we show that the
minimal time to disseminate the file is the same as for the simultaneous
send/receive version of the broadcasting problem. For general upload
capacities, we provide a mixed integer linear program (MILP) solution and a
complementary fluid limit solution. We thus provide a lower bound which can be
used as a performance benchmark for any P2P file dissemination system. We also
investigate the performance of a decentralized strategy, providing evidence
that the performance of necessarily decentralized P2P file dissemination
systems should be close to this bound and therefore that it is useful in
practice.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2006 08:11:57 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2006 07:17:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mundinger",
"Jochen",
""
],
[
"Weber",
"Richard R.",
""
],
[
"Weiss",
"Gideon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
cs/0606111
|
Hind El Haouzi
|
Hind El Haouzi (CRAN)
|
Models simulation and interoperability using MDA and HLA
|
8 pages
|
Doctoral Symposium, IFAC/IFIP International conference on
Interoperability for Enterprise Applications and Software (I-ESA'2006), March
22-24, 2006,, France (2006)
| null | null |
cs.OH
| null |
In the manufacturing context, there have been numerous efforts to use
modeling and simulation tools and techniques to improve manufacturing
efficiency over the last four decades. While an increasing number of
manufacturing system decisions are being made based on the use of models, their
use is still sporadic in many manufacturing environments. Our paper advocates
for an approach combining MDA (model driven architecture) and HLA (High Level
Architecture), the IEEE standard for modeling and simulation, in order to
overcome the deficiencies of current simulation methods at the level of
interoperability and reuse.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2006 14:55:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Haouzi",
"Hind El",
"",
"CRAN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0606112
|
Salah Baina
|
Salah Baina (CRAN), G\'erard Morel (CRAN)
|
Product Centric Holons for Synchronisation and Interoperability in
Manufacturing Environments
| null |
12th IFAC Symposium on Information Control Problems in
Manufacturing, INCOM'2006, St-Etienne, France (17/05/2006) CDROM
| null | null |
cs.SE
| null |
In the last few years, lot of work has been done in order to ensure
enterprise applications interoperability; however, proposed solutions focus
mainly on enterprise processes. Indeed, throughout product lifecycle
coordination needs to be established between reality in the physical world
(physical view) and the virtual world handled by manufacturing information
systems (informational view). This paper presents a holonic approach that
enables synchronisation of both physical and informational views. A model
driven approach for interoperability is proposed to ensure interoperability of
holon based models with other applications in the enterprise.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2006 11:21:23 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Baina",
"Salah",
"",
"CRAN"
],
[
"Morel",
"Gérard",
"",
"CRAN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0606113
|
Leon Moonen
|
Marius Marin, Leon Moonen and Arie van Deursen
|
A common framework for aspect mining based on crosscutting concern sorts
|
14 pages
|
Proceedings Working Conference on Reverse Engineering (WCRE), IEEE
Computer Society, 2006, pages 29-38
|
10.1109/WCRE.2006.6
|
TUD-SERG-2006-009
|
cs.SE cs.PL
| null |
The increasing number of aspect mining techniques proposed in literature
calls for a methodological way of comparing and combining them in order to
assess, and improve on, their quality. This paper addresses this situation by
proposing a common framework based on crosscutting concern sorts which allows
for consistent assessment, comparison and combination of aspect mining
techniques. The framework identifies a set of requirements that ensure
homogeneity in formulating the mining goals, presenting the results and
assessing their quality.
We demonstrate feasibility of the approach by retrofitting an existing aspect
mining technique to the framework, and by using it to design and implement two
new mining techniques. We apply the three techniques to a known aspect mining
benchmark and show how they can be consistently assessed and combined to
increase the quality of the results. The techniques and combinations are
implemented in FINT, our publicly available free aspect mining tool.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2006 12:40:04 GMT"
}
] | 2007-06-27T00:00:00 |
[
[
"Marin",
"Marius",
""
],
[
"Moonen",
"Leon",
""
],
[
"van Deursen",
"Arie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0606114
|
Mohammad Rezaeian
|
Mohammad Rezaeian
|
Hidden Markov Process: A New Representation, Entropy Rate and Estimation
Entropy
|
7 pages. Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
We consider a pair of correlated processes {Z_n} and {S_n} (two sided), where
the former is observable and the later is hidden. The uncertainty in the
estimation of Z_n upon its finite past history is H(Z_n|Z_0^{n-1}), and for
estimation of S_n upon this observation is H(S_n|Z_0^{n-1}), which are both
sequences of n. The limits of these sequences (and their existence) are of
practical and theoretical interest. The first limit, if exists, is the entropy
rate. We call the second limit the estimation entropy. An example of a process
jointly correlated to another one is the hidden Markov process. It is the
memoryless observation of the Markov state process where state transitions are
independent of past observations. We consider a new representation of hidden
Markov process using iterated function system. In this representation the state
transitions are deterministically related to the process. This representation
provides a unified framework for the analysis of the two limiting entropies for
this process, resulting in integral expressions for the limits. This analysis
shows that under mild conditions the limits exist and provides a simple method
for calculating the elements of the corresponding sequences.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2006 15:00:12 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 16:15:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Rezaeian",
"Mohammad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606115
|
Jos\'e Borges
|
Jose Borges and Mark Levene
|
Evaluating Variable Length Markov Chain Models for Analysis of User Web
Navigation Sessions
| null | null | null | null |
cs.AI cs.IR
| null |
Markov models have been widely used to represent and analyse user web
navigation data. In previous work we have proposed a method to dynamically
extend the order of a Markov chain model and a complimentary method for
assessing the predictive power of such a variable length Markov chain. Herein,
we review these two methods and propose a novel method for measuring the
ability of a variable length Markov model to summarise user web navigation
sessions up to a given length. While the summarisation ability of a model is
important to enable the identification of user navigation patterns, the ability
to make predictions is important in order to foresee the next link choice of a
user after following a given trail so as, for example, to personalise a web
site. We present an extensive experimental evaluation providing strong evidence
that prediction accuracy increases linearly with summarisation ability.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2006 08:26:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Borges",
"Jose",
""
],
[
"Levene",
"Mark",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0606116
|
Philip Bille
|
Philip Bille
|
New Algorithms for Regular Expression Matching
| null | null | null | null |
cs.DS
| null |
In this paper we revisit the classical regular expression matching problem,
namely, given a regular expression $R$ and a string $Q$, decide if $Q$ matches
one of the strings specified by $R$. Let $m$ and $n$ be the length of $R$ and
$Q$, respectively. On a standard unit-cost RAM with word length $w \geq \log
n$, we show that the problem can be solved in $O(m)$ space with the following
running times: \begin{equation*} \begin{cases}
O(n\frac{m \log w}{w} + m \log w) & \text{if $m > w$} \\
O(n\log m + m\log m) & \text{if $\sqrt{w} < m \leq w$} \\
O(\min(n+ m^2, n\log m + m\log m)) & \text{if $m \leq \sqrt{w}$.} \end{cases}
\end{equation*} This improves the best known time bound among algorithms using
$O(m)$ space. Whenever $w \geq \log^2 n$ it improves all known time bounds
regardless of how much space is used.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2006 10:51:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bille",
"Philip",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0606117
|
Fabrice Portier
|
Fabrice Portier (IETR), R. Legouable (FT R&D), L. Maret (LETI), F.
Bauer (NOKIA Research Center), N. Neda (UNIS), J.-F. H\'elard (IETR), E.
Hemming (NOKIA Research Center), M. Des Noes (LETI), M. H\'elard (FT R&D),
the projet europ\'een Matrice Collaboration
|
Performance comparison of multi-user detectors for the downlink of a
broadband MC-CDMA system
| null |
Proceedings IST Mobile & Wireless Communications Summit (IST
Summit 2004) (2004) 1
| null | null |
cs.IT math.IT
| null |
In this paper multi-user detection techniques, such as Parallel and Serial
Interference Cancellations (PIC & SIC), General Minimum Mean Square Error
(GMMSE) and polynomial MMSE, for the downlink of a broadband Multi-Carrier Code
Division Multiple Access (MCCDMA) system are investigated. The Bit Error Rate
(BER) and Frame Error Rate (FER) results are evaluated, and compared with
single-user detection (MMSEC, EGC) approaches, as well. The performance
evaluation takes into account the system load, channel coding and modulation
schemes.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2006 15:51:04 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Portier",
"Fabrice",
"",
"IETR"
],
[
"Legouable",
"R.",
"",
"FT R&D"
],
[
"Maret",
"L.",
"",
"LETI"
],
[
"Bauer",
"F.",
"",
"NOKIA Research Center"
],
[
"Neda",
"N.",
"",
"UNIS"
],
[
"Hélard",
"J. -F.",
"",
"IETR"
],
[
"Hemming",
"E.",
"",
"NOKIA Research Center"
],
[
"Noes",
"M. Des",
"",
"LETI"
],
[
"Hélard",
"M.",
"",
"FT R&D"
],
[
"Collaboration",
"the projet européen Matrice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606118
|
Sophie Aubin
|
Sophie Aubin (LIPN), Adeline Nazarenko (LIPN), Claire N\'edellec (MIG)
|
Adapting a general parser to a sublanguage
| null |
Proceedings of the International Conference on Recent Advances in
Natural Language Processing (RANLP'05) (2005) 89-93
| null | null |
cs.CL cs.IR
| null |
In this paper, we propose a method to adapt a general parser (Link Parser) to
sublanguages, focusing on the parsing of texts in biology. Our main proposal is
the use of terminology (identication and analysis of terms) in order to reduce
the complexity of the text to be parsed. Several other strategies are explored
and finally combined among which text normalization, lexicon and
morpho-guessing module extensions and grammar rules adaptation. We compare the
parsing results before and after these adaptations.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2006 14:43:42 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
],
[
"Nédellec",
"Claire",
"",
"MIG"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0606119
|
Sophie Aubin
|
Sampo Pyysalo, Tapio Salakoski, Sophie Aubin (LIPN), Adeline Nazarenko
(LIPN)
|
Lexical Adaptation of Link Grammar to the Biomedical Sublanguage: a
Comparative Evaluation of Three Approaches
| null |
Proceedings of the Second International Symposium on Semantic
Mining in Biomedicine (SMBM 2006) (2006) 60-67
| null | null |
cs.CL cs.IR
| null |
We study the adaptation of Link Grammar Parser to the biomedical sublanguage
with a focus on domain terms not found in a general parser lexicon. Using two
biomedical corpora, we implement and evaluate three approaches to addressing
unknown words: automatic lexicon expansion, the use of morphological clues, and
disambiguation using a part-of-speech tagger. We evaluate each approach
separately for its effect on parsing performance and consider combinations of
these approaches. In addition to a 45% increase in parsing efficiency, we find
that the best approach, incorporating information from a domain part-of-speech
tagger, offers a statistically signicant 10% relative decrease in error. The
adapted parser is available under an open-source license at
http://www.it.utu.fi/biolg.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2006 14:44:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pyysalo",
"Sampo",
"",
"LIPN"
],
[
"Salakoski",
"Tapio",
"",
"LIPN"
],
[
"Aubin",
"Sophie",
"",
"LIPN"
],
[
"Nazarenko",
"Adeline",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0606120
|
Benoit Masson
|
Enrico Formenti (I3S), Beno\^it Masson (I3S), Theophilos Pisokas (I3S)
|
On symmetric sandpiles
|
Will be presented at ACRI2006 conference
| null | null | null |
cs.CC cs.PF
| null |
A symmetric version of the well-known SPM model for sandpiles is introduced.
