id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0607065
Khalil Djelloul
Khalil Djelloul
Decomposable Theories
null
null
null
null
cs.LO cs.AI
null
We present in this paper a general algorithm for solving first-order formulas in particular theories called "decomposable theories". First of all, using special quantifiers, we give a formal characterization of decomposable theories and show some of their properties. Then, we present a general algorithm for solving first-order formulas in any decomposable theory "T". The algorithm is given in the form of five rewriting rules. It transforms a first-order formula "P", which can possibly contain free variables, into a conjunction "Q" of solved formulas easily transformable into a Boolean combination of existentially quantified conjunctions of atomic formulas. In particular, if "P" has no free variables then "Q" is either the formula "true" or "false". The correctness of our algorithm proves the completeness of the decomposable theories. Finally, we show that the theory "Tr" of finite or infinite trees is a decomposable theory and give some benchmarks realized by an implementation of our algorithm, solving formulas on two-partner games in "Tr" with more than 160 nested alternated quantifiers.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 14:46:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Djelloul", "Khalil", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607066
Dimitrios Katsaros
Antonis Sidiropoulos, Dimitrios Katsaros, Yannis Manolopoulos
Generalized h-index for Disclosing Latent Facts in Citation Networks
19 pages, 17 tables, 27 figures
null
null
null
cs.DL
null
What is the value of a scientist and its impact upon the scientific thinking? How can we measure the prestige of a journal or of a conference? The evaluation of the scientific work of a scientist and the estimation of the quality of a journal or conference has long attracted significant interest, due to the benefits from obtaining an unbiased and fair criterion. Although it appears to be simple, defining a quality metric is not an easy task. To overcome the disadvantages of the present metrics used for ranking scientists and journals, J.E. Hirsch proposed a pioneering metric, the now famous h-index. In this article, we demonstrate several inefficiencies of this index and develop a pair of generalizations and effective variants of it to deal with scientist ranking and with publication forum ranking. The new citation indices are able to disclose trendsetters in scientific research, as well as researchers that constantly shape their field with their influential work, no matter how old they are. We exhibit the effectiveness and the benefits of the new indices to unfold the full potential of the h-index, with extensive experimental results obtained from DBLP, a widely known on-line digital library.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 15:47:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Sidiropoulos", "Antonis", "" ], [ "Katsaros", "Dimitrios", "" ], [ "Manolopoulos", "Yannis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0607067
Vladimir Vovk
Vladimir Vovk
Competing with stationary prediction strategies
20 pages
null
null
null
cs.LG
null
In this paper we introduce the class of stationary prediction strategies and construct a prediction algorithm that asymptotically performs as well as the best continuous stationary strategy. We make mild compactness assumptions but no stochastic assumptions about the environment. In particular, no assumption of stationarity is made about the environment, and the stationarity of the considered strategies only means that they do not depend explicitly on time; we argue that it is natural to consider only stationary strategies even for highly non-stationary environments.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 15:52:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607068
Felice Manganiello
Felice Manganiello
Computation of the Weight Distribution of CRC Codes
16 pages, 1 figure, submitted for publication
null
null
null
cs.IT math.AC math.IT
null
In this article, we illustrate an algorithm for the computation of the weight distribution of CRC codes. The recursive structure of CRC codes will give us an iterative way to compute the weight distribution of their dual codes starting from just some ``representative'' words. Thanks to MacWilliams Theorem, the computation of the weight distribution of dual codes can be easily brought back to that of CRC codes. This algorithm is a good alternative to the standard algorithm that involves listing every word of the code.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 17:24:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Manganiello", "Felice", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607069
Nithin Nagaraj
Mahesh C Shastry, Nithin Nagaraj, Prabhakar G Vaidya
The B-Exponential Map: A Generalization of the Logistic Map, and Its Applications In Generating Pseudo-random Numbers
25 pages, 15 figures
null
null
null
cs.CR nlin.CD
null
A 1-dimensional generalization of the well known Logistic Map is proposed. The proposed family of maps is referred to as the B-Exponential Map. The dynamics of this map are analyzed and found to have interesting properties. In particular, the B-Exponential Map exhibits robust chaos for all real values of the parameter B >= e^(-4). We then propose a pseudo-random number generator based on the B-Exponential Map by chaotically hopping between different trajectories for different values of B. We call this BEACH (B-Exponential All-Chaotic Map Hopping) pseudo-random number generator. BEACH successfully passes stringent statistical randomness tests such as ENT, NIST and Diehard. An implementation of BEACH is also outlined.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 08:42:36 GMT" }, { "version": "v2", "created": "Mon, 17 Jul 2006 14:37:02 GMT" } ]
2011-01-25T00:00:00
[ [ "Shastry", "Mahesh C", "" ], [ "Nagaraj", "Nithin", "" ], [ "Vaidya", "Prabhakar G", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" } ]
cs/0607070
Victor Kryssanov
V. V. Kryssanov, F. J. Rinaldo, H. Ogawa, E. Kuleshov
Citation as a Representation Process
5 pages, 2 figures. Preprint completed in July 2006
null
null
null
cs.DL cs.CY physics.data-an
null
The presented work proposes a novel approach to model the citation rate. The paper begins with a brief introduction into informetrics studies and highlights drawbacks of the contemporary approaches to modeling the citation process as a product of social interactions. An alternative modeling framework based on results obtained in cognitive psychology is then introduced and applied in an experiment to investigate properties of the citation process, as they are revealed by a large collection of citation statistics. Major research findings are discussed, and a summary is given.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 10:38:11 GMT" }, { "version": "v2", "created": "Mon, 17 Jul 2006 01:36:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Kryssanov", "V. V.", "" ], [ "Rinaldo", "F. J.", "" ], [ "Ogawa", "H.", "" ], [ "Kuleshov", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
cs/0607071
Peter J. Stuckey
H. Fang, Y. Kilani, J.H.M. Lee, and P.J. Stuckey
Islands for SAT
7 pages
null
null
null
cs.AI
null
In this note we introduce the notion of islands for restricting local search. We show how we can construct islands for CNF SAT problems, and how much search space can be eliminated by restricting search to the island.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 12:44:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Fang", "H.", "" ], [ "Kilani", "Y.", "" ], [ "Lee", "J. H. M.", "" ], [ "Stuckey", "P. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607072
Scott Turner
Scott A. Turner, Manuel A. Perez-Quinones, Stephen H. Edwards
Effect of Interface Style in Peer Review Comments for UML Designs
8 pages, 7 figures
null
null
null
cs.HC
null
This paper presents our evaluation of using a Tablet-PC to provide peer-review comments in the first year Computer Science course. Our exploration consisted of an evaluation of how students write comments on other students' assignments using three different methods: pen and paper, a Tablet-PC, and a desktop computer. Our ultimate goal is to explore the effect that interface style (Tablet vs. Desktop) has on the quality and quantity of the comments provided.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 16:00:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Turner", "Scott A.", "" ], [ "Perez-Quinones", "Manuel A.", "" ], [ "Edwards", "Stephen H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0607073
Andrea Montanari
Andrea Montanari, Devavrat Shah
Counting good truth assignments of random k-SAT formulae
13 pages, 1 eps figure
null
null
null
cs.DM cond-mat.dis-nn
null
We present a deterministic approximation algorithm to compute logarithm of the number of `good' truth assignments for a random k-satisfiability (k-SAT) formula in polynomial time (by `good' we mean that violate a small fraction of clauses). The relative error is bounded above by an arbitrarily small constant epsilon with high probability as long as the clause density (ratio of clauses to variables) alpha<alpha_{u}(k) = 2k^{-1}\log k(1+o(1)). The algorithm is based on computation of marginal distribution via belief propagation and use of an interpolation procedure. This scheme substitutes the traditional one based on approximation of marginal probabilities via MCMC, in conjunction with self-reduction, which is not easy to extend to the present problem. We derive 2k^{-1}\log k (1+o(1)) as threshold for uniqueness of the Gibbs distribution on satisfying assignment of random infinite tree k-SAT formulae to establish our results, which is of interest in its own right.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 16:05:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Shah", "Devavrat", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" } ]
cs/0607074
Xiaohong Peng
Xiao-Hong Peng and Paddy Farrell
On Construction of the (24,12,8) Golay Codes
To appear in IEEE Trans. on Information Theory Vol. 24 No. 8
null
null
null
cs.IT math.IT
null
Two product array codes are used to construct the (24, 12, 8) binary Golay code through the direct sum operation. This construction provides a systematic way to find proper (8, 4, 4) linear block component codes for generating the Golay code, and it generates and extends previously existing methods that use a similar construction framework. The code constructed is simple to decode.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 18:39:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Peng", "Xiao-Hong", "" ], [ "Farrell", "Paddy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607075
Chandra Nair
Chandra Nair, Balaji Prabhakar, Devavrat Shah
On entropy for mixtures of discrete and continuous variables
10 pages, two-column
null
null
null
cs.IT math.IT
null
Let $X$ be a discrete random variable with support $S$ and $f : S \to S^\prime$ be a bijection. Then it is well-known that the entropy of $X$ is the same as the entropy of $f(X)$. This entropy preservation property has been well-utilized to establish non-trivial properties of discrete stochastic processes, e.g. queuing process \cite{prg03}. Entropy as well as entropy preservation is well-defined only in the context of purely discrete or continuous random variables. However for a mixture of discrete and continuous random variables, which arise in many interesting situations, the notions of entropy and entropy preservation have not been well understood. In this paper, we extend the notion of entropy in a natural manner for a mixed-pair random variable, a pair of random variables with one discrete and the other continuous. Our extensions are consistent with the existing definitions of entropy in the sense that there exist natural injections from discrete or continuous random variables into mixed-pair random variables such that their entropy remains the same. This extension of entropy allows us to obtain sufficient conditions for entropy preservation in mixtures of discrete and continuous random variables under bijections. The extended definition of entropy leads to an entropy rate for continuous time Markov chains. As an application, we recover a known probabilistic result related to Poisson process. We strongly believe that the frame-work developed in this paper can be useful in establishing probabilistic properties of complex processes, such as load balancing systems, queuing network, caching algorithms.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 23:02:41 GMT" }, { "version": "v2", "created": "Wed, 17 Jan 2007 17:58:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Nair", "Chandra", "" ], [ "Prabhakar", "Balaji", "" ], [ "Shah", "Devavrat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607076
Oliver Kosut
Oliver Kosut and Lang Tong
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
8 pages, 2 figures
null
null
null
cs.IT math.IT
null
The problem of cooperative fusion in the presence of Byzantine sensors is considered. An information theoretic formulation is used to characterize the Shannon capacity of sensor fusion. It is shown that when less than half of the sensors are Byzantine, the effect of Byzantine attack can be entirely mitigated, and the fusion capacity is identical to that when all sensors are honest. But when at least half of the sensors are Byzantine, they can completely defeat the sensor fusion so that no information can be transmitted reliably. A capacity achieving transmit-then-verify strategy is proposed for the case that less than half of the sensors are Byzantine, and its error probability and coding rate is analyzed by using a Markov decision process modeling of the transmission protocol.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 23:22:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Kosut", "Oliver", "" ], [ "Tong", "Lang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607077
Emin Gabrielyan
Emin Gabrielyan
Fault-Tolerant Real-Time Streaming with FEC thanks to Capillary Multi-Path Routing
null
Emin Gabrielyan, Fault-Tolerant Real-Time Streaming with FEC thanks to Capillary Multi-Path Routing, International Conference on Communications, Circuits and Systems - ICCCAS'06 - Gui Lin, China, 25-28 June 2006, Vol. 3, pp. 1497-1501
null
null
cs.NI cs.MM
null
Erasure resilient FEC codes in off-line packetized streaming rely on time diversity. This requires unrestricted buffering time at the receiver. In real-time streaming the playback buffering time must be very short. Path diversity is an orthogonal strategy. However, the large number of long paths increases the number of underlying links and consecutively the overall link failure rate. This may increase the overall requirement in redundant FEC packets for combating the link failures. We introduce the Redundancy Overall Requirement (ROR) metric, a routing coefficient specifying the total number of FEC packets required for compensation of all underlying link failures. We present a capillary routing algorithm for constructing layer by layer steadily diversifying multi-path routing patterns. By measuring the ROR coefficients of a dozen of routing layers on hundreds of network samples, we show that the number of required FEC packets decreases substantially when the path diversity is increased by the capillary routing construction algorithm.
