id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0607065
|
Khalil Djelloul
|
Khalil Djelloul
|
Decomposable Theories
| null | null | null | null |
cs.LO cs.AI
| null |
We present in this paper a general algorithm for solving first-order formulas
in particular theories called "decomposable theories". First of all, using
special quantifiers, we give a formal characterization of decomposable theories
and show some of their properties. Then, we present a general algorithm for
solving first-order formulas in any decomposable theory "T". The algorithm is
given in the form of five rewriting rules. It transforms a first-order formula
"P", which can possibly contain free variables, into a conjunction "Q" of
solved formulas easily transformable into a Boolean combination of
existentially quantified conjunctions of atomic formulas. In particular, if "P"
has no free variables then "Q" is either the formula "true" or "false". The
correctness of our algorithm proves the completeness of the decomposable
theories.
Finally, we show that the theory "Tr" of finite or infinite trees is a
decomposable theory and give some benchmarks realized by an implementation of
our algorithm, solving formulas on two-partner games in "Tr" with more than 160
nested alternated quantifiers.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2006 14:46:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Djelloul",
"Khalil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607066
|
Dimitrios Katsaros
|
Antonis Sidiropoulos, Dimitrios Katsaros, Yannis Manolopoulos
|
Generalized h-index for Disclosing Latent Facts in Citation Networks
|
19 pages, 17 tables, 27 figures
| null | null | null |
cs.DL
| null |
What is the value of a scientist and its impact upon the scientific thinking?
How can we measure the prestige of a journal or of a conference? The evaluation
of the scientific work of a scientist and the estimation of the quality of a
journal or conference has long attracted significant interest, due to the
benefits from obtaining an unbiased and fair criterion. Although it appears to
be simple, defining a quality metric is not an easy task. To overcome the
disadvantages of the present metrics used for ranking scientists and journals,
J.E. Hirsch proposed a pioneering metric, the now famous h-index. In this
article, we demonstrate several inefficiencies of this index and develop a pair
of generalizations and effective variants of it to deal with scientist ranking
and with publication forum ranking. The new citation indices are able to
disclose trendsetters in scientific research, as well as researchers that
constantly shape their field with their influential work, no matter how old
they are. We exhibit the effectiveness and the benefits of the new indices to
unfold the full potential of the h-index, with extensive experimental results
obtained from DBLP, a widely known on-line digital library.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2006 15:47:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sidiropoulos",
"Antonis",
""
],
[
"Katsaros",
"Dimitrios",
""
],
[
"Manolopoulos",
"Yannis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0607067
|
Vladimir Vovk
|
Vladimir Vovk
|
Competing with stationary prediction strategies
|
20 pages
| null | null | null |
cs.LG
| null |
In this paper we introduce the class of stationary prediction strategies and
construct a prediction algorithm that asymptotically performs as well as the
best continuous stationary strategy. We make mild compactness assumptions but
no stochastic assumptions about the environment. In particular, no assumption
of stationarity is made about the environment, and the stationarity of the
considered strategies only means that they do not depend explicitly on time; we
argue that it is natural to consider only stationary strategies even for highly
non-stationary environments.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2006 15:52:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vovk",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607068
|
Felice Manganiello
|
Felice Manganiello
|
Computation of the Weight Distribution of CRC Codes
|
16 pages, 1 figure, submitted for publication
| null | null | null |
cs.IT math.AC math.IT
| null |
In this article, we illustrate an algorithm for the computation of the weight
distribution of CRC codes. The recursive structure of CRC codes will give us an
iterative way to compute the weight distribution of their dual codes starting
from just some ``representative'' words. Thanks to MacWilliams Theorem, the
computation of the weight distribution of dual codes can be easily brought back
to that of CRC codes. This algorithm is a good alternative to the standard
algorithm that involves listing every word of the code.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2006 17:24:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Manganiello",
"Felice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607069
|
Nithin Nagaraj
|
Mahesh C Shastry, Nithin Nagaraj, Prabhakar G Vaidya
|
The B-Exponential Map: A Generalization of the Logistic Map, and Its
Applications In Generating Pseudo-random Numbers
|
25 pages, 15 figures
| null | null | null |
cs.CR nlin.CD
| null |
A 1-dimensional generalization of the well known Logistic Map is proposed.
The proposed family of maps is referred to as the B-Exponential Map. The
dynamics of this map are analyzed and found to have interesting properties. In
particular, the B-Exponential Map exhibits robust chaos for all real values of
the parameter B >= e^(-4). We then propose a pseudo-random number generator
based on the B-Exponential Map by chaotically hopping between different
trajectories for different values of B. We call this BEACH (B-Exponential
All-Chaotic Map Hopping) pseudo-random number generator. BEACH successfully
passes stringent statistical randomness tests such as ENT, NIST and Diehard. An
implementation of BEACH is also outlined.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 08:42:36 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jul 2006 14:37:02 GMT"
}
] | 2011-01-25T00:00:00 |
[
[
"Shastry",
"Mahesh C",
""
],
[
"Nagaraj",
"Nithin",
""
],
[
"Vaidya",
"Prabhakar G",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
}
] |
cs/0607070
|
Victor Kryssanov
|
V. V. Kryssanov, F. J. Rinaldo, H. Ogawa, E. Kuleshov
|
Citation as a Representation Process
|
5 pages, 2 figures. Preprint completed in July 2006
| null | null | null |
cs.DL cs.CY physics.data-an
| null |
The presented work proposes a novel approach to model the citation rate. The
paper begins with a brief introduction into informetrics studies and highlights
drawbacks of the contemporary approaches to modeling the citation process as a
product of social interactions. An alternative modeling framework based on
results obtained in cognitive psychology is then introduced and applied in an
experiment to investigate properties of the citation process, as they are
revealed by a large collection of citation statistics. Major research findings
are discussed, and a summary is given.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 10:38:11 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Jul 2006 01:36:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kryssanov",
"V. V.",
""
],
[
"Rinaldo",
"F. J.",
""
],
[
"Ogawa",
"H.",
""
],
[
"Kuleshov",
"E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
cs/0607071
|
Peter J. Stuckey
|
H. Fang, Y. Kilani, J.H.M. Lee, and P.J. Stuckey
|
Islands for SAT
|
7 pages
| null | null | null |
cs.AI
| null |
In this note we introduce the notion of islands for restricting local search.
We show how we can construct islands for CNF SAT problems, and how much search
space can be eliminated by restricting search to the island.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 12:44:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fang",
"H.",
""
],
[
"Kilani",
"Y.",
""
],
[
"Lee",
"J. H. M.",
""
],
[
"Stuckey",
"P. J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607072
|
Scott Turner
|
Scott A. Turner, Manuel A. Perez-Quinones, Stephen H. Edwards
|
Effect of Interface Style in Peer Review Comments for UML Designs
|
8 pages, 7 figures
| null | null | null |
cs.HC
| null |
This paper presents our evaluation of using a Tablet-PC to provide
peer-review comments in the first year Computer Science course. Our exploration
consisted of an evaluation of how students write comments on other students'
assignments using three different methods: pen and paper, a Tablet-PC, and a
desktop computer. Our ultimate goal is to explore the effect that interface
style (Tablet vs. Desktop) has on the quality and quantity of the comments
provided.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 16:00:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Turner",
"Scott A.",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
],
[
"Edwards",
"Stephen H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0607073
|
Andrea Montanari
|
Andrea Montanari, Devavrat Shah
|
Counting good truth assignments of random k-SAT formulae
|
13 pages, 1 eps figure
| null | null | null |
cs.DM cond-mat.dis-nn
| null |
We present a deterministic approximation algorithm to compute logarithm of
the number of `good' truth assignments for a random k-satisfiability (k-SAT)
formula in polynomial time (by `good' we mean that violate a small fraction of
clauses). The relative error is bounded above by an arbitrarily small constant
epsilon with high probability as long as the clause density (ratio of clauses
to variables) alpha<alpha_{u}(k) = 2k^{-1}\log k(1+o(1)). The algorithm is
based on computation of marginal distribution via belief propagation and use of
an interpolation procedure. This scheme substitutes the traditional one based
on approximation of marginal probabilities via MCMC, in conjunction with
self-reduction, which is not easy to extend to the present problem.
We derive 2k^{-1}\log k (1+o(1)) as threshold for uniqueness of the Gibbs
distribution on satisfying assignment of random infinite tree k-SAT formulae to
establish our results, which is of interest in its own right.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 16:05:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Montanari",
"Andrea",
""
],
[
"Shah",
"Devavrat",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
}
] |
cs/0607074
|
Xiaohong Peng
|
Xiao-Hong Peng and Paddy Farrell
|
On Construction of the (24,12,8) Golay Codes
|
To appear in IEEE Trans. on Information Theory Vol. 24 No. 8
| null | null | null |
cs.IT math.IT
| null |
Two product array codes are used to construct the (24, 12, 8) binary Golay
code through the direct sum operation. This construction provides a systematic
way to find proper (8, 4, 4) linear block component codes for generating the
Golay code, and it generates and extends previously existing methods that use a
similar construction framework. The code constructed is simple to decode.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 18:39:36 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Peng",
"Xiao-Hong",
""
],
[
"Farrell",
"Paddy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607075
|
Chandra Nair
|
Chandra Nair, Balaji Prabhakar, Devavrat Shah
|
On entropy for mixtures of discrete and continuous variables
|
10 pages, two-column
| null | null | null |
cs.IT math.IT
| null |
Let $X$ be a discrete random variable with support $S$ and $f : S \to
S^\prime$ be a bijection. Then it is well-known that the entropy of $X$ is the
same as the entropy of $f(X)$. This entropy preservation property has been
well-utilized to establish non-trivial properties of discrete stochastic
processes, e.g. queuing process \cite{prg03}. Entropy as well as entropy
preservation is well-defined only in the context of purely discrete or
continuous random variables. However for a mixture of discrete and continuous
random variables, which arise in many interesting situations, the notions of
entropy and entropy preservation have not been well understood.
In this paper, we extend the notion of entropy in a natural manner for a
mixed-pair random variable, a pair of random variables with one discrete and
the other continuous. Our extensions are consistent with the existing
definitions of entropy in the sense that there exist natural injections from
discrete or continuous random variables into mixed-pair random variables such
that their entropy remains the same. This extension of entropy allows us to
obtain sufficient conditions for entropy preservation in mixtures of discrete
and continuous random variables under bijections.
The extended definition of entropy leads to an entropy rate for continuous
time Markov chains. As an application, we recover a known probabilistic result
related to Poisson process. We strongly believe that the frame-work developed
in this paper can be useful in establishing probabilistic properties of complex
processes, such as load balancing systems, queuing network, caching algorithms.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 23:02:41 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jan 2007 17:58:00 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Nair",
"Chandra",
""
],
[
"Prabhakar",
"Balaji",
""
],
[
"Shah",
"Devavrat",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607076
|
Oliver Kosut
|
Oliver Kosut and Lang Tong
|
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
|
8 pages, 2 figures
| null | null | null |
cs.IT math.IT
| null |
The problem of cooperative fusion in the presence of Byzantine sensors is
considered. An information theoretic formulation is used to characterize the
Shannon capacity of sensor fusion. It is shown that when less than half of the
sensors are Byzantine, the effect of Byzantine attack can be entirely
mitigated, and the fusion capacity is identical to that when all sensors are
honest. But when at least half of the sensors are Byzantine, they can
completely defeat the sensor fusion so that no information can be transmitted
reliably. A capacity achieving transmit-then-verify strategy is proposed for
the case that less than half of the sensors are Byzantine, and its error
probability and coding rate is analyzed by using a Markov decision process
modeling of the transmission protocol.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 23:22:38 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kosut",
"Oliver",
""
],
[
"Tong",
"Lang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607077
|
Emin Gabrielyan
|
Emin Gabrielyan
|
Fault-Tolerant Real-Time Streaming with FEC thanks to Capillary
Multi-Path Routing
| null |
Emin Gabrielyan, Fault-Tolerant Real-Time Streaming with FEC
thanks to Capillary Multi-Path Routing, International Conference on
Communications, Circuits and Systems - ICCCAS'06 - Gui Lin, China, 25-28 June
2006, Vol. 3, pp. 1497-1501
| null | null |
cs.NI cs.MM
| null |
Erasure resilient FEC codes in off-line packetized streaming rely on time
diversity. This requires unrestricted buffering time at the receiver. In
real-time streaming the playback buffering time must be very short. Path
diversity is an orthogonal strategy. However, the large number of long paths
increases the number of underlying links and consecutively the overall link
failure rate. This may increase the overall requirement in redundant FEC
packets for combating the link failures. We introduce the Redundancy Overall
Requirement (ROR) metric, a routing coefficient specifying the total number of
FEC packets required for compensation of all underlying link failures. We
present a capillary routing algorithm for constructing layer by layer steadily
diversifying multi-path routing patterns. By measuring the ROR coefficients of
a dozen of routing layers on hundreds of network samples, we show that the
number of required FEC packets decreases substantially when the path diversity
is increased by the capillary routing construction algorithm.