We prove that the new model has fixed point dynamics. Although there might be
several fixed points, a precise description of the fixed points is given.
Moreover, we provide a simple closed formula for counting the number of fixed
points originated by initial conditions made of a single column of grains.
|
[
{
"version": "v1",
"created": "Thu, 29 Jun 2006 09:53:05 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Formenti",
"Enrico",
"",
"I3S"
],
[
"Masson",
"Benoît",
"",
"I3S"
],
[
"Pisokas",
"Theophilos",
"",
"I3S"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0606121
|
Kaibin Huang
|
Kaibin Huang, Jeffrey G. Andrews, and Robert W. Heath Jr
|
Performance of Orthogonal Beamforming for SDMA with Limited Feedback
|
27 pages; to appear in IEEE Transactions on Vehicular Technology
| null | null | null |
cs.IT math.IT
| null |
On the multi-antenna broadcast channel, the spatial degrees of freedom
support simultaneous transmission to multiple users. The optimal multiuser
transmission, known as dirty paper coding, is not directly realizable.
Moreover, close-to-optimal solutions such as Tomlinson-Harashima precoding are
sensitive to CSI inaccuracy. This paper considers a more practical design
called per user unitary and rate control (PU2RC), which has been proposed for
emerging cellular standards. PU2RC supports multiuser simultaneous
transmission, enables limited feedback, and is capable of exploiting multiuser
diversity. Its key feature is an orthogonal beamforming (or precoding)
constraint, where each user selects a beamformer (or precoder) from a codebook
of multiple orthonormal bases. In this paper, the asymptotic throughput scaling
laws for PU2RC with a large user pool are derived for different regimes of the
signal-to-noise ratio (SNR). In the multiuser-interference-limited regime, the
throughput of PU2RC is shown to scale logarithmically with the number of users.
In the normal SNR and noise-limited regimes, the throughput is found to scale
double logarithmically with the number of users and also linearly with the
number of antennas at the base station. In addition, numerical results show
that PU2RC achieves higher throughput and is more robust against CSI
quantization errors than the popular alternative of zero-forcing beamforming if
the number of users is sufficiently large.
|
[
{
"version": "v1",
"created": "Thu, 29 Jun 2006 19:56:00 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jun 2006 20:36:29 GMT"
},
{
"version": "v3",
"created": "Sat, 3 May 2008 07:24:35 GMT"
}
] | 2008-05-05T00:00:00 |
[
[
"Huang",
"Kaibin",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606122
|
P. Oscar Boykin
|
Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury
|
Comparison of Image Similarity Queries in P2P Systems
|
To appear in IEEE P2P2006
| null | null | null |
cs.DC cs.NI
| null |
Given some of the recent advances in Distributed Hash Table (DHT) based
Peer-To-Peer (P2P) systems we ask the following questions: Are there
applications where unstructured queries are still necessary (i.e., the
underlying queries do not efficiently map onto any structured framework), and
are there unstructured P2P systems that can deliver the high bandwidth and
computing performance necessary to support such applications. Toward this end,
we consider an image search application which supports queries based on image
similarity metrics, such as color histogram intersection, and discuss why in
this setting, standard DHT approaches are not directly applicable. We then
study the feasibility of implementing such an image search system on two
different unstructured P2P systems: power-law topology with percolation search,
and an optimized super-node topology using structured broadcasts. We examine
the average and maximum values for node bandwidth, storage and processing
requirements in the percolation and super-node models, and show that current
high-end computers and high-speed links have sufficient resources to enable
deployments of large-scale complex image search systems.
|
[
{
"version": "v1",
"created": "Thu, 29 Jun 2006 14:28:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mueller",
"Wolfgang",
""
],
[
"Boykin",
"P. Oscar",
""
],
[
"Sarshar",
"Nima",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0606123
|
Atos Alves
|
Atos Ramos Alves
|
Use MPLS in Lan's
|
9 pages, 0 figures tests in laboratory
| null | null | null |
cs.NI cs.CR
| null |
To demonstrate the result of researches in laboratory with the focus in
exhibiting the real impact of the use of the technology MPLS in LAN. Through
these researches we will verify that the investment in this technology is
shown, of the point of view cost/benefit, very interesting, being necessary,
however, the adoption of another measured, in order to settle down a
satisfactory level in the items Quality and safety in the sending of packages
in VPN but assisting to the requirement latency of the net very well being
shown in the tests that it consumes on average one Tuesday leaves of the time
spend for the same function in routing IP.
|
[
{
"version": "v1",
"created": "Thu, 29 Jun 2006 14:44:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Alves",
"Atos Ramos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606124
|
Sean Falconer
|
Sean M. Falconer and Dmitri Maslov
|
Weighted hierarchical alignment of directed acyclic graph
| null | null | null | null |
cs.DS
| null |
In some applications of matching, the structural or hierarchical properties
of the two graphs being aligned must be maintained. The hierarchical properties
are induced by the direction of the edges in the two directed graphs. These
structural relationships defined by the hierarchy in the graphs act as a
constraint on the alignment. In this paper, we formalize the above problem as
the weighted alignment between two directed acyclic graphs. We prove that this
problem is NP-complete, show several upper bounds for approximating the
solution, and finally introduce polynomial time algorithms for sub-classes of
directed acyclic graphs.
|
[
{
"version": "v1",
"created": "Thu, 29 Jun 2006 18:07:49 GMT"
},
{
"version": "v2",
"created": "Fri, 11 May 2007 18:44:43 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Falconer",
"Sean M.",
""
],
[
"Maslov",
"Dmitri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0606125
|
Leon Moonen
|
Marius Marin
|
Formalizing typical crosscutting concerns
|
24 pages
| null | null |
TUD-SERG-2006-010
|
cs.SE cs.PL
| null |
We present a consistent system for referring crosscutting functionality,
relating crosscutting concerns to specific implementation idioms, and
formalizing their underlying relations through queries. The system is based on
generic crosscutting concerns that we organize and describe in a catalog.
We have designed and implemented a tool support for querying source code for
instances of the proposed generic concerns and organizing them in composite
concern models. The composite concern model adds a new dimension to the
dominant decomposition of the system for describing and making explicit source
code relations specific to crosscutting concerns implementations.
We use the proposed approach to describe crosscutting concerns in design
patterns and apply the tool to an opensource system (JHotDraw).
|
[
{
"version": "v1",
"created": "Thu, 29 Jun 2006 20:04:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Marin",
"Marius",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0606126
|
Eldan Goldenberg
|
Eldan Goldenberg, Jacob R. Garcowski, Randall D. Beer
|
May We Have Your Attention: Analysis of a Selective Attention Task
|
In S. Schaal, A. Ijspeert, A. Billard, S. Vijayakumar, J. Hallam &
J-A. Meyer (Eds.), From Animals to Animats 8: Proceedings of the Eighth
International Conference on the Simulation of Adaptive Behavior (pp 49-56).
MIT Press
| null | null | null |
cs.NE cs.AI
| null |
In this paper we present a deeper analysis than has previously been carried
out of a selective attention problem, and the evolution of continuous-time
recurrent neural networks to solve it. We show that the task has a rich
structure, and agents must solve a variety of subproblems to perform well. We
consider the relationship between the complexity of an agent and the ease with
which it can evolve behavior that generalizes well across subproblems, and
demonstrate a shaping protocol that improves generalization.
|
[
{
"version": "v1",
"created": "Thu, 29 Jun 2006 22:33:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Goldenberg",
"Eldan",
""
],
[
"Garcowski",
"Jacob R.",
""
],
[
"Beer",
"Randall D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606127
|
Mukund Sundararajan
|
Tim Roughgarden (Stanford University) and Mukund Sundararajan
(Stanford University)
|
Approximately Efficient Cost-Sharing Mechanisms
|
latex source, 22 pages, 1 figure
| null | null | null |
cs.GT
| null |
We make three different types of contributions to cost-sharing: First, we
identify several new classes of combinatorial cost functions that admit
incentive-compatible mechanisms achieving both a constant-factor approximation
of budget-balance and a polylogarithmic approximation of the social cost
formulation of efficiency. Second, we prove a new, optimal lower bound on the
approximate efficiency of every budget-balanced Moulin mechanism for Steiner
tree or SSRoB cost functions. This lower bound exposes a latent approximation
hierarchy among different cost-sharing problems. Third, we show that weakening
the definition of incentive-compatibility to strategyproofness can permit
exponentially more efficient approximately budget-balanced mechanisms, in
particular for set cover cost-sharing problems.
|
[
{
"version": "v1",
"created": "Fri, 30 Jun 2006 02:24:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Roughgarden",
"Tim",
"",
"Stanford University"
],
[
"Sundararajan",
"Mukund",
"",
"Stanford University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0606128
|
Andrew Krizhanovsky A
|
A. Krizhanovsky
|
Automatic forming lists of semantically related terms based on texts
rating in the corpus with hyperlinks and categories (In Russian)
|
6 pages, 1 figure, in Russian, PDF, for other formats see
http://whinger.narod.ru/paper/index.html
| null | null | null |
cs.IR cs.DM
| null |
HITS adapted algorithm for synonym search, the program architecture, and the
program work evaluation with test examples are presented in the paper.
Synarcher program for synonym (and related terms) search in the text corpus of
special structure (Wikipedia) was developed. The results of search are
presented in the form of a graph. It is possible to explore the graph and
search graph elements interactively. The proposed algorithm could be applied to
the search request extending and for synonym dictionary forming.
|
[
{
"version": "v1",
"created": "Fri, 30 Jun 2006 15:17:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Krizhanovsky",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607001
|
Chinmoy Bhattacharya
|
Chinmoy Bhattacharya and P.R.Mahapatra
|
A Novel Application of Lifting Scheme for Multiresolution Correlation of
Complex Radar Signals
| null | null | null | null |
cs.DC cs.CC
| null |
The lifting scheme of discrete wavelet transform (DWT) is now quite well
established as an efficient technique for image compression, and has been
incorporated into the JPEG2000 standards. However, the potential of the lifting
scheme has not been exploited in the context of correlationbased processing,
such as encountered in radar applications. This paper presents a complete and
consistent framework for the application of DWT for correlation of complex
signals. In particular, lifting scheme factorization of biorthogonal
filterbanks is carried out in dual analysis basis spaces for multiresolution
correlation of complex radar signals in the DWT domain only. A causal
formulation of lifting for orthogonal filterbank is also developed. The
resulting parallel algorithms and consequent saving of computational effort are
briefly dealt with.
|
[
{
"version": "v1",
"created": "Sat, 1 Jul 2006 16:58:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bhattacharya",
"Chinmoy",
""
],
[
"Mahapatra",
"P. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0607002
|
Igal Sason
|
I. Sason and I. Goldenberg
|
Coding for Parallel Channels: Gallager Bounds for Binary Linear Codes
with Applications to Repeat-Accumulate Codes and Variations
|
Submitted to IEEE Trans. on Information Theory, June 2006 (57 pages,
9 figures)
| null | null | null |
cs.IT math.IT
| null |
This paper is focused on the performance analysis of binary linear block
codes (or ensembles) whose transmission takes place over independent and
memoryless parallel channels. New upper bounds on the maximum-likelihood (ML)
decoding error probability are derived. These bounds are applied to various
ensembles of turbo-like codes, focusing especially on repeat-accumulate codes
and their recent variations which possess low encoding and decoding complexity
and exhibit remarkable performance under iterative decoding. The framework of
the second version of the Duman and Salehi (DS2) bounds is generalized to the
case of parallel channels, along with the derivation of their optimized tilting
measures. The connection between the generalized DS2 and the 1961 Gallager
bounds, addressed by Divsalar and by Sason and Shamai for a single channel, is
explored in the case of an arbitrary number of independent parallel channels.