[ { "version": "v1", "created": "Mon, 17 Jul 2006 08:10:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Gabrielyan", "Emin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0607078
Ying Hung Gan
Ying Hung Gan, Cong Ling and Wai Ho Mow
Complex Lattice Reduction Algorithm for Low-Complexity MIMO Detection
Submitted to IEEE Transactions on Wireless Communication in March 2006. Part of this work was presented at the 2005 Global Telecommunications Conference, United States, November 2005
null
null
null
cs.DS cs.IT math.IT
null
Recently, lattice-reduction-aided detectors have been proposed for multiple-input multiple-output (MIMO) systems to give performance with full diversity like maximum likelihood receiver, and yet with complexity similar to linear receivers. However, these lattice-reduction-aided detectors are based on the traditional LLL reduction algorithm that was originally introduced for reducing real lattice bases, in spite of the fact that the channel matrices are inherently complex-valued. In this paper, we introduce the complex LLL algorithm for direct application to reduce the basis of a complex lattice which is naturally defined by a complex-valued channel matrix. We prove that complex LLL reduction-aided detection can also achieve full diversity. Our analysis reveals that the new complex LLL algorithm can achieve a reduction in complexity of nearly 50% over the traditional LLL algorithm, and this is confirmed by simulation. It is noteworthy that the complex LLL algorithm aforementioned has nearly the same bit-error-rate performance as the traditional LLL algorithm.
[ { "version": "v1", "created": "Mon, 17 Jul 2006 09:01:33 GMT" } ]
2007-07-13T00:00:00
[ [ "Gan", "Ying Hung", "" ], [ "Ling", "Cong", "" ], [ "Mow", "Wai Ho", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607079
Boaz Tsaban
Dima Ruinskiy, Adi Shamir, and Boaz Tsaban
Length-based cryptanalysis: The case of Thompson's Group
Final version, to appear in JMC
Journal of Mathematical Cryptology 1 (2007), 359--372
10.1515/jmc.2007.018
null
cs.CR cs.CC math.GR
null
The length-based approach is a heuristic for solving randomly generated equations in groups which possess a reasonably behaved length function. We describe several improvements of the previously suggested length-based algorithms, that make them applicable to Thompson's group with significant success rates. In particular, this shows that the Shpilrain-Ushakov public key cryptosystem based on Thompson's group is insecure, and suggests that no practical public key cryptosystem based on this group can be secure.
[ { "version": "v1", "created": "Mon, 17 Jul 2006 14:26:53 GMT" }, { "version": "v2", "created": "Mon, 23 Oct 2006 13:03:49 GMT" }, { "version": "v3", "created": "Sun, 20 May 2007 14:00:43 GMT" }, { "version": "v4", "created": "Thu, 31 May 2007 14:32:06 GMT" } ]
2010-08-02T00:00:00
[ [ "Ruinskiy", "Dima", "" ], [ "Shamir", "Adi", "" ], [ "Tsaban", "Boaz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
cs/0607080
Shai Carmi
Shai Carmi, Shlomo Havlin, Scott Kirkpatrick, Yuval Shavitt and Eran Shir
New Model of Internet Topology Using k-shell Decomposition
4 pages, 4 figures
PNAS 104, 11150-11154 (2007).
10.1073/pnas.0701175104
null
cs.NI cond-mat.dis-nn
null
We introduce and use k-shell decomposition to investigate the topology of the Internet at the AS level. Our analysis separates the Internet into three sub-components: (a) a nucleus which is a small (~100 nodes) very well connected globally distributed subgraph; (b) a fractal sub-component that is able to connect the bulk of the Internet without congesting the nucleus, with self similar properties and critical exponents; and (c) dendrite-like structures, usually isolated nodes that are connected to the rest of the network through the nucleus only. This unique decomposition is robust, and provides insight into the underlying structure of the Internet and its functional consequences. Our approach is general and useful also when studying other complex networks.
[ { "version": "v1", "created": "Mon, 17 Jul 2006 15:31:17 GMT" } ]
2007-06-23T00:00:00
[ [ "Carmi", "Shai", "" ], [ "Havlin", "Shlomo", "" ], [ "Kirkpatrick", "Scott", "" ], [ "Shavitt", "Yuval", "" ], [ "Shir", "Eran", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" } ]
cs/0607081
Marie-France Ango-Obiang
Marie-France Ango-Obiang (LORIA)
Syst\`{e}me de repr\'{e}sentation d'aide au besoin dans le domaine architectural
null
Dans CONFERE 2006, Conception et Innovation
null
null
cs.OH cs.IR
null
The image is a very important mean of communication in the field of architectural who intervenes in the various phases of the design of a project. It can be regarded as a tool of decision-making aid. The study of our research aims at to see the contribution of the Economic Intelligence in the resolution of a decisional problem of the various partners (Architect, Contractor, Customer) in the architectural field, in order to make strategic decisions within the framework of the realization or design of an architectural work. The economic Intelligence allows the taking into account of the real needs for the user-decision makers, so that their waiting are considered at the first stage of a search for information and not in the final stage of the development of the tool in the evaluation of this last.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 05:04:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Ango-Obiang", "Marie-France", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0607082
Gwenael Richomme
Flavio D'Alessandro, Gw\'ena\"el Richomme (LaRIA), Stefano Varrichio
Well quasi-orders and the shuffle closure of finite sets
null
null
null
null
cs.DM
null
Given a set I of word, the set of all words obtained by the shuffle of (copies of) words of I is naturally provided with a partial order. In [FS05], the authors have opened the problem of the characterization of the finite sets I such that the order is a well quasi-order . In this paper we give an answer in the case when I consists of a single word w.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 05:30:52 GMT" } ]
2016-08-16T00:00:00
[ [ "D'Alessandro", "Flavio", "", "LaRIA" ], [ "Richomme", "Gwénaël", "", "LaRIA" ], [ "Varrichio", "Stefano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607083
Stanko Shtrakov
Stanko Vl. Shtrakov, Anton Stoilov
Mathematical Modelling of the Thermal Accumulation in Hot Water Solar Systems
11 pages, 5 figures
null
null
null
cs.CE
null
Mathematical modelling and defining useful recommendations for construction and regimes of exploitation for hot water solar installation with thermal stratification is the main purpose of this work. A special experimental solar module for hot water was build and equipped with sufficient measure apparatus. The main concept of investigation is to optimise the stratified regime of thermal accumulation and constructive parameters of heat exchange equipment (heat serpentine in tank). Accumulation and heat exchange processes were investigated by theoretical end experimental means. Special mathematical model was composed to simulate the energy transfer in stratified tank. Computer program was developed to solve mathematical equations for thermal accumulation and energy exchange. Extensive numerical and experimental tests were carried out. A good correspondence between theoretical and experimental data was arrived. Keywords: Mathematical modelling, accumulation
[ { "version": "v1", "created": "Tue, 18 Jul 2006 08:07:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Stanko Vl.", "" ], [ "Stoilov", "Anton", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0607084
Farid Nouioua
Daniel Kayser (LIPN), Farid Nouioua (LIPN)
About Norms and Causes
null
The 17th FLAIRS'04 Conference (2004) 502-507
null
null
cs.AI
null
Knowing the norms of a domain is crucial, but there exist no repository of norms. We propose a method to extract them from texts: texts generally do not describe a norm, but rather how a state-of-affairs differs from it. Answers concerning the cause of the state-of-affairs described often reveal the implicit norm. We apply this idea to the domain of driving, and validate it by designing algorithms that identify, in a text, the "basic" norms to which it refers implicitly.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:46:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kayser", "Daniel", "", "LIPN" ], [ "Nouioua", "Farid", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607085
Amaury Habrard
Amaury Habrard (LIF), Francois Denis (LIF), Yann Esposito (LIF)
Using Pseudo-Stochastic Rational Languages in Probabilistic Grammatical Inference
null
8th International Colloquium on Grammatical Inference (ICGI'06), Japan (2006)
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In probabilistic grammatical inference, a usual goal is to infer a good approximation of an unknown distribution P called a stochastic language. The estimate of P stands in some class of probabilistic models such as probabilistic automata (PA). In this paper, we focus on probabilistic models based on multiplicity automata (MA). The stochastic languages generated by MA are called rational stochastic languages; they strictly include stochastic languages generated by PA; they also admit a very concise canonical representation. Despite the fact that this class is not recursively enumerable, it is efficiently identifiable in the limit by using the algorithm DEES, introduced by the authors in a previous paper. However, the identification is not proper and before the convergence of the algorithm, DEES can produce MA that do not define stochastic languages. Nevertheless, it is possible to use these MA to define stochastic languages. We show that they belong to a broader class of rational series, that we call pseudo-stochastic rational languages. The aim of this paper is twofold. First we provide a theoretical study of pseudo-stochastic rational languages, the languages output by DEES, showing for example that this class is decidable within polynomial time. Second, we have carried out a lot of experiments in order to compare DEES to classical inference algorithms such as ALERGIA and MDI. They show that DEES outperforms them in most cases.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:21:51 GMT" }, { "version": "v2", "created": "Fri, 7 Nov 2008 16:21:18 GMT" } ]
2008-12-19T00:00:00
[ [ "Habrard", "Amaury", "", "LIF" ], [ "Denis", "Francois", "", "LIF" ], [ "Esposito", "Yann", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607086
Farid Nouioua
Daniel Kayser (LIPN), Farid Nouioua (LIPN)
Representing Knowledge about Norms
null
The 16th European Conference on Artificial Intelligence (ECAI'04) (2004) 363-367
null
null
cs.AI
null
Norms are essential to extend inference: inferences based on norms are far richer than those based on logical implications. In the recent decades, much effort has been devoted to reason on a domain, once its norms are represented. How to extract and express those norms has received far less attention. Extraction is difficult: as the readers are supposed to know them, the norms of a domain are seldom made explicit. For one thing, extracting norms requires a language to represent them, and this is the topic of this paper. We apply this language to represent norms in the domain of driving, and show that it is adequate to reason on the causes of accidents, as described by car-crash reports.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 08:15:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Kayser", "Daniel", "", "LIPN" ], [ "Nouioua", "Farid", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607087
Emmanuel Ramasso
Emmanuel Ramasso (LIS), Mich\`ele Rombaut (LIS), Denis Pellerin (LIS)
Un filtre temporel cr\'edibiliste pour la reconnaissance d'actions humaines dans les vid\'eos
8 pages
null
null
null
cs.MM
null
In the context of human action recognition in video sequences, a temporal belief filter is presented. It allows to cope with human action disparity and low quality videos. The whole system of action recognition is based on the Transferable Belief Model (TBM) proposed by P. Smets. The TBM allows to explicitly model the doubt between actions. Furthermore, the TBM emphasizes the conflict which is exploited for action recognition. The filtering performance is assessed on real video sequences acquired by a moving camera and under several unknown view angles.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 08:16:37 GMT" } ]
2009-01-09T00:00:00
[ [ "Ramasso", "Emmanuel", "", "LIS" ], [ "Rombaut", "Michèle", "", "LIS" ], [ "Pellerin", "Denis", "", "LIS" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0607088
Farid Nouioua
Farid Nouioua (LIPN), Pascal Nicolas (LERIA)
Using Answer Set Programming in an Inference-Based approach to Natural Language Semantics
null
Inference in Computational Semantics ICoS-5, France (2006) 77-86
null
null
cs.CL cs.AI
null
Using Answer Set Programming in an Inference-Based approach to Natural Language Semantics
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:43:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Nouioua", "Farid", "", "LIPN" ], [ "Nicolas", "Pascal", "", "LERIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607089
Ryan Hutchinson
R. Hutchinson, R. Smarandache, J. Trumpf
Superregular Matrices and the Construction of Convolutional Codes having a Maximum Distance Profile
20 pages. Replaced on 19/7/2006, because bibtex files were not included in the original submission
null
null
null
cs.IT math.CO math.IT
null
Superregular matrices are a class of lower triangular Toeplitz matrices that arise in the context of constructing convolutional codes having a maximum distance profile. These matrices are characterized by the property that no submatrix has a zero determinant unless it is trivially zero due to the lower triangular structure. In this paper, we discuss how superregular matrices may be used to construct codes having a maximum distance profile. We also introduce group actions that preserve the superregularity property and present an upper bound on the minimum size a finite field must have in order that a superregular matrix of a given size can exist over that field.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 18:44:30 GMT" }, { "version": "v2", "created": "Wed, 19 Jul 2006 10:35:49 GMT" } ]
2007-07-13T00:00:00
[ [ "Hutchinson", "R.", "" ], [ "Smarandache", "R.", "" ], [ "Trumpf", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607090
Adityan Rishiyur
Adityan Rishiyur
Neural Networks with Complex and Quaternion Inputs
14 pages, 2 figures
null
null
null
cs.NE
null
This article investigates Kak neural networks, which can be instantaneously trained, for complex and quaternion inputs. The performance of the basic algorithm has been analyzed and shown how it provides a plausible model of human perception and understanding of images. The motivation for studying quaternion inputs is their use in representing spatial rotations that find applications in computer graphics, robotics, global navigation, computer vision and the spatial orientation of instruments. The problem of efficient mapping of data in quaternion neural networks is examined. Some problems that need to be addressed before quaternion neural networks find applications are identified.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 21:01:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Rishiyur", "Adityan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0607091
Stanko Shtrakov
Stanko Shtrakov, Anton Stoilov
Finite element method for thermal analysis of concentrating solar receivers
8 pages; 5 figures
null
null
null
cs.CE
null
Application of finite element method and heat conductivity transfer model for calculation of temperature distribution in receiver for dish-Stirling concentrating solar system is described. The method yields discretized equations that are entirely local to the elements and provides complete geometric flexibility. A computer program solving the finite element method problem is created and great number of numerical experiments is carried out. Illustrative numerical results are given for an array of triangular elements in receiver for dish-Stirling system.