|
[
{
"version": "v1",
"created": "Mon, 17 Jul 2006 08:10:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gabrielyan",
"Emin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0607078
|
Ying Hung Gan
|
Ying Hung Gan, Cong Ling and Wai Ho Mow
|
Complex Lattice Reduction Algorithm for Low-Complexity MIMO Detection
|
Submitted to IEEE Transactions on Wireless Communication in March
2006. Part of this work was presented at the 2005 Global Telecommunications
Conference, United States, November 2005
| null | null | null |
cs.DS cs.IT math.IT
| null |
Recently, lattice-reduction-aided detectors have been proposed for
multiple-input multiple-output (MIMO) systems to give performance with full
diversity like maximum likelihood receiver, and yet with complexity similar to
linear receivers. However, these lattice-reduction-aided detectors are based on
the traditional LLL reduction algorithm that was originally introduced for
reducing real lattice bases, in spite of the fact that the channel matrices are
inherently complex-valued. In this paper, we introduce the complex LLL
algorithm for direct application to reduce the basis of a complex lattice which
is naturally defined by a complex-valued channel matrix. We prove that complex
LLL reduction-aided detection can also achieve full diversity. Our analysis
reveals that the new complex LLL algorithm can achieve a reduction in
complexity of nearly 50% over the traditional LLL algorithm, and this is
confirmed by simulation. It is noteworthy that the complex LLL algorithm
aforementioned has nearly the same bit-error-rate performance as the
traditional LLL algorithm.
|
[
{
"version": "v1",
"created": "Mon, 17 Jul 2006 09:01:33 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gan",
"Ying Hung",
""
],
[
"Ling",
"Cong",
""
],
[
"Mow",
"Wai Ho",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607079
|
Boaz Tsaban
|
Dima Ruinskiy, Adi Shamir, and Boaz Tsaban
|
Length-based cryptanalysis: The case of Thompson's Group
|
Final version, to appear in JMC
|
Journal of Mathematical Cryptology 1 (2007), 359--372
|
10.1515/jmc.2007.018
| null |
cs.CR cs.CC math.GR
| null |
The length-based approach is a heuristic for solving randomly generated
equations in groups which possess a reasonably behaved length function. We
describe several improvements of the previously suggested length-based
algorithms, that make them applicable to Thompson's group with significant
success rates. In particular, this shows that the Shpilrain-Ushakov public key
cryptosystem based on Thompson's group is insecure, and suggests that no
practical public key cryptosystem based on this group can be secure.
|
[
{
"version": "v1",
"created": "Mon, 17 Jul 2006 14:26:53 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2006 13:03:49 GMT"
},
{
"version": "v3",
"created": "Sun, 20 May 2007 14:00:43 GMT"
},
{
"version": "v4",
"created": "Thu, 31 May 2007 14:32:06 GMT"
}
] | 2010-08-02T00:00:00 |
[
[
"Ruinskiy",
"Dima",
""
],
[
"Shamir",
"Adi",
""
],
[
"Tsaban",
"Boaz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
cs/0607080
|
Shai Carmi
|
Shai Carmi, Shlomo Havlin, Scott Kirkpatrick, Yuval Shavitt and Eran
Shir
|
New Model of Internet Topology Using k-shell Decomposition
|
4 pages, 4 figures
|
PNAS 104, 11150-11154 (2007).
|
10.1073/pnas.0701175104
| null |
cs.NI cond-mat.dis-nn
| null |
We introduce and use k-shell decomposition to investigate the topology of the
Internet at the AS level. Our analysis separates the Internet into three
sub-components: (a) a nucleus which is a small (~100 nodes) very well connected
globally distributed subgraph; (b) a fractal sub-component that is able to
connect the bulk of the Internet without congesting the nucleus, with self
similar properties and critical exponents; and (c) dendrite-like structures,
usually isolated nodes that are connected to the rest of the network through
the nucleus only. This unique decomposition is robust, and provides insight
into the underlying structure of the Internet and its functional consequences.
Our approach is general and useful also when studying other complex networks.
|
[
{
"version": "v1",
"created": "Mon, 17 Jul 2006 15:31:17 GMT"
}
] | 2007-06-23T00:00:00 |
[
[
"Carmi",
"Shai",
""
],
[
"Havlin",
"Shlomo",
""
],
[
"Kirkpatrick",
"Scott",
""
],
[
"Shavitt",
"Yuval",
""
],
[
"Shir",
"Eran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
}
] |
cs/0607081
|
Marie-France Ango-Obiang
|
Marie-France Ango-Obiang (LORIA)
|
Syst\`{e}me de repr\'{e}sentation d'aide au besoin dans le domaine
architectural
| null |
Dans CONFERE 2006, Conception et Innovation
| null | null |
cs.OH cs.IR
| null |
The image is a very important mean of communication in the field of
architectural who intervenes in the various phases of the design of a project.
It can be regarded as a tool of decision-making aid. The study of our research
aims at to see the contribution of the Economic Intelligence in the resolution
of a decisional problem of the various partners (Architect, Contractor,
Customer) in the architectural field, in order to make strategic decisions
within the framework of the realization or design of an architectural work. The
economic Intelligence allows the taking into account of the real needs for the
user-decision makers, so that their waiting are considered at the first stage
of a search for information and not in the final stage of the development of
the tool in the evaluation of this last.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 05:04:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ango-Obiang",
"Marie-France",
"",
"LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0607082
|
Gwenael Richomme
|
Flavio D'Alessandro, Gw\'ena\"el Richomme (LaRIA), Stefano Varrichio
|
Well quasi-orders and the shuffle closure of finite sets
| null | null | null | null |
cs.DM
| null |
Given a set I of word, the set of all words obtained by the shuffle of
(copies of) words of I is naturally provided with a partial order. In [FS05],
the authors have opened the problem of the characterization of the finite sets
I such that the order is a well quasi-order . In this paper we give an answer
in the case when I consists of a single word w.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 05:30:52 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"D'Alessandro",
"Flavio",
"",
"LaRIA"
],
[
"Richomme",
"Gwénaël",
"",
"LaRIA"
],
[
"Varrichio",
"Stefano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607083
|
Stanko Shtrakov
|
Stanko Vl. Shtrakov, Anton Stoilov
|
Mathematical Modelling of the Thermal Accumulation in Hot Water Solar
Systems
|
11 pages, 5 figures
| null | null | null |
cs.CE
| null |
Mathematical modelling and defining useful recommendations for construction
and regimes of exploitation for hot water solar installation with thermal
stratification is the main purpose of this work. A special experimental solar
module for hot water was build and equipped with sufficient measure apparatus.
The main concept of investigation is to optimise the stratified regime of
thermal accumulation and constructive parameters of heat exchange equipment
(heat serpentine in tank). Accumulation and heat exchange processes were
investigated by theoretical end experimental means. Special mathematical model
was composed to simulate the energy transfer in stratified tank. Computer
program was developed to solve mathematical equations for thermal accumulation
and energy exchange. Extensive numerical and experimental tests were carried
out. A good correspondence between theoretical and experimental data was
arrived. Keywords: Mathematical modelling, accumulation
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 08:07:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shtrakov",
"Stanko Vl.",
""
],
[
"Stoilov",
"Anton",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0607084
|
Farid Nouioua
|
Daniel Kayser (LIPN), Farid Nouioua (LIPN)
|
About Norms and Causes
| null |
The 17th FLAIRS'04 Conference (2004) 502-507
| null | null |
cs.AI
| null |
Knowing the norms of a domain is crucial, but there exist no repository of
norms. We propose a method to extract them from texts: texts generally do not
describe a norm, but rather how a state-of-affairs differs from it. Answers
concerning the cause of the state-of-affairs described often reveal the
implicit norm. We apply this idea to the domain of driving, and validate it by
designing algorithms that identify, in a text, the "basic" norms to which it
refers implicitly.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:46:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607085
|
Amaury Habrard
|
Amaury Habrard (LIF), Francois Denis (LIF), Yann Esposito (LIF)
|
Using Pseudo-Stochastic Rational Languages in Probabilistic Grammatical
Inference
| null |
8th International Colloquium on Grammatical Inference (ICGI'06),
Japan (2006)
| null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In probabilistic grammatical inference, a usual goal is to infer a good
approximation of an unknown distribution P called a stochastic language. The
estimate of P stands in some class of probabilistic models such as
probabilistic automata (PA). In this paper, we focus on probabilistic models
based on multiplicity automata (MA). The stochastic languages generated by MA
are called rational stochastic languages; they strictly include stochastic
languages generated by PA; they also admit a very concise canonical
representation. Despite the fact that this class is not recursively enumerable,
it is efficiently identifiable in the limit by using the algorithm DEES,
introduced by the authors in a previous paper. However, the identification is
not proper and before the convergence of the algorithm, DEES can produce MA
that do not define stochastic languages. Nevertheless, it is possible to use
these MA to define stochastic languages. We show that they belong to a broader
class of rational series, that we call pseudo-stochastic rational languages.
The aim of this paper is twofold. First we provide a theoretical study of
pseudo-stochastic rational languages, the languages output by DEES, showing for
example that this class is decidable within polynomial time. Second, we have
carried out a lot of experiments in order to compare DEES to classical
inference algorithms such as ALERGIA and MDI. They show that DEES outperforms
them in most cases.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:21:51 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Nov 2008 16:21:18 GMT"
}
] | 2008-12-19T00:00:00 |
[
[
"Habrard",
"Amaury",
"",
"LIF"
],
[
"Denis",
"Francois",
"",
"LIF"
],
[
"Esposito",
"Yann",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607086
|
Farid Nouioua
|
Daniel Kayser (LIPN), Farid Nouioua (LIPN)
|
Representing Knowledge about Norms
| null |
The 16th European Conference on Artificial Intelligence (ECAI'04)
(2004) 363-367
| null | null |
cs.AI
| null |
Norms are essential to extend inference: inferences based on norms are far
richer than those based on logical implications. In the recent decades, much
effort has been devoted to reason on a domain, once its norms are represented.
How to extract and express those norms has received far less attention.
Extraction is difficult: as the readers are supposed to know them, the norms of
a domain are seldom made explicit. For one thing, extracting norms requires a
language to represent them, and this is the topic of this paper. We apply this
language to represent norms in the domain of driving, and show that it is
adequate to reason on the causes of accidents, as described by car-crash
reports.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 08:15:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kayser",
"Daniel",
"",
"LIPN"
],
[
"Nouioua",
"Farid",
"",
"LIPN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607087
|
Emmanuel Ramasso
|
Emmanuel Ramasso (LIS), Mich\`ele Rombaut (LIS), Denis Pellerin (LIS)
|
Un filtre temporel cr\'edibiliste pour la reconnaissance d'actions
humaines dans les vid\'eos
|
8 pages
| null | null | null |
cs.MM
| null |
In the context of human action recognition in video sequences, a temporal
belief filter is presented. It allows to cope with human action disparity and
low quality videos. The whole system of action recognition is based on the
Transferable Belief Model (TBM) proposed by P. Smets. The TBM allows to
explicitly model the doubt between actions. Furthermore, the TBM emphasizes the
conflict which is exploited for action recognition. The filtering performance
is assessed on real video sequences acquired by a moving camera and under
several unknown view angles.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 08:16:37 GMT"
}
] | 2009-01-09T00:00:00 |
[
[
"Ramasso",
"Emmanuel",
"",
"LIS"
],
[
"Rombaut",
"Michèle",
"",
"LIS"
],
[
"Pellerin",
"Denis",
"",
"LIS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0607088
|
Farid Nouioua
|
Farid Nouioua (LIPN), Pascal Nicolas (LERIA)
|
Using Answer Set Programming in an Inference-Based approach to Natural
Language Semantics
| null |
Inference in Computational Semantics ICoS-5, France (2006) 77-86
| null | null |
cs.CL cs.AI
| null |
Using Answer Set Programming in an Inference-Based approach to Natural
Language Semantics
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:43:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Nouioua",
"Farid",
"",
"LIPN"
],
[
"Nicolas",
"Pascal",
"",
"LERIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607089
|
Ryan Hutchinson
|
R. Hutchinson, R. Smarandache, J. Trumpf
|
Superregular Matrices and the Construction of Convolutional Codes having
a Maximum Distance Profile
|
20 pages. Replaced on 19/7/2006, because bibtex files were not
included in the original submission
| null | null | null |
cs.IT math.CO math.IT
| null |
Superregular matrices are a class of lower triangular Toeplitz matrices that
arise in the context of constructing convolutional codes having a maximum
distance profile. These matrices are characterized by the property that no
submatrix has a zero determinant unless it is trivially zero due to the lower
triangular structure. In this paper, we discuss how superregular matrices may
be used to construct codes having a maximum distance profile. We also introduce
group actions that preserve the superregularity property and present an upper
bound on the minimum size a finite field must have in order that a superregular
matrix of a given size can exist over that field.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 18:44:30 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Jul 2006 10:35:49 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hutchinson",
"R.",
""
],
[
"Smarandache",
"R.",
""
],
[
"Trumpf",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607090
|
Adityan Rishiyur
|
Adityan Rishiyur
|
Neural Networks with Complex and Quaternion Inputs
|
14 pages, 2 figures
| null | null | null |
cs.NE
| null |
This article investigates Kak neural networks, which can be instantaneously
trained, for complex and quaternion inputs. The performance of the basic
algorithm has been analyzed and shown how it provides a plausible model of
human perception and understanding of images. The motivation for studying
quaternion inputs is their use in representing spatial rotations that find
applications in computer graphics, robotics, global navigation, computer vision
and the spatial orientation of instruments. The problem of efficient mapping of
data in quaternion neural networks is examined. Some problems that need to be
addressed before quaternion neural networks find applications are identified.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 21:01:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rishiyur",
"Adityan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0607091
|
Stanko Shtrakov
|
Stanko Shtrakov, Anton Stoilov
|
Finite element method for thermal analysis of concentrating solar
receivers
|
8 pages; 5 figures
| null | null | null |
cs.CE
| null |
Application of finite element method and heat conductivity transfer model for
calculation of temperature distribution in receiver for dish-Stirling
concentrating solar system is described. The method yields discretized
equations that are entirely local to the elements and provides complete
geometric flexibility. A computer program solving the finite element method
problem is created and great number of numerical experiments is carried out.