The generalization of the DS2 bound for parallel channels enables to re-derive
specific bounds which were originally derived by Liu et al. as special cases of
the Gallager bound. In the asymptotic case where we let the block length tend
to infinity, the new bounds are used to obtain improved inner bounds on the
attainable channel regions under ML decoding. The tightness of the new bounds
for independent parallel channels is exemplified for structured ensembles of
turbo-like codes. The improved bounds with their optimized tilting measures
show, irrespectively of the block length of the codes, an improvement over the
union bound and other previously reported bounds for independent parallel
channels; this improvement is especially pronounced for moderate to large block
lengths.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 08:39:55 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sason",
"I.",
""
],
[
"Goldenberg",
"I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607003
|
Igal Sason
|
M. Twitto, I. Sason and S. Shamai
|
Tightened Upper Bounds on the ML Decoding Error Probability of Binary
Linear Block Codes
|
Submitted to the IEEE Trans. on Information Theory (as a
correspondence), February 2006
| null | null | null |
cs.IT math.IT
| null |
The performance of maximum-likelihood (ML) decoded binary linear block codes
is addressed via the derivation of tightened upper bounds on their decoding
error probability. The upper bounds on the block and bit error probabilities
are valid for any memoryless, binary-input and output-symmetric communication
channel, and their effectiveness is exemplified for various ensembles of
turbo-like codes over the AWGN channel. An expurgation of the distance spectrum
of binary linear block codes further tightens the resulting upper bounds.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 09:03:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Twitto",
"M.",
""
],
[
"Sason",
"I.",
""
],
[
"Shamai",
"S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607004
|
Igal Sason
|
M. Twitto and I. Sason
|
On the Error Exponents of Some Improved Tangential-Sphere Bounds
|
Submitted to the IEEE Trans. on Information Theory (as a
correspondence), March 2006. Revised (August 2006)
| null | null | null |
cs.IT math.IT
| null |
The performance of maximum-likelihood (ML) decoded binary linear block codes
over the AWGN channel is addressed via the tangential-sphere bound (TSB) and
two of its recent improved versions. The paper is focused on the derivation of
the error exponents of these bounds. Although it was exemplified that some
recent improvements of the TSB tighten this bound for finite-length codes, it
is demonstrated in this paper that their error exponents coincide. For an
arbitrary ensemble of binary linear block codes, the common value of these
error exponents is explicitly expressed in terms of the asymptotic growth rate
of the average distance spectrum.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 09:15:39 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Sep 2006 21:27:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Twitto",
"M.",
""
],
[
"Sason",
"I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607005
|
Florentin Smarandache
|
Florentin Smarandache, Jean Dezert
|
Belief Conditioning Rules (BCRs)
|
26 pages
| null | null | null |
cs.AI
| null |
In this paper we propose a new family of Belief Conditioning Rules (BCRs) for
belief revision. These rules are not directly related with the fusion of
several sources of evidence but with the revision of a belief assignment
available at a given time according to the new truth (i.e. conditioning
constraint) one has about the space of solutions of the problem.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 14:54:54 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Nov 2006 19:14:21 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607006
|
Leon Moonen
|
Mariano Ceccato, Marius Marin, Kim Mens, Leon Moonen, Paolo Tonella,
and Tom Tourwe
|
Applying and Combining Three Different Aspect Mining Techniques
|
28 pages
| null | null |
TUD-SERG-2006-002
|
cs.SE cs.PL
| null |
Understanding a software system at source-code level requires understanding
the different concerns that it addresses, which in turn requires a way to
identify these concerns in the source code. Whereas some concerns are
explicitly represented by program entities (like classes, methods and
variables) and thus are easy to identify, crosscutting concerns are not
captured by a single program entity but are scattered over many program
entities and are tangled with the other concerns. Because of their crosscutting
nature, such crosscutting concerns are difficult to identify, and reduce the
understandability of the system as a whole.
In this paper, we report on a combined experiment in which we try to identify
crosscutting concerns in the JHotDraw framework automatically. We first apply
three independently developed aspect mining techniques to JHotDraw and evaluate
and compare their results. Based on this analysis, we present three interesting
combinations of these three techniques, and show how these combinations provide
a more complete coverage of the detected concerns as compared to the original
techniques individually. Our results are a first step towards improving the
understandability of a system that contains crosscutting concerns, and can be
used as a basis for refactoring the identified crosscutting concerns into
aspects.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 17:16:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ceccato",
"Mariano",
""
],
[
"Marin",
"Marius",
""
],
[
"Mens",
"Kim",
""
],
[
"Moonen",
"Leon",
""
],
[
"Tonella",
"Paolo",
""
],
[
"Tourwe",
"Tom",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0607007
|
Boris D. Lubachevsky
|
Boris D. Lubachevsky
|
Theory of sexes by Geodakian as it is advanced by Iskrin
|
9 pages
| null | null | null |
cs.NE cs.GL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In 1960s V.Geodakian proposed a theory that explains sexes as a mechanism for
evolutionary adaptation of the species to changing environmental conditions. In
2001 V.Iskrin refined and augmented the concepts of Geodakian and gave a new
and interesting explanation to several phenomena which involve sex, and sex
ratio, including the war-years phenomena. He also introduced a new concept of
the "catastrophic sex ratio." This note is an attempt to digest technical
aspects of the new ideas by Iskrin.
|
[
{
"version": "v1",
"created": "Mon, 3 Jul 2006 04:03:23 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2006 22:15:57 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Jul 2006 01:59:00 GMT"
},
{
"version": "v4",
"created": "Sun, 4 Oct 2009 15:23:16 GMT"
}
] | 2009-10-04T00:00:00 |
[
[
"Lubachevsky",
"Boris D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0607008
|
Jean-Sebastien Sereni
|
F\'ed\'eric Havet (INRIA Sophia Antipolis), Jean-S\'ebastien Sereni
(INRIA Sophia Antipolis), Riste Skrekovski
|
3-facial colouring of plane graphs
| null | null | null | null |
cs.DM
| null |
A plane graph is l-facially k-colourable if its vertices can be coloured with
k colours such that any two distinct vertices on a facial segment of length at
most l are coloured differently. We prove that every plane graph is 3-facially
11-colourable. As a consequence, we derive that every 2-connected plane graph
with maximum face-size at most 7 is cyclically 11-colourable. These two bounds
are for one off from those that are proposed by the (3l+1)-Conjecture and the
Cyclic Conjecture.
|
[
{
"version": "v1",
"created": "Mon, 3 Jul 2006 06:38:48 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Havet",
"Fédéric",
"",
"INRIA Sophia Antipolis"
],
[
"Sereni",
"Jean-Sébastien",
"",
"INRIA Sophia Antipolis"
],
[
"Skrekovski",
"Riste",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607009
|
Yuri Pritykin
|
Yuri Pritykin
|
Almost Periodicity, Finite Automata Mappings and Related Effectiveness
Issues
|
12 pages. Continuation of the results from the paper "Strongly Almost
Periodic Sequences under Finite Automata Mappings" on cs.DM/0605026 Enhanced
version of the talk on Workshop on Words and Automata, St Petersburg, Russia,
June 7th, 2006 (satellite to CSR'06)
| null | null | null |
cs.DM
| null |
The paper studies different variants of almost periodicity notion. We
introduce the class of eventually strongly almost periodic sequences where some
suffix is strongly almost periodic (=uniformly recurrent). The class of almost
periodic sequences includes the class of eventually strongly almost periodic
sequences, and we prove this inclusion to be strict. We prove that the class of
eventually strongly almost periodic sequences is closed under finite automata
mappings and finite transducers. Moreover, an effective form of this result is
presented. Finally we consider some algorithmic questions concerning almost
periodicity.
|
[
{
"version": "v1",
"created": "Mon, 3 Jul 2006 08:27:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pritykin",
"Yuri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607010
|
Samuel Sattath
|
Samuel Sattath
|
ITs, a structure sensitive information theory
| null | null | null | null |
cs.IT math.IT
| null |
Broadly speaking Information theory (IT) assumes no structure of the
underlying states. But what about contexts where states do have a clear
structure - how should IT cope with such situations? And if such coping is at
all possible then - how should structure be expressed so that it can be coped
with? A possible answer to these questions is presented here. Noting that IT
can cope well with a structure expressed as an accurate clustering (by shifting
to the implied reduced alphabet), a generalization is suggested in which
structure is expressed as a measure on reduced alphabets. Given such structure
an extension of IT is presented where the reduced alphabets are treated
simultaneously. This structure-sensitive IT, called ITs, extends traditional IT
in the sense that: a)there are structure-sensitive analogs to the notions of
traditional IT and b)translating a theorem in IT by replacing its notions with
their structure-sensitive counterparts, yields a (provable) theorem of ITs.
Seemingly paradoxically, ITs extends IT but it's completely within the
framework of IT. The richness of the suggested structures is demonstrated by
two disparate families studied in more detail: the family of hierarchical
structures and the family of linear structures. The formal findings extend the
scope of cases to which a rigorous application of IT can be applied (with
implications on quantization, for example). The implications on the foundations
of IT are that the assumption regarding no underlying structure of states is
not mandatory and that there is a framework for expressing such underlying
structure.
|
[
{
"version": "v1",
"created": "Mon, 3 Jul 2006 10:23:31 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sattath",
"Samuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607011
|
Ayan Mahalanobis
|
Ayan Mahalanobis
|
A simple generalization of El-Gamal cryptosystem to non-abelian groups
| null | null | null | null |
cs.CR math.GR
| null |
In this paper we study the MOR cryptosystem. We use the group of
unitriangular matrices over a finite field as the non-abelian group in the MOR
cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem
over finite fields can be built using the proposed groups and a set of
automorphisms of these groups. We also show that the security of this proposed
MOR cryptosystem is equivalent to the El-Gamal cryptosystem over finite fields.
|
[
{
"version": "v1",
"created": "Tue, 4 Jul 2006 11:28:38 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Jul 2006 11:32:31 GMT"
},
{
"version": "v3",
"created": "Tue, 11 Jul 2006 12:56:43 GMT"
},
{
"version": "v4",
"created": "Thu, 20 Jul 2006 06:07:39 GMT"
},
{
"version": "v5",
"created": "Mon, 7 May 2007 14:56:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mahalanobis",
"Ayan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
cs/0607012
|
Anne-Marie Vercoustre
|
Anne-Marie Vercoustre (INRIA Rocquencourt / INRIA Sophia Antipolis),
Mounir Fegas (INRIA Rocquencourt / INRIA Sophia Antipolis), Saba Gul (INRIA
Rocquencourt / INRIA Sophia Antipolis), Yves Lechevallier (INRIA Rocquencourt
/ INRIA Sophia Antipolis)
|
A Flexible Structured-based Representation for XML Document Mining
|
This is the authors' version. To access the final version go to the
editor's site through the DOI
|
Dans The Fourth International Workshop of the Initiative for the
Evaluation of XML Retrieval (INEX 2005)
|
10.1007/11766278\_34
| null |
cs.IR
| null |
This paper reports on the INRIA group's approach to XML mining while
participating in the INEX XML Mining track 2005. We use a flexible
representation of XML documents that allows taking into account the structure
only or both the structure and content. Our approach consists of representing
XML documents by a set of their sub-paths, defined according to some criteria
(length, root beginning, leaf ending). By considering those sub-paths as words,
we can use standard methods for vocabulary reduction, and simple clustering
methods such as K-means that scale well. We actually use an implementation of
the clustering algorithm known as "dynamic clouds" that can work with distinct
groups of independent variables put in separate variables. This is useful in
our model since embedded sub-paths are not independent: we split potentially
dependant paths into separate variables, resulting in each of them containing
independant paths. Experiments with the INEX collections show good results for
the structure-only collections, but our approach could not scale well for large
structure-and-content collections.