[ { "version": "v1", "created": "Wed, 19 Jul 2006 06:58:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Shtrakov", "Stanko", "" ], [ "Stoilov", "Anton", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0607092
L. Sunil Chandran
L. Sunil Chandran, Mathew C. Francis, Naveen Sivadasan
Representing graphs as the intersection of axis-parallel cubes
12 pages, 0 figures
null
null
null
cs.DM
null
A unit cube in $k$ dimensional space (or \emph{$k$-cube} in short) is defined as the Cartesian product $R_1\times R_2\times...\times R_k$ where $R_i$(for $1\leq i\leq k$) is a closed interval of the form $[a_i,a_i+1]$ on the real line. A $k$-cube representation of a graph $G$ is a mapping of the vertices of $G$ to $k$-cubes such that two vertices in $G$ are adjacent if and only if their corresponding $k$-cubes have a non-empty intersection. The \emph{cubicity} of $G$, denoted as $\cubi(G)$, is the minimum $k$ such that $G$ has a $k$-cube representation. Roberts \cite{Roberts} showed that for any graph $G$ on $n$ vertices, $\cubi(G)\leq 2n/3$. Many NP-complete graph problems have polynomial time deterministic algorithms or have good approximation ratios in graphs of low cubicity. In most of these algorithms, computing a low dimensional cube representation of the given graph is usually the first step. We present an efficient algorithm to compute the $k$-cube representation of $G$ with maximum degree $\Delta$ in $O(\Delta \ln b)$ dimensions where $b$ is the bandwidth of $G$. Bandwidth of $G$ is at most $n$ and can be much lower. The algorithm takes as input a bandwidth ordering of the vertices in $G$. Though computing the bandwidth ordering of vertices for a graph is NP-hard, there are heuristics that perform very well in practice. Even theoretically, there is an $O(\log^4 n)$ approximation algorithm for computing the bandwidth ordering of a graph using which our algorithm can produce a $k$-cube representation of any given graph in $k=O(\Delta(\ln b + \ln\ln n))$ dimensions. Both the bounds on cubicity are shown to be tight upto a factor of $O(\log\log n)$.
[ { "version": "v1", "created": "Wed, 19 Jul 2006 10:45:58 GMT" }, { "version": "v2", "created": "Sun, 8 Oct 2006 11:10:48 GMT" }, { "version": "v3", "created": "Wed, 26 Mar 2008 06:48:13 GMT" } ]
2008-03-26T00:00:00
[ [ "Chandran", "L. Sunil", "" ], [ "Francis", "Mathew C.", "" ], [ "Sivadasan", "Naveen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607093
Craig Alan Feinstein
Craig Alan Feinstein
An Elegant Argument that P is not NP
2 pages; Version 14 is the published version, but this version is clearer
Progress in Physics Volume 2 (2011), 30-31
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we present an elegant argument that P is not NP by demonstrating that the Meet-in-the-Middle algorithm must have the fastest running-time of all deterministic and exact algorithms which solve the SUBSET-SUM problem on a classical computer.
[ { "version": "v1", "created": "Wed, 19 Jul 2006 19:01:09 GMT" }, { "version": "v10", "created": "Thu, 28 Oct 2010 00:47:28 GMT" }, { "version": "v11", "created": "Mon, 22 Nov 2010 16:44:39 GMT" }, { "version": "v12", "created": "Mon, 20 Dec 2010 18:12:33 GMT" }, { "version": "v13", "created": "Wed, 19 Jan 2011 20:23:30 GMT" }, { "version": "v14", "created": "Fri, 21 Jan 2011 17:32:31 GMT" }, { "version": "v15", "created": "Thu, 1 Sep 2011 19:02:22 GMT" }, { "version": "v16", "created": "Thu, 8 Sep 2011 19:24:37 GMT" }, { "version": "v17", "created": "Thu, 15 Sep 2011 15:58:59 GMT" }, { "version": "v18", "created": "Thu, 22 Sep 2011 12:01:57 GMT" }, { "version": "v19", "created": "Mon, 26 Sep 2011 16:23:47 GMT" }, { "version": "v2", "created": "Fri, 9 Feb 2007 18:07:15 GMT" }, { "version": "v20", "created": "Wed, 28 Sep 2011 17:21:19 GMT" }, { "version": "v21", "created": "Mon, 10 Oct 2011 18:24:22 GMT" }, { "version": "v3", "created": "Thu, 26 Aug 2010 19:09:27 GMT" }, { "version": "v4", "created": "Mon, 30 Aug 2010 15:17:41 GMT" }, { "version": "v5", "created": "Wed, 22 Sep 2010 18:04:40 GMT" }, { "version": "v6", "created": "Tue, 28 Sep 2010 19:11:57 GMT" }, { "version": "v7", "created": "Wed, 29 Sep 2010 19:08:35 GMT" }, { "version": "v8", "created": "Wed, 6 Oct 2010 15:42:11 GMT" }, { "version": "v9", "created": "Tue, 26 Oct 2010 19:10:36 GMT" } ]
2011-10-11T00:00:00
[ [ "Feinstein", "Craig Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0607094
David Eppstein
David Eppstein
Upright-Quad Drawing of st-Planar Learning Spaces
12 pages, 10 figures. To appear at 14th Int. Symp. Graph Drawing, 2006
J. Graph Algorithms & Applications 12(1):51-72, 2008
null
null
cs.CG
null
We consider graph drawing algorithms for learning spaces, a type of st-oriented partial cube derived from antimatroids and used to model states of knowledge of students. We show how to draw any st-planar learning space so all internal faces are convex quadrilaterals with the bottom side horizontal and the left side vertical, with one minimal and one maximal vertex. Conversely, every such drawing represents an st-planar learning space. We also describe connections between these graphs and arrangements of translates of a quadrant.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 04:52:14 GMT" } ]
2008-06-30T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0607095
Hyundong Shin
Hyundong Shin, Moe Z. Win
Gallager's Exponent for MIMO Channels: A Reliability-Rate Tradeoff
Submitted to the IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
In this paper, we derive Gallager's random coding error exponent for multiple-input multiple-output (MIMO) channels, assuming no channel-state information (CSI) at the transmitter and perfect CSI at the receiver. This measure gives insight into a fundamental tradeoff between the communication reliability and information rate of MIMO channels, enabling to determine the required codeword length to achieve a prescribed error probability at a given rate below the channel capacity. We quantify the effects of the number of antennas, channel coherence time, and spatial fading correlation on the MIMO exponent. In addition, general formulae for the ergodic capacity and the cutoff rate in the presence of spatial correlation are deduced from the exponent expressions. These formulae are applicable to arbitrary structures of transmit and receive correlation, encompassing all the previously known results as special cases of our expressions.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 06:56:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Shin", "Hyundong", "" ], [ "Win", "Moe Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607096
Henry Soldano
Dominique Bouthinon (LIPN), Henry Soldano (LIPN), V\'eronique Ventos (LRI)
Logical settings for concept learning from incomplete examples in First Order Logic
null
null
null
null
cs.LG
null
We investigate here concept learning from incomplete examples. Our first purpose is to discuss to what extent logical learning settings have to be modified in order to cope with data incompleteness. More precisely we are interested in extending the learning from interpretations setting introduced by L. De Raedt that extends to relational representations the classical propositional (or attribute-value) concept learning from examples framework. We are inspired here by ideas presented by H. Hirsh in a work extending the Version space inductive paradigm to incomplete data. H. Hirsh proposes to slightly modify the notion of solution when dealing with incomplete examples: a solution has to be a hypothesis compatible with all pieces of information concerning the examples. We identify two main classes of incompleteness. First, uncertainty deals with our state of knowledge concerning an example. Second, generalization (or abstraction) deals with what part of the description of the example is sufficient for the learning purpose. These two main sources of incompleteness can be mixed up when only part of the useful information is known. We discuss a general learning setting, referred to as "learning from possibilities" that formalizes these ideas, then we present a more specific learning setting, referred to as "assumption-based learning" that cope with examples which uncertainty can be reduced when considering contextual information outside of the proper description of the examples. Assumption-based learning is illustrated on a recent work concerning the prediction of a consensus secondary structure common to a set of RNA sequences.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 14:52:08 GMT" } ]
2016-08-16T00:00:00
[ [ "Bouthinon", "Dominique", "", "LIPN" ], [ "Soldano", "Henry", "", "LIPN" ], [ "Ventos", "Véronique", "", "LRI" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607097
Tahiry Razafindralambo
Tahiry Razafindralambo (INRIA Rh\^one-Alpes), Isabelle Gu\'erin-Lassous (INRIA Rh\^one-Alpes), Luigi Iannone (LIP6), Serge Fdida (LIP6)
Dynamic Packet Aggregation to Solve Performance Anomaly in 802.11 Wireless Networks
null
null
null
null
cs.NI
null
In the widely used 802.11 standard, the so called performance anomaly is a well known issue. Several works have tried to solve this problem by introducing mechanisms such as packet fragmentation, backoff adaptation, or packet aggregation during a fixed time interval. In this paper, we propose a novel approach solving the performance anomaly problem by packet aggregation using a dynamic time interval, which depends on the busy time of the wireless medium. Our solution differs from other proposition in the literature because of this dynamic time interval, which allows increasing fairness, reactivity, and in some cases efficiency. In this article, we emphasize the performance evaluation of our proposal.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 15:29:05 GMT" } ]
2016-08-16T00:00:00
[ [ "Razafindralambo", "Tahiry", "", "INRIA Rhône-Alpes" ], [ "Guérin-Lassous", "Isabelle", "", "INRIA Rhône-Alpes" ], [ "Iannone", "Luigi", "", "LIP6" ], [ "Fdida", "Serge", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0607098
Martin Strauss
A. R. Calderbank, Anna C. Gilbert, and Martin J. Strauss
List decoding of noisy Reed-Muller-like codes
null
null
null
null
cs.DS cs.IT math.IT
null
First- and second-order Reed-Muller (RM(1) and RM(2), respectively) codes are two fundamental error-correcting codes which arise in communication as well as in probabilistically-checkable proofs and learning. In this paper, we take the first steps toward extending the quick randomized decoding tools of RM(1) into the realm of quadratic binary and, equivalently, Z_4 codes. Our main algorithmic result is an extension of the RM(1) techniques from Goldreich-Levin and Kushilevitz-Mansour algorithms to the Hankel code, a code between RM(1) and RM(2). That is, given signal s of length N, we find a list that is a superset of all Hankel codewords phi with dot product to s at least (1/sqrt(k)) times the norm of s, in time polynomial in k and log(N). We also give a new and simple formulation of a known Kerdock code as a subcode of the Hankel code. As a corollary, we can list-decode Kerdock, too. Also, we get a quick algorithm for finding a sparse Kerdock approximation. That is, for k small compared with 1/sqrt{N} and for epsilon > 0, we find, in time polynomial in (k log(N)/epsilon), a k-Kerdock-term approximation s~ to s with Euclidean error at most the factor (1+epsilon+O(k^2/sqrt{N})) times that of the best such approximation.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 21:02:29 GMT" }, { "version": "v2", "created": "Wed, 2 Aug 2006 20:25:58 GMT" } ]
2007-07-16T00:00:00
[ [ "Calderbank", "A. R.", "" ], [ "Gilbert", "Anna C.", "" ], [ "Strauss", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607099
Syed Jafar
Syed A. Jafar, Shlomo Shamai (Shitz)
Degrees of Freedom Region for the MIMO X Channel
31 pages
null
null
null
cs.IT math.IT
null
We provide achievability as well as converse results for the degrees of freedom region of a MIMO $X$ channel, i.e., a system with two transmitters, two receivers, each equipped with multiple antennas, where independent messages need to be conveyed over fixed channels from each transmitter to each receiver. With M=1 antennas at each node, we find that the total (sum rate) degrees of freedom are bounded above and below as $1 \leq\eta_X^\star \leq {4/3}$. If $M>1$ and channel matrices are non-degenerate then the precise degrees of freedom $\eta_X^\star = {4/3}M$. Simple zero forcing without dirty paper encoding or successive decoding, suffices to achieve the ${4/3}M$ degrees of freedom. With equal number of antennas at all nodes, we explore the increase in degrees of freedom when some of the messages are made available to a transmitter or receiver in the manner of cognitive radio. With a cognitive transmitter we show that the number of degrees of freedom $\eta = {3/2}M$ (for $M>1$) on the MIMO $X$ channel. The same degrees of freedom are obtained on the MIMO $X$ channel with a cognitive receiver as well. In contrast to the $X$ channel result, we show that for the MIMO \emph{interference} channel, the degrees of freedom are not increased even if both the transmitter and the receiver of one user know the other user's message. However, the interference channel can achieve the full $2M$ degrees of freedom if \emph{each} user has either a cognitive transmitter or a cognitive receiver. Lastly, if the channels vary with time/frequency then the $X$ channel with single antennas $(M=1)$ at all nodes has exactly 4/3 degrees of freedom with no shared messages and exactly 3/2 degrees of freedom with a cognitive transmitter or a cognitive receiver.