Illustrative numerical results are given for an array of triangular elements in
receiver for dish-Stirling system.
|
[
{
"version": "v1",
"created": "Wed, 19 Jul 2006 06:58:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Shtrakov",
"Stanko",
""
],
[
"Stoilov",
"Anton",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0607092
|
L. Sunil Chandran
|
L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan
|
Representing graphs as the intersection of axis-parallel cubes
|
12 pages, 0 figures
| null | null | null |
cs.DM
| null |
A unit cube in $k$ dimensional space (or \emph{$k$-cube} in short) is defined
as the Cartesian product $R_1\times R_2\times...\times R_k$ where $R_i$(for
$1\leq i\leq k$) is a closed interval of the form $[a_i,a_i+1]$ on the real
line. A $k$-cube representation of a graph $G$ is a mapping of the vertices of
$G$ to $k$-cubes such that two vertices in $G$ are adjacent if and only if
their corresponding $k$-cubes have a non-empty intersection. The
\emph{cubicity} of $G$, denoted as $\cubi(G)$, is the minimum $k$ such that $G$
has a $k$-cube representation. Roberts \cite{Roberts} showed that for any graph
$G$ on $n$ vertices, $\cubi(G)\leq 2n/3$. Many NP-complete graph problems have
polynomial time deterministic algorithms or have good approximation ratios in
graphs of low cubicity. In most of these algorithms, computing a low
dimensional cube representation of the given graph is usually the first step.
We present an efficient algorithm to compute the $k$-cube representation of
$G$ with maximum degree $\Delta$ in $O(\Delta \ln b)$ dimensions where $b$ is
the bandwidth of $G$. Bandwidth of $G$ is at most $n$ and can be much lower.
The algorithm takes as input a bandwidth ordering of the vertices in $G$.
Though computing the bandwidth ordering of vertices for a graph is NP-hard,
there are heuristics that perform very well in practice. Even theoretically,
there is an $O(\log^4 n)$ approximation algorithm for computing the bandwidth
ordering of a graph using which our algorithm can produce a $k$-cube
representation of any given graph in $k=O(\Delta(\ln b + \ln\ln n))$
dimensions. Both the bounds on cubicity are shown to be tight upto a factor of
$O(\log\log n)$.
|
[
{
"version": "v1",
"created": "Wed, 19 Jul 2006 10:45:58 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Oct 2006 11:10:48 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Mar 2008 06:48:13 GMT"
}
] | 2008-03-26T00:00:00 |
[
[
"Chandran",
"L. Sunil",
""
],
[
"Francis",
"Mathew C.",
""
],
[
"Sivadasan",
"Naveen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607093
|
Craig Alan Feinstein
|
Craig Alan Feinstein
|
An Elegant Argument that P is not NP
|
2 pages; Version 14 is the published version, but this version is
clearer
|
Progress in Physics Volume 2 (2011), 30-31
| null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this note, we present an elegant argument that P is not NP by
demonstrating that the Meet-in-the-Middle algorithm must have the fastest
running-time of all deterministic and exact algorithms which solve the
SUBSET-SUM problem on a classical computer.
|
[
{
"version": "v1",
"created": "Wed, 19 Jul 2006 19:01:09 GMT"
},
{
"version": "v10",
"created": "Thu, 28 Oct 2010 00:47:28 GMT"
},
{
"version": "v11",
"created": "Mon, 22 Nov 2010 16:44:39 GMT"
},
{
"version": "v12",
"created": "Mon, 20 Dec 2010 18:12:33 GMT"
},
{
"version": "v13",
"created": "Wed, 19 Jan 2011 20:23:30 GMT"
},
{
"version": "v14",
"created": "Fri, 21 Jan 2011 17:32:31 GMT"
},
{
"version": "v15",
"created": "Thu, 1 Sep 2011 19:02:22 GMT"
},
{
"version": "v16",
"created": "Thu, 8 Sep 2011 19:24:37 GMT"
},
{
"version": "v17",
"created": "Thu, 15 Sep 2011 15:58:59 GMT"
},
{
"version": "v18",
"created": "Thu, 22 Sep 2011 12:01:57 GMT"
},
{
"version": "v19",
"created": "Mon, 26 Sep 2011 16:23:47 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Feb 2007 18:07:15 GMT"
},
{
"version": "v20",
"created": "Wed, 28 Sep 2011 17:21:19 GMT"
},
{
"version": "v21",
"created": "Mon, 10 Oct 2011 18:24:22 GMT"
},
{
"version": "v3",
"created": "Thu, 26 Aug 2010 19:09:27 GMT"
},
{
"version": "v4",
"created": "Mon, 30 Aug 2010 15:17:41 GMT"
},
{
"version": "v5",
"created": "Wed, 22 Sep 2010 18:04:40 GMT"
},
{
"version": "v6",
"created": "Tue, 28 Sep 2010 19:11:57 GMT"
},
{
"version": "v7",
"created": "Wed, 29 Sep 2010 19:08:35 GMT"
},
{
"version": "v8",
"created": "Wed, 6 Oct 2010 15:42:11 GMT"
},
{
"version": "v9",
"created": "Tue, 26 Oct 2010 19:10:36 GMT"
}
] | 2011-10-11T00:00:00 |
[
[
"Feinstein",
"Craig Alan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0607094
|
David Eppstein
|
David Eppstein
|
Upright-Quad Drawing of st-Planar Learning Spaces
|
12 pages, 10 figures. To appear at 14th Int. Symp. Graph Drawing,
2006
|
J. Graph Algorithms & Applications 12(1):51-72, 2008
| null | null |
cs.CG
| null |
We consider graph drawing algorithms for learning spaces, a type of
st-oriented partial cube derived from antimatroids and used to model states of
knowledge of students. We show how to draw any st-planar learning space so all
internal faces are convex quadrilaterals with the bottom side horizontal and
the left side vertical, with one minimal and one maximal vertex. Conversely,
every such drawing represents an st-planar learning space. We also describe
connections between these graphs and arrangements of translates of a quadrant.
|
[
{
"version": "v1",
"created": "Thu, 20 Jul 2006 04:52:14 GMT"
}
] | 2008-06-30T00:00:00 |
[
[
"Eppstein",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0607095
|
Hyundong Shin
|
Hyundong Shin, Moe Z. Win
|
Gallager's Exponent for MIMO Channels: A Reliability-Rate Tradeoff
|
Submitted to the IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
| null |
In this paper, we derive Gallager's random coding error exponent for
multiple-input multiple-output (MIMO) channels, assuming no channel-state
information (CSI) at the transmitter and perfect CSI at the receiver. This
measure gives insight into a fundamental tradeoff between the communication
reliability and information rate of MIMO channels, enabling to determine the
required codeword length to achieve a prescribed error probability at a given
rate below the channel capacity. We quantify the effects of the number of
antennas, channel coherence time, and spatial fading correlation on the MIMO
exponent. In addition, general formulae for the ergodic capacity and the cutoff
rate in the presence of spatial correlation are deduced from the exponent
expressions. These formulae are applicable to arbitrary structures of transmit
and receive correlation, encompassing all the previously known results as
special cases of our expressions.
|
[
{
"version": "v1",
"created": "Thu, 20 Jul 2006 06:56:02 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shin",
"Hyundong",
""
],
[
"Win",
"Moe Z.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607096
|
Henry Soldano
|
Dominique Bouthinon (LIPN), Henry Soldano (LIPN), V\'eronique Ventos
(LRI)
|
Logical settings for concept learning from incomplete examples in First
Order Logic
| null | null | null | null |
cs.LG
| null |
We investigate here concept learning from incomplete examples. Our first
purpose is to discuss to what extent logical learning settings have to be
modified in order to cope with data incompleteness. More precisely we are
interested in extending the learning from interpretations setting introduced by
L. De Raedt that extends to relational representations the classical
propositional (or attribute-value) concept learning from examples framework. We
are inspired here by ideas presented by H. Hirsh in a work extending the
Version space inductive paradigm to incomplete data. H. Hirsh proposes to
slightly modify the notion of solution when dealing with incomplete examples: a
solution has to be a hypothesis compatible with all pieces of information
concerning the examples. We identify two main classes of incompleteness. First,
uncertainty deals with our state of knowledge concerning an example. Second,
generalization (or abstraction) deals with what part of the description of the
example is sufficient for the learning purpose. These two main sources of
incompleteness can be mixed up when only part of the useful information is
known. We discuss a general learning setting, referred to as "learning from
possibilities" that formalizes these ideas, then we present a more specific
learning setting, referred to as "assumption-based learning" that cope with
examples which uncertainty can be reduced when considering contextual
information outside of the proper description of the examples. Assumption-based
learning is illustrated on a recent work concerning the prediction of a
consensus secondary structure common to a set of RNA sequences.
|
[
{
"version": "v1",
"created": "Thu, 20 Jul 2006 14:52:08 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Bouthinon",
"Dominique",
"",
"LIPN"
],
[
"Soldano",
"Henry",
"",
"LIPN"
],
[
"Ventos",
"Véronique",
"",
"LRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607097
|
Tahiry Razafindralambo
|
Tahiry Razafindralambo (INRIA Rh\^one-Alpes), Isabelle
Gu\'erin-Lassous (INRIA Rh\^one-Alpes), Luigi Iannone (LIP6), Serge Fdida
(LIP6)
|
Dynamic Packet Aggregation to Solve Performance Anomaly in 802.11
Wireless Networks
| null | null | null | null |
cs.NI
| null |
In the widely used 802.11 standard, the so called performance anomaly is a
well known issue. Several works have tried to solve this problem by introducing
mechanisms such as packet fragmentation, backoff adaptation, or packet
aggregation during a fixed time interval. In this paper, we propose a novel
approach solving the performance anomaly problem by packet aggregation using a
dynamic time interval, which depends on the busy time of the wireless medium.
Our solution differs from other proposition in the literature because of this
dynamic time interval, which allows increasing fairness, reactivity, and in
some cases efficiency. In this article, we emphasize the performance evaluation
of our proposal.
|
[
{
"version": "v1",
"created": "Thu, 20 Jul 2006 15:29:05 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Razafindralambo",
"Tahiry",
"",
"INRIA Rhône-Alpes"
],
[
"Guérin-Lassous",
"Isabelle",
"",
"INRIA Rhône-Alpes"
],
[
"Iannone",
"Luigi",
"",
"LIP6"
],
[
"Fdida",
"Serge",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0607098
|
Martin Strauss
|
A. R. Calderbank, Anna C. Gilbert, and Martin J. Strauss
|
List decoding of noisy Reed-Muller-like codes
| null | null | null | null |
cs.DS cs.IT math.IT
| null |
First- and second-order Reed-Muller (RM(1) and RM(2), respectively) codes are
two fundamental error-correcting codes which arise in communication as well as
in probabilistically-checkable proofs and learning. In this paper, we take the
first steps toward extending the quick randomized decoding tools of RM(1) into
the realm of quadratic binary and, equivalently, Z_4 codes. Our main
algorithmic result is an extension of the RM(1) techniques from Goldreich-Levin
and Kushilevitz-Mansour algorithms to the Hankel code, a code between RM(1) and
RM(2). That is, given signal s of length N, we find a list that is a superset
of all Hankel codewords phi with dot product to s at least (1/sqrt(k)) times
the norm of s, in time polynomial in k and log(N). We also give a new and
simple formulation of a known Kerdock code as a subcode of the Hankel code. As
a corollary, we can list-decode Kerdock, too. Also, we get a quick algorithm
for finding a sparse Kerdock approximation. That is, for k small compared with
1/sqrt{N} and for epsilon > 0, we find, in time polynomial in (k
log(N)/epsilon), a k-Kerdock-term approximation s~ to s with Euclidean error at
most the factor (1+epsilon+O(k^2/sqrt{N})) times that of the best such
approximation.
|
[
{
"version": "v1",
"created": "Thu, 20 Jul 2006 21:02:29 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Aug 2006 20:25:58 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Calderbank",
"A. R.",
""
],
[
"Gilbert",
"Anna C.",
""
],
[
"Strauss",
"Martin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607099
|
Syed Jafar
|
Syed A. Jafar, Shlomo Shamai (Shitz)
|
Degrees of Freedom Region for the MIMO X Channel
|
31 pages
| null | null | null |
cs.IT math.IT
| null |
We provide achievability as well as converse results for the degrees of
freedom region of a MIMO $X$ channel, i.e., a system with two transmitters, two
receivers, each equipped with multiple antennas, where independent messages
need to be conveyed over fixed channels from each transmitter to each receiver.