|
[
{
"version": "v1",
"created": "Wed, 5 Jul 2006 12:07:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vercoustre",
"Anne-Marie",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Fegas",
"Mounir",
"",
"INRIA Rocquencourt / INRIA Sophia Antipolis"
],
[
"Gul",
"Saba",
"",
"INRIA\n Rocquencourt / INRIA Sophia Antipolis"
],
[
"Lechevallier",
"Yves",
"",
"INRIA Rocquencourt\n / INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0607013
|
Jan Chomicki
|
Jan Chomicki
|
Database Querying under Changing Preferences
|
Submitted to a journal
| null | null | null |
cs.DB cs.AI
| null |
We present here a formal foundation for an iterative and incremental approach
to constructing and evaluating preference queries. Our main focus is on query
modification: a query transformation approach which works by revising the
preference relation in the query. We provide a detailed analysis of the cases
where the order-theoretic properties of the preference relation are preserved
by the revision. We consider a number of different revision operators: union,
prioritized and Pareto composition. We also formulate algebraic laws that
enable incremental evaluation of preference queries. Finally, we consider two
variations of the basic framework: finite restrictions of preference relations
and weak-order extensions of strict partial order preference relations.
|
[
{
"version": "v1",
"created": "Wed, 5 Jul 2006 18:37:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chomicki",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607014
|
Aaron Wagner
|
Aaron B. Wagner, Pramod Viswanath, and Sanjeev R. Kulkarni
|
Strong Consistency of the Good-Turing Estimator
|
To appear at IEEE ISIT 2006
| null |
10.1109/ISIT.2006.262066
| null |
cs.IT math.IT
| null |
We consider the problem of estimating the total probability of all symbols
that appear with a given frequency in a string of i.i.d. random variables with
unknown distribution. We focus on the regime in which the block length is large
yet no symbol appears frequently in the string. This is accomplished by
allowing the distribution to change with the block length. Under a natural
convergence assumption on the sequence of underlying distributions, we show
that the total probabilities converge to a deterministic limit, which we
characterize. We then show that the Good-Turing total probability estimator is
strongly consistent.
|
[
{
"version": "v1",
"created": "Wed, 5 Jul 2006 19:09:05 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Wagner",
"Aaron B.",
""
],
[
"Viswanath",
"Pramod",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607015
|
Juan Valle-Lisboa C
|
Juan C. Valle-Lisboa (1), Eduardo Mizraji (1) ((1) Seccion Biofisica,
Facultad de Ciencias, Universidad de la Republica)
|
The uncovering of hidden structures by Latent Semantic Analysis
|
51 pages, 7 figures, pdf
| null | null | null |
cs.IR
| null |
Latent Semantic Analysis (LSA) is a well known method for information
retrieval. It has also been applied as a model of cognitive processing and
word-meaning acquisition. This dual importance of LSA derives from its capacity
to modulate the meaning of words by contexts, dealing successfully with
polysemy and synonymy. The underlying reasons that make the method work are not
clear enough. We propose that the method works because it detects an underlying
block structure (the blocks corresponding to topics) in the term by document
matrix. In real cases this block structure is hidden because of perturbations.
We propose that the correct explanation for LSA must be searched in the
structure of singular vectors rather than in the profile of singular values.
Using Perron-Frobenius theory we show that the presence of disjoint blocks of
documents is marked by sign-homogeneous entries in the vectors corresponding to
the documents of one block and zeros elsewhere. In the case of nearly disjoint
blocks, perturbation theory shows that if the perturbations are small the zeros
in the leading vectors are replaced by small numbers (pseudo-zeros). Since the
singular values of each block might be very different in magnitude, their order
does not mirror the order of blocks. When the norms of the blocks are similar,
LSA works fine, but we propose that when the topics have different sizes, the
usual procedure of selecting the first k singular triplets (k being the number
of blocks) should be replaced by a method that selects the perturbed Perron
vectors for each block.
|
[
{
"version": "v1",
"created": "Wed, 5 Jul 2006 22:56:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Valle-Lisboa",
"Juan C.",
""
],
[
"Mizraji",
"Eduardo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0607016
|
Krzysztof R. Apt
|
Krzysztof R. Apt and Peter Zoeteweij
|
An Analysis of Arithmetic Constraints on Integer Intervals
|
44 pages, to appear in 'Constraints' journal
| null | null | null |
cs.AI cs.PL
| null |
Arithmetic constraints on integer intervals are supported in many constraint
programming systems. We study here a number of approaches to implement
constraint propagation for these constraints. To describe them we introduce
integer interval arithmetic. Each approach is explained using appropriate proof
rules that reduce the variable domains. We compare these approaches using a set
of benchmarks. For the most promising approach we provide results that
characterize the effect of constraint propagation. This is a full version of
our earlier paper, cs.PL/0403016.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 10:09:43 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Mar 2007 13:51:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
],
[
"Zoeteweij",
"Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0607017
|
Fabrice Portier
|
Fabrice Portier (IETR), Jean-Yves Baudais (IETR), Jean-Fran\c{c}ois
H\'elard (IETR), the Projet europeen IST-MATRICE Collaboration
|
Performance of STBC MC-CDMA systems over outdoor realistic MIMO channels
| null |
Proceedings IEEE 60th Vehicular Technology Conference (VTC
2004-Fall) (2004) 2409-2413
| null | null |
cs.IT math.IT
| null |
The paper deals with orthogonal space-time block coded MC-CDMA systems in
outdoor realistic downlink scenarios with up to two transmit and receive
antennas. Assuming no channel state information at the transmitter, we compare
several linear single-user detection and spreading schemes, with or without
channel coding, achieving a spectral efficiency of 1-2 bits/s/Hz. The different
results obtained demonstrate that spatial diversity significantly improves the
performance of MC-CDMA systems, and allows different chip-mapping without
notably decreasing performance. Moreover, the global system exhibits a good
trade-off between complexity at mobile stations and performance. Then,
Alamouti's STBC MC-CDMA schemes derive full benefit from the frequency and
spatial diversities and can be considered as a very realistic and promising
candidate for the air interface downlink of the 4/sup th/ generation mobile
radio systems.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 15:52:36 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Portier",
"Fabrice",
"",
"IETR"
],
[
"Baudais",
"Jean-Yves",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
],
[
"Collaboration",
"the Projet europeen IST-MATRICE",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607018
|
Edward Hanna
|
Edward Hanna
|
Feynman Checkerboard as a Model of Discrete Space-Time
|
10 pages, 14 figures - changed section 6 title
| null | null | null |
cs.CE
| null |
In 1965, Feynman wrote of using a lattice containing one dimension of space
and one dimension of time to derive aspects of quantum mechanics. Instead of
summing the behavior of all possible paths as he did, this paper will consider
the motion of single particles within this discrete Space-Time lattice,
sometimes called Feynman's Checkerboard. This empirical approach yielded
several predicted emergent properties for a discrete Space-Time lattice, one of
which is novel and testable.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 16:35:38 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Aug 2006 19:10:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hanna",
"Edward",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0607019
|
Stephen Luttrell
|
Stephen Luttrell
|
Modelling the Probability Density of Markov Sources
|
26 pages
| null | null | null |
cs.NE
| null |
This paper introduces an objective function that seeks to minimise the
average total number of bits required to encode the joint state of all of the
layers of a Markov source. This type of encoder may be applied to the problem
of optimising the bottom-up (recognition model) and top-down (generative model)
connections in a multilayer neural network, and it unifies several previous
results on the optimisation of multilayer neural networks.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 18:49:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Luttrell",
"Stephen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0607020
|
Chun-Hao Hsu
|
Chun-Hao Hsu and Achilleas Anastasopoulos
|
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
|
10 pages, no figures. This paper is submitted to the 44rd Annual
Allerton Conference on Communication, Control and Computing, Monticello, IL,
USA, Sept. 27-29, 2006
| null | null | null |
cs.IT math.IT
| null |
The asymptotic iterative decoding performances of low-density parity-check
(LDPC) codes using min-sum (MS) and sum-product (SP) decoding algorithms on
memoryless binary-input output-symmetric (MBIOS) channels are analyzed in this
paper. For MS decoding, the analysis is done by upper bounding the bit error
probability of the root bit of a tree code by the sequence error probability of
a subcode of the tree code assuming the transmission of the all-zero codeword.
The result is a recursive upper bound on the bit error probability after each
iteration. For SP decoding, we derive a recursively determined lower bound on
the bit error probability after each iteration. This recursive lower bound
recovers the density evolution equation of LDPC codes on the binary erasure
channel (BEC) with inequalities satisfied with equalities. A significant
implication of this result is that the performance of LDPC codes under SP
decoding on the BEC is an upper bound of the performance on all MBIOS channels
with the same uncoded bit error probability. All results hold for the more
general multi-edge type LDPC codes.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 19:08:26 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jul 2006 18:33:57 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Jul 2006 19:02:24 GMT"
},
{
"version": "v4",
"created": "Tue, 18 Jul 2006 15:25:03 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hsu",
"Chun-Hao",
""
],
[
"Anastasopoulos",
"Achilleas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607021
|
Jun Chen
|
Jun Chen, Da-ke He, and Ashish Jagmohan
|
Slepian-Wolf Code Design via Source-Channel Correspondence
|
to appear at ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
We consider Slepian-Wolf code design based on LDPC (low-density parity-check)
coset codes for memoryless source-side information pairs. A density evolution
formula, equipped with a concentration theorem, is derived for Slepian- Wolf
coding based on LDPC coset codes. As a consequence, an intimate connection
between Slepian-Wolf coding and channel coding is established. Specifically we
show that, under density evolution, design of binary LDPC coset codes for
Slepian-Wolf coding of an arbitrary memoryless source-side information pair
reduces to design of binary LDPC codes for binary-input output-symmetric
channels without loss of optimality. With this connection, many classic results
in channel coding can be easily translated into the Slepian-Wolf setting.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 22:14:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Jun",
""
],
[
"He",
"Da-ke",
""
],
[
"Jagmohan",
"Ashish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607022
|
George Maney Mr.
|
G. A. Maney
|
Ten Incredibly Dangerous Software Ideas
|
14 page software industry interest book synopsis
| null | null | null |
cs.GL
| null |
This is a rough draft synopsis of a book presently in preparation. This book
provides a systematic critique of the software industry. This critique is
accomplished using classical methods in practical design science.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 01:17:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Maney",
"G. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
cs/0607023
|
Josep Diaz Prof
|
J. Diaz, D. Mitsche, X. Perez
|
Sharp threshold for hamiltonicity of random geometric graphs
|
10 pages, 2 figures
| null | null | null |
cs.DM
| null |
We show for an arbitrary $\ell_p$ norm that the property that a random
geometric graph $\mathcal G(n,r)$ contains a Hamiltonian cycle exhibits a sharp
threshold at $r=r(n)=\sqrt{\frac{\log n}{\alpha_p n}}$, where $\alpha_p$ is the
area of the unit disk in the $\ell_p$ norm. The proof is constructive and
yields a linear time algorithm for finding a Hamiltonian cycle of $\RG$ a.a.s.,
provided $r=r(n)\ge\sqrt{\frac{\log n}{(\alpha_p -\epsilon)n}}$ for some fixed
$\epsilon > 0$.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 18:16:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Diaz",
"J.",
""
],
[
"Mitsche",
"D.",
""
],
[
"Perez",
"X.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607024
|
Jos Weber
|
Jos H. Weber and Khaled A.S. Abdel-Ghaffar
|
Results on Parity-Check Matrices with Optimal Stopping and/or Dead-End
Set Enumerators
|
8 pages, submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
The performance of iterative decoding techniques for linear block codes
correcting erasures depends very much on the sizes of the stopping sets
associated with the underlying Tanner graph, or, equivalently, the parity-check
matrix representing the code. In this paper, we introduce the notion of
dead-end sets to explicitly demonstrate this dependency. The choice of the
parity-check matrix entails a trade-off between performance and complexity. We
give bounds on the complexity of iterative decoders achieving optimal
performance in terms of the sizes of the underlying parity-check matrices.