[ { "version": "v1", "created": "Fri, 21 Jul 2006 07:50:42 GMT" }, { "version": "v2", "created": "Tue, 12 Sep 2006 23:55:53 GMT" }, { "version": "v3", "created": "Fri, 11 May 2007 20:48:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Jafar", "Syed A.", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607100
Xin Han
Xin Han, Kazuo Iwama, Guochuan Zhang
New Upper Bounds on The Approximability of 3D Strip Packing
Submitted to SODA 2007
null
null
null
cs.DS
null
In this paper, we study the 3D strip packing problem in which we are given a list of 3-dimensional boxes and required to pack all of them into a 3-dimensional strip with length 1 and width 1 and unlimited height to minimize the height used. Our results are below: i) we give an approximation algorithm with asymptotic worst-case ratio 1.69103, which improves the previous best bound of $2+\epsilon$ by Jansen and Solis-Oba of SODA 2006; ii) we also present an asymptotic PTAS for the case in which all items have {\em square} bases.
[ { "version": "v1", "created": "Sat, 22 Jul 2006 02:06:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Han", "Xin", "" ], [ "Iwama", "Kazuo", "" ], [ "Zhang", "Guochuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0607101
Patricia Hill
Patricia M. Hill, Fausto Spoto
Deriving Escape Analysis by Abstract Interpretation: Proofs of results
null
null
null
null
cs.PL
null
Escape analysis of object-oriented languages approximates the set of objects which do not escape from a given context. If we take a method as context, the non-escaping objects can be allocated on its activation stack; if we take a thread, Java synchronisation locks on such objects are not needed. In this paper, we formalise a basic escape domain e as an abstract interpretation of concrete states, which we then refine into an abstract domain er which is more concrete than e and, hence, leads to a more precise escape analysis than e. We provide optimality results for both e and er, in the form of Galois insertions from the concrete to the abstract domains and of optimal abstract operations. The Galois insertion property is obtained by restricting the abstract domains to those elements which do not contain garbage, by using an abstract garbage collector. Our implementation of er is hence an implementation of a formally correct escape analyser, able to detect the stack allocatable creation points of Java (bytecode) applications. This report contains the proofs of results of a paper with the same title and authors and to be published in the Journal "Higher-Order Symbolic Computation".
[ { "version": "v1", "created": "Mon, 24 Jul 2006 09:24:07 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 14:59:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Hill", "Patricia M.", "" ], [ "Spoto", "Fausto", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0607102
Shivaprasad Kotagiri
Shiva Prasad Kotagiri and J. Nicholas Laneman
Multiaccess Channels with State Known to Some Encoders and Independent Messages
Accepted to EURASIP Journal on Wireless Communication and Networking, Feb. 2008
null
null
null
cs.IT math.IT
null
We consider a state-dependent multiaccess channel (MAC) with state non-causally known to some encoders. We derive an inner bound for the capacity region in the general discrete memoryless case and specialize to a binary noiseless case. In the case of maximum entropy channel state, we obtain the capacity region for binary noiseless MAC with one informed encoder by deriving a non-trivial outer bound for this case. For a Gaussian state-dependent MAC with one encoder being informed of the channel state, we present an inner bound by applying a slightly generalized dirty paper coding (GDPC) at the informed encoder that allows for partial state cancellation, and a trivial outer bound by providing channel state to the decoder also. The uninformed encoders benefit from the state cancellation in terms of achievable rates, however, appears that GDPC cannot completely eliminate the effect of the channel state on the achievable rate region, in contrast to the case of all encoders being informed. In the case of infinite state variance, we analyze how the uninformed encoder benefits from the informed encoder's actions using the inner bound and also provide a non-trivial outer bound for this case which is better than the trivial outer bound.
[ { "version": "v1", "created": "Sun, 23 Jul 2006 15:05:38 GMT" }, { "version": "v2", "created": "Sun, 30 Mar 2008 17:54:30 GMT" } ]
2008-03-30T00:00:00
[ [ "Kotagiri", "Shiva Prasad", "" ], [ "Laneman", "J. Nicholas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607103
Lester Ingber
Lester Ingber
Ideas by Statistical Mechanics (ISM)
null
null
null
null
cs.CE cs.MS cs.NE
null
Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author's work in Statistical Mechanics of Neocortical Interactions (SMNI), and uses the author's Adaptive Simulated Annealing (ASA) code for optimizations of training sets, as well as for importance-sampling to apply the author's copula financial risk-management codes, Trading in Risk Dimensions (TRD), for assessments of risk and uncertainty. This product can be used for decision support for projects ranging from diplomatic, information, military, and economic (DIME) factors of propagation/evolution of ideas, to commercial sales, trading indicators across sectors of financial markets, advertising and political campaigns, etc. A statistical mechanical model of neocortical interactions, developed by the author and tested successfully in describing short-term memory and EEG indicators, is the proposed model. Parameters with a given subset of macrocolumns will be fit using ASA to patterns representing ideas. Parameters of external and inter-regional interactions will be determined that promote or inhibit the spread of these ideas. Tools of financial risk management, developed by the author to process correlated multivariate systems with differing non-Gaussian distributions using modern copula analysis, importance-sampled using ASA, will enable bona fide correlations and uncertainties of success and failure to be calculated. Marginal distributions will be evolved to determine their expected duration and stability using algorithms developed by the author, i.e., PATHTREE and PATHINT codes.
[ { "version": "v1", "created": "Sun, 23 Jul 2006 16:12:47 GMT" } ]
2007-05-23T00:00:00
[ [ "Ingber", "Lester", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0607104
Hao Chen
Hao Chen
Reducing the Computation of Linear Complexities of Periodic Sequences over $GF(p^m)$
10 pages. To appear in IEEE Transactions on Innformation Theory
null
null
null
cs.CR cs.IT math.IT
null
The linear complexity of a periodic sequence over $GF(p^m)$ plays an important role in cryptography and communication [12]. In this correspondence, we prove a result which reduces the computation of the linear complexity and minimal connection polynomial of a period $un$ sequence over $GF(p^m)$ to the computation of the linear complexities and minimal connection polynomials of $u$ period $n$ sequences. The conditions $u|p^m-1$ and $\gcd(n,p^m-1)=1$ are required for the result to hold. Some applications of this reduction in fast algorithms to determine the linear complexities and minimal connection polynomials of sequences over $GF(p^m)$ are presented.
[ { "version": "v1", "created": "Mon, 24 Jul 2006 02:54:21 GMT" }, { "version": "v2", "created": "Mon, 18 Sep 2006 03:15:08 GMT" } ]
2016-08-31T00:00:00
[ [ "Chen", "Hao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607105
Daniel A. Spielman
Daniel A. Spielman and Shang-Hua Teng
Nearly-Linear Time Algorithms for Preconditioning and Solving Symmetric, Diagonally Dominant Linear Systems
This revised version contains a new section in which we prove that it suffices to carry out the computations with limited precision
null
null
null
cs.NA cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a randomized algorithm that, on input a symmetric, weakly diagonally dominant n-by-n matrix A with m nonzero entries and an n-vector b, produces a y such that $\norm{y - \pinv{A} b}_{A} \leq \epsilon \norm{\pinv{A} b}_{A}$ in expected time $O (m \log^{c}n \log (1/\epsilon)),$ for some constant c. By applying this algorithm inside the inverse power method, we compute approximate Fiedler vectors in a similar amount of time. The algorithm applies subgraph preconditioners in a recursive fashion. These preconditioners improve upon the subgraph preconditioners first introduced by Vaidya (1990). For any symmetric, weakly diagonally-dominant matrix A with non-positive off-diagonal entries and $k \geq 1$, we construct in time $O (m \log^{c} n)$ a preconditioner B of A with at most $2 (n - 1) + O ((m/k) \log^{39} n)$ nonzero off-diagonal entries such that the finite generalized condition number $\kappa_{f} (A,B)$ is at most k, for some other constant c. In the special case when the nonzero structure of the matrix is planar the corresponding linear system solver runs in expected time $ O (n \log^{2} n + n \log n \ \log \log n \ \log (1/\epsilon))$. We hope that our introduction of algorithms of low asymptotic complexity will lead to the development of algorithms that are also fast in practice.
[ { "version": "v1", "created": "Mon, 24 Jul 2006 04:02:24 GMT" }, { "version": "v2", "created": "Wed, 22 Nov 2006 21:06:59 GMT" }, { "version": "v3", "created": "Mon, 14 May 2007 15:15:46 GMT" }, { "version": "v4", "created": "Thu, 17 Sep 2009 17:48:44 GMT" }, { "version": "v5", "created": "Thu, 13 Sep 2012 12:51:05 GMT" } ]
2012-09-14T00:00:00
[ [ "Spielman", "Daniel A.", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0607106
Hubie Chen
Hubie Chen
The Complexity of Quantified Constraint Satisfaction: Collapsibility, Sink Algebras, and the Three-Element Case
null
null
null
null
cs.LO cs.CC
null
The constraint satisfaction probem (CSP) is a well-acknowledged framework in which many combinatorial search problems can be naturally formulated. The CSP may be viewed as the problem of deciding the truth of a logical sentence consisting of a conjunction of constraints, in front of which all variables are existentially quantified. The quantified constraint satisfaction problem (QCSP) is the generalization of the CSP where universal quantification is permitted in addition to existential quantification. The general intractability of these problems has motivated research studying the complexity of these problems under a restricted constraint language, which is a set of relations that can be used to express constraints. This paper introduces collapsibility, a technique for deriving positive complexity results on the QCSP. In particular, this technique allows one to show that, for a particular constraint language, the QCSP reduces to the CSP. We show that collapsibility applies to three known tractable cases of the QCSP that were originally studied using disparate proof techniques in different decades: Quantified 2-SAT (Aspvall, Plass, and Tarjan 1979), Quantified Horn-SAT (Karpinski, Kleine B\"{u}ning, and Schmitt 1987), and Quantified Affine-SAT (Creignou, Khanna, and Sudan 2001). This reconciles and reveals common structure among these cases, which are describable by constraint languages over a two-element domain. In addition to unifying these known tractable cases, we study constraint languages over domains of larger size.
[ { "version": "v1", "created": "Mon, 24 Jul 2006 16:03:56 GMT" }, { "version": "v2", "created": "Tue, 25 Jul 2006 13:06:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hubie", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0607107
Louis Mello
Louis Mello
Linear Predictive Coding as an Estimator of Volatility
null
null
null
null
cs.IT math.IT
null
In this paper, we present a method of estimating the volatility of a signal that displays stochastic noise (such as a risky asset traded on an open market) utilizing Linear Predictive Coding. The main purpose is to associate volatility with a series of statistical properties that can lead us, through further investigation, toward a better understanding of structural volatility as well as to improve the quality of our current estimates.
