id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0608018
|
Renato Renner
|
Renato Renner and Stefan Wolf and Juerg Wullschleger
|
The single-serving channel capacity
|
4 pages, latex
|
Proceedings of the 2006 IEEE International Symposium on
Information Theory (ISIT)
| null | null |
cs.IT math.IT
| null |
In this paper we provide the answer to the following question: Given a noisy
channel and epsilon>0, how many bits can be transmitted with an error of at
most epsilon by a single use of the channel?
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 03:19:12 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Renner",
"Renato",
""
],
[
"Wolf",
"Stefan",
""
],
[
"Wullschleger",
"Juerg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608019
|
Sebastian Brand
|
Sebastian Brand
|
Relation Variables in Qualitative Spatial Reasoning
|
14 pages; 27th German Conference on Artificial Intelligence (KI'04)
| null | null | null |
cs.AI
| null |
We study an alternative to the prevailing approach to modelling qualitative
spatial reasoning (QSR) problems as constraint satisfaction problems. In the
standard approach, a relation between objects is a constraint whereas in the
alternative approach it is a variable. The relation-variable approach greatly
simplifies integration and implementation of QSR. To substantiate this point,
we discuss several QSR algorithms from the literature which in the
relation-variable approach reduce to the customary constraint propagation
algorithm enforcing generalised arc-consistency.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 03:24:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Brand",
"Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0608020
|
Romain Pechoux
|
Jean-Yves Marion and Romain Pechoux
|
Quasi-friendly sup-interpretations
| null | null | null | null |
cs.CC
| null |
In a previous paper, the sup-interpretation method was proposed as a new tool
to control memory resources of first order functional programs with pattern
matching by static analysis. Basically, a sup-interpretation provides an upper
bound on the size of function outputs. In this former work, a criterion, which
can be applied to terminating as well as non-terminating programs, was
developed in order to bound polynomially the stack frame size. In this paper,
we suggest a new criterion which captures more algorithms computing values
polynomially bounded in the size of the inputs. Since this work is related to
quasi-interpretations, we compare the two notions obtaining two main features.
The first one is that, given a program, we have heuristics for finding a
sup-interpretation when we consider polynomials of bounded degree. The other
one consists in the characterizations of the set of function computable in
polynomial time and in polynomial space.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 13:05:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Marion",
"Jean-Yves",
""
],
[
"Pechoux",
"Romain",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608021
|
Eyal Lubetzky
|
Noga Alon, Eyal Lubetzky
|
The Shannon capacity of a graph and the independence numbers of its
powers
| null |
IEEE Trans. on Information Theory 52 (2006), 2172-2176
|
10.1109/TIT.2006.872856
| null |
cs.IT cs.DM math.IT
| null |
The independence numbers of powers of graphs have been long studied, under
several definitions of graph products, and in particular, under the strong
graph product. We show that the series of independence numbers in strong powers
of a fixed graph can exhibit a complex structure, implying that the Shannon
Capacity of a graph cannot be approximated (up to a sub-polynomial factor of
the number of vertices) by any arbitrarily large, yet fixed, prefix of the
series. This is true even if this prefix shows a significant increase of the
independence number at a given power, after which it stabilizes for a while.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 14:46:36 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Alon",
"Noga",
""
],
[
"Lubetzky",
"Eyal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608022
|
Joseph Y. Halpern
|
Joseph Y. Halpern and Sabina Petride
|
Expressing Security Properties Using Selective Interleaving Functions
| null | null | null | null |
cs.CR
| null |
McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the
best-known attempt to construct a framework for expressing various security
properties. We examine the expressive power of SIFs carefully. We show that
SIFs cannot capture nondeducibility on strategies (NOS). We also prove that the
set of security properties expressed with SIFs is not closed under conjunction,
from which it follows that separability is strictly stronger than double
generalized noninterference. However, we show that if we generalize the notion
of SIF in a natural way, then NOS is expressible, and the set of security
properties expressible by generalized SIFs is closed under conjunction.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2006 20:15:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Halpern",
"Joseph Y.",
""
],
[
"Petride",
"Sabina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608023
|
Thomas Michel
|
Gerhard Wunder, Thomas Michel
|
Optimal resource allocation for OFDM multiuser channels
| null | null | null | null |
cs.IT math.IT
| null |
In this paper, a unifying framework for orthogonal frequency division
multiplexing (OFDM) multiuser resource allocation is presented. The isolated
seeming problems of maximizing a weighted sum of rates for a given power budget
$\bar{P}$ and minimizing sum power for given rate requirements
$\mathbf{\bar{R}}$ can be interpreted jointly in this framework. To this end we
embed the problems in a higher dimensional space. Based on these results, we
subsequently consider the combined problem of maximizing a weighted sum of
rates under given rate requirements $\mathbf{\bar{R}}$ and a fixed power budget
$\bar{P}$. This new problem is challenging, since the additional constraints do
not allow to use the hitherto existing approaches. Interestingly, the optimal
decoding orders turn out to be the ordering of the Lagrangian factors in all
problems.