Further, we fully characterize codes for which the optimal stopping set
enumerator equals the weight enumerator.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 09:04:43 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Weber",
"Jos H.",
""
],
[
"Abdel-Ghaffar",
"Khaled A. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607025
|
Oskar Sandberg
|
Oskar Sandberg and Ian Clarke
|
The evolution of navigable small-world networks
| null | null | null | null |
cs.DS cs.DC
| null |
Small-world networks, which combine randomized and structured elements, are
seen as prevalent in nature. Several random graph models have been given for
small-world networks, with one of the most fruitful, introduced by Jon
Kleinberg, showing in which type of graphs it is possible to route, or
navigate, between vertices with very little knowledge of the graph itself.
Kleinberg's model is static, with random edges added to a fixed grid. In this
paper we introduce, analyze and test a randomized algorithm which successively
rewires a graph with every application. The resulting process gives a model for
the evolution of small-world networks with properties similar to those studied
by Kleinberg.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 13:21:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sandberg",
"Oskar",
""
],
[
"Clarke",
"Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607026
|
James Aspnes
|
James Aspnes and Yang Richard Yang and Yitong Yin
|
Path-independent load balancing with unreliable machines
|
Full version of paper submitted to SODA 2007
| null | null | null |
cs.DS cs.NI
| null |
We consider algorithms for load balancing on unreliable machines. The
objective is to optimize the two criteria of minimizing the makespan and
minimizing job reassignments in response to machine failures. We assume that
the set of jobs is known in advance but that the pattern of machine failures is
unpredictable. Motivated by the requirements of BGP routing, we consider
path-independent algorithms, with the property that the job assignment is
completely determined by the subset of available machines and not the previous
history of the assignments. We examine first the question of performance
measurement of path-independent load-balancing algorithms, giving the measure
of makespan and the normalized measure of reassignments cost. We then describe
two classes of algorithms for optimizing these measures against an oblivious
adversary for identical machines. The first, based on independent random
assignments, gives expected reassignment costs within a factor of 2 of optimal
and gives a makespan within a factor of O(log m/log log m) of optimal with high
probability, for unknown job sizes. The second, in which jobs are first grouped
into bins and at most one bin is assigned to each machine, gives
constant-factor ratios on both reassignment cost and makespan, for known job
sizes. Several open problems are discussed.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 14:01:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Aspnes",
"James",
""
],
[
"Yang",
"Yang Richard",
""
],
[
"Yin",
"Yitong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0607027
|
Hans-Andrea Loeliger
|
Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, and Frank Kschischang
|
A general computation rule for lossy summaries/messages with examples
from equalization
|
Proc. of the 44th Allerton Conference on Communication, Control, and
Computing, Monticello, Ill., USA, Sept. 2006
| null | null | null |
cs.IT math.IT
| null |
Elaborating on prior work by Minka, we formulate a general computation rule
for lossy messages. An important special case (with many applications in
communications) is the conversion of "soft-bit" messages to Gaussian messages.
By this method, the performance of a Kalman equalizer is improved, both for
uncoded and coded transmission.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 17:03:46 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Oct 2006 14:33:19 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hu",
"Junli",
""
],
[
"Loeliger",
"Hans-Andrea",
""
],
[
"Dauwels",
"Justin",
""
],
[
"Kschischang",
"Frank",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607028
|
Christian Lavault
|
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady
Ravelomanana (LIPN)
|
A Quasi-Optimal Leader Election Algorithm in Radio Networks with
Log-Logarithmic Awake Time Slots
| null | null | null | null |
cs.DC cs.NI
| null |
Radio networks (RN) are distributed systems (\textit{ad hoc networks})
consisting in $n \ge 2$ radio stations. Assuming the number $n$ unknown, two
distinct models of RN without collision detection (\textit{no-CD}) are
addressed: the model with \textit{weak no-CD} RN and the one with
\textit{strong no-CD} RN. We design and analyze two distributed leader election
protocols, each one running in each of the above two (no-CD RN) models,
respectively. Both randomized protocols are shown to elect a leader within
$\BO(\log{(n)})$ expected time, with no station being awake for more than
$\BO(\log{\log{(n)}})$ time slots (such algorithms are said to be
\textit{energy-efficient}). Therefore, a new class of efficient algorithms is
set up that matchthe $\Omega(\log{(n)})$ time lower-bound established by
Kushilevitz and Mansour.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 17:42:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0607029
|
Vaneet Aggarwal
|
Vaneet Aggarwal, R.K. Bansal
|
A Coding Theorem Characterizing Renyi's Entropy through
Variable-to-Fixed Length Codes
|
This paper has been withdrawn
| null | null | null |
cs.IT math.IT
| null |
This paper has been withdrawn
|
[
{
"version": "v1",
"created": "Sat, 8 Jul 2006 04:42:41 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Sep 2006 06:57:50 GMT"
},
{
"version": "v3",
"created": "Sat, 28 Oct 2006 06:28:57 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Aggarwal",
"Vaneet",
""
],
[
"Bansal",
"R. K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607030
|
Michael Vielhaber
|
Michael Vielhaber, Monica del Pilar Canales
|
Towards a General Theory of Simultaneous Diophantine Approximation of
Formal Power Series: Multidimensional Linear Complexity
|
28 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
We model the development of the linear complexity of multisequences by a
stochastic infinite state machine, the Battery-Discharge-Model, BDM. The states
s in S of the BDM have asymptotic probabilities or mass Pr(s)=1/(P(q,M)
q^K(s)), where K(s) in N_0 is the class of the state s, and P(q,M)=\sum_(K
in\N0) P_M(K)q^(-K)=\prod_(i=1..M) q^i/(q^i-1) is the generating function of
the number of partitions into at most M parts. We have (for each timestep
modulo M+1) just P_M(K) states of class K \.
We obtain a closed formula for the asymptotic probability for the linear
complexity deviation d(n) := L(n)-\lceil n\cdot M/(M+1)\rceil with
Pr(d)=O(q^(-|d|(M+1))), for M in N, for d in Z. The precise formula is given in
the text. It has been verified numerically for M=1..8, and is conjectured to
hold for all M in N.
From the asymptotic growth (proven for all M in N), we infer the Law of the
Logarithm for the linear complexity deviation, -liminf_{n\to\infty} d_a(n) /
log n = 1 /((M+1)log q) = limsup_{n\to\infty} d_a(n) / log n, which immediately
yields L_a(n)/n \to M/(M+1) with measure one, for all M in N, a result recently
shown already by Niederreiter and Wang. Keywords: Linear complexity, linear
complexity deviation, multisequence, Battery Discharge Model, isometry.
|
[
{
"version": "v1",
"created": "Mon, 10 Jul 2006 18:03:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Vielhaber",
"Michael",
""
],
[
"Canales",
"Monica del Pilar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607031
|
Christian Lavault
|
Christian Lavault (LIPN), Mario Valencia-Pabon (LIPN)
|
A distributed approximation algorithm for the minimum degree minimum
weight spanning trees
| null | null | null | null |
cs.DC cs.DM
| null |
Fischer has shown how to compute a minimum weight spanning tree of degree at
most $b \Delta^* + \lceil \log\_b n\rceil$ in time $O(n^{4 + 1/\ln b})$ for any
constant $b > 1$, where $\Delta^*$ is the value of an optimal solution and $n$
is the number of nodes in the network. In this paper, we propose a distributed
version of Fischer's algorithm that requires messages and time complexity
$O(n^{2 + 1/\ln b})$, and O(n) space per node.
|
[
{
"version": "v1",
"created": "Sat, 8 Jul 2006 08:42:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Valencia-Pabon",
"Mario",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607032
|
Christian Lavault
|
Christian Lavault (LIPN), Guy Louchard (ULB)
|
Asymptotic Analysis of a Leader Election Algorithm
| null | null | null | null |
cs.DC cs.NA
| null |
Itai and Rodeh showed that, on the average, the communication of a leader
election algorithm takes no more than $LN$ bits, where $L \simeq 2.441716$ and
$N$ denotes the size of the ring. We give a precise asymptotic analysis of the
average number of rounds M(n) required by the algorithm, proving for example
that $\dis M(\infty) := \lim\_{n\to \infty} M(n) = 2.441715879...$, where $n$
is the number of starting candidates in the election. Accurate asymptotic
expressions of the second moment $M^{(2)}(n)$ of the discrete random variable
at hand, its probability distribution, and the generalization to all moments
are given. Corresponding asymptotic expansions $(n\to \infty)$ are provided for
sufficiently large $j$, where $j$ counts the number of rounds. Our numerical
results show that all computations perfectly fit the observed values. Finally,
we investigate the generalization to probability $t/n$, where $t$ is a non
negative real parameter. The real function $\dis M(\infty,t) := \lim\_{n\to
\infty} M(n,t)$ is shown to admit \textit{one unique minimum} $M(\infty,t^{*})$
on the real segment $(0,2)$. Furthermore, the variations of $M(\infty,t)$ on
thewhole real line are also studied in detail.
|
[
{
"version": "v1",
"created": "Sat, 8 Jul 2006 08:46:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Louchard",
"Guy",
"",
"ULB"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0607033
|
Oleg Verbitsky
|
Oleg Verbitsky
|
Planar Graphs: Logical Complexity and Parallel Isomorphism Tests
|
36 pages
| null | null | null |
cs.CC cs.LO
| null |
We prove that every triconnected planar graph is definable by a first order
sentence that uses at most 15 variables and has quantifier depth at most
$11\log_2 n+43$. As a consequence, a canonic form of such graphs is computable
in $AC^1$ by the 14-dimensional Weisfeiler-Lehman algorithm. This provides
another way to show that the planar graph isomorphism is solvable in $AC^1$.
|
[
{
"version": "v1",
"created": "Sat, 8 Jul 2006 10:37:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Verbitsky",
"Oleg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0607034
|
Christian Lavault
|
Christian Lavault (LIPN), Jean-Fran\c{c}ois Marckert (LaBRI), Vlady
Ravelomanana (LIPN)
|
Quasi-Optimal Leader Election Algorithms in Radio Networks with
Loglogarithmic Awake Time Slots
| null |
10th IEEE International Conference on Telecommunications (2003)
1113-1119
| null | null |
cs.DC cs.NI
| null |
A radio network (RN) is a distributed system consisting of $n$ radio
stations. We design and analyze two distributed leader election protocols in RN
where the number $n$ of radio stations is unknown. The first algorithm runs
under the assumption of {\it limited collision detection}, while the second
assumes that {\it no collision detection} is available. By ``limited collision
detection'', we mean that if exactly one station sends (broadcasts) a message,
then all stations (including the transmitter) that are listening at this moment
receive the sent message. By contrast, the second no-collision-detection
algorithm assumes that a station cannot simultaneously send and listen signals.