[ { "version": "v1", "created": "Mon, 24 Jul 2006 19:10:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Mello", "Louis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607108
Pierre Loidreau
E. M. Gabidulin and P. Loidreau
Properties of subspace subcodes of optimum codes in rank metric
17 pages, Submitted to IEEE-IT
null
null
null
cs.IT cs.DM math.IT
null
Maximum rank distance codes denoted MRD-codes are the equivalent in rank metric of MDS-codes. Given any integer $q$ power of a prime and any integer $n$ there is a family of MRD-codes of length $n$ over $\FF{q^n}$ having polynomial-time decoding algorithms. These codes can be seen as the analogs of Reed-Solomon codes (hereafter denoted RS-codes) for rank metric. In this paper their subspace subcodes are characterized. It is shown that hey are equivalent to MRD-codes constructed in the same way but with smaller parameters. A specific polynomial-time decoding algorithm is designed. Moreover, it is shown that the direct sum of subspace subcodes is equivalent to the direct product of MRD-codes with smaller parameters. This implies that the decoding procedure can correct errors of higher rank than the error-correcting capability. Finally it is shown that, for given parameters, subfield subcodes are completely characterized by elements of the general linear group ${GL}_n(\FF{q})$ of non-singular $q$-ary matrices of size $n$.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 07:37:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Gabidulin", "E. M.", "" ], [ "Loidreau", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607109
Marko Samer
Marko Samer and Stefan Szeider
Complexity and Applications of Edge-Induced Vertex-Cuts
17 pages, 5 figures, 2 tables
null
null
null
cs.DM cs.CC
null
Motivated by hypergraph decomposition algorithms, we introduce the notion of edge-induced vertex-cuts and compare it with the well-known notions of edge-cuts and vertex-cuts. We investigate the complexity of computing minimum edge-induced vertex-cuts and demonstrate the usefulness of our notion by applications in network reliability and constraint satisfaction.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 16:17:22 GMT" }, { "version": "v2", "created": "Mon, 31 Jul 2006 09:23:22 GMT" } ]
2007-05-23T00:00:00
[ [ "Samer", "Marko", "" ], [ "Szeider", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0607110
Etienne Grossmann
Etienne Grossmann
A Theory of Probabilistic Boosting, Decision Trees and Matryoshki
null
null
null
null
cs.LG
null
We present a theory of boosting probabilistic classifiers. We place ourselves in the situation of a user who only provides a stopping parameter and a probabilistic weak learner/classifier and compare three types of boosting algorithms: probabilistic Adaboost, decision tree, and tree of trees of ... of trees, which we call matryoshka. "Nested tree," "embedded tree" and "recursive tree" are also appropriate names for this algorithm, which is one of our contributions. Our other contribution is the theoretical analysis of the algorithms, in which we give training error bounds. This analysis suggests that the matryoshka leverages probabilistic weak classifiers more efficiently than simple decision trees.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 15:57:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Grossmann", "Etienne", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607111
William Yurcik
William Yurcik, Cristina Abad, Ragib Hasan, Moazzam Saleem, Shyama Sridharan
UCLog+ : A Security Data Management System for Correlating Alerts, Incidents, and Raw Data From Remote Logs
10 pages, 9 Tables, 16 Figures
null
null
null
cs.CR
null
Source data for computer network security analysis takes different forms (alerts, incidents, logs) and each source may be voluminous. Due to the challenge this presents for data management, this has often lead to security stovepipe operations which focus primarily on a small number of data sources for analysis with little or no automated correlation between data sources (although correlation may be done manually). We seek to address this systemic problem. In previous work we developed a unified correlated logging system (UCLog) that automatically processes alerts from different devices. We take this work one step further by presenting the architecture and applications of UCLog+ which adds the new capability to correlate between alerts and incidents and raw data located on remote logs. UCLog+ can be used for forensic analysis including queries and report generation but more importantly it can be used for near-real-time situational awareness of attack patterns in progress. The system, implemented with open source tools, can also be a repository for secure information sharing by different organizations.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 19:44:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Yurcik", "William", "" ], [ "Abad", "Cristina", "" ], [ "Hasan", "Ragib", "" ], [ "Saleem", "Moazzam", "" ], [ "Sridharan", "Shyama", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0607112
Misha Stepanov
M.G. Stepanov, M. Chertkov
Improving convergence of Belief Propagation decoding
null
null
null
LA-UR-06-5058
cs.IT math.IT
null
The decoding of Low-Density Parity-Check codes by the Belief Propagation (BP) algorithm is revisited. We check the iterative algorithm for its convergence to a codeword (termination), we run Monte Carlo simulations to find the probability distribution function of the termination time, n_it. Tested on an example [155, 64, 20] code, this termination curve shows a maximum and an extended algebraic tail at the highest values of n_it. Aiming to reduce the tail of the termination curve we consider a family of iterative algorithms modifying the standard BP by means of a simple relaxation. The relaxation parameter controls the convergence of the modified BP algorithm to a minimum of the Bethe free energy. The improvement is experimentally demonstrated for Additive-White-Gaussian-Noise channel in some range of the signal-to-noise ratios. We also discuss the trade-off between the relaxation parameter of the improved iterative scheme and the number of iterations.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 21:54:15 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "M. G.", "" ], [ "Chertkov", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607113
David Eppstein
Josiah Carlson and David Eppstein
Trees with Convex Faces and Optimal Angles
12 pages, 10 figures. To appear at 14th Int. Symp. Graph Drawing, 2006
null
null
null
cs.CG
null
We consider drawings of trees in which all edges incident to leaves can be extended to infinite rays without crossing, partitioning the plane into infinite convex polygons. Among all such drawings we seek the one maximizing the angular resolution of the drawing. We find linear time algorithms for solving this problem, both for plane trees and for trees without a fixed embedding. In any such drawing, the edge lengths may be set independently of the angles, without crossing; we describe multiple strategies for setting these lengths.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 00:44:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Carlson", "Josiah", "" ], [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0607114
Martin Ziegler
Martin Ziegler
Revising Type-2 Computation and Degrees of Discontinuity
to appear in Proc. CCA'06
Electronic Notes in Theoretical Computer Science vol.167 (Jan.2007)
10.1016/j.entcs.2006.08.015
null
cs.LO math.LO
null
By the sometimes so-called MAIN THEOREM of Recursive Analysis, every computable real function is necessarily continuous. Weihrauch and Zheng (TCS'2000), Brattka (MLQ'2005), and Ziegler (ToCS'2006) have considered different relaxed notions of computability to cover also discontinuous functions. The present work compares and unifies these approaches. This is based on the concept of the JUMP of a representation: both a TTE-counterpart to the well known recursion-theoretic jump on Kleene's Arithmetical Hierarchy of hypercomputation: and a formalization of revising computation in the sense of Shoenfield. We also consider Markov and Banach/Mazur oracle-computation of discontinuous fu nctions and characterize the computational power of Type-2 nondeterminism to coincide with the first level of the Analytical Hierarchy.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 06:07:22 GMT" }, { "version": "v2", "created": "Tue, 12 Sep 2006 01:21:49 GMT" } ]
2011-08-04T00:00:00
[ [ "Ziegler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
cs/0607115
Marcin Kaminski
Marcin Kaminski and Vadim Lozin
Polynomial-time algorithm for vertex k-colorability of P_5-free graphs
null
null
null
null
cs.DM cs.DS
null
We give the first polynomial-time algorithm for coloring vertices of P_5-free graphs with k colors. This settles an open problem and generalizes several previously known results.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 09:20:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Kaminski", "Marcin", "" ], [ "Lozin", "Vadim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0607116
Rui Abreu Eng
Rui Abreu, Peter Zoeteweij and Arjan JC van Gemund
Program Spectra Analysis in Embedded Software: A Case Study
null
null
null
TUD-SERG-2006-007
cs.SE
null
Because of constraints imposed by the market, embedded software in consumer electronics is almost inevitably shipped with faults and the goal is just to reduce the inherent unreliability to an acceptable level before a product has to be released. Automatic fault diagnosis is a valuable tool to capture software faults without extra effort spent on testing. Apart from a debugging aid at design and integration time, fault diagnosis can help analyzing problems during operation, which allows for more accurate system recovery. In this paper we discuss perspectives and limitations for applying a particular fault diagnosis technique, namely the analysis of program spectra, in the area of embedded software in consumer electronics devices. We illustrate these by our first experience with a test case from industry.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 09:26:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Abreu", "Rui", "" ], [ "Zoeteweij", "Peter", "" ], [ "van Gemund", "Arjan JC", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0607117
Jon Feldman
Gagan Aggarwal, S. Muthukrishnan, Jon Feldman
Bidding to the Top: VCG and Equilibria of Position-Based Auctions
null
null
null
null
cs.GT
null
Many popular search engines run an auction to determine the placement of advertisements next to search results. Current auctions at Google and Yahoo! let advertisers specify a single amount as their bid in the auction. This bid is interpreted as the maximum amount the advertiser is willing to pay per click on its ad. When search queries arrive, the bids are used to rank the ads linearly on the search result page. The advertisers pay for each user who clicks on their ad, and the amount charged depends on the bids of all the advertisers participating in the auction. In order to be effective, advertisers seek to be as high on the list as their budget permits, subject to the market. We study the problem of ranking ads and associated pricing mechanisms when the advertisers not only specify a bid, but additionally express their preference for positions in the list of ads. In particular, we study "prefix position auctions" where advertiser $i$ can specify that she is interested only in the top $b_i$ positions. We present a simple allocation and pricing mechanism that generalizes the desirable properties of current auctions that do not have position constraints. In addition, we show that our auction has an "envy-free" or "symmetric" Nash equilibrium with the same outcome in allocation and pricing as the well-known truthful Vickrey-Clarke-Groves (VCG) auction. Furthermore, we show that this equilibrium is the best such equilibrium for the advertisers in terms of the profit made by each advertiser. We also discuss other position-based auctions.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 15:42:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Aggarwal", "Gagan", "" ], [ "Muthukrishnan", "S.", "" ], [ "Feldman", "Jon", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0607118
Naohi Eguchi
Toshiyasu Arai and Naohi Eguchi
A new function algebra of EXPTIME functions by safe nested recursion
null
null
null
null
cs.CC
null
Bellantoni and Cook have given a function-algebra characterization of the polynomial-time computable functions via an unbounded recursion scheme which is called safe recursion. Inspired by their work, we characterize the exponential-time computable functions with the use of a safe variant of nested recursion.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 06:34:53 GMT" }, { "version": "v2", "created": "Wed, 5 Mar 2008 11:55:07 GMT" } ]
2008-03-05T00:00:00
[ [ "Arai", "Toshiyasu", "" ], [ "Eguchi", "Naohi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0607119
Sergey Zykov V.
Sergey V. Zykov
Web-Based Enterprise Information Systems Development: The Integrated Methodology
5 pages
Proceedings of the 5th International Conference on Computer Science and Information Technologies (CSIT 2005), Yerevan, Armenia, 19-23 September 2005. National Academy of Sciences of Armenia Publishers, 2005, pp.373-381
null
null
cs.SE cs.DC
null
The paper considers software development issues for large-scale enterprise information systems (IS) with databases (DB) in global heterogeneous distributed computational environment. Due to high IT development rates, the present-day society has accumulated and rapidly increases an extremely huge data burden. Manipulating with such huge data arrays becomes an essential problem, particularly due to their global distribution, heterogeneous and weak-structured character. The conceptual approach to integrated Internet-based IS design, development and implementation is presented, including formal models, software development methodology and original software development tools for visual problem-oriented development and content management. IS implementation results proved shortening terms and reducing costs of implementation compared to commercial software available.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 07:47:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607120
Peter Turney
Peter D. Turney (National Research Council of Canada)
Expressing Implicit Semantic Relations without Supervision
8 pages, related work available at http://purl.org/peter.turney/
Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics (ACL-06), (2006), Sydney, Australia, 313-320
null
NRC-48761
cs.CL cs.AI cs.IR cs.LG
null
We present an unsupervised learning algorithm that mines large text corpora for patterns that express implicit semantic relations. For a given input word pair X:Y with some unspecified semantic relations, the corresponding output list of patterns <P1,...,Pm> is ranked according to how well each pattern Pi expresses the relations between X and Y. For example, given X=ostrich and Y=bird, the two highest ranking output patterns are "X is the largest Y" and "Y such as the X". The output patterns are intended to be useful for finding further pairs with the same relations, to support the construction of lexicons, ontologies, and semantic networks. The patterns are sorted by pertinence, where the pertinence of a pattern Pi for a word pair X:Y is the expected relational similarity between the given pair and typical pairs for Pi. The algorithm is empirically evaluated on two tasks, solving multiple-choice SAT word analogy questions and classifying semantic relations in noun-modifier pairs. On both tasks, the algorithm achieves state-of-the-art results, performing significantly better than several alternative pattern ranking algorithms, based on tf-idf.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 18:23:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607121
Sergey Zykov V.
Sergey V.Zykov, Gleb G. Pogodayev
Object-Based Groupware: Theory, Design and Implementation Issues
8 pages, 2 figures
In: J.Eder and L.A. Kalinichenko, (Ed.) Advances in Databases and Information Systems, Vol.2. St.-Petersburg: Nevsky Dialect, 1997, p.p.10-17
null
null
cs.SE
null
Document management software systems are having a wide audience at present. However, groupware as a term has a wide variety of possible definitions. Groupware classification attempt is made in this paper. Possible approaches to groupware are considered including document management, document control and mailing systems. Lattice theory and concept modelling are presented as a theoretical background for the systems in question. Current technologies in state-of-the-art document managenent software are discussed. Design and implementation aspects for user-friendly integrate enterprise systems are described. Results for a real system to be implemented are given. Perspectives of the field in question are discussed.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 10:16:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ], [ "Pogodayev", "Gleb G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0607122
Sergey Zykov V.
Sergey V. Zykov
Enterprise Content Management: Theory and Engineering for Entire Lifecycle Support
6 pages, 1 figure
Proceedings of the 8th International Workshop on Computer Science and Information Technologies (CSIT'2006), Vol.1, Karlsruhe, Germany, Sept.28-29, 2006.- Karlsruhe University Publishers, Karlsruhe, 2006.- Vol.1, p.p.92-97
null
null
cs.SE cs.DC
null
The paper considers enterprise content management (ECM) issues in global heterogeneous distributed computational environment. Present-day enterprises have accumulated a huge data burden. Manipulating with such a bulk becomes an essential problem, particularly due to its global distribution, heterogeneous and weak-structured character. The conceptual approach to integrated ECM lifecycle support is presented, including overview of formal models, software development methodology and innovative software development tools. Implementation results proved shortening terms and reducing costs of implementation compared to commercial software available.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 10:32:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607123
Sergey Zykov V.