With M=1 antennas at each node, we find that the total (sum rate) degrees of
freedom are bounded above and below as $1 \leq\eta_X^\star \leq {4/3}$. If
$M>1$ and channel matrices are non-degenerate then the precise degrees of
freedom $\eta_X^\star = {4/3}M$. Simple zero forcing without dirty paper
encoding or successive decoding, suffices to achieve the ${4/3}M$ degrees of
freedom. With equal number of antennas at all nodes, we explore the increase in
degrees of freedom when some of the messages are made available to a
transmitter or receiver in the manner of cognitive radio. With a cognitive
transmitter we show that the number of degrees of freedom $\eta = {3/2}M$ (for
$M>1$) on the MIMO $X$ channel. The same degrees of freedom are obtained on the
MIMO $X$ channel with a cognitive receiver as well. In contrast to the $X$
channel result, we show that for the MIMO \emph{interference} channel, the
degrees of freedom are not increased even if both the transmitter and the
receiver of one user know the other user's message. However, the interference
channel can achieve the full $2M$ degrees of freedom if \emph{each} user has
either a cognitive transmitter or a cognitive receiver. Lastly, if the channels
vary with time/frequency then the $X$ channel with single antennas $(M=1)$ at
all nodes has exactly 4/3 degrees of freedom with no shared messages and
exactly 3/2 degrees of freedom with a cognitive transmitter or a cognitive
receiver.
|
[
{
"version": "v1",
"created": "Fri, 21 Jul 2006 07:50:42 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Sep 2006 23:55:53 GMT"
},
{
"version": "v3",
"created": "Fri, 11 May 2007 20:48:40 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jafar",
"Syed A.",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607100
|
Xin Han
|
Xin Han, Kazuo Iwama, Guochuan Zhang
|
New Upper Bounds on The Approximability of 3D Strip Packing
|
Submitted to SODA 2007
| null | null | null |
cs.DS
| null |
In this paper, we study the 3D strip packing problem in which we are given a
list of 3-dimensional boxes and required to pack all of them into a
3-dimensional strip with length 1 and width 1 and unlimited height to minimize
the height used. Our results are below: i) we give an approximation algorithm
with asymptotic worst-case ratio 1.69103, which improves the previous best
bound of $2+\epsilon$ by Jansen and Solis-Oba of SODA 2006; ii) we also present
an asymptotic PTAS for the case in which all items have {\em square} bases.
|
[
{
"version": "v1",
"created": "Sat, 22 Jul 2006 02:06:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Han",
"Xin",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Zhang",
"Guochuan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0607101
|
Patricia Hill
|
Patricia M. Hill, Fausto Spoto
|
Deriving Escape Analysis by Abstract Interpretation: Proofs of results
| null | null | null | null |
cs.PL
| null |
Escape analysis of object-oriented languages approximates the set of objects
which do not escape from a given context. If we take a method as context, the
non-escaping objects can be allocated on its activation stack; if we take a
thread, Java synchronisation locks on such objects are not needed. In this
paper, we formalise a basic escape domain e as an abstract interpretation of
concrete states, which we then refine into an abstract domain er which is more
concrete than e and, hence, leads to a more precise escape analysis than e. We
provide optimality results for both e and er, in the form of Galois insertions
from the concrete to the abstract domains and of optimal abstract operations.
The Galois insertion property is obtained by restricting the abstract domains
to those elements which do not contain garbage, by using an abstract garbage
collector. Our implementation of er is hence an implementation of a formally
correct escape analyser, able to detect the stack allocatable creation points
of Java (bytecode) applications.
This report contains the proofs of results of a paper with the same title and
authors and to be published in the Journal "Higher-Order Symbolic Computation".
|
[
{
"version": "v1",
"created": "Mon, 24 Jul 2006 09:24:07 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 14:59:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hill",
"Patricia M.",
""
],
[
"Spoto",
"Fausto",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0607102
|
Shivaprasad Kotagiri
|
Shiva Prasad Kotagiri and J. Nicholas Laneman
|
Multiaccess Channels with State Known to Some Encoders and Independent
Messages
|
Accepted to EURASIP Journal on Wireless Communication and Networking,
Feb. 2008
| null | null | null |
cs.IT math.IT
| null |
We consider a state-dependent multiaccess channel (MAC) with state
non-causally known to some encoders. We derive an inner bound for the capacity
region in the general discrete memoryless case and specialize to a binary
noiseless case. In the case of maximum entropy channel state, we obtain the
capacity region for binary noiseless MAC with one informed encoder by deriving
a non-trivial outer bound for this case. For a Gaussian state-dependent MAC
with one encoder being informed of the channel state, we present an inner bound
by applying a slightly generalized dirty paper coding (GDPC) at the informed
encoder that allows for partial state cancellation, and a trivial outer bound
by providing channel state to the decoder also. The uninformed encoders benefit
from the state cancellation in terms of achievable rates, however, appears that
GDPC cannot completely eliminate the effect of the channel state on the
achievable rate region, in contrast to the case of all encoders being informed.
In the case of infinite state variance, we analyze how the uninformed encoder
benefits from the informed encoder's actions using the inner bound and also
provide a non-trivial outer bound for this case which is better than the
trivial outer bound.
|
[
{
"version": "v1",
"created": "Sun, 23 Jul 2006 15:05:38 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Mar 2008 17:54:30 GMT"
}
] | 2008-03-30T00:00:00 |
[
[
"Kotagiri",
"Shiva Prasad",
""
],
[
"Laneman",
"J. Nicholas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607103
|
Lester Ingber
|
Lester Ingber
|
Ideas by Statistical Mechanics (ISM)
| null | null | null | null |
cs.CE cs.MS cs.NE
| null |
Ideas by Statistical Mechanics (ISM) is a generic program to model evolution
and propagation of ideas/patterns throughout populations subjected to
endogenous and exogenous interactions. The program is based on the author's
work in Statistical Mechanics of Neocortical Interactions (SMNI), and uses the
author's Adaptive Simulated Annealing (ASA) code for optimizations of training
sets, as well as for importance-sampling to apply the author's copula financial
risk-management codes, Trading in Risk Dimensions (TRD), for assessments of
risk and uncertainty. This product can be used for decision support for
projects ranging from diplomatic, information, military, and economic (DIME)
factors of propagation/evolution of ideas, to commercial sales, trading
indicators across sectors of financial markets, advertising and political
campaigns, etc. A statistical mechanical model of neocortical interactions,
developed by the author and tested successfully in describing short-term memory
and EEG indicators, is the proposed model. Parameters with a given subset of
macrocolumns will be fit using ASA to patterns representing ideas. Parameters
of external and inter-regional interactions will be determined that promote or
inhibit the spread of these ideas. Tools of financial risk management,
developed by the author to process correlated multivariate systems with
differing non-Gaussian distributions using modern copula analysis,
importance-sampled using ASA, will enable bona fide correlations and
uncertainties of success and failure to be calculated. Marginal distributions
will be evolved to determine their expected duration and stability using
algorithms developed by the author, i.e., PATHTREE and PATHINT codes.
|
[
{
"version": "v1",
"created": "Sun, 23 Jul 2006 16:12:47 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ingber",
"Lester",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0607104
|
Hao Chen
|
Hao Chen
|
Reducing the Computation of Linear Complexities of Periodic Sequences
over $GF(p^m)$
|
10 pages. To appear in IEEE Transactions on Innformation Theory
| null | null | null |
cs.CR cs.IT math.IT
| null |
The linear complexity of a periodic sequence over $GF(p^m)$ plays an
important role in cryptography and communication [12]. In this correspondence,
we prove a result which reduces the computation of the linear complexity and
minimal connection polynomial of a period $un$ sequence over $GF(p^m)$ to the
computation of the linear complexities and minimal connection polynomials of
$u$ period $n$ sequences. The conditions $u|p^m-1$ and
$\gcd(n,p^m-1)=1$ are required for the result to hold. Some applications of
this reduction in fast algorithms to determine the linear complexities and
minimal connection polynomials of sequences over $GF(p^m)$ are presented.
|
[
{
"version": "v1",
"created": "Mon, 24 Jul 2006 02:54:21 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Sep 2006 03:15:08 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Chen",
"Hao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607105
|
Daniel A. Spielman
|
Daniel A. Spielman and Shang-Hua Teng
|
Nearly-Linear Time Algorithms for Preconditioning and Solving Symmetric,
Diagonally Dominant Linear Systems
|
This revised version contains a new section in which we prove that it
suffices to carry out the computations with limited precision
| null | null | null |
cs.NA cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a randomized algorithm that, on input a symmetric, weakly
diagonally dominant n-by-n matrix A with m nonzero entries and an n-vector b,
produces a y such that $\norm{y - \pinv{A} b}_{A} \leq \epsilon \norm{\pinv{A}
b}_{A}$ in expected time $O (m \log^{c}n \log (1/\epsilon)),$ for some constant
c. By applying this algorithm inside the inverse power method, we compute
approximate Fiedler vectors in a similar amount of time. The algorithm applies
subgraph preconditioners in a recursive fashion. These preconditioners improve
upon the subgraph preconditioners first introduced by Vaidya (1990).
For any symmetric, weakly diagonally-dominant matrix A with non-positive
off-diagonal entries and $k \geq 1$, we construct in time $O (m \log^{c} n)$ a
preconditioner B of A with at most $2 (n - 1) + O ((m/k) \log^{39} n)$ nonzero
off-diagonal entries such that the finite generalized condition number
$\kappa_{f} (A,B)$ is at most k, for some other constant c.
In the special case when the nonzero structure of the matrix is planar the
corresponding linear system solver runs in expected time $ O (n \log^{2} n + n
\log n \ \log \log n \ \log (1/\epsilon))$.
We hope that our introduction of algorithms of low asymptotic complexity will
lead to the development of algorithms that are also fast in practice.
|
[
{
"version": "v1",
"created": "Mon, 24 Jul 2006 04:02:24 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Nov 2006 21:06:59 GMT"
},
{
"version": "v3",
"created": "Mon, 14 May 2007 15:15:46 GMT"
},
{
"version": "v4",
"created": "Thu, 17 Sep 2009 17:48:44 GMT"
},
{
"version": "v5",
"created": "Thu, 13 Sep 2012 12:51:05 GMT"
}
] | 2012-09-14T00:00:00 |
[
[
"Spielman",
"Daniel A.",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0607106
|
Hubie Chen
|
Hubie Chen
|
The Complexity of Quantified Constraint Satisfaction: Collapsibility,
Sink Algebras, and the Three-Element Case
| null | null | null | null |
cs.LO cs.CC
| null |
The constraint satisfaction probem (CSP) is a well-acknowledged framework in
which many combinatorial search problems can be naturally formulated. The CSP
may be viewed as the problem of deciding the truth of a logical sentence
consisting of a conjunction of constraints, in front of which all variables are
existentially quantified. The quantified constraint satisfaction problem (QCSP)
is the generalization of the CSP where universal quantification is permitted in
addition to existential quantification. The general intractability of these
problems has motivated research studying the complexity of these problems under
a restricted constraint language, which is a set of relations that can be used
to express constraints.
This paper introduces collapsibility, a technique for deriving positive
complexity results on the QCSP. In particular, this technique allows one to
show that, for a particular constraint language, the QCSP reduces to the CSP.
We show that collapsibility applies to three known tractable cases of the QCSP
that were originally studied using disparate proof techniques in different
decades: Quantified 2-SAT (Aspvall, Plass, and Tarjan 1979), Quantified
Horn-SAT (Karpinski, Kleine B\"{u}ning, and Schmitt 1987), and Quantified
Affine-SAT (Creignou, Khanna, and Sudan 2001). This reconciles and reveals
common structure among these cases, which are describable by constraint
languages over a two-element domain. In addition to unifying these known
tractable cases, we study constraint languages over domains of larger size.
|
[
{
"version": "v1",
"created": "Mon, 24 Jul 2006 16:03:56 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jul 2006 13:06:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chen",
"Hubie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0607107
|
Louis Mello
|
Louis Mello
|
Linear Predictive Coding as an Estimator of Volatility
| null | null | null | null |
cs.IT math.IT
| null |
In this paper, we present a method of estimating the volatility of a signal
that displays stochastic noise (such as a risky asset traded on an open market)
utilizing Linear Predictive Coding. The main purpose is to associate volatility
with a series of statistical properties that can lead us, through further
investigation, toward a better understanding of structural volatility as well
as to improve the quality of our current estimates.
|
[
{
"version": "v1",
"created": "Mon, 24 Jul 2006 19:10:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mello",
"Louis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607108
|
Pierre Loidreau
|
E. M. Gabidulin and P. Loidreau
|
Properties of subspace subcodes of optimum codes in rank metric
|
17 pages, Submitted to IEEE-IT
| null | null | null |
cs.IT cs.DM math.IT
| null |
Maximum rank distance codes denoted MRD-codes are the equivalent in rank
metric of MDS-codes. Given any integer $q$ power of a prime and any integer $n$
there is a family of MRD-codes of length $n$ over $\FF{q^n}$ having
polynomial-time decoding algorithms. These codes can be seen as the analogs of
Reed-Solomon codes (hereafter denoted RS-codes) for rank metric. In this paper
their subspace subcodes are characterized. It is shown that hey are equivalent
to MRD-codes constructed in the same way but with smaller parameters. A
specific polynomial-time decoding algorithm is designed. Moreover, it is shown
that the direct sum of subspace subcodes is equivalent to the direct product of
MRD-codes with smaller parameters. This implies that the decoding procedure can
correct errors of higher rank than the error-correcting capability. Finally it
is shown that, for given parameters, subfield subcodes are completely
characterized by elements of the general linear group ${GL}_n(\FF{q})$ of
non-singular $q$-ary matrices of size $n$.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2006 07:37:48 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gabidulin",
"E. M.",
""
],
[
"Loidreau",
"P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607109
|
Marko Samer
|
Marko Samer and Stefan Szeider
|
Complexity and Applications of Edge-Induced Vertex-Cuts
|
17 pages, 5 figures, 2 tables
| null | null | null |
cs.DM cs.CC
| null |
Motivated by hypergraph decomposition algorithms, we introduce the notion of
edge-induced vertex-cuts and compare it with the well-known notions of
edge-cuts and vertex-cuts. We investigate the complexity of computing minimum
edge-induced vertex-cuts and demonstrate the usefulness of our notion by
applications in network reliability and constraint satisfaction.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2006 16:17:22 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Jul 2006 09:23:22 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Samer",
"Marko",
""
],
[
"Szeider",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0607110
|
Etienne Grossmann
|
Etienne Grossmann
|
A Theory of Probabilistic Boosting, Decision Trees and Matryoshki
| null | null | null | null |
cs.LG
| null |
We present a theory of boosting probabilistic classifiers. We place ourselves
in the situation of a user who only provides a stopping parameter and a
probabilistic weak learner/classifier and compare three types of boosting
algorithms: probabilistic Adaboost, decision tree, and tree of trees of ... of
trees, which we call matryoshka. "Nested tree," "embedded tree" and "recursive
tree" are also appropriate names for this algorithm, which is one of our
contributions. Our other contribution is the theoretical analysis of the
algorithms, in which we give training error bounds. This analysis suggests that
the matryoshka leverages probabilistic weak classifiers more efficiently than
simple decision trees.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2006 15:57:56 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grossmann",
"Etienne",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607111
|
William Yurcik
|
William Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama
Sridharan
|
UCLog+ : A Security Data Management System for Correlating Alerts,
Incidents, and Raw Data From Remote Logs
|
10 pages, 9 Tables, 16 Figures
| null | null | null |
cs.CR
| null |
Source data for computer network security analysis takes different forms
(alerts, incidents, logs) and each source may be voluminous. Due to the
challenge this presents for data management, this has often lead to security
stovepipe operations which focus primarily on a small number of data sources
for analysis with little or no automated correlation between data sources
(although correlation may be done manually). We seek to address this systemic
problem.