Moreover, both protocols allow the stations to keep asleep as long as possible,
thus minimizing their awake time slots (such algorithms are called {\it
energy-efficient}). Both randomized protocols in RN areshown to elect a leader
in $O(\log{(n)})$ expected time, with no station being awake for more than
$O(\log{\log{(n)}})$ time slots. Therefore, a new class of efficient algorithms
is set up that match the $\Omega(\log{(n)})$ time lower-bound established by
Kushilevitz and Mansour.
|
[
{
"version": "v1",
"created": "Sat, 8 Jul 2006 12:04:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lavault",
"Christian",
"",
"LIPN"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
],
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0607035
|
Yi Deng
|
Yi Deng, Dongdai Lin
|
Resettable Zero Knowledge in the Bare Public-Key Model under Standard
Assumption
|
19 page
| null | null | null |
cs.CR
| null |
In this paper we resolve an open problem regarding resettable zero knowledge
in the bare public-key (BPK for short) model: Does there exist constant round
resettable zero knowledge argument with concurrent soundness for $\mathcal{NP}$
in BPK model without assuming \emph{sub-exponential hardness}? We give a
positive answer to this question by presenting such a protocol for any language
in $\mathcal{NP}$ in the bare public-key model assuming only
collision-resistant hash functions against \emph{polynomial-time} adversaries.
|
[
{
"version": "v1",
"created": "Mon, 10 Jul 2006 16:31:03 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Jul 2006 05:20:32 GMT"
},
{
"version": "v3",
"created": "Mon, 24 Jul 2006 14:09:43 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Deng",
"Yi",
""
],
[
"Lin",
"Dongdai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0607036
|
Stefano Mancini
|
Roland Hildebrand, Stefano Mancini, and Simone Severini
|
Combinatorial laplacians and positivity under partial transpose
|
19 pages, 7 eps figures, final version accepted for publication in
Math. Struct. in Comp. Sci
|
Math. Struct. in Comp. Sci. Vol.18, pp.205-219 (2008)
| null | null |
cs.CC quant-ph
| null |
Density matrices of graphs are combinatorial laplacians normalized to have
trace one (Braunstein \emph{et al.} \emph{Phys. Rev. A,} \textbf{73}:1, 012320
(2006)). If the vertices of a graph are arranged as an array, then its density
matrix carries a block structure with respect to which properties such as
separability can be considered. We prove that the so-called degree-criterion,
which was conjectured to be necessary and sufficient for separability of
density matrices of graphs, is equivalent to the PPT-criterion. As such it is
not sufficient for testing the separability of density matrices of graphs (we
provide an explicit example). Nonetheless, we prove the sufficiency when one of
the array dimensions has length two (for an alternative proof see Wu,
\emph{Phys. Lett. A}\textbf{351} (2006), no. 1-2, 18--22).
Finally we derive a rational upper bound on the concurrence of density
matrices of graphs and show that this bound is exact for graphs on four
vertices.
|
[
{
"version": "v1",
"created": "Mon, 10 Jul 2006 10:38:38 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Nov 2006 15:47:38 GMT"
},
{
"version": "v3",
"created": "Sat, 23 Jun 2007 07:11:25 GMT"
}
] | 2008-07-03T00:00:00 |
[
[
"Hildebrand",
"Roland",
""
],
[
"Mancini",
"Stefano",
""
],
[
"Severini",
"Simone",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0607037
|
Daowen Qiu
|
Zhujun Fan
|
The Minimal Cost Algorithm for Off-Line Diagnosability of Discrete Event
Systems
|
12 pages, 7 figures, critical comments and suggestions are welcomed
and appreciated
| null | null | null |
cs.AI cs.CC
| null |
The failure diagnosis for {\it discrete event systems} (DESs) has been given
considerable attention in recent years. Both on-line and off-line diagnostics
in the framework of DESs was first considered by Lin Feng in 1994, and
particularly an algorithm for diagnosability of DESs was presented. Motivated
by some existing problems to be overcome in previous work, in this paper, we
investigate the minimal cost algorithm for diagnosability of DESs.
More specifically: (i) we give a generic method for judging a system's
off-line diagnosability, and the complexity of this algorithm is
polynomial-time; (ii) and in particular, we present an algorithm of how to
search for the minimal set in all observable event sets, whereas the previous
algorithm may find {\it non-minimal} one.
|
[
{
"version": "v1",
"created": "Sun, 9 Jul 2006 04:55:03 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Apr 2007 16:27:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fan",
"Zhujun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0607038
|
Benoit Donnet
|
Benoit Donnet, Bruno Baynat, Timur Friedman
|
Retouched Bloom Filters: Allowing Networked Applications to Flexibly
Trade Off False Positives Against False Negatives
|
This is a new version of the technical reports with improved
algorithms and theorical analysis of algorithms
| null | null | null |
cs.NI
| null |
Where distributed agents must share voluminous set membership information,
Bloom filters provide a compact, though lossy, way for them to do so. Numerous
recent networking papers have examined the trade-offs between the bandwidth
consumed by the transmission of Bloom filters, and the error rate, which takes
the form of false positives, and which rises the more the filters are
compressed. In this paper, we introduce the retouched Bloom filter (RBF), an
extension that makes the Bloom filter more flexible by permitting the removal
of selected false positives at the expense of generating random false
negatives. We analytically show that RBFs created through a random process
maintain an overall error rate, expressed as a combination of the false
positive rate and the false negative rate, that is equal to the false positive
rate of the corresponding Bloom filters. We further provide some simple
heuristics and improved algorithms that decrease the false positive rate more
than than the corresponding increase in the false negative rate, when creating
RBFs. Finally, we demonstrate the advantages of an RBF over a Bloom filter in a
distributed network topology measurement application, where information about
large stop sets must be shared among route tracing monitors.
|
[
{
"version": "v1",
"created": "Sun, 9 Jul 2006 10:40:26 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Dec 2006 13:52:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Donnet",
"Benoit",
""
],
[
"Baynat",
"Bruno",
""
],
[
"Friedman",
"Timur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0607039
|
M. H. van Emden
|
M.H. van Emden
|
Set-Theoretic Preliminaries for Computer Scientists
|
36 pages, 5 figures
| null | null |
DCS-304-IR
|
cs.DM cs.DB
| null |
The basics of set theory are usually copied, directly or indirectly, by
computer scientists from introductions to mathematical texts. Often
mathematicians are content with special cases when the general case is of no
mathematical interest. But sometimes what is of no mathematical interest is of
great practical interest in computer science. For example, non-binary relations
in mathematics tend to have numerical indexes and tend to be unsorted. In the
theory and practice of relational databases both these simplifications are
unwarranted. In response to this situation we present here an alternative to
the ``set-theoretic preliminaries'' usually found in computer science texts.
This paper separates binary relations from the kind of relations that are
needed in relational databases. Its treatment of functions supports both
computer science in general and the kind of relations needed in databases. As a
sample application this paper shows how the mathematical theory of relations
naturally leads to the relational data model and how the operations on
relations are by themselves already a powerful vehicle for queries.
|
[
{
"version": "v1",
"created": "Sun, 9 Jul 2006 14:27:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"van Emden",
"M. H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0607040
|
Gopal Gupta
|
Enrico Pontelli (1), Karen Villaverde (1), Hai-Feng Guo (2), Gopal
Gupta (3) ((1) New Mexico State University, (2) University of Nebraska at
Omaha, (3) University of Texas at Dallas)
|
PALS: Efficient Or-Parallelism on Beowulf Clusters
|
63 pages, 32 figures, 5 tabels. Theory and Practice of Logic
Programming (to appear)
| null | null | null |
cs.DC cs.PL
| null |
This paper describes the development of the PALS system, an implementation of
Prolog capable of efficiently exploiting or-parallelism on distributed-memory
platforms--specifically Beowulf clusters. PALS makes use of a novel technique,
called incremental stack-splitting. The technique proposed builds on the
stack-splitting approach, previously described by the authors and
experimentally validated on shared-memory systems, which in turn is an
evolution of the stack-copying method used in a variety of parallel logic and
constraint systems--e.g., MUSE, YAP, and Penny. The PALS system is the first
distributed or-parallel implementation of Prolog based on the stack-splitting
method ever realized. The results presented confirm the superiority of this
method as a simple yet effective technique to transition from shared-memory to
distributed-memory systems. PALS extends stack-splitting by combining it with
incremental copying; the paper provides a description of the implementation of
PALS, including details of how distributed scheduling is handled. We also
investigate methodologies to effectively support order-sensitive predicates
(e.g., side-effects) in the context of the stack-splitting scheme. Experimental
results obtained from running PALS on both Shared Memory and Beowulf systems
are presented and analyzed.
|
[
{
"version": "v1",
"created": "Sun, 9 Jul 2006 19:56:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pontelli",
"Enrico",
""
],
[
"Villaverde",
"Karen",
""
],
[
"Guo",
"Hai-Feng",
""
],
[
"Gupta",
"Gopal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0607041
|
Jean-Christophe Dubacq
|
Christophe C\'erin (LIPN), Jean-Christophe Dubacq (LIPN), Jean-Louis
Roch (INRIA Rh\^one-Alpes / ID-IMAG), the SafeScale Collaboration
|
Methods for Partitioning Data to Improve Parallel Execution Time for
Sorting on Heterogeneous Clusters
| null |
Advances in Grid and Pervasive Computing (2006) 175-186
| null | null |
cs.DC cs.PF
| null |
The aim of the paper is to introduce general techniques in order to optimize
the parallel execution time of sorting on a distributed architectures with
processors of various speeds. Such an application requires a partitioning step.
For uniformly related processors (processors speeds are related by a constant
factor), we develop a constant time technique for mastering processor load and
execution time in an heterogeneous environment and also a technique to deal
with unknown cost functions. For non uniformly related processors, we use a
technique based on dynamic programming. Most of the time, the solutions are in
O(p) (p is the number of processors), independent of the problem size n.
Consequently, there is a small overhead regarding the problem we deal with but
it is inherently limited by the knowing of time complexity of the portion of
code following the partitioning.
|
[
{
"version": "v1",
"created": "Mon, 10 Jul 2006 19:46:47 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Cérin",
"Christophe",
"",
"LIPN"
],
[
"Dubacq",
"Jean-Christophe",
"",
"LIPN"
],
[
"Roch",
"Jean-Louis",
"",
"INRIA Rhône-Alpes / ID-IMAG"
],
[
"Collaboration",
"the SafeScale",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0607042
|
Rahul Jain
|
Rahul Jain
|
Towards a classical proof of exponential lower bound for 2-probe smooth
codes
|
7 pages, no figure
| null | null | null |
cs.CR cs.IT math.IT
| null |
Let C: {0,1}^n -> {0,1}^m be a code encoding an n-bit string into an m-bit
string. Such a code is called a (q, c, e) smooth code if there exists a
decoding algorithm which while decoding any bit of the input, makes at most q
probes on the code word and the probability that it looks at any location is at
most c/m. The error made by the decoding algorithm is at most e. Smooth codes
were introduced by Katz and Trevisan in connection with Locally decodable
codes.
For 2-probe smooth codes Kerenedis and de Wolf have shown exponential in n
lower bound on m in case c and e are constants. Their lower bound proof went
through quantum arguments and interestingly there is no completely classical
argument as yet for the same (albeit completely classical !) statement.