Sergey V. Zykov
Enterprise Portal Development Tools: Problem-Oriented Approach
4 pages, 2 figures
Proceedings of the 7th International Workshop on Computer Science and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 110-113
null
null
cs.SE cs.DC
null
The paper deals with problem-oriented visual information system (IS) engineering for enterprise Internet-based applications, which is a vital part of the whole development process. The suggested approach is based on semantic network theory and a novel ConceptModeller CASE tool.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 11:24:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607124
Sergey Zykov V.
Sergey V. Zykov
ConceptModeller: a Problem-Oriented Visual SDK for Globally Distributed Enterprise Systems
4 pages, 2 figures
Proceedings of the 7th International Workshop on Computer Science and Information Technologies (CSIT'2005), Vol.1, Ufa State Aviation Technical University, USATU Editorial-Publishing Office, Ufa, 2005, pp. 114-117
null
cs.szykov.27374
cs.SE cs.DC
null
The paper describes problem-oriented approach to software development. The approach is a part of the original integrated methodology of enterprise Internet-based software design and implementation. All aspects of software development, from theory to implementation, are covered.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 11:35:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607125
Sergey Zykov V.
Sergey V. Zykov
Enterprise Portal: from Model to Implementation
6 pages, 1 figure
Workshop on Computer Science and Information Technologies (CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.188-193
null
null
cs.SE cs.DC
null
Portal technology can significantly improve the entire corporate information infrastructure. The approach proposed is based on rigorous and consistent (meta)data model and provides for efficient and accurate front-end integration of heterogeneous corporate applications including enterprise resource planning (ERP) systems, multimedia data warehouses and proprietary content databases. The methodology proposed embraces entire software lifecycle; it is illustrated by an enterprise-level Intranet portal implementation.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:12:01 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607126
Sergey Zykov V.
Sergey V. Zykov
Abstract Machine as a Model of Content Management Information System
4 pages
Workshop on Computer Science and Information Technologies (CSIT'2004), Budapest, Hungary, 2004, Vol.2, p.p.251-252
null
null
cs.SE cs.DC
null
Enterprise content management is an urgent issue of current scientific and practical activities in software design and implementation. However, papers known as yet give insufficient coverage of theoretical background of the software in question. The paper gives an attempt of building a state-based model of content management. In accordance with the theoretical principles outlined, a content management information system (CMIS) has been implemented in a large international oil-and-gas group of companies.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:40:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607127
Sergey Zykov V.
Sergey V. Zykov
Integrating Enterprise Software Applications with Web Portal Technology
6 pages, 1 picture
Proceedings of 5th International Workshop on Computer Science and Information Technologies (CSIT'2003), Vol.1, Ufa State Aviation Technical University, Ufa:USATU Editorial-Publishing Office, 2003, p.p.60-65
null
null
cs.SE cs.DC
null
Web-portal based approach can significantly improve the entire corporate information infrastructure. The approach proposed provides for rapid and accurate front-end integration of heterogeneous corporate applications including enterprise resource planning (ERP) systems. Human resources ERP component and multimedia data warehouse implementations are discussed as essential instances.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:49:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607128
Sergey Zykov V.
Sergey V. Zykov
The Integrated Approach to ERP: Embracing the Web
6 pages, 3 pictures
Proceedings of 4th International Workshop on Computer Science and Information Technologies, (CSIT'2002) Sept., 2002, Patras, Greece, Vol.1, p.p.73-78
null
null
cs.SE cs.DC
null
Integrated approach to enterprise resource planning (ERP) software design and implementation can significantly improve the entire corporate information infrastructure and it helps to benefit from power of Internet services. The approach proposed provides for corporate Web portal integrity, consistency, urgency and front-end data processing. Human resources (HR) ERP component implementation is discussed as an essential instance.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 12:58:51 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607129
Sergey Zykov V.
Sergey V. Zykov
Enterprise Resource Planning Systems: the Integrated Approach
12 pages, 6 pictures
Proceedings of the 3d International Workshop on Computer Science and Information Technologies, (CSIT'2001), Ufa:USATU, 2001, Vol.1, p.p.284-295
null
null
cs.SE cs.DC
null
Enterprise resource planning (ERP) systems enjoy an increasingly wide coverage. However, no truly integrate solution has been proposed as yet. ERP classification is given. Recent trends in commercial systems are analyzed on the basis of human resources (HR) management software. An innovative "straight through" design and implementation process of an open, secure, and scalable integrated event-driven enterprise solution is suggested. Implementation results are presented.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 13:07:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0607130
Sergey Zykov V.
Sergey V. Zykov
Towards Implementing an Enterprise Groupware-Integrated Human Resources Information System
9 pages, 3 pictures
Proceedings of the 2nd International Workshop on Computer Science and Information Technologies (CSIT'2000), Vol.1, Ufa State Aviation Technical University, USATU Editorial-Publishing Office, Ufa, 2000, p.p.188-196
null
null
cs.SE cs.CY
null
Human resources management software is having a wide audience at present. However, no truly integrate solution has been proposed yet to improve the systems concerned. Approaches to extra data collection for appraisal decision-making are considered on the concept modeling theoretical basis. Current technologies in state-of-the-art HR management software are compared. Design and implementation aspects for a Web-wired truly integrated secure and scalable event-driven enterprise system are described. Benchmark results are presented. Field perspectives are discussed.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 13:14:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Zykov", "Sergey V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0607131
Boris Skoric
B. Skoric, T.U. Vladimirova, M. Celik, J.C. Talstra
Tardos fingerprinting is better than we thought
Modified presentation of results
null
null
PR-MS 26.957
cs.CR
null
We review the fingerprinting scheme by Tardos and show that it has a much better performance than suggested by the proofs in Tardos' original paper. In particular, the length of the codewords can be significantly reduced. First we generalize the proofs of the false positive and false negative error probabilities with the following modifications: (1) we replace Tardos' hard-coded numbers by variables and (2) we allow for independently chosen false positive and false negative error rates. It turns out that all the collusion-resistance properties can still be proven when the code length is reduced by a factor of more than 2. Second, we study the statistical properties of the fingerprinting scheme, in particular the average and variance of the accusations. We identify which colluder strategy forces the content owner to employ the longest code. Using a gaussian approximation for the probability density functions of the accusations, we show that the required false negative and false positive error rate can be achieved with codes that are a factor 2 shorter than required for rigid proofs. Combining the results of these two approaches, we show that the Tardos scheme can be used with a code length approximately 5 times shorter than in the original construction.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 15:11:23 GMT" }, { "version": "v2", "created": "Tue, 3 Jun 2008 09:41:53 GMT" } ]
2008-06-03T00:00:00
[ [ "Skoric", "B.", "" ], [ "Vladimirova", "T. U.", "" ], [ "Celik", "M.", "" ], [ "Talstra", "J. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0607132
Ludo M.G.M. Tolhuizen
R. Ahlswede, H. Aydinian, L.H. Khachatrian and L.M.G.M. Tolhuizen
On q-ary codes correcting all unidirectional errors of a limited magnitude
22 pages,no figures. Accepted for publication of Journal of Armenian Academy of Sciences, special issue dedicated to Rom Varshamov
null
null
null
cs.IT math.IT
null
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of unidirectional errors of level l. That is, the transmission channel is such that the received word cannot contain both a component larger than the transmitted one and a component smaller than the transmitted one. Moreover, the absolute value of the difference between a transmitted component and its received version is at most l. We introduce and study q-ary codes capable of correcting all unidirectional errors of level l. Lower and upper bounds for the maximal size of those codes are presented. We also study codes for this aim that are defined by a single equation on the codeword coordinates(similar to the Varshamov-Tenengolts codes for correcting binary asymmetric errors). We finally consider the problem of detecting all unidirectional errors of level l.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 15:51:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Ahlswede", "R.", "" ], [ "Aydinian", "H.", "" ], [ "Khachatrian", "L. H.", "" ], [ "Tolhuizen", "L. M. G. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607133
Peter Turney
Robert Ewaschuk, Peter D. Turney
Self-Replication and Self-Assembly for Manufacturing
Java code available at http://purl.org/net/johnnyvon/
Artificial Life, (2006), 12, 411-433
10.1162/artl.2006.12.3.411
NRC-48760
cs.MA cs.CE
null
It has been argued that a central objective of nanotechnology is to make products inexpensively, and that self-replication is an effective approach to very low-cost manufacturing. The research presented here is intended to be a step towards this vision. We describe a computational simulation of nanoscale machines floating in a virtual liquid. The machines can bond together to form strands (chains) that self-replicate and self-assemble into user-specified meshes. There are four types of machines and the sequence of machine types in a strand determines the shape of the mesh they will build. A strand may be in an unfolded state, in which the bonds are straight, or in a folded state, in which the bond angles depend on the types of machines. By choosing the sequence of machine types in a strand, the user can specify a variety of polygonal shapes. A simulation typically begins with an initial unfolded seed strand in a soup of unbonded machines. The seed strand replicates by bonding with free machines in the soup. The child strands fold into the encoded polygonal shape, and then the polygons drift together and bond to form a mesh. We demonstrate that a variety of polygonal meshes can be manufactured in the simulation, by simply changing the sequence of machine types in the seed.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 17:55:16 GMT" } ]
2020-08-20T00:00:00
[ [ "Ewaschuk", "Robert", "" ], [ "Turney", "Peter D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
cs/0607134
Vladimir Vovk
Vladimir Vovk
Leading strategies in competitive on-line prediction
20 pages; a conference version is to appear in the ALT'2006 proceedings
null
null
null
cs.LG
null
We start from a simple asymptotic result for the problem of on-line regression with the quadratic loss function: the class of continuous limited-memory prediction strategies admits a "leading prediction strategy", which not only asymptotically performs at least as well as any continuous limited-memory strategy but also satisfies the property that the excess loss of any continuous limited-memory strategy is determined by how closely it imitates the leading strategy. More specifically, for any class of prediction strategies constituting a reproducing kernel Hilbert space we construct a leading strategy, in the sense that the loss of any prediction strategy whose norm is not too large is determined by how closely it imitates the leading strategy. This result is extended to the loss functions given by Bregman divergences and by strictly proper scoring rules.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 22:11:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607135
Shmuel Friedland
Shmuel Friedland and Daniel Levy
A polynomial-time approximation algorithm for the number of k-matchings in bipartite graphs
6 pages
null
null
null
cs.CC cs.DM
null
We show that the number of $k$-matching in a given undirected graph $G$ is equal to the number of perfect matching of the corresponding graph $G_k$ on an even number of vertices divided by a suitable factor. If $G$ is bipartite then one can construct a bipartite $G_k$. For bipartite graphs this result implies that the number of $k$-matching has a polynomial-time approximation algorithm. The above results are extended to permanents and hafnians of corresponding matrices.
[ { "version": "v1", "created": "Fri, 28 Jul 2006 19:03:07 GMT" } ]
2016-08-31T00:00:00
[ [ "Friedland", "Shmuel", "" ], [ "Levy", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0607136
Vladimir Vovk
Vladimir Vovk
Competing with Markov prediction strategies
11 pages
null
null
null
cs.LG
null
Assuming that the loss function is convex in the prediction, we construct a prediction strategy universal for the class of Markov prediction strategies, not necessarily continuous. Allowing randomization, we remove the requirement of convexity.
[ { "version": "v1", "created": "Fri, 28 Jul 2006 21:45:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607137
Henrik Petander
Henrik Petander, Eranga Perera, Aruna Seneviratne
Multicasting with selective delivery: A SafetyNet for vertical handoffs
20 pages
null
null
null
cs.NI
null
In future mobility support will require handling roaming in heterogeneous access networks. In order to enable seamless roaming it is necessary to minimize the impact of the vertical handoffs. Localized mobility management schemes such as FMIPv6 and HMIPv6 do not provide sufficient handoff performance, since they have been designed for horizontal handoffs. In this paper, we propose the SafetyNet protocol, which allows a Mobile Node to perform seamless vertical handoffs. Further, we propose a handoff timing algorithm which allows a Mobile Node to delay or even completely avoid upward vertical handoffs. We implement the SafetyNet protocol and compare its performance with the Fast Handovers for Mobile IPv6 protocol in our wireless test bed and analyze the results. The experimental results indicate that the proposed SafetyNet protocol can provide an improvement of up to 95% for TCP performance in vertical handoffs, when compared with FMIPv6 and an improvement of 64% over FMIPv6 with bicasting. We use numerical analysis of the protocol to show that its signaling and data transmission overhead is comparable to Fast Mobile IPv6 and significantly smaller than that of FMIPv6 with bicasting.
[ { "version": "v1", "created": "Sat, 29 Jul 2006 01:45:39 GMT" } ]
2007-05-23T00:00:00
[ [ "Petander", "Henrik", "" ], [ "Perera", "Eranga", "" ], [ "Seneviratne", "Aruna", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0607138
Mohamed Belal A.Y.