In previous work we developed a unified correlated logging system (UCLog)
that automatically processes alerts from different devices. We take this work
one step further by presenting the architecture and applications of UCLog+
which adds the new capability to correlate between alerts and incidents and raw
data located on remote logs. UCLog+ can be used for forensic analysis including
queries and report generation but more importantly it can be used for
near-real-time situational awareness of attack patterns in progress. The
system, implemented with open source tools, can also be a repository for secure
information sharing by different organizations.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2006 19:44:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Yurcik",
"William",
""
],
[
"Abad",
"Cristina",
""
],
[
"Hasan",
"Ragib",
""
],
[
"Saleem",
"Moazzam",
""
],
[
"Sridharan",
"Shyama",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0607112
|
Misha Stepanov
|
M.G. Stepanov, M. Chertkov
|
Improving convergence of Belief Propagation decoding
| null | null | null |
LA-UR-06-5058
|
cs.IT math.IT
| null |
The decoding of Low-Density Parity-Check codes by the Belief Propagation (BP)
algorithm is revisited. We check the iterative algorithm for its convergence to
a codeword (termination), we run Monte Carlo simulations to find the
probability distribution function of the termination time, n_it. Tested on an
example [155, 64, 20] code, this termination curve shows a maximum and an
extended algebraic tail at the highest values of n_it. Aiming to reduce the
tail of the termination curve we consider a family of iterative algorithms
modifying the standard BP by means of a simple relaxation. The relaxation
parameter controls the convergence of the modified BP algorithm to a minimum of
the Bethe free energy. The improvement is experimentally demonstrated for
Additive-White-Gaussian-Noise channel in some range of the signal-to-noise
ratios. We also discuss the trade-off between the relaxation parameter of the
improved iterative scheme and the number of iterations.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2006 21:54:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Stepanov",
"M. G.",
""
],
[
"Chertkov",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607113
|
David Eppstein
|
Josiah Carlson and David Eppstein
|
Trees with Convex Faces and Optimal Angles
|
12 pages, 10 figures. To appear at 14th Int. Symp. Graph Drawing,
2006
| null | null | null |
cs.CG
| null |
We consider drawings of trees in which all edges incident to leaves can be
extended to infinite rays without crossing, partitioning the plane into
infinite convex polygons. Among all such drawings we seek the one maximizing
the angular resolution of the drawing. We find linear time algorithms for
solving this problem, both for plane trees and for trees without a fixed
embedding. In any such drawing, the edge lengths may be set independently of
the angles, without crossing; we describe multiple strategies for setting these
lengths.
|
[
{
"version": "v1",
"created": "Wed, 26 Jul 2006 00:44:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Carlson",
"Josiah",
""
],
[
"Eppstein",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0607114
|
Martin Ziegler
|
Martin Ziegler
|
Revising Type-2 Computation and Degrees of Discontinuity
|
to appear in Proc. CCA'06
|
Electronic Notes in Theoretical Computer Science vol.167
(Jan.2007)
|
10.1016/j.entcs.2006.08.015
| null |
cs.LO math.LO
| null |
By the sometimes so-called MAIN THEOREM of Recursive Analysis, every
computable real function is necessarily continuous. Weihrauch and Zheng
(TCS'2000), Brattka (MLQ'2005), and Ziegler (ToCS'2006) have considered
different relaxed notions of computability to cover also discontinuous
functions. The present work compares and unifies these approaches. This is
based on the concept of the JUMP of a representation: both a TTE-counterpart to
the well known recursion-theoretic jump on Kleene's Arithmetical Hierarchy of
hypercomputation: and a formalization of revising computation in the sense of
Shoenfield.
We also consider Markov and Banach/Mazur oracle-computation of discontinuous
fu nctions and characterize the computational power of Type-2 nondeterminism to
coincide with the first level of the Analytical Hierarchy.
|
[
{
"version": "v1",
"created": "Wed, 26 Jul 2006 06:07:22 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Sep 2006 01:21:49 GMT"
}
] | 2011-08-04T00:00:00 |
[
[
"Ziegler",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
cs/0607115
|
Marcin Kaminski
|
Marcin Kaminski and Vadim Lozin
|
Polynomial-time algorithm for vertex k-colorability of P_5-free graphs
| null | null | null | null |
cs.DM cs.DS
| null |
We give the first polynomial-time algorithm for coloring vertices of P_5-free
graphs with k colors. This settles an open problem and generalizes several
previously known results.
|
[
{
"version": "v1",
"created": "Wed, 26 Jul 2006 09:20:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kaminski",
"Marcin",
""
],
[
"Lozin",
"Vadim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0607116
|
Rui Abreu Eng
|
Rui Abreu, Peter Zoeteweij and Arjan JC van Gemund
|
Program Spectra Analysis in Embedded Software: A Case Study
| null | null | null |
TUD-SERG-2006-007
|
cs.SE
| null |
Because of constraints imposed by the market, embedded software in consumer
electronics is almost inevitably shipped with faults and the goal is just to
reduce the inherent unreliability to an acceptable level before a product has
to be released. Automatic fault diagnosis is a valuable tool to capture
software faults without extra effort spent on testing. Apart from a debugging
aid at design and integration time, fault diagnosis can help analyzing problems
during operation, which allows for more accurate system recovery. In this paper
we discuss perspectives and limitations for applying a particular fault
diagnosis technique, namely the analysis of program spectra, in the area of
embedded software in consumer electronics devices. We illustrate these by our
first experience with a test case from industry.
|
[
{
"version": "v1",
"created": "Wed, 26 Jul 2006 09:26:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Abreu",
"Rui",
""
],
[
"Zoeteweij",
"Peter",
""
],
[
"van Gemund",
"Arjan JC",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0607117
|
Jon Feldman
|
Gagan Aggarwal, S. Muthukrishnan, Jon Feldman
|
Bidding to the Top: VCG and Equilibria of Position-Based Auctions
| null | null | null | null |
cs.GT
| null |
Many popular search engines run an auction to determine the placement of
advertisements next to search results. Current auctions at Google and Yahoo!
let advertisers specify a single amount as their bid in the auction. This bid
is interpreted as the maximum amount the advertiser is willing to pay per click
on its ad. When search queries arrive, the bids are used to rank the ads
linearly on the search result page. The advertisers pay for each user who
clicks on their ad, and the amount charged depends on the bids of all the
advertisers participating in the auction. In order to be effective, advertisers
seek to be as high on the list as their budget permits, subject to the market.
We study the problem of ranking ads and associated pricing mechanisms when
the advertisers not only specify a bid, but additionally express their
preference for positions in the list of ads. In particular, we study "prefix
position auctions" where advertiser $i$ can specify that she is interested only
in the top $b_i$ positions.
We present a simple allocation and pricing mechanism that generalizes the
desirable properties of current auctions that do not have position constraints.
In addition, we show that our auction has an "envy-free" or "symmetric" Nash
equilibrium with the same outcome in allocation and pricing as the well-known
truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this
equilibrium is the best such equilibrium for the advertisers in terms of the
profit made by each advertiser. We also discuss other position-based auctions.
|
[
{
"version": "v1",
"created": "Wed, 26 Jul 2006 15:42:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Aggarwal",
"Gagan",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Feldman",
"Jon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0607118
|
Naohi Eguchi
|
Toshiyasu Arai and Naohi Eguchi
|
A new function algebra of EXPTIME functions by safe nested recursion
| null | null | null | null |
cs.CC
| null |
Bellantoni and Cook have given a function-algebra characterization of the
polynomial-time computable functions via an unbounded recursion scheme which is
called safe recursion. Inspired by their work, we characterize the
exponential-time computable functions with the use of a safe variant of nested
recursion.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 06:34:53 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Mar 2008 11:55:07 GMT"
}
] | 2008-03-05T00:00:00 |
[
[
"Arai",
"Toshiyasu",
""
],
[
"Eguchi",
"Naohi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0607119
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Web-Based Enterprise Information Systems Development: The Integrated
Methodology
|
5 pages
|
Proceedings of the 5th International Conference on Computer
Science and Information Technologies (CSIT 2005), Yerevan, Armenia, 19-23
September 2005. National Academy of Sciences of Armenia Publishers, 2005,
pp.373-381
| null | null |
cs.SE cs.DC
| null |
The paper considers software development issues for large-scale enterprise
information systems (IS) with databases (DB) in global heterogeneous
distributed computational environment. Due to high IT development rates, the
present-day society has accumulated and rapidly increases an extremely huge
data burden. Manipulating with such huge data arrays becomes an essential
problem, particularly due to their global distribution, heterogeneous and
weak-structured character. The conceptual approach to integrated Internet-based
IS design, development and implementation is presented, including formal
models, software development methodology and original software development
tools for visual problem-oriented development and content management. IS
implementation results proved shortening terms and reducing costs of
implementation compared to commercial software available.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 07:47:35 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607120
|
Peter Turney
|
Peter D. Turney (National Research Council of Canada)
|
Expressing Implicit Semantic Relations without Supervision
|
8 pages, related work available at http://purl.org/peter.turney/
|
Proceedings of the 21st International Conference on Computational
Linguistics and 44th Annual Meeting of the Association for Computational
Linguistics (ACL-06), (2006), Sydney, Australia, 313-320
| null |
NRC-48761
|
cs.CL cs.AI cs.IR cs.LG
| null |
We present an unsupervised learning algorithm that mines large text corpora
for patterns that express implicit semantic relations. For a given input word
pair X:Y with some unspecified semantic relations, the corresponding output
list of patterns <P1,...,Pm> is ranked according to how well each pattern Pi
expresses the relations between X and Y. For example, given X=ostrich and
Y=bird, the two highest ranking output patterns are "X is the largest Y" and "Y
such as the X". The output patterns are intended to be useful for finding
further pairs with the same relations, to support the construction of lexicons,
ontologies, and semantic networks. The patterns are sorted by pertinence, where
the pertinence of a pattern Pi for a word pair X:Y is the expected relational
similarity between the given pair and typical pairs for Pi. The algorithm is
empirically evaluated on two tasks, solving multiple-choice SAT word analogy
questions and classifying semantic relations in noun-modifier pairs. On both
tasks, the algorithm achieves state-of-the-art results, performing
significantly better than several alternative pattern ranking algorithms, based
on tf-idf.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 18:23:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607121
|
Sergey Zykov V.
|
Sergey V.Zykov, Gleb G. Pogodayev
|
Object-Based Groupware: Theory, Design and Implementation Issues
|
8 pages, 2 figures
|
In: J.Eder and L.A. Kalinichenko, (Ed.) Advances in Databases and
Information Systems, Vol.2. St.-Petersburg: Nevsky Dialect, 1997, p.p.10-17
| null | null |
cs.SE
| null |
Document management software systems are having a wide audience at present.
However, groupware as a term has a wide variety of possible definitions.
Groupware classification attempt is made in this paper. Possible approaches to
groupware are considered including document management, document control and
mailing systems. Lattice theory and concept modelling are presented as a
theoretical background for the systems in question. Current technologies in
state-of-the-art document managenent software are discussed. Design and
implementation aspects for user-friendly integrate enterprise systems are
described. Results for a real system to be implemented are given. Perspectives
of the field in question are discussed.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 10:16:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
],
[
"Pogodayev",
"Gleb G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0607122
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Enterprise Content Management: Theory and Engineering for Entire
Lifecycle Support
|
6 pages, 1 figure
|
Proceedings of the 8th International Workshop on Computer Science
and Information Technologies (CSIT'2006), Vol.1, Karlsruhe, Germany,
Sept.28-29, 2006.- Karlsruhe University Publishers, Karlsruhe, 2006.- Vol.1,
p.p.92-97
| null | null |
cs.SE cs.DC
| null |
The paper considers enterprise content management (ECM) issues in global
heterogeneous distributed computational environment. Present-day enterprises
have accumulated a huge data burden. Manipulating with such a bulk becomes an
essential problem, particularly due to its global distribution, heterogeneous
and weak-structured character. The conceptual approach to integrated ECM
lifecycle support is presented, including overview of formal models, software
development methodology and innovative software development tools.