We do not match the bounds shown by Kerenedis and de Wolf but however show
the following. Let C: {0,1}^n -> {0,1}^m be a (2,c,e) smooth code and if e <=
c^2/8n^2, then m >= 2^(n/320c^2 - 1)$. We hope that the arguments and
techniques used in this paper extend (or are helpful in making similar other
arguments), to match the bounds shown using quantum arguments. More so,
hopefully they extend to show bounds for codes with greater number of probes
where quantum arguments unfortunately do not yield good bounds (even for
3-probe codes).
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 02:56:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jain",
"Rahul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607043
|
Koujin Takeda
|
Koujin Takeda, Shinsuke Uda, Yoshiyuki Kabashima
|
Analysis of CDMA systems that are characterized by eigenvalue spectrum
|
7 pages, 2 figures
|
Europhys. Lett. 76 (2006) 1193-1199
|
10.1209/epl/i2006-10380-5
| null |
cs.IT cond-mat.dis-nn math.IT
| null |
An approach by which to analyze the performance of the code division multiple
access (CDMA) scheme, which is a core technology used in modern wireless
communication systems, is provided. The approach characterizes the objective
system by the eigenvalue spectrum of a cross-correlation matrix composed of
signature sequences used in CDMA communication, which enables us to handle a
wider class of CDMA systems beyond the basic model reported by Tanaka. The
utility of the novel scheme is shown by analyzing a system in which the
generation of signature sequences is designed for enhancing the orthogonality.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 07:24:55 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2007 06:44:26 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Takeda",
"Koujin",
""
],
[
"Uda",
"Shinsuke",
""
],
[
"Kabashima",
"Yoshiyuki",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607044
|
Valdis Vitolins
|
Audris Kalnins, Valdis Vitolins
|
Use of UML and Model Transformations for Workflow Process Definitions
|
12 pages, 7 figures, communications of the conference "Baltic DB&IS
2006", July 3-6, Vilnius, Lithuania
|
Audris Kalnins, Valdis Vitolins, Databases and Information
Systems, BalticDB&IS'2006, edited by Olegas Vasilecas, Johann Eder, Albertas
Caplinskas, Vilnius, Technika, 2006, pp. 3.-15
| null | null |
cs.SE
| null |
Currently many different modeling languages are used for workflow definitions
in BPM systems. Authors of this paper analyze the two most popular graphical
languages, with highest possibility of wide practical usage - UML Activity
diagrams (AD) and Business Process Modeling Notation (BPMN). The necessary in
practice workflow aspects are briefly discussed, and on this basis a natural AD
profile is proposed, which covers all of them. A functionally equivalent BPMN
subset is also selected. The semantics of both languages in the context of
process execution (namely, mapping to BPEL) is also analyzed in the paper. By
analyzing AD and BPMN metamodels, authors conclude that an exact transformation
from AD to BPMN is not trivial even for the selected subset, though these
languages are considered to be similar. Authors show how this transformation
could be defined in the MOLA transformation language.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 09:23:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kalnins",
"Audris",
""
],
[
"Vitolins",
"Valdis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0607045
|
Xin Han
|
Xin Han, Deshi Ye, Yong Zhou
|
Improved online hypercube packing
|
13 pages, one figure, accepted in WAOA'06
| null | null | null |
cs.DS
| null |
In this paper, we study online multidimensional bin packing problem when all
items are hypercubes.
Based on the techniques in one dimensional bin packing algorithm Super
Harmonic by Seiden, we give a framework for online hypercube packing problem
and obtain new upper bounds of asymptotic competitive ratios.
For square packing, we get an upper bound of 2.1439, which is better than
2.24437.
For cube packing, we also give a new upper bound 2.6852 which is better than
2.9421 by Epstein and van Stee.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 09:43:45 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Sep 2006 03:26:46 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Han",
"Xin",
""
],
[
"Ye",
"Deshi",
""
],
[
"Zhou",
"Yong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0607046
|
Xin Han
|
Xin Han, Kazuo Iwama, Deshi Ye, Guochuan Zhang
|
Strip Packing vs. Bin Packing
|
12 pages, 3 figures
| null | null | null |
cs.DS
| null |
In this paper we establish a general algorithmic framework between bin
packing and strip packing, with which we achieve the same asymptotic bounds by
applying bin packing algorithms to strip packing. More precisely we obtain the
following results: (1) Any offline bin packing algorithm can be applied to
strip packing maintaining the same asymptotic worst-case ratio. Thus using FFD
(MFFD) as a subroutine, we get a practical (simple and fast) algorithm for
strip packing with an upper bound 11/9 (71/60). A simple AFPTAS for strip
packing immediately follows. (2) A class of Harmonic-based algorithms for bin
packing can be applied to online strip packing maintaining the same asymptotic
competitive ratio. It implies online strip packing admits an upper bound of
1.58889 on the asymptotic competitive ratio, which is very close to the lower
bound 1.5401 and significantly improves the previously best bound of 1.6910 and
affirmatively answers an open question posed by Csirik et. al.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 09:58:34 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Aug 2006 00:33:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Han",
"Xin",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Ye",
"Deshi",
""
],
[
"Zhang",
"Guochuan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0607047
|
Paul Goldberg
|
Nick Palmer and Paul W. Goldberg
|
PAC Classification based on PAC Estimates of Label Class Distributions
|
14 pages
| null | null | null |
cs.LG
| null |
A standard approach in pattern classification is to estimate the
distributions of the label classes, and then to apply the Bayes classifier to
the estimates of the distributions in order to classify unlabeled examples. As
one might expect, the better our estimates of the label class distributions,
the better the resulting classifier will be. In this paper we make this
observation precise by identifying risk bounds of a classifier in terms of the
quality of the estimates of the label class distributions. We show how PAC
learnability relates to estimates of the distributions that have a PAC
guarantee on their $L_1$ distance from the true distribution, and we bound the
increase in negative log likelihood risk in terms of PAC bounds on the
KL-divergence. We give an inefficient but general-purpose smoothing method for
converting an estimated distribution that is good under the $L_1$ metric into a
distribution that is good under the KL-divergence.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 13:52:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Palmer",
"Nick",
""
],
[
"Goldberg",
"Paul W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607048
|
Emmanuel Viennet
|
Emmanuel Viennet (LIPN), Fran\c{c}oise Fogelman Souli\'e (KXEN),
Benoit Rognier (KXEN)
|
Evaluation de Techniques de Traitement des Refus\'{e}s pour l'Octroi de
Cr\'{e}dit
| null |
38i\`{e}mes Journ\'{e}es de Statistiques (2006) 105
| null | null |
cs.NE math.ST stat.TH
| null |
We present the problem of "Reject Inference" for credit acceptance. Because
of the current legal framework (Basel II), credit institutions need to
industrialize their processes for credit acceptance, including Reject
Inference. We present here a methodology to compare various techniques of
Reject Inference and show that it is necessary, in the absence of real
theoretical results, to be able to produce and compare models adapted to
available data (selection of "best" model conditionnaly on data). We describe
some simulations run on a small data set to illustrate the approach and some
strategies for choosing the control group, which is the only valid approach to
Reject Inference.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 15:25:56 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Viennet",
"Emmanuel",
"",
"LIPN"
],
[
"Soulié",
"Françoise Fogelman",
"",
"KXEN"
],
[
"Rognier",
"Benoit",
"",
"KXEN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0607049
|
Pierre Parrend
|
Pierre Parrend (INRIA Rh\^one-Alpes), St\'ephane Fr\'enot (INRIA
Rh\^one-Alpes)
|
Secure Component Deployment in the OSGi(tm) Release 4 Platform
| null | null | null | null |
cs.CR cs.OS
| null |
Last years have seen a dramatic increase in the use of component platforms,
not only in classical application servers, but also more and more in the domain
of Embedded Systems. The OSGi(tm) platform is one of these platforms dedicated
to lightweight execution environments, and one of the most prominent. However,
new platforms also imply new security flaws, and a lack of both knowledge and
tools for protecting the exposed systems. This technical report aims at
fostering the understanding of security mechanisms in component deployment. It
focuses on securing the deployment of components. It presents the cryptographic
mechanisms necessary for signing OSGi(tm) bundles, as well as the detailed
process of bundle signature and validation. We also present the SFelix
platform, which is a secure extension to Felix OSGi(tm) framework
implementation. It includes our implementation of the bundle signature process,
as specified by OSGi(tm) Release 4 Security Layer. Moreover, a tool for signing
and publishing bundles, SFelix JarSigner, has been developed to conveniently
integrate bundle signature in the bundle deployment process.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 18:54:21 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Aug 2006 07:04:20 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Parrend",
"Pierre",
"",
"INRIA Rhône-Alpes"
],
[
"Frénot",
"Stéphane",
"",
"INRIA\n Rhône-Alpes"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
cs/0607050
|
Joelle Thollot
|
Pascal Barla (INRIA Rh\^one-Alpes / GRAVIR-IMAG), Simon Breslav
(EECS), Lee Markosian (EECS), Jo\"elle Thollot (INRIA Rh\^one-Alpes /
GRAVIR-IMAG)
|
Interactive Hatching and Stippling by Example
| null | null | null | null |
cs.GR
| null |
We describe a system that lets a designer interactively draw patterns of
strokes in the picture plane, then guide the synthesis of similar patterns over
new picture regions. Synthesis is based on an initial user-assisted analysis
phase in which the system recognizes distinct types of strokes (hatching and
stippling) and organizes them according to perceptual grouping criteria. The
synthesized strokes are produced by combining properties (eg. length,
orientation, parallelism, proximity) of the stroke groups extracted from the
input examples. We illustrate our technique with a drawing application that
allows the control of attributes and scale-dependent reproduction of the
synthesized patterns.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:01:41 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Mar 2008 15:53:37 GMT"
}
] | 2008-03-25T00:00:00 |
[
[
"Barla",
"Pascal",
"",
"INRIA Rhône-Alpes / GRAVIR-IMAG"
],
[
"Breslav",
"Simon",
"",
"EECS"
],
[
"Markosian",
"Lee",
"",
"EECS"
],
[
"Thollot",
"Joëlle",
"",
"INRIA Rhône-Alpes /\n GRAVIR-IMAG"
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0607051
|
Catherine Recanati
|
Catherine Recanati (LIPN)
|
Raisonner avec des diagrammes : perspectives cognitives et
computationnelles
|
paru initialement comme Rapport LIPN en 2004
|
Intellectica 40 (2005) 9-42
| null | null |
cs.CL
| null |
Diagrammatic, analogical or iconic representations are often contrasted with
linguistic or logical representations, in which the shape of the symbols is
arbitrary. The aim of this paper is to make a case for the usefulness of
diagrams in inferential knowledge representation systems. Although commonly
used, diagrams have for a long time suffered from the reputation of being only
a heuristic tool or a mere support for intuition. The first part of this paper
is an historical background paying tribute to the logicians, psychologists and
computer scientists who put an end to this formal prejudice against diagrams.