Mohamed A. Belal
A Foundation to Perception Computing, Logic and Automata
39 pages, pdf format, to be published
null
null
null
cs.AI cs.LG
null
In this report, a novel approach to intelligence and learning is introduced, this approach is based on what we call 'perception logic'. Based on this logic, a computing mechanism and automata are introduced. Multi-resolution analysis of perceptual information is given, in which learning is accomplished in at most O(log(N))epochs, where N is the number of samples, and the convergence is guarnteed. This approach combines the favors of computational modeles in the sense that they are structured and mathematically well-defined, and the adaptivity of soft computing approaches, in addition to the continuity and real-time response of dynamical systems.
[ { "version": "v1", "created": "Sun, 30 Jul 2006 10:44:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Belal", "Mohamed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0607139
Holenstein Thomas
Thomas Holenstein
Parallel repetition: simplifications and the no-signaling case
27 pages; v2:PRW97 strengthening added, references added, typos fixed; v3: fixed error in the proof of the no-signaling theorem, minor changes
Theory of Computing 5 (2009) 1, pp. 141-172
10.4086/toc.2009.v005a008
null
cs.CC quant-ph
null
Consider a game where a refereed a referee chooses (x,y) according to a publicly known distribution P_XY, sends x to Alice, and y to Bob. Without communicating with each other, Alice responds with a value "a" and Bob responds with a value "b". Alice and Bob jointly win if a publicly known predicate Q(x,y,a,b) holds. Let such a game be given and assume that the maximum probability that Alice and Bob can win is v<1. Raz (SIAM J. Comput. 27, 1998) shows that if the game is repeated n times in parallel, then the probability that Alice and Bob win all games simultaneously is at most v'^(n/log(s)), where s is the maximal number of possible responses from Alice and Bob in the initial game, and v' is a constant depending only on v. In this work, we simplify Raz's proof in various ways and thus shorten it significantly. Further we study the case where Alice and Bob are not restricted to local computations and can use any strategy which does not imply communication among them.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 16:09:37 GMT" }, { "version": "v2", "created": "Tue, 5 Sep 2006 16:54:54 GMT" }, { "version": "v3", "created": "Thu, 28 Dec 2006 01:59:48 GMT" } ]
2009-08-07T00:00:00
[ [ "Holenstein", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0607140
Lukas Pichl
Lukas Pichl, Taisei Kaizoji, Takuya Yamano
Stylized Facts in Internal Rates of Return on Stock Index and its Derivative Transactions
APFA 5
null
10.1016/j.physa.2007.03.042
null
cs.IT cs.CE math.IT
null
Universal features in stock markets and their derivative markets are studied by means of probability distributions in internal rates of return on buy and sell transaction pairs. Unlike the stylized facts in log normalized returns, the probability distributions for such single asset encounters encorporate the time factor by means of the internal rate of return defined as the continuous compound interest. Resulting stylized facts are shown in the probability distributions derived from the daily series of TOPIX, S & P 500 and FTSE 100 index close values. The application of the above analysis to minute-tick data of NIKKEI 225 and its futures market, respectively, reveals an interesting diffference in the behavior of the two probability distributions, in case a threshold on the minimal duration of the long position is imposed. It is therefore suggested that the probability distributions of the internal rates of return could be used for causality mining between the underlying and derivative stock markets. The highly specific discrete spectrum, which results from noise trader strategies as opposed to the smooth distributions observed for fundamentalist strategies in single encounter transactions may be also useful in deducing the type of investment strategy from trading revenues of small portfolio investors.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 12:15:28 GMT" }, { "version": "v2", "created": "Wed, 2 Aug 2006 10:05:09 GMT" } ]
2009-11-11T00:00:00
[ [ "Pichl", "Lukas", "" ], [ "Kaizoji", "Taisei", "" ], [ "Yamano", "Takuya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0607141
Riccardo Pucella
Karl Crary and Robert Harper
Logic Column 16: Higher-Order Abstract Syntax: Setting the Record Straight
4 pages
null
null
null
cs.LO
null
This article responds to a critique of higher-order abstract syntax appearing in Logic Column 14, ``Nominal Logic and Abstract Syntax'', cs.LO/0511025.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 14:15:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Crary", "Karl", "" ], [ "Harper", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0607142
Andreas U. Schmidt
Nicolai Kuntze, Dominique Maehler, and Andreas U. Schmidt
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Refereed contribution to the 4th International Workshop for Technical, Economic and Legal Aspects of Business Models for Virtual Goods, December 13 -15, 2006 on AXMEDIS 2006 in Leeds, England. 5 pages, 3 figures, final version
null
null
null
cs.CR
null
Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibrium and are often based on cheap pseudonyms used to submit ratings. We present a method to price ratings using trusted computing, based on pseudonymous tickets.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:17:39 GMT" }, { "version": "v2", "created": "Tue, 29 Aug 2006 09:51:19 GMT" } ]
2007-05-23T00:00:00
[ [ "Kuntze", "Nicolai", "" ], [ "Maehler", "Dominique", "" ], [ "Schmidt", "Andreas U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0607143
Florentin Smarandache
Jean Dezert, Albena Tchamova, Florentin Smarandache, Pavlina Konstantinova
Target Type Tracking with PCR5 and Dempster's rules: A Comparative Analysis
10 pages, 5 diagrams. Presented to Fusion 2006 International Conference, Florence, Italy, July 2006
Proceedings of Fusion 2006 International Conference, Florence, Italy, July 2006
null
null
cs.AI
null
In this paper we consider and analyze the behavior of two combinational rules for temporal (sequential) attribute data fusion for target type estimation. Our comparative analysis is based on Dempster's fusion rule proposed in Dempster-Shafer Theory (DST) and on the Proportional Conflict Redistribution rule no. 5 (PCR5) recently proposed in Dezert-Smarandache Theory (DSmT). We show through very simple scenario and Monte-Carlo simulation, how PCR5 allows a very efficient Target Type Tracking and reduces drastically the latency delay for correct Target Type decision with respect to Demspter's rule. For cases presenting some short Target Type switches, Demspter's rule is proved to be unable to detect the switches and thus to track correctly the Target Type changes. The approach proposed here is totally new, efficient and promising to be incorporated in real-time Generalized Data Association - Multi Target Tracking systems (GDA-MTT) and provides an important result on the behavior of PCR5 with respect to Dempster's rule. The MatLab source code is provided in
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:32:44 GMT" } ]
2007-05-23T00:00:00
[ [ "Dezert", "Jean", "" ], [ "Tchamova", "Albena", "" ], [ "Smarandache", "Florentin", "" ], [ "Konstantinova", "Pavlina", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0607144
Stanimir Andonov A
Stanimir Andonov
Levels of Product Differentiation in the Global Mobile Phones Market
null
null
null
null
cs.OH
null
The sixth product level called compliant product is a connecting element between the physical product characteristics and the strategy of the producer company. The article discusses the differentiation among the product offers of companies working in the global markets, as well as the strategies which they use and could use in that respect.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 15:43:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Andonov", "Stanimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0607145
Ioannis Doxaras N. Mr
Yannis Bakopoulos, Theophanis Raptis, Doxaras Ioannis
Geometric definition of a new skeletonization concept
9 pages, 3 figures, to appear in "2nd Interdisciplinary Symposium and 2nd Summer School on Mathematical Modeling in Modern Technologies and Economics", 1-5 September, Athens, Greece
null
null
null
cs.CG
null
The Divider set, as an innovative alternative concept to maximal disks, Voronoi sets and cut loci, is presented with a formal definition based on topology and differential geometry. The relevant mathematical theory by previous authors and a comparison with other medial axis definitions is presented. Appropriate applications are proposed and examined.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 18:17:30 GMT" }, { "version": "v2", "created": "Thu, 3 Aug 2006 13:53:45 GMT" }, { "version": "v3", "created": "Tue, 26 Sep 2006 13:26:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Bakopoulos", "Yannis", "" ], [ "Raptis", "Theophanis", "" ], [ "Ioannis", "Doxaras", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0607146
Riccardo Pucella
Joseph Y. Halpern (Cornell University), Riccardo Pucella (Northeastern University)
Modeling Adversaries in a Logic for Security Protocol Analysis
23 pages. A preliminary version appeared in the proceedings of FaSec'02
Logical Methods in Computer Science, Volume 8, Issue 1 (March 9, 2012) lmcs:688
10.2168/LMCS-8(1:21)2012
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which considers only adversaries that can compose and replay messages, and decipher them with known keys. The Dolev-Yao model is a useful abstraction, but it suffers from some drawbacks: it cannot handle the adversary knowing protocol-specific information, and it cannot handle probabilistic notions, such as the adversary attempting to guess the keys. We show how we can analyze security protocols under different adversary models by using a logic with a notion of algorithmic knowledge. Roughly speaking, adversaries are assumed to use algorithms to compute their knowledge; adversary capabilities are captured by suitable restrictions on the algorithms used. We show how we can model the standard Dolev-Yao adversary in this setting, and how we can capture more general capabilities including protocol-specific knowledge and guesses.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 16:44:15 GMT" }, { "version": "v2", "created": "Tue, 24 Jan 2012 05:52:58 GMT" }, { "version": "v3", "created": "Tue, 6 Mar 2012 15:55:49 GMT" }, { "version": "v4", "created": "Wed, 7 Mar 2012 07:38:47 GMT" }, { "version": "v5", "created": "Thu, 8 Mar 2012 13:33:09 GMT" }, { "version": "v6", "created": "Fri, 9 Mar 2012 07:02:01 GMT" } ]
2019-03-14T00:00:00
[ [ "Halpern", "Joseph Y.", "", "Cornell University" ], [ "Pucella", "Riccardo", "", "Northeastern\n University" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0607147
Florentin Smarandache
Florentin Smarandache, Jean Dezert
Fusion of qualitative beliefs using DSmT
13 pages. To appear in "Advances and Applications of DSmT for Information Fusion", collected works, second volume, 2006
Presented as an extended version (Tutorial MO2) to the Fusion 2006 International Conference, Florence, Italy, July 10-13, 2006
null
null
cs.AI
null
This paper introduces the notion of qualitative belief assignment to model beliefs of human experts expressed in natural language (with linguistic labels). We show how qualitative beliefs can be efficiently combined using an extension of Dezert-Smarandache Theory (DSmT) of plausible and paradoxical quantitative reasoning to qualitative reasoning. We propose a new arithmetic on linguistic labels which allows a direct extension of classical DSm fusion rule or DSm Hybrid rules. An approximate qualitative PCR5 rule is also proposed jointly with a Qualitative Average Operator. We also show how crisp or interval mappings can be used to deal indirectly with linguistic labels. A very simple example is provided to illustrate our qualitative fusion rules.
[ { "version": "v1", "created": "Mon, 31 Jul 2006 17:16:57 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2006 19:16:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0608001
Bas Luttik
Luca Aceto, Wan Fokkink, Anna Ingolfsdottir, and Bas Luttik
A Finite Equational Base for CCS with Left Merge and Communication Merge
null
null
null
null
cs.LO
null
Using the left merge and communication merge from ACP, we present an equational base (i.e., a ground-complete and $\omega$-complete set of valid equations) for the fragment of CCS without recursion, restriction and relabelling. Our equational base is finite if the set of actions is finite.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 10:45:29 GMT" }, { "version": "v2", "created": "Wed, 2 Aug 2006 08:20:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Aceto", "Luca", "" ], [ "Fokkink", "Wan", "" ], [ "Ingolfsdottir", "Anna", "" ], [ "Luttik", "Bas", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608002
Florentin Smarandache
Florentin Smarandache, Jean Dezert
An Introduction to the DSm Theory for the Combination of Paradoxical, Uncertain, and Imprecise Sources of Information
21 pages, many tables, figures. To appear in Information&Security International Journal, 2006
Presented at 13th International Congress of Cybernetics and Systems, Maribor, Slovenia, July 6-10, 2005.