Implementation results proved shortening terms and reducing costs of
implementation compared to commercial software available.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 10:32:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607123
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Enterprise Portal Development Tools: Problem-Oriented Approach
|
4 pages, 2 figures
|
Proceedings of the 7th International Workshop on Computer Science
and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 110-113
| null | null |
cs.SE cs.DC
| null |
The paper deals with problem-oriented visual information system (IS)
engineering for enterprise Internet-based applications, which is a vital part
of the whole development process. The suggested approach is based on semantic
network theory and a novel ConceptModeller CASE tool.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 11:24:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607124
|
Sergey Zykov V.
|
Sergey V. Zykov
|
ConceptModeller: a Problem-Oriented Visual SDK for Globally Distributed
Enterprise Systems
|
4 pages, 2 figures
|
Proceedings of the 7th International Workshop on Computer Science
and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 114-117
| null |
cs.szykov.27374
|
cs.SE cs.DC
| null |
The paper describes problem-oriented approach to software development. The
approach is a part of the original integrated methodology of enterprise
Internet-based software design and implementation. All aspects of software
development, from theory to implementation, are covered.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 11:35:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607125
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Enterprise Portal: from Model to Implementation
|
6 pages, 1 figure
|
Workshop on Computer Science and Information Technologies
(CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.188-193
| null | null |
cs.SE cs.DC
| null |
Portal technology can significantly improve the entire corporate information
infrastructure. The approach proposed is based on rigorous and consistent
(meta)data model and provides for efficient and accurate front-end integration
of heterogeneous corporate applications including enterprise resource planning
(ERP) systems, multimedia data warehouses and proprietary content databases.
The methodology proposed embraces entire software lifecycle; it is illustrated
by an enterprise-level Intranet portal implementation.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:12:01 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607126
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Abstract Machine as a Model of Content Management Information System
|
4 pages
|
Workshop on Computer Science and Information Technologies
(CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.251-252
| null | null |
cs.SE cs.DC
| null |
Enterprise content management is an urgent issue of current scientific and
practical activities in software design and implementation. However, papers
known as yet give insufficient coverage of theoretical background of the
software in question. The paper gives an attempt of building a state-based
model of content management. In accordance with the theoretical principles
outlined, a content management information system (CMIS) has been implemented
in a large international oil-and-gas group of companies.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:40:21 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607127
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Integrating Enterprise Software Applications with Web Portal Technology
|
6 pages, 1 picture
|
Proceedings of 5th International Workshop on Computer Science and
Information Technologies (CSIT'2003), Vol.1, Ufa State Aviation Technical
University, Ufa:USATU Editorial-Publishing Office, 2003, p.p.60-65
| null | null |
cs.SE cs.DC
| null |
Web-portal based approach can significantly improve the entire corporate
information infrastructure. The approach proposed provides for rapid and
accurate front-end integration of heterogeneous corporate applications
including enterprise resource planning (ERP) systems. Human resources ERP
component and multimedia data warehouse implementations are discussed as
essential instances.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:49:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607128
|
Sergey Zykov V.
|
Sergey V. Zykov
|
The Integrated Approach to ERP: Embracing the Web
|
6 pages, 3 pictures
|
Proceedings of 4th International Workshop on Computer Science and
Information Technologies, (CSIT'2002) Sept., 2002, Patras, Greece, Vol.1,
p.p.73-78
| null | null |
cs.SE cs.DC
| null |
Integrated approach to enterprise resource planning (ERP) software design and
implementation can significantly improve the entire corporate information
infrastructure and it helps to benefit from power of Internet services. The
approach proposed provides for corporate Web portal integrity, consistency,
urgency and front-end data processing. Human resources (HR) ERP component
implementation is discussed as an essential instance.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 12:58:51 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607129
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Enterprise Resource Planning Systems: the Integrated Approach
|
12 pages, 6 pictures
|
Proceedings of the 3d International Workshop on Computer Science
and Information Technologies, (CSIT'2001), Ufa:USATU, 2001, Vol.1,
p.p.284-295
| null | null |
cs.SE cs.DC
| null |
Enterprise resource planning (ERP) systems enjoy an increasingly wide
coverage. However, no truly integrate solution has been proposed as yet. ERP
classification is given. Recent trends in commercial systems are analyzed on
the basis of human resources (HR) management software. An innovative "straight
through" design and implementation process of an open, secure, and scalable
integrated event-driven enterprise solution is suggested. Implementation
results are presented.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 13:07:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0607130
|
Sergey Zykov V.
|
Sergey V. Zykov
|
Towards Implementing an Enterprise Groupware-Integrated Human Resources
Information System
|
9 pages, 3 pictures
|
Proceedings of the 2nd International Workshop on Computer Science
and Information Technologies (CSIT'2000), Vol.1, Ufa State Aviation Technical
University, USATU Editorial-Publishing Office, Ufa, 2000, p.p.188-196
| null | null |
cs.SE cs.CY
| null |
Human resources management software is having a wide audience at present.
However, no truly integrate solution has been proposed yet to improve the
systems concerned. Approaches to extra data collection for appraisal
decision-making are considered on the concept modeling theoretical basis.
Current technologies in state-of-the-art HR management software are compared.
Design and implementation aspects for a Web-wired truly integrated secure and
scalable event-driven enterprise system are described. Benchmark results are
presented. Field perspectives are discussed.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 13:14:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zykov",
"Sergey V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0607131
|
Boris Skoric
|
B. Skoric, T.U. Vladimirova, M. Celik, J.C. Talstra
|
Tardos fingerprinting is better than we thought
|
Modified presentation of results
| null | null |
PR-MS 26.957
|
cs.CR
| null |
We review the fingerprinting scheme by Tardos and show that it has a much
better performance than suggested by the proofs in Tardos' original paper. In
particular, the length of the codewords can be significantly reduced.
First we generalize the proofs of the false positive and false negative error
probabilities with the following modifications: (1) we replace Tardos'
hard-coded numbers by variables and (2) we allow for independently chosen false
positive and false negative error rates. It turns out that all the
collusion-resistance properties can still be proven when the code length is
reduced by a factor of more than 2.
Second, we study the statistical properties of the fingerprinting scheme, in
particular the average and variance of the accusations. We identify which
colluder strategy forces the content owner to employ the longest code. Using a
gaussian approximation for the probability density functions of the
accusations, we show that the required false negative and false positive error
rate can be achieved with codes that are a factor 2 shorter than required for
rigid proofs.
Combining the results of these two approaches, we show that the Tardos scheme
can be used with a code length approximately 5 times shorter than in the
original construction.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 15:11:23 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Jun 2008 09:41:53 GMT"
}
] | 2008-06-03T00:00:00 |
[
[
"Skoric",
"B.",
""
],
[
"Vladimirova",
"T. U.",
""
],
[
"Celik",
"M.",
""
],
[
"Talstra",
"J. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0607132
|
Ludo M.G.M. Tolhuizen
|
R. Ahlswede, H. Aydinian, L.H. Khachatrian and L.M.G.M. Tolhuizen
|
On q-ary codes correcting all unidirectional errors of a limited
magnitude
|
22 pages,no figures. Accepted for publication of Journal of Armenian
Academy of Sciences, special issue dedicated to Rom Varshamov
| null | null | null |
cs.IT math.IT
| null |
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of
unidirectional errors of level l. That is, the transmission channel is such
that the received word cannot contain both a component larger than the
transmitted one and a component smaller than the transmitted one. Moreover, the
absolute value of the difference between a transmitted component and its
received version is at most l.
We introduce and study q-ary codes capable of correcting all unidirectional
errors of level l. Lower and upper bounds for the maximal size of those codes
are presented.
We also study codes for this aim that are defined by a single equation on the
codeword coordinates(similar to the Varshamov-Tenengolts codes for correcting
binary asymmetric errors). We finally consider the problem of detecting all
unidirectional errors of level l.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 15:51:31 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ahlswede",
"R.",
""
],
[
"Aydinian",
"H.",
""
],
[
"Khachatrian",
"L. H.",
""
],
[
"Tolhuizen",
"L. M. G. M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607133
|
Peter Turney
|
Robert Ewaschuk, Peter D. Turney
|
Self-Replication and Self-Assembly for Manufacturing
|
Java code available at http://purl.org/net/johnnyvon/
|
Artificial Life, (2006), 12, 411-433
|
10.1162/artl.2006.12.3.411
|
NRC-48760
|
cs.MA cs.CE
| null |
It has been argued that a central objective of nanotechnology is to make
products inexpensively, and that self-replication is an effective approach to
very low-cost manufacturing. The research presented here is intended to be a
step towards this vision. We describe a computational simulation of nanoscale
machines floating in a virtual liquid. The machines can bond together to form
strands (chains) that self-replicate and self-assemble into user-specified
meshes. There are four types of machines and the sequence of machine types in a
strand determines the shape of the mesh they will build. A strand may be in an
unfolded state, in which the bonds are straight, or in a folded state, in which
the bond angles depend on the types of machines. By choosing the sequence of
machine types in a strand, the user can specify a variety of polygonal shapes.
A simulation typically begins with an initial unfolded seed strand in a soup of
unbonded machines. The seed strand replicates by bonding with free machines in
the soup. The child strands fold into the encoded polygonal shape, and then the
polygons drift together and bond to form a mesh. We demonstrate that a variety
of polygonal meshes can be manufactured in the simulation, by simply changing
the sequence of machine types in the seed.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 17:55:16 GMT"
}
] | 2020-08-20T00:00:00 |
[
[
"Ewaschuk",
"Robert",
""
],
[
"Turney",
"Peter D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
cs/0607134
|
Vladimir Vovk
|
Vladimir Vovk
|
Leading strategies in competitive on-line prediction
|
20 pages; a conference version is to appear in the ALT'2006
proceedings
| null | null | null |
cs.LG
| null |
We start from a simple asymptotic result for the problem of on-line
regression with the quadratic loss function: the class of continuous
limited-memory prediction strategies admits a "leading prediction strategy",
which not only asymptotically performs at least as well as any continuous
limited-memory strategy but also satisfies the property that the excess loss of
any continuous limited-memory strategy is determined by how closely it imitates
the leading strategy. More specifically, for any class of prediction strategies
constituting a reproducing kernel Hilbert space we construct a leading
strategy, in the sense that the loss of any prediction strategy whose norm is
not too large is determined by how closely it imitates the leading strategy.
This result is extended to the loss functions given by Bregman divergences and
by strictly proper scoring rules.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 22:11:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vovk",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607135
|
Shmuel Friedland
|
Shmuel Friedland and Daniel Levy
|
A polynomial-time approximation algorithm for the number of k-matchings
in bipartite graphs
|
6 pages
| null | null | null |
cs.CC cs.DM
| null |
We show that the number of $k$-matching in a given undirected graph
$G$ is equal to the number of perfect matching of the corresponding graph
$G_k$ on an even number of vertices divided by a suitable factor.
If $G$ is bipartite then one can construct a bipartite $G_k$.
For bipartite graphs this result implies that the number of $k$-matching has
a polynomial-time approximation algorithm. The above results are extended to
permanents and hafnians of corresponding matrices.
|
[
{
"version": "v1",
"created": "Fri, 28 Jul 2006 19:03:07 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Friedland",
"Shmuel",
""
],
[
"Levy",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0607136
|
Vladimir Vovk
|
Vladimir Vovk
|
Competing with Markov prediction strategies
|
11 pages
| null | null | null |
cs.LG
| null |
Assuming that the loss function is convex in the prediction, we construct a
prediction strategy universal for the class of Markov prediction strategies,
not necessarily continuous. Allowing randomization, we remove the requirement
of convexity.
|
[
{
"version": "v1",
"created": "Fri, 28 Jul 2006 21:45:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Vovk",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607137
|
Henrik Petander
|
Henrik Petander, Eranga Perera, Aruna Seneviratne
|
Multicasting with selective delivery: A SafetyNet for vertical handoffs
|
20 pages
| null | null | null |
cs.NI
| null |
In future mobility support will require handling roaming in heterogeneous
access networks. In order to enable seamless roaming it is necessary to
minimize the impact of the vertical handoffs. Localized mobility management
schemes such as FMIPv6 and HMIPv6 do not provide sufficient handoff
performance, since they have been designed for horizontal handoffs. In this
paper, we propose the SafetyNet protocol, which allows a Mobile Node to perform
seamless vertical handoffs. Further, we propose a handoff timing algorithm
which allows a Mobile Node to delay or even completely avoid upward vertical
handoffs. We implement the SafetyNet protocol and compare its performance with
the Fast Handovers for Mobile IPv6 protocol in our wireless test bed and
analyze the results. The experimental results indicate that the proposed
SafetyNet protocol can provide an improvement of up to 95% for TCP performance
in vertical handoffs, when compared with FMIPv6 and an improvement of 64% over
FMIPv6 with bicasting. We use numerical analysis of the protocol to show that
its signaling and data transmission overhead is comparable to Fast Mobile IPv6
and significantly smaller than that of FMIPv6 with bicasting.
|
[
{
"version": "v1",
"created": "Sat, 29 Jul 2006 01:45:39 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Petander",
"Henrik",
""
],
[
"Perera",
"Eranga",
""
],
[
"Seneviratne",
"Aruna",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0607138
|
Mohamed Belal A.Y.
|
Mohamed A. Belal
|
A Foundation to Perception Computing, Logic and Automata
|
39 pages, pdf format, to be published
| null | null | null |
cs.AI cs.LG
| null |
In this report, a novel approach to intelligence and learning is introduced,
this approach is based on what we call 'perception logic'. Based on this logic,
a computing mechanism and automata are introduced. Multi-resolution analysis of
perceptual information is given, in which learning is accomplished in at most
O(log(N))epochs, where N is the number of samples, and the convergence is
guarnteed. This approach combines the favors of computational modeles in the
sense that they are structured and mathematically well-defined, and the
adaptivity of soft computing approaches, in addition to the continuity and
real-time response of dynamical systems.
|
[
{
"version": "v1",
"created": "Sun, 30 Jul 2006 10:44:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Belal",
"Mohamed A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0607139
|
Holenstein Thomas
|
Thomas Holenstein
|
Parallel repetition: simplifications and the no-signaling case
|
27 pages; v2:PRW97 strengthening added, references added, typos
fixed; v3: fixed error in the proof of the no-signaling theorem, minor
changes
|
Theory of Computing 5 (2009) 1, pp. 141-172
|
10.4086/toc.2009.v005a008
| null |
cs.CC quant-ph
| null |
Consider a game where a refereed a referee chooses (x,y) according to a
publicly known distribution P_XY, sends x to Alice, and y to Bob. Without
communicating with each other, Alice responds with a value "a" and Bob responds
with a value "b". Alice and Bob jointly win if a publicly known predicate
Q(x,y,a,b) holds.