The second part is a discussion of their characteristics as opposed to those of
linguistic forms. The last part is aimed at reviving the interest for
heterogeneous representation systems including both linguistic and diagrammatic
representations.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:13:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Recanati",
"Catherine",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0607052
|
Thierry Poibeau
|
Thierry Poibeau (LIPN)
|
Dealing with Metonymic Readings of Named Entities
| null |
Dans Actes de The 28th Annual Conference of the Cognitive Science
Society (CogSci 2006) - The 28th Annual Conference of the Cognitive Science
Society (CogSci 2006), Vancouver : Canada (2006)
| null | null |
cs.AI cs.CL
| null |
The aim of this paper is to propose a method for tagging named entities (NE),
using natural language processing techniques. Beyond their literal meaning,
named entities are frequently subject to metonymy. We show the limits of
current NE type hierarchies and detail a new proposal aiming at dynamically
capturing the semantics of entities in context. This model can analyze complex
linguistic phenomena like metonymy, which are known to be difficult for natural
language processing but crucial for most applications. We present an
implementation and some test using the French ESTER corpus and give significant
results.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:14:49 GMT"
}
] | 2007-12-08T00:00:00 |
[
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0607053
|
Thierry Poibeau
|
Thierry Poibeau (LIPN)
|
Linguistically Grounded Models of Language Change
| null |
The 28th Annual Conference of the Cognitive Science Society
(CogSci 2006), Canada (2006)
| null | null |
cs.AI cs.CL
| null |
Questions related to the evolution of language have recently known an
impressive increase of interest (Briscoe, 2002). This short paper aims at
questioning the scientific status of these models and their relations to
attested data. We show that one cannot directly model non-linguistic factors
(exogenous factors) even if they play a crucial role in language evolution. We
then examine the relation between linguistic models and attested language data,
as well as their contribution to cognitive linguistics.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:17:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Poibeau",
"Thierry",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0607054
|
Elliott H. Lieb
|
Elliott H. Lieb, Daniel Osherson and Scott Weinstein
|
Elementary Proof of a Theorem of Jean Ville
|
12 pages latex
| null | null | null |
cs.CC
| null |
Considerable thought has been devoted to an adequate definition of the class
of infinite, random binary sequences (the sort of sequence that almost
certainly arises from flipping a fair coin indefinitely). The first
mathematical exploration of this problem was due to R. Von Mises, and based on
his concept of a "selection function." A decisive objection to Von Mises' idea
was formulated in a theorem offered by Jean Ville in 1939. It shows that some
sequences admitted by Von Mises as "random" in fact manifest a certain kind of
systematicity. Ville's proof is challenging, and an alternative approach has
appeared only in condensed form. We attempt to provide an expanded version of
the latter, alternative argument.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 19:52:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lieb",
"Elliott H.",
""
],
[
"Osherson",
"Daniel",
""
],
[
"Weinstein",
"Scott",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0607055
|
Akimichi Takemura
|
Hisayuki Hara and Akimichi Takemura
|
Boundary cliques, clique trees and perfect sequences of maximal cliques
of a chordal graph
| null | null | null | null |
cs.DM
| null |
We characterize clique trees of a chordal graph in their relation to
simplicial vertices and perfect sequences of maximal cliques. We investigate
boundary cliques defined by Shibata and clarify their relation to endpoints of
clique trees. Next we define a symmetric binary relation between the set of
clique trees and the set of perfect sequences of maximal cliques. We describe
the relation as a bipartite graph and prove that the bipartite graph is always
connected. Lastly we consider to characterize chordal graphs from the aspect of
non-uniqueness of clique trees.
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 23:14:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hara",
"Hisayuki",
""
],
[
"Takemura",
"Akimichi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607056
|
Sylviane Schwer
|
Sylviane Schwer (LIPN)
|
Reasoning with Intervals on Granules
| null |
Journal of Universal Computer Science 8 (8) (2002) 793-808
| null | null |
cs.AI cs.DM
| null |
The formalizations of periods of time inside a linear model of Time are
usually based on the notion of intervals, that may contain or may not their
endpoints. This is not enought when the periods are written in terms of coarse
granularities with respect to the event taken into account. For instance, how
to express the inter-war period in terms of a {\em years} interval? This paper
presents a new type of intervals, neither open, nor closed or open-closed and
the extension of operations on intervals of this new type, in order to reduce
the gap between the discourse related to temporal relationship and its
translation into a discretized model of Time.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:16:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schwer",
"Sylviane",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607057
|
Vlady Ravelomanana
|
Vlady Ravelomanana (LIPN), the Projet PAI Amadeus Collaboration
|
The Average Size of Giant Components Between the Double-Jump
|
A para\^{i}tre dans Algorithmica
|
Algorithmica Issue sp\'{e}ciale "Analysis of Algorithms" (2006) A
para\^{i}tre
| null | null |
cs.DM math.CO math.PR
| null |
We study the sizes of connected components according to their excesses during
a random graph process built with $n$ vertices. The considered model is the
continuous one defined in Janson 2000. An ${\ell}$-component is a connected
component with ${\ell}$ edges more than vertices. $\ell$ is also called the
\textit{excess} of such component. As our main result, we show that when $\ell$
and ${n \over \ell}$ are both large, the expected number of vertices that ever
belong to an $\ell$-component is about ${12}^{1/3} {\ell}^{1/3} n^{2/3}$. We
also obtain limit theorems for the number of creations of $\ell$-components.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:23:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Collaboration",
"the Projet PAI Amadeus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0607058
|
Tom Ridge
|
Tom Ridge
|
Craig's Interpolation Theorem formalised and mechanised in Isabelle/HOL
| null | null | null | null |
cs.LO
| null |
We formalise and mechanise a construtive, proof theoretic proof of Craig's
Interpolation Theorem in Isabelle/HOL. We give all the definitions and lemma
statements both formally and informally. We also transcribe informally the
formal proofs. We detail the main features of our mechanisation, such as the
formalisation of binding for first order formulae. We also give some
applications of Craig's Interpolation Theorem.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 17:26:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ridge",
"Tom",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0607059
|
Vlady Ravelomanana
|
Vlady Ravelomanana (LIPN), Alphonse Laza Rijamame (D.M.I)
|
Creation and Growth of Components in a Random Hypergraph Process
|
R\'{e}sum\'{e} \'{e}tendu
|
Proceedings of The Twelfth Annual International Computing and
Combinatorics Conference (COCOON'06) -- Lecture Notes in Computer Science
(2006) \`{a} para\^{i}tre
| null | null |
cs.DM math.CO math.PR
| null |
Denote by an $\ell$-component a connected $b$-uniform hypergraph with $k$
edges and $k(b-1) - \ell$ vertices. We prove that the expected number of
creations of $\ell$-component during a random hypergraph process tends to 1 as
$\ell$ and $b$ tend to $\infty$ with the total number of vertices $n$ such that
$\ell = o(\sqrt[3]{\frac{n}{b}})$. Under the same conditions, we also show that
the expected number of vertices that ever belong to an $\ell$-component is
approximately $12^{1/3} (b-1)^{1/3} \ell^{1/3} n^{2/3}$. As an immediate
consequence, it follows that with high probability the largest $\ell$-component
during the process is of size $O((b-1)^{1/3} \ell^{1/3} n^{2/3})$. Our results
give insight about the size of giant components inside the phase transition of
random hypergraphs.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 09:45:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ravelomanana",
"Vlady",
"",
"LIPN"
],
[
"Rijamame",
"Alphonse Laza",
"",
"D.M.I"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0607060
|
Gary Hardy
|
Yoann Dieudonne (LaRIA), Ouiddad Labbani-Igbida (CREA), Franck Petit
(LaRIA)
|
Circle Formation of Weak Mobile Robots
| null | null | null | null |
cs.RO
| null |
In this paper we prove the conjecture of D\'{e}fago & Konagaya. Furthermore,
we describe a deterministic protocol for forming a regular n-gon in finite
time.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 12:57:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dieudonne",
"Yoann",
"",
"LaRIA"
],
[
"Labbani-Igbida",
"Ouiddad",
"",
"CREA"
],
[
"Petit",
"Franck",
"",
"LaRIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
cs/0607061
|
Igor Mackarov Dr.
|
Igor Mackarov (Maharishi University of Management)
|
On Some Peculiarities of Dynamic Switch between Component
Implementations in an Autonomic Computing System
|
16 pages, 3 figures
| null | null | null |
cs.DS cs.DC cs.NA
| null |
Behavior of the delta algorithm of autonomic switch between two component
implementations is considered on several examples of a client-server systems
involving, in particular, periodic change of intensities of requests for the
component. It is shown that in the cases of some specific combinations of
elementary requests costs, the number of clients in the system, the number of
requests per unit of time, and the cost of switch between the implementations,
the algorithm may reveal behavior that is rather far from the desired. A
sufficient criterion of a success of the algorithm is proposed based on the
analysis of the accumulated implementations costs difference as a function of
time. Suggestions are pointed out of practical evaluation of the algorithm
functioning regarding the observations made in this paper.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 11:09:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mackarov",
"Igor",
"",
"Maharishi University of Management"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0607062
|
Lillian Lee
|
Matt Thomas, Bo Pang and Lillian Lee
|
Get out the vote: Determining support or opposition from Congressional
floor-debate transcripts
|
Proceedings of EMNLP 2006. This revision (created Dec 2006) contains
clearly-marked updates from the proceedings version. Data available at
http://www.cs.cornell.edu/home/llee/data/convote.html
| null | null | null |
cs.CL cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate whether one can determine from the transcripts of U.S.
Congressional floor debates whether the speeches represent support of or
opposition to proposed legislation. To address this problem, we exploit the
fact that these speeches occur as part of a discussion; this allows us to use
sources of information regarding relationships between discourse segments, such
as whether a given utterance indicates agreement with the opinion expressed by
another. We find that the incorporation of such information yields substantial
improvements over classifying speeches in isolation.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 20:03:52 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Jul 2006 20:14:56 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Jun 2012 18:41:56 GMT"
}
] | 2012-06-08T00:00:00 |
[
[
"Thomas",
"Matt",
""
],
[
"Pang",
"Bo",
""
],
[
"Lee",
"Lillian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0607063
|
Leon Moonen
|
Cathal Boogerd and Leon Moonen
|
Prioritizing Software Inspection Results using Static Profiling
|
14 pages
| null | null |
TUD-SERG-2006-001
|
cs.SE
| null |
Static software checking tools are useful as an additional automated software
inspection step that can easily be integrated in the development cycle and
assist in creating secure, reliable and high quality code. However, an often
quoted disadvantage of these tools is that they generate an overly large number
of warnings, including many false positives due to the approximate analysis
techniques. This information overload effectively limits their usefulness.
In this paper we present ELAN, a technique that helps the user prioritize the
information generated by a software inspection tool, based on a demand-driven
computation of the likelihood that execution reaches the locations for which
warnings are reported. This analysis is orthogonal to other prioritization
techniques known from literature, such as severity levels and statistical
analysis to reduce false positives. We evaluate feasibility of our technique
using a number of case studies and assess the quality of our predictions by
comparing them to actual values obtained by dynamic profiling.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2006 20:35:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Boogerd",
"Cathal",
""
],
[
"Moonen",
"Leon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0607064
|
Andrea Montanari
|
Abdelaziz Amraoui, Andrea Montanari, Ruediger Urbanke
|
How to Find Good Finite-Length Codes: From Art Towards Science
|
13 pages, 13 eps figures, enhanced version of an invited paperat the
4th International Symposium on Turbo Codes and Related Topics, Munich,
Germany, 2006
| null | null | null |
cs.IT math.IT
| null |
We explain how to optimize finite-length LDPC codes for transmission over the
binary erasure channel. Our approach relies on an analytic approximation of the
erasure probability. This is in turn based on a finite-length scaling result to
model large scale erasures and a union bound involving minimal stopping sets to
take into account small error events. We show that the performances of
optimized ensembles as observed in simulations are well described by our
approximation. Although we only address the case of transmission over the
binary erasure channel, our method should be applicable to a more general
setting.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2006 09:54:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Amraoui",
"Abdelaziz",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Urbanke",
"Ruediger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.