null
null
cs.AI
null
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been, and still remains today, of primal importance for the development of reliable modern information systems involving artificial reasoning. In this introduction, we present a survey of our recent theory of plausible and paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT) in the literature, developed for dealing with imprecise, uncertain and paradoxical sources of information. We focus our presentation here rather on the foundations of DSmT, and on the two important new rules of combination, than on browsing specific applications of DSmT available in literature. Several simple examples are given throughout the presentation to show the efficiency and the generality of this new approach.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 15:31:13 GMT" } ]
2007-05-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Dezert", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0608003
Alessandro Rosa
Alessandro Rosa
On a solution to display non-filled-in quaternionic Julia sets
15 pages, 28 figures
null
null
null
cs.GR cs.MS math.DS
null
During early 1980s, the so-called `escape time' method, developed to display the Julia sets for complex dynamical systems, was exported to quaternions in order to draw analogous pictures in this wider numerical field. Despite of the fine results in the complex plane, where all topological configurations of Julia sets have been successfully displayed, the `escape time' method fails to render properly the non-filled-in variety of quaternionic Julia sets. So their digital visualisation remained an open problem for several years. Both the solution for extending this old method to non-filled-in quaternionic Julia sets and its implementation into a program are explained here.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 19:25:17 GMT" }, { "version": "v2", "created": "Tue, 1 Aug 2006 22:08:19 GMT" } ]
2007-06-13T00:00:00
[ [ "Rosa", "Alessandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" } ]
cs/0608004
Jose M. Soler
Jose M. Soler
Separating the articles of authors with the same name
4 pages, 0 figures
null
null
null
cs.DL cs.IR
null
I describe a method to separate the articles of different authors with the same name. It is based on a distance between any two publications, defined in terms of the probability that they would have as many coincidences if they were drawn at random from all published documents. Articles with a given author name are then clustered according to their distance, so that all articles in a cluster belong very likely to the same author. The method has proven very useful in generating groups of papers that are then selected manually. This simplifies considerably citation analysis when the author publication lists are not available.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 18:23:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Soler", "Jose M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0608005
Kasper Peeters
Kasper Peeters
A field-theory motivated approach to symbolic computer algebra
14 pages; v2: several clarifications and references added, version as published
Comput.Phys.Commun.176:550-558,2007
10.1016/j.cpc.2007.01.003
AEI-2006-037
cs.SC gr-qc hep-th
null
Field theory is an area in physics with a deceptively compact notation. Although general purpose computer algebra systems, built around generic list-based data structures, can be used to represent and manipulate field-theory expressions, this often leads to cumbersome input formats, unexpected side-effects, or the need for a lot of special-purpose code. This makes a direct translation of problems from paper to computer and back needlessly time-consuming and error-prone. A prototype computer algebra system is presented which features TeX-like input, graph data structures, lists with Young-tableaux symmetries and a multiple-inheritance property system. The usefulness of this approach is illustrated with a number of explicit field-theory problems.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 19:05:20 GMT" }, { "version": "v2", "created": "Tue, 12 Jun 2007 12:21:22 GMT" } ]
2008-11-26T00:00:00
[ [ "Peeters", "Kasper", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" } ]
cs/0608006
S. Sandeep Pradhan
Suhan Choi and S. Sandeep Pradhan
A Graph-based Framework for Transmission of Correlated Sources over Broadcast Channels
36 pages, 9 figures
null
null
null
cs.IT math.IT
null
In this paper we consider the communication problem that involves transmission of correlated sources over broadcast channels. We consider a graph-based framework for this information transmission problem. The system involves a source coding module and a channel coding module. In the source coding module, the sources are efficiently mapped into a nearly semi-regular bipartite graph, and in the channel coding module, the edges of this graph are reliably transmitted over a broadcast channel. We consider nearly semi-regular bipartite graphs as discrete interface between source coding and channel coding in this multiterminal setting. We provide an information-theoretic characterization of (1) the rate of exponential growth (as a function of the number of channel uses) of the size of the bipartite graphs whose edges can be reliably transmitted over a broadcast channel and (2) the rate of exponential growth (as a function of the number of source samples) of the size of the bipartite graphs which can reliably represent a pair of correlated sources to be transmitted over a broadcast channel.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 22:34:26 GMT" } ]
2007-07-13T00:00:00
[ [ "Choi", "Suhan", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608007
Renato Renner
Thomas Holenstein and Renato Renner
On the randomness of independent experiments
latex, 15 pages
null
null
null
cs.IT math.IT
null
Given a probability distribution P, what is the minimum amount of bits needed to store a value x sampled according to P, such that x can later be recovered (except with some small probability)? Or, what is the maximum amount of uniform randomness that can be extracted from x? Answering these and similar information-theoretic questions typically boils down to computing so-called smooth entropies. In this paper, we derive explicit and almost tight bounds on the smooth entropies of n-fold product distributions.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 03:25:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Holenstein", "Thomas", "" ], [ "Renner", "Renato", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608008
Ilya Safro
Ilya Safro
The minimum linear arrangement problem on proper interval graphs
null
null
null
null
cs.DM cs.DS
null
We present a linear time algorithm for the minimum linear arrangement problem on proper interval graphs. The obtained ordering is a 4-approximation for general interval graphs
[ { "version": "v1", "created": "Wed, 2 Aug 2006 07:46:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Safro", "Ilya", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0608009
Claudia Landi
Andrea Cerri, Patrizio Frosini and Claudia Landi
Stability in multidimensional Size Theory
15 pages, 1 figure, uses psfrag
null
null
Universita' di Modena e Reggio Emilia, DISMI-85 june 2006
cs.CG cs.CV
null
This paper proves that in Size Theory the comparison of multidimensional size functions can be reduced to the 1-dimensional case by a suitable change of variables. Indeed, we show that a foliation in half-planes can be given, such that the restriction of a multidimensional size function to each of these half-planes turns out to be a classical size function in two scalar variables. This leads to the definition of a new distance between multidimensional size functions, and to the proof of their stability with respect to that distance.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 08:49:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Cerri", "Andrea", "" ], [ "Frosini", "Patrizio", "" ], [ "Landi", "Claudia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0608010
Sander Stepanov
Sander Stepanov
MIMO scheme performance and detection in epsilon noise
30 pages
null
null
null
cs.IT math.IT
null
New approach for analysis and decoding MIMO signaling is developed for usual model of nongaussion noise consists of background and impulsive noise named epsilon - noise. It is shown that non-gaussion noise performance significantly worse than gaussion ones. Stimulation results strengthen out theory. Robust in statistical sense detection rule is suggested for such kind of noise features much best robust detector performance than detector designed for Gaussian noise in impulsive environment and modest margin in background noise. Proposed algorithms performance are comparable with developed potential bound. Proposed tool, is crucial issue for MIMO communication system design, since real noise environment has impulsive character that contradict with wide used Gaussian approach, so real MIMO performance much different for Gaussian a non-Gaussian noise model.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 09:52:11 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2006 11:59:19 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "Sander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608011
Krzysztof R. Apt
Krzysztof R. Apt
The Many Faces of Rationalizability
39 pages, appeared in The B.E. Journal of Theoretical Economics: Vol. 7 : Iss. 1 (Topics), Article 18. Available at: http://www.bepress.com/bejte/vol7/iss1/art18
null
null
null
cs.GT
null
The rationalizability concept was introduced in \cite{Ber84} and \cite{Pea84} to assess what can be inferred by rational players in a non-cooperative game in the presence of common knowledge. However, this notion can be defined in a number of ways that differ in seemingly unimportant minor details. We shed light on these differences, explain their impact, and clarify for which games these definitions coincide. Then we apply the same analysis to explain the differences and similarities between various ways the iterated elimination of strictly dominated strategies was defined in the literature. This allows us to clarify the results of \cite{DS02} and \cite{CLL05} and improve upon them. We also consider the extension of these results to strict dominance by a mixed strategy. Our approach is based on a general study of the operators on complete lattices. We allow transfinite iterations of the considered operators and clarify the need for them. The advantage of such a general approach is that a number of results, including order independence for some of the notions of rationalizability and strict dominance, come for free.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 09:57:54 GMT" }, { "version": "v2", "created": "Wed, 18 Oct 2006 12:32:01 GMT" }, { "version": "v3", "created": "Fri, 25 May 2007 10:48:44 GMT" } ]
2007-06-13T00:00:00
[ [ "Apt", "Krzysztof R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
cs/0608012
Stavros Toumpis
R. Catanuto, S. Toumpis, G. Morabito
Opti{c,m}al: Optical/Optimal Routing in Massively Dense Wireless Networks
null
Proc. INFOCOM 2007, Anchorage, AL, May 2007
10.1109/INFCOM.2007.122
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study routing for massively dense wireless networks, i.e., wireless networks that contain so many nodes that, in addition to their usual microscopic description, a novel macroscopic description becomes possible. The macroscopic description is not detailed, but nevertheless contains enough information to permit a meaningful study and performance optimization of the network. Within this context, we continue and significantly expand previous work on the analogy between optimal routing and the propagation of light according to the laws of Geometrical Optics. Firstly, we pose the analogy in a more general framework than previously, notably showing how the eikonal equation, which is the central equation of Geometrical Optics, also appears in the networking context. Secondly, we develop a methodology for calculating the cost function, which is the function describing the network at the macroscopic level. We apply this methodology for two important types of networks: bandwidth limited and energy limited.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 14:26:30 GMT" }, { "version": "v2", "created": "Wed, 23 Oct 2013 12:35:35 GMT" } ]
2013-10-24T00:00:00
[ [ "Catanuto", "R.", "" ], [ "Toumpis", "S.", "" ], [ "Morabito", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608013
Julien Robert
Julien Robert, Nicolas Schabanel
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
null
null
null
null
cs.DS cs.CC
null
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently observed that the average service time of broadcast systems can be considerably improved by taking into consideration existing correlations between requests. We study a pull-based data broadcast system where users request possibly overlapping sets of items; a request is served when all its requested items are downloaded. We aim at minimizing the average user perceived latency, i.e. the average flow time of the requests. We first show that any algorithm that ignores the dependencies can yield arbitrary bad performances with respect to the optimum even if it is given arbitrary extra resources. We then design a $(4+\epsilon)$-speed $O(1+1/\epsilon^2)$-competitive algorithm for this setting that consists in 1) splitting evenly the bandwidth among each requested set and in 2) broadcasting arbitrarily the items still missing in each set into the bandwidth the set has received. Our algorithm presents several interesting features: it is simple to implement, non-clairvoyant, fair to users so that no user may starve for a long period of time, and guarantees good performances in presence of correlations between user requests (without any change in the broadcast protocol). We also present a $ (4+\epsilon)$-speed $O(1+1/\epsilon^3)$-competitive algorithm which broadcasts at most one item at any given time and preempts each item broadcast at most once on average. As a side result of our analysis, we design a competitive algorithm for a particular setting of non-clairvoyant job scheduling with dependencies, which might be of independent interest.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 15:00:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Robert", "Julien", "" ], [ "Schabanel", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608014
Jian Tan
Yuliy Baryshnikov, Jian Tan
Localization for Anchoritic Sensor Networks
null
null
null
null
cs.NI cs.CG
null
We introduce a class of anchoritic sensor networks, where communications between sensor nodes is undesirable or infeasible, e.g., due to harsh environment, energy constraints, or security considerations.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 22:10:51 GMT" } ]
2009-09-29T00:00:00
[ [ "Baryshnikov", "Yuliy", "" ], [ "Tan", "Jian", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0608015
Sebastian Brand
Sebastian Brand, Roland H. C. Yap
Towards "Propagation = Logic + Control"
15 pages; 22nd International Conference on Logic Programming (ICLP'06)
null
null
null
cs.PL cs.AI
null
Constraint propagation algorithms implement logical inference. For efficiency, it is essential to control whether and in what order basic inference steps are taken. We provide a high-level framework that clearly differentiates between information needed for controlling propagation versus that needed for the logical semantics of complex constraints composed from primitive ones. We argue for the appropriateness of our controlled propagation framework by showing that it captures the underlying principles of manually designed propagation algorithms, such as literal watching for unit clause propagation and the lexicographic ordering constraint. We provide an implementation and benchmark results that demonstrate the practicality and efficiency of our framework.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 02:41:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "Sebastian", "" ], [ "Yap", "Roland H. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0608016
Sebastian Brand
Gregory J. Duck, Peter J. Stuckey, Sebastian Brand
ACD Term Rewriting
21 pages; 22nd International Conference on Logic Programming (ICLP'06)
null
null
null
cs.PL cs.SC
null
We introduce Associative Commutative Distributive Term Rewriting (ACDTR), a rewriting language for rewriting logical formulae. ACDTR extends AC term rewriting by adding distribution of conjunction over other operators. Conjunction is vital for expressive term rewriting systems since it allows us to require that multiple conditions hold for a term rewriting rule to be used. ACDTR uses the notion of a "conjunctive context", which is the conjunction of constraints that must hold in the context of a term, to enable the programmer to write very expressive and targeted rewriting rules. ACDTR can be seen as a general logic programming language that extends Constraint Handling Rules and AC term rewriting. In this paper we define the semantics of ACDTR and describe our prototype implementation.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 02:55:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Duck", "Gregory J.", "" ], [ "Stuckey", "Peter J.", "" ], [ "Brand", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
cs/0608017
Sebastian Brand
Krzysztof R. Apt, Sebastian Brand
Infinite Qualitative Simulations by Means of Constraint Programming
15 pages; 12th International Conference on Principles and Practice of Constraint Programming (CP'06)
null
null
null
cs.AI cs.LO
null
We introduce a constraint-based framework for studying infinite qualitative simulations concerned with contingencies such as time, space, shape, size, abstracted into a finite set of qualitative relations. To define the simulations, we combine constraints that formalize the background knowledge concerned with qualitative reasoning with appropriate inter-state constraints that are formulated using linear temporal logic. We implemented this approach in a constraint programming system by drawing on ideas from bounded model checking. The resulting system allows us to test and modify the problem specifications in a straightforward way and to combine various knowledge aspects.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 03:08:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Brand", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]