Let such a game be given and assume that the maximum probability that Alice
and Bob can win is v<1. Raz (SIAM J. Comput. 27, 1998) shows that if the game
is repeated n times in parallel, then the probability that Alice and Bob win
all games simultaneously is at most v'^(n/log(s)), where s is the maximal
number of possible responses from Alice and Bob in the initial game, and v' is
a constant depending only on v.
In this work, we simplify Raz's proof in various ways and thus shorten it
significantly. Further we study the case where Alice and Bob are not restricted
to local computations and can use any strategy which does not imply
communication among them.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 16:09:37 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Sep 2006 16:54:54 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Dec 2006 01:59:48 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Holenstein",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0607140
|
Lukas Pichl
|
Lukas Pichl, Taisei Kaizoji, Takuya Yamano
|
Stylized Facts in Internal Rates of Return on Stock Index and its
Derivative Transactions
|
APFA 5
| null |
10.1016/j.physa.2007.03.042
| null |
cs.IT cs.CE math.IT
| null |
Universal features in stock markets and their derivative markets are studied
by means of probability distributions in internal rates of return on buy and
sell transaction pairs. Unlike the stylized facts in log normalized returns,
the probability distributions for such single asset encounters encorporate the
time factor by means of the internal rate of return defined as the continuous
compound interest. Resulting stylized facts are shown in the probability
distributions derived from the daily series of TOPIX, S & P 500 and FTSE 100
index close values. The application of the above analysis to minute-tick data
of NIKKEI 225 and its futures market, respectively, reveals an interesting
diffference in the behavior of the two probability distributions, in case a
threshold on the minimal duration of the long position is imposed. It is
therefore suggested that the probability distributions of the internal rates of
return could be used for causality mining between the underlying and derivative
stock markets. The highly specific discrete spectrum, which results from noise
trader strategies as opposed to the smooth distributions observed for
fundamentalist strategies in single encounter transactions may be also useful
in deducing the type of investment strategy from trading revenues of small
portfolio investors.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 12:15:28 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Aug 2006 10:05:09 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Pichl",
"Lukas",
""
],
[
"Kaizoji",
"Taisei",
""
],
[
"Yamano",
"Takuya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0607141
|
Riccardo Pucella
|
Karl Crary and Robert Harper
|
Logic Column 16: Higher-Order Abstract Syntax: Setting the Record
Straight
|
4 pages
| null | null | null |
cs.LO
| null |
This article responds to a critique of higher-order abstract syntax appearing
in Logic Column 14, ``Nominal Logic and Abstract Syntax'', cs.LO/0511025.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 14:15:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Crary",
"Karl",
""
],
[
"Harper",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0607142
|
Andreas U. Schmidt
|
Nicolai Kuntze, Dominique Maehler, and Andreas U. Schmidt
|
Employing Trusted Computing for the forward pricing of pseudonyms in
reputation systems
|
Refereed contribution to the 4th International Workshop for
Technical, Economic and Legal Aspects of Business Models for Virtual Goods,
December 13 -15, 2006 on AXMEDIS 2006 in Leeds, England. 5 pages, 3 figures,
final version
| null | null | null |
cs.CR
| null |
Reputation and recommendation systems are fundamental for the formation of
community market places. Yet, they are easy targets for attacks which disturb a
market's equilibrium and are often based on cheap pseudonyms used to submit
ratings. We present a method to price ratings using trusted computing, based on
pseudonymous tickets.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 15:17:39 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Aug 2006 09:51:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kuntze",
"Nicolai",
""
],
[
"Maehler",
"Dominique",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0607143
|
Florentin Smarandache
|
Jean Dezert, Albena Tchamova, Florentin Smarandache, Pavlina
Konstantinova
|
Target Type Tracking with PCR5 and Dempster's rules: A Comparative
Analysis
|
10 pages, 5 diagrams. Presented to Fusion 2006 International
Conference, Florence, Italy, July 2006
|
Proceedings of Fusion 2006 International Conference, Florence,
Italy, July 2006
| null | null |
cs.AI
| null |
In this paper we consider and analyze the behavior of two combinational rules
for temporal (sequential) attribute data fusion for target type estimation. Our
comparative analysis is based on Dempster's fusion rule proposed in
Dempster-Shafer Theory (DST) and on the Proportional Conflict Redistribution
rule no. 5 (PCR5) recently proposed in Dezert-Smarandache Theory (DSmT). We
show through very simple scenario and Monte-Carlo simulation, how PCR5 allows a
very efficient Target Type Tracking and reduces drastically the latency delay
for correct Target Type decision with respect to Demspter's rule. For cases
presenting some short Target Type switches, Demspter's rule is proved to be
unable to detect the switches and thus to track correctly the Target Type
changes. The approach proposed here is totally new, efficient and promising to
be incorporated in real-time Generalized Data Association - Multi Target
Tracking systems (GDA-MTT) and provides an important result on the behavior of
PCR5 with respect to Dempster's rule. The MatLab source code is provided in
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 15:32:44 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dezert",
"Jean",
""
],
[
"Tchamova",
"Albena",
""
],
[
"Smarandache",
"Florentin",
""
],
[
"Konstantinova",
"Pavlina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0607144
|
Stanimir Andonov A
|
Stanimir Andonov
|
Levels of Product Differentiation in the Global Mobile Phones Market
| null | null | null | null |
cs.OH
| null |
The sixth product level called compliant product is a connecting element
between the physical product characteristics and the strategy of the producer
company. The article discusses the differentiation among the product offers of
companies working in the global markets, as well as the strategies which they
use and could use in that respect.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 15:43:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Andonov",
"Stanimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0607145
|
Ioannis Doxaras N. Mr
|
Yannis Bakopoulos, Theophanis Raptis, Doxaras Ioannis
|
Geometric definition of a new skeletonization concept
|
9 pages, 3 figures, to appear in "2nd Interdisciplinary Symposium and
2nd Summer School on Mathematical Modeling in Modern Technologies and
Economics", 1-5 September, Athens, Greece
| null | null | null |
cs.CG
| null |
The Divider set, as an innovative alternative concept to maximal disks,
Voronoi sets and cut loci, is presented with a formal definition based on
topology and differential geometry. The relevant mathematical theory by
previous authors and a comparison with other medial axis definitions is
presented. Appropriate applications are proposed and examined.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 18:17:30 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Aug 2006 13:53:45 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Sep 2006 13:26:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bakopoulos",
"Yannis",
""
],
[
"Raptis",
"Theophanis",
""
],
[
"Ioannis",
"Doxaras",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0607146
|
Riccardo Pucella
|
Joseph Y. Halpern (Cornell University), Riccardo Pucella (Northeastern
University)
|
Modeling Adversaries in a Logic for Security Protocol Analysis
|
23 pages. A preliminary version appeared in the proceedings of
FaSec'02
|
Logical Methods in Computer Science, Volume 8, Issue 1 (March 9,
2012) lmcs:688
|
10.2168/LMCS-8(1:21)2012
| null |
cs.CR cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Logics for security protocol analysis require the formalization of an
adversary model that specifies the capabilities of adversaries. A common model
is the Dolev-Yao model, which considers only adversaries that can compose and
replay messages, and decipher them with known keys. The Dolev-Yao model is a
useful abstraction, but it suffers from some drawbacks: it cannot handle the
adversary knowing protocol-specific information, and it cannot handle
probabilistic notions, such as the adversary attempting to guess the keys. We
show how we can analyze security protocols under different adversary models by
using a logic with a notion of algorithmic knowledge. Roughly speaking,
adversaries are assumed to use algorithms to compute their knowledge; adversary
capabilities are captured by suitable restrictions on the algorithms used. We
show how we can model the standard Dolev-Yao adversary in this setting, and how
we can capture more general capabilities including protocol-specific knowledge
and guesses.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 16:44:15 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jan 2012 05:52:58 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Mar 2012 15:55:49 GMT"
},
{
"version": "v4",
"created": "Wed, 7 Mar 2012 07:38:47 GMT"
},
{
"version": "v5",
"created": "Thu, 8 Mar 2012 13:33:09 GMT"
},
{
"version": "v6",
"created": "Fri, 9 Mar 2012 07:02:01 GMT"
}
] | 2019-03-14T00:00:00 |
[
[
"Halpern",
"Joseph Y.",
"",
"Cornell University"
],
[
"Pucella",
"Riccardo",
"",
"Northeastern\n University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0607147
|
Florentin Smarandache
|
Florentin Smarandache, Jean Dezert
|
Fusion of qualitative beliefs using DSmT
|
13 pages. To appear in "Advances and Applications of DSmT for
Information Fusion", collected works, second volume, 2006
|
Presented as an extended version (Tutorial MO2) to the Fusion 2006
International Conference, Florence, Italy, July 10-13, 2006
| null | null |
cs.AI
| null |
This paper introduces the notion of qualitative belief assignment to model
beliefs of human experts expressed in natural language (with linguistic
labels). We show how qualitative beliefs can be efficiently combined using an
extension of Dezert-Smarandache Theory (DSmT) of plausible and paradoxical
quantitative reasoning to qualitative reasoning. We propose a new arithmetic on
linguistic labels which allows a direct extension of classical DSm fusion rule
or DSm Hybrid rules. An approximate qualitative PCR5 rule is also proposed
jointly with a Qualitative Average Operator. We also show how crisp or interval
mappings can be used to deal indirectly with linguistic labels. A very simple
example is provided to illustrate our qualitative fusion rules.
|
[
{
"version": "v1",
"created": "Mon, 31 Jul 2006 17:16:57 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Nov 2006 19:16:48 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0608001
|
Bas Luttik
|
Luca Aceto, Wan Fokkink, Anna Ingolfsdottir, and Bas Luttik
|
A Finite Equational Base for CCS with Left Merge and Communication Merge
| null | null | null | null |
cs.LO
| null |
Using the left merge and communication merge from ACP, we present an
equational base (i.e., a ground-complete and $\omega$-complete set of valid
equations) for the fragment of CCS without recursion, restriction and
relabelling. Our equational base is finite if the set of actions is finite.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2006 10:45:29 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Aug 2006 08:20:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Aceto",
"Luca",
""
],
[
"Fokkink",
"Wan",
""
],
[
"Ingolfsdottir",
"Anna",
""
],
[
"Luttik",
"Bas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608002
|
Florentin Smarandache
|
Florentin Smarandache, Jean Dezert
|
An Introduction to the DSm Theory for the Combination of Paradoxical,
Uncertain, and Imprecise Sources of Information
|
21 pages, many tables, figures. To appear in Information&Security
International Journal, 2006
|
Presented at 13th International Congress of Cybernetics and
Systems, Maribor, Slovenia, July 6-10, 2005.
| null | null |
cs.AI
| null |
The management and combination of uncertain, imprecise, fuzzy and even
paradoxical or high conflicting sources of information has always been, and
still remains today, of primal importance for the development of reliable
modern information systems involving artificial reasoning. In this
introduction, we present a survey of our recent theory of plausible and
paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT) in the
literature, developed for dealing with imprecise, uncertain and paradoxical
sources of information. We focus our presentation here rather on the
foundations of DSmT, and on the two important new rules of combination, than on
browsing specific applications of DSmT available in literature. Several simple
examples are given throughout the presentation to show the efficiency and the
generality of this new approach.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2006 15:31:13 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Smarandache",
"Florentin",
""
],
[
"Dezert",
"Jean",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0608003
|
Alessandro Rosa
|
Alessandro Rosa
|
On a solution to display non-filled-in quaternionic Julia sets
|
15 pages, 28 figures
| null | null | null |
cs.GR cs.MS math.DS
| null |
During early 1980s, the so-called `escape time' method, developed to display
the Julia sets for complex dynamical systems, was exported to quaternions in
order to draw analogous pictures in this wider numerical field. Despite of the
fine results in the complex plane, where all topological configurations of
Julia sets have been successfully displayed, the `escape time' method fails to
render properly the non-filled-in variety of quaternionic Julia sets. So their
digital visualisation remained an open problem for several years. Both the
solution for extending this old method to non-filled-in quaternionic Julia sets
and its implementation into a program are explained here.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2006 19:25:17 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Aug 2006 22:08:19 GMT"
}
] | 2007-06-13T00:00:00 |
[
[
"Rosa",
"Alessandro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
] |
cs/0608004
|
Jose M. Soler
|
Jose M. Soler
|
Separating the articles of authors with the same name
|
4 pages, 0 figures
| null | null | null |
cs.DL cs.IR
| null |
I describe a method to separate the articles of different authors with the
same name. It is based on a distance between any two publications, defined in
terms of the probability that they would have as many coincidences if they were
drawn at random from all published documents. Articles with a given author name
are then clustered according to their distance, so that all articles in a
cluster belong very likely to the same author. The method has proven very
useful in generating groups of papers that are then selected manually. This
simplifies considerably citation analysis when the author publication lists are
not available.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2006 18:23:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Soler",
"Jose M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0608005
|
Kasper Peeters
|
Kasper Peeters
|
A field-theory motivated approach to symbolic computer algebra
|
14 pages; v2: several clarifications and references added, version as
published
|
Comput.Phys.Commun.176:550-558,2007
|
10.1016/j.cpc.2007.01.003
|
AEI-2006-037
|
cs.SC gr-qc hep-th
| null |
Field theory is an area in physics with a deceptively compact notation.