|
[
{
"version": "v1",
"created": "Fri, 4 Aug 2006 08:12:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wunder",
"Gerhard",
""
],
[
"Michel",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608024
|
Shujun Li Dr.
|
Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen
|
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
|
8 pages, 10 figures, IEEE format
|
IEEE Transactions on Circuits and Systems-I: Regular Papers, vol.
55, no. 4, pp. 1055-1063, April 2008
|
10.1109/TCSI.2008.916540
| null |
cs.CR cs.MM
| null |
Recently Lin et al. proposed a method of using the underdetermined BSS (blind
source separation) problem to realize image and speech encryption. In this
paper, we give a cryptanalysis of this BSS-based encryption and point out that
it is not secure against known/chosen-plaintext attack and chosen-ciphertext
attack. In addition, there exist some other security defects: low sensitivity
to part of the key and the plaintext, a ciphertext-only differential attack,
divide-and-conquer (DAC) attack on part of the key. We also discuss the role of
BSS in Lin et al.'s efforts towards cryptographically secure ciphers.
|
[
{
"version": "v1",
"created": "Fri, 4 Aug 2006 11:32:44 GMT"
}
] | 2010-06-23T00:00:00 |
[
[
"Li",
"Shujun",
""
],
[
"Li",
"Chengqing",
""
],
[
"Lo",
"Kwok-Tung",
""
],
[
"Chen",
"Guanrong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0608025
|
Dinesh Kumar
|
Dinesh Kumar (INRIA Sophia Antipolis), Eitan Altman (INRIA Sophia
Antipolis), Jean-Marc Kelif (INRIA Sophia Antipolis)
|
User-Network Association in a WLAN-UMTS Hybrid Cell: Global & Individual
Optimality
| null | null | null | null |
cs.NI
| null |
We study optimal user-network association in an integrated 802.11 WLAN and
3G-UMTS hybrid cell. Assuming saturated resource allocation on the downlink of
WLAN and UMTS networks and a single QoS class of mobiles arriving at an average
location in the hybrid cell, we formulate the problem with two different
approaches: Global and Individual optimality. The Globally optimal association
is formulated as an SMDP (Semi Markov Decision Process) connection routing
decision problem where rewards comprise a financial gain component and an
aggregate network throughput component. The corresponding Dynamic Programming
equations are solved using Value Iteration method and a stationary optimal
policy with neither convex nor concave type switching curve structure is
obtained. Threshold type and symmetric switching curves are observed for the
analogous homogenous network cases. The Individual optimality is studied under
a non-cooperative dynamic game framework with expected service time of a mobile
as the decision cost criteria. It is shown that individual optimality in a
WLAN-UMTS hybrid cell, results in a threshold policy curve of descending
staircase form with increasing Poisson arrival rate of mobiles.
|
[
{
"version": "v1",
"created": "Fri, 4 Aug 2006 11:44:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kumar",
"Dinesh",
"",
"INRIA Sophia Antipolis"
],
[
"Altman",
"Eitan",
"",
"INRIA Sophia\n Antipolis"
],
[
"Kelif",
"Jean-Marc",
"",
"INRIA Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608026
|
Dinesh Kumar
|
Dinesh Kumar (INRIA Sophia Antipolis), Dhiman Barman, Eitan Altman
(INRIA Sophia Antipolis), Jean-Marc Kelif (FT R&D)
|
New Cross-Layer Channel Switching Policy for TCP Transmission on 3G UMTS
Downlink
| null | null | null | null |
cs.NI
| null |
In 3G UMTS, two main transport channels have been provided for downlink data
transmission: a common FACH channel and a dedicated DCH channel. The
performance of TCP in UMTS depends much on the channel switching policy used.
In this paper, we propose and analyze three new basic threshold-based channel
switching policies for UMTS that we name as QS (Queue Size), FS (Flow Size) and
QSFS (QS & FS combined) policy. These policies significantly improve over a
modified threshold policy in [1] by about 17% in response time metrics. We
further propose and evaluate a new improved switching policy that we call
FS-DCH (at-least flow-size threshold on DCH) policy. This policy is biased
towards short TCP flows of few packets and is thus a cross-layer policy that
improves the performance of TCP by giving priority to the initial few packets
of a flow on the fast DCH channel. Extensive simulation results confirm this
improvement for the case when number of TCP connections is low.
|
[
{
"version": "v1",
"created": "Fri, 4 Aug 2006 11:53:04 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kumar",
"Dinesh",
"",
"INRIA Sophia Antipolis"
],
[
"Barman",
"Dhiman",
"",
"INRIA Sophia Antipolis"
],
[
"Altman",
"Eitan",
"",
"INRIA Sophia Antipolis"
],
[
"Kelif",
"Jean-Marc",
"",
"FT R&D"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608027
|
Edwin Henneken
|
E. Henneken, M.J. Kurtz, G. Eichhorn, A. Accomazzi, C.S. Grant, D.
Thompson, E. Bohlen, S.S. Murray
|
myADS-arXiv - a Tailor-Made, Open Access, Virtual Journal
|
4 pages, 2 figures, poster paper to appear in the proceedings of the
LISA V conference
| null | null | null |
cs.DL astro-ph
| null |
The myADS-arXiv service provides the scientific community with a one stop
shop for staying up-to-date with a researcher's field of interest. The service
provides a powerful and unique filter on the enormous amount of bibliographic
information added to the ADS on a daily basis. It also provides a complete view
with the most relevant papers available in the subscriber's field of interest.
With this service, the subscriber will get to know the lastest developments,
popular trends and the most important papers. This makes the service not only
unique from a technical point of view, but also from a content point of view.
On this poster we will argue why myADS-arXiv is a tailor-made, open access,
virtual journal and we will illustrate its unique character.
|
[
{
"version": "v1",
"created": "Fri, 4 Aug 2006 15:23:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Henneken",
"E.",
""
],
[
"Kurtz",
"M. J.",
""
],
[
"Eichhorn",
"G.",
""
],
[
"Accomazzi",
"A.",
""
],
[
"Grant",
"C. S.",
""
],
[
"Thompson",
"D.",
""
],
[
"Bohlen",
"E.",
""
],
[
"Murray",
"S. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
null
] |
cs/0608028
|
Joseph Y. Halpern
|
Joseph Y. Halpern
|
Using Sets of Probability Measures to Represent Uncertainty
| null | null | null | null |
cs.AI
| null |
I explore the use of sets of probability measures as a representation of
uncertainty.
|
[
{
"version": "v1",
"created": "Fri, 4 Aug 2006 20:26:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Halpern",
"Joseph Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0608029
|
Martin Wainwright
|
Alexandros G. Dimakis, Martin J. Wainwright
|
Guessing Facets: Polytope Structure and Improved LP Decoder
|
Appeared in International Symposium on Information Theory, Seattle,
WA. July 2006. Revision: fixed author names in abstract (to be recognized as
two separate authors)
| null | null | null |
cs.IT math.IT
| null |
A new approach for decoding binary linear codes by solving a linear program
(LP) over a relaxed codeword polytope was recently proposed by Feldman et al.
In this paper we investigate the structure of the polytope used in the LP
relaxation decoding. We begin by showing that for expander codes, every
fractional pseudocodeword always has at least a constant fraction of
non-integral bits. We then prove that for expander codes, the active set of any
fractional pseudocodeword is smaller by a constant fraction than the active set
of any codeword. We exploit this fact to devise a decoding algorithm that
provably outperforms the LP decoder for finite blocklengths. It proceeds by
guessing facets of the polytope, and resolving the linear program on these
facets. While the LP decoder succeeds only if the ML codeword has the highest
likelihood over all pseudocodewords, we prove that for expander codes the
proposed algorithm succeeds even with a constant number of pseudocodewords of
higher likelihood. Moreover, the complexity of the proposed algorithm is only a
constant factor larger than that of the LP decoder.
|
[
{
"version": "v1",
"created": "Sat, 5 Aug 2006 01:25:45 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Aug 2006 22:30:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dimakis",
"Alexandros G.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608030
|
Ugo Dal Lago
|
Patrick Baillot, Ugo Dal Lago and Jean-Yves Moyen
|
On Quasi-Interpretations, Blind Abstractions and Implicit Complexity
|
18 pages
| null | null | null |
cs.PL cs.CC cs.LO
| null |
Quasi-interpretations are a technique to guarantee complexity bounds on
first-order functional programs: with termination orderings they give in
particular a sufficient condition for a program to be executable in polynomial
time, called here the P-criterion. We study properties of the programs
satisfying the P-criterion, in order to better understand its intensional
expressive power. Given a program on binary lists, its blind abstraction is the
nondeterministic program obtained by replacing lists by their lengths (natural
numbers). A program is blindly polynomial if its blind abstraction terminates
in polynomial time. We show that all programs satisfying a variant of the
P-criterion are in fact blindly polynomial. Then we give two extensions of the
P-criterion: one by relaxing the termination ordering condition, and the other
one (the bounded value property) giving a necessary and sufficient condition
for a program to be polynomial time executable, with memoisation.
|
[
{
"version": "v1",
"created": "Sun, 6 Aug 2006 07:20:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Baillot",
"Patrick",
""
],
[
"Lago",
"Ugo Dal",
""
],
[
"Moyen",
"Jean-Yves",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608031
|
Mikio Fujii
|
Mikio Fujii
|
Secure Positioning of Mobile Terminals with Simplex Radio Communication
|
8 pages, 4 figures
| null | null | null |
cs.CR
| null |
With the rapid spread of various mobile terminals in our society, the
importance of secure positioning is growing for wireless networks in
adversarial settings. Recently, several authors have proposed a secure
positioning mechanism of mobile terminals which is based on the geometric
property of wireless node placement, and on the postulate of modern physics
that a propagation speed of information never exceeds the velocity of light. In
particular, they utilize the measurements of the round-trip time of radio
signal propagation and bidirectional communication for variants of the
challenge-and-response. In this paper, we propose a novel means to construct
the above mechanism by use of unidirectional communication instead of
bidirectional communication. Our proposal is based on the assumption that a
mobile terminal incorporates a high-precision inner clock in a tamper-resistant
protected area. In positioning, the mobile terminal uses its inner clock and
the time and location information broadcasted by radio from trusted stations.
Our proposal has a major advantage in protecting the location privacy of mobile
terminal users, because the mobile terminal need not provide any information to
the trusted stations through positioning procedures. Besides, our proposal is
free from the positioning error due to claimant's processing-time fluctuations
in the challenge-and-response, and is well-suited for mobile terminals in the
open air, or on the move at high speed, in terms of practical usage. We analyze
the security, the functionality, and the feasibility of our proposal in
comparison to previous proposals.
|
[
{
"version": "v1",
"created": "Mon, 7 Aug 2006 05:49:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fujii",
"Mikio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608032
|
Harald Zankl
|
Harald Zankl, Aart Middeldorp
|
Satisfying KBO Constraints
|
15 pages
| null | null | null |
cs.SC cs.LO
| null |
This paper presents two new approaches to prove termination of rewrite
systems with the Knuth-Bendix order efficiently. The constraints for the weight
function and for the precedence are encoded in (pseudo-)propositional logic and
the resulting formula is tested for satisfiability. Any satisfying assignment
represents a weight function and a precedence such that the induced
Knuth-Bendix order orients the rules of the encoded rewrite system from left to
right.
|
[
{
"version": "v1",
"created": "Sun, 6 Aug 2006 12:42:31 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2007 08:45:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zankl",
"Harald",
""
],
[
"Middeldorp",
"Aart",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608033
|
Roberto Bonato
|
Roberto Bonato (INRIA Futurs, LaBRI)
|
A Study on Learnability for Rigid Lambek Grammars
| null | null | null | null |
cs.LG
| null |
We present basic notions of Gold's "learnability in the limit" paradigm,
first presented in 1967, a formalization of the cognitive process by which a
native speaker gets to grasp the underlying grammar of his/her own native
language by being exposed to well formed sentences generated by that grammar.
Then we present Lambek grammars, a formalism issued from categorial grammars
which, although not as expressive as needed for a full formalization of natural
languages, is particularly suited to easily implement a natural interface
between syntax and semantics. In the last part of this work, we present a
learnability result for Rigid Lambek grammars from structured examples.
|
[
{
"version": "v1",
"created": "Sun, 6 Aug 2006 16:10:05 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Bonato",
"Roberto",
"",
"INRIA Futurs, LaBRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0608034
|
William Yurcik
|
Aashish Sharma, William Yurcik
|
Security Assessment of E-Tax Filing Websites
|
9 pages
| null | null | null |
cs.CR
| null |
Technical security is only part of E-Commerce security operations; human
usability and security perception play major and sometimes dominating factors.
For instance, slick websites with impressive security icons but no real
technical security are often perceived by users to be trustworthy (and thus
more profitable) than plain vanilla websites that use powerful encryption for
transmission and server protection. We study one important type of E-Commerce
transaction website, E-Tax Filing, that is exposed to large populations. We
assess a large number of international (5), Federal (USA), and state E-Tax
filing websites (38) for both technical security protection and human
perception of security. As a result of this assessment, we identify security
best practices across these E-Tax Filing websites and recommend additional
security techniques that have not been found in current use by E-Tax Filing
websites.
|
[
{
"version": "v1",
"created": "Sun, 6 Aug 2