Although general purpose computer algebra systems, built around generic
list-based data structures, can be used to represent and manipulate
field-theory expressions, this often leads to cumbersome input formats,
unexpected side-effects, or the need for a lot of special-purpose code. This
makes a direct translation of problems from paper to computer and back
needlessly time-consuming and error-prone. A prototype computer algebra system
is presented which features TeX-like input, graph data structures, lists with
Young-tableaux symmetries and a multiple-inheritance property system. The
usefulness of this approach is illustrated with a number of explicit
field-theory problems.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2006 19:05:20 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jun 2007 12:21:22 GMT"
}
] | 2008-11-26T00:00:00 |
[
[
"Peeters",
"Kasper",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
}
] |
cs/0608006
|
S. Sandeep Pradhan
|
Suhan Choi and S. Sandeep Pradhan
|
A Graph-based Framework for Transmission of Correlated Sources over
Broadcast Channels
|
36 pages, 9 figures
| null | null | null |
cs.IT math.IT
| null |
In this paper we consider the communication problem that involves
transmission of correlated sources over broadcast channels. We consider a
graph-based framework for this information transmission problem. The system
involves a source coding module and a channel coding module. In the source
coding module, the sources are efficiently mapped into a nearly semi-regular
bipartite graph, and in the channel coding module, the edges of this graph are
reliably transmitted over a broadcast channel. We consider nearly semi-regular
bipartite graphs as discrete interface between source coding and channel coding
in this multiterminal setting. We provide an information-theoretic
characterization of (1) the rate of exponential growth (as a function of the
number of channel uses) of the size of the bipartite graphs whose edges can be
reliably transmitted over a broadcast channel and (2) the rate of exponential
growth (as a function of the number of source samples) of the size of the
bipartite graphs which can reliably represent a pair of correlated sources to
be transmitted over a broadcast channel.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2006 22:34:26 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Choi",
"Suhan",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608007
|
Renato Renner
|
Thomas Holenstein and Renato Renner
|
On the randomness of independent experiments
|
latex, 15 pages
| null | null | null |
cs.IT math.IT
| null |
Given a probability distribution P, what is the minimum amount of bits needed
to store a value x sampled according to P, such that x can later be recovered
(except with some small probability)? Or, what is the maximum amount of uniform
randomness that can be extracted from x? Answering these and similar
information-theoretic questions typically boils down to computing so-called
smooth entropies. In this paper, we derive explicit and almost tight bounds on
the smooth entropies of n-fold product distributions.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 03:25:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Holenstein",
"Thomas",
""
],
[
"Renner",
"Renato",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608008
|
Ilya Safro
|
Ilya Safro
|
The minimum linear arrangement problem on proper interval graphs
| null | null | null | null |
cs.DM cs.DS
| null |
We present a linear time algorithm for the minimum linear arrangement problem
on proper interval graphs. The obtained ordering is a 4-approximation for
general interval graphs
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 07:46:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Safro",
"Ilya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0608009
|
Claudia Landi
|
Andrea Cerri, Patrizio Frosini and Claudia Landi
|
Stability in multidimensional Size Theory
|
15 pages, 1 figure, uses psfrag
| null | null |
Universita' di Modena e Reggio Emilia, DISMI-85 june 2006
|
cs.CG cs.CV
| null |
This paper proves that in Size Theory the comparison of multidimensional size
functions can be reduced to the 1-dimensional case by a suitable change of
variables. Indeed, we show that a foliation in half-planes can be given, such
that the restriction of a multidimensional size function to each of these
half-planes turns out to be a classical size function in two scalar variables.
This leads to the definition of a new distance between multidimensional size
functions, and to the proof of their stability with respect to that distance.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 08:49:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Cerri",
"Andrea",
""
],
[
"Frosini",
"Patrizio",
""
],
[
"Landi",
"Claudia",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0608010
|
Sander Stepanov
|
Sander Stepanov
|
MIMO scheme performance and detection in epsilon noise
|
30 pages
| null | null | null |
cs.IT math.IT
| null |
New approach for analysis and decoding MIMO signaling is developed for usual
model of nongaussion noise consists of background and impulsive noise named
epsilon - noise. It is shown that non-gaussion noise performance significantly
worse than gaussion ones. Stimulation results strengthen out theory. Robust in
statistical sense detection rule is suggested for such kind of noise features
much best robust detector performance than detector designed for Gaussian noise
in impulsive environment and modest margin in background noise. Proposed
algorithms performance are comparable with developed potential bound. Proposed
tool, is crucial issue for MIMO communication system design, since real noise
environment has impulsive character that contradict with wide used Gaussian
approach, so real MIMO performance much different for Gaussian a non-Gaussian
noise model.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 09:52:11 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 11:59:19 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Stepanov",
"Sander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608011
|
Krzysztof R. Apt
|
Krzysztof R. Apt
|
The Many Faces of Rationalizability
|
39 pages, appeared in The B.E. Journal of Theoretical Economics: Vol.
7 : Iss. 1 (Topics), Article 18. Available at:
http://www.bepress.com/bejte/vol7/iss1/art18
| null | null | null |
cs.GT
| null |
The rationalizability concept was introduced in \cite{Ber84} and
\cite{Pea84} to assess what can be inferred by rational players in a
non-cooperative game in the presence of common knowledge. However, this notion
can be defined in a number of ways that differ in seemingly unimportant minor
details. We shed light on these differences, explain their impact, and clarify
for which games these definitions coincide. Then we apply the same analysis to
explain the differences and similarities between various ways the iterated
elimination of strictly dominated strategies was defined in the literature.
This allows us to clarify the results of \cite{DS02} and \cite{CLL05} and
improve upon them. We also consider the extension of these results to strict
dominance by a mixed strategy. Our approach is based on a general study of the
operators on complete lattices. We allow transfinite iterations of the
considered operators and clarify the need for them. The advantage of such a
general approach is that a number of results, including order independence for
some of the notions of rationalizability and strict dominance, come for free.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 09:57:54 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Oct 2006 12:32:01 GMT"
},
{
"version": "v3",
"created": "Fri, 25 May 2007 10:48:44 GMT"
}
] | 2007-06-13T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0608012
|
Stavros Toumpis
|
R. Catanuto, S. Toumpis, G. Morabito
|
Opti{c,m}al: Optical/Optimal Routing in Massively Dense Wireless
Networks
| null |
Proc. INFOCOM 2007, Anchorage, AL, May 2007
|
10.1109/INFCOM.2007.122
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study routing for massively dense wireless networks, i.e., wireless
networks that contain so many nodes that, in addition to their usual
microscopic description, a novel macroscopic description becomes possible. The
macroscopic description is not detailed, but nevertheless contains enough
information to permit a meaningful study and performance optimization of the
network. Within this context, we continue and significantly expand previous
work on the analogy between optimal routing and the propagation of light
according to the laws of Geometrical Optics. Firstly, we pose the analogy in a
more general framework than previously, notably showing how the eikonal
equation, which is the central equation of Geometrical Optics, also appears in
the networking context. Secondly, we develop a methodology for calculating the
cost function, which is the function describing the network at the macroscopic
level. We apply this methodology for two important types of networks: bandwidth
limited and energy limited.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 14:26:30 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Oct 2013 12:35:35 GMT"
}
] | 2013-10-24T00:00:00 |
[
[
"Catanuto",
"R.",
""
],
[
"Toumpis",
"S.",
""
],
[
"Morabito",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608013
|
Julien Robert
|
Julien Robert, Nicolas Schabanel
|
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to
Items
| null | null | null | null |
cs.DS cs.CC
| null |
Broadcasting is known to be an efficient means of disseminating data in
wireless communication environments (such as Satellite, mobile phone
networks,...). It has been recently observed that the average service time of
broadcast systems can be considerably improved by taking into consideration
existing correlations between requests. We study a pull-based data broadcast
system where users request possibly overlapping sets of items; a request is
served when all its requested items are downloaded. We aim at minimizing the
average user perceived latency, i.e. the average flow time of the requests. We
first show that any algorithm that ignores the dependencies can yield arbitrary
bad performances with respect to the optimum even if it is given arbitrary
extra resources. We then design a $(4+\epsilon)$-speed
$O(1+1/\epsilon^2)$-competitive algorithm for this setting that consists in 1)
splitting evenly the bandwidth among each requested set and in 2) broadcasting
arbitrarily the items still missing in each set into the bandwidth the set has
received. Our algorithm presents several interesting features: it is simple to
implement, non-clairvoyant, fair to users so that no user may starve for a long
period of time, and guarantees good performances in presence of correlations
between user requests (without any change in the broadcast protocol). We also
present a $ (4+\epsilon)$-speed $O(1+1/\epsilon^3)$-competitive algorithm which
broadcasts at most one item at any given time and preempts each item broadcast
at most once on average. As a side result of our analysis, we design a
competitive algorithm for a particular setting of non-clairvoyant job
scheduling with dependencies, which might be of independent interest.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 15:00:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Robert",
"Julien",
""
],
[
"Schabanel",
"Nicolas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608014
|
Jian Tan
|
Yuliy Baryshnikov, Jian Tan
|
Localization for Anchoritic Sensor Networks
| null | null | null | null |
cs.NI cs.CG
| null |
We introduce a class of anchoritic sensor networks, where communications
between sensor nodes is undesirable or infeasible, e.g., due to harsh
environment, energy constraints, or security considerations.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 22:10:51 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Baryshnikov",
"Yuliy",
""
],
[
"Tan",
"Jian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0608015
|
Sebastian Brand
|
Sebastian Brand, Roland H. C. Yap
|
Towards "Propagation = Logic + Control"
|
15 pages; 22nd International Conference on Logic Programming
(ICLP'06)
| null | null | null |
cs.PL cs.AI
| null |
Constraint propagation algorithms implement logical inference. For
efficiency, it is essential to control whether and in what order basic
inference steps are taken. We provide a high-level framework that clearly
differentiates between information needed for controlling propagation versus
that needed for the logical semantics of complex constraints composed from
primitive ones. We argue for the appropriateness of our controlled propagation
framework by showing that it captures the underlying principles of manually
designed propagation algorithms, such as literal watching for unit clause
propagation and the lexicographic ordering constraint. We provide an
implementation and benchmark results that demonstrate the practicality and
efficiency of our framework.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 02:41:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Brand",
"Sebastian",
""
],
[
"Yap",
"Roland H. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0608016
|
Sebastian Brand
|
Gregory J. Duck, Peter J. Stuckey, Sebastian Brand
|
ACD Term Rewriting
|
21 pages; 22nd International Conference on Logic Programming
(ICLP'06)
| null | null | null |
cs.PL cs.SC
| null |
We introduce Associative Commutative Distributive Term Rewriting (ACDTR), a
rewriting language for rewriting logical formulae. ACDTR extends AC term
rewriting by adding distribution of conjunction over other operators.
Conjunction is vital for expressive term rewriting systems since it allows us
to require that multiple conditions hold for a term rewriting rule to be used.
ACDTR uses the notion of a "conjunctive context", which is the conjunction of
constraints that must hold in the context of a term, to enable the programmer
to write very expressive and targeted rewriting rules. ACDTR can be seen as a
general logic programming language that extends Constraint Handling Rules and
AC term rewriting. In this paper we define the semantics of ACDTR and describe
our prototype implementation.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 02:55:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Duck",
"Gregory J.",
""
],
[
"Stuckey",
"Peter J.",
""
],
[
"Brand",
"Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0608017
|
Sebastian Brand
|
Krzysztof R. Apt, Sebastian Brand
|
Infinite Qualitative Simulations by Means of Constraint Programming
|
15 pages; 12th International Conference on Principles and Practice of
Constraint Programming (CP'06)
| null | null | null |
cs.AI cs.LO
| null |
We introduce a constraint-based framework for studying infinite qualitative
simulations concerned with contingencies such as time, space, shape, size,
abstracted into a finite set of qualitative relations. To define the
simulations, we combine constraints that formalize the background knowledge
concerned with qualitative reasoning with appropriate inter-state constraints
that are formulated using linear temporal logic. We implemented this approach
in a constraint programming system by drawing on ideas from bounded model
checking. The resulting system allows us to test and modify the problem
specifications in a straightforward way and to combine various knowledge
aspects.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 03:08:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
],
[
"Brand",
"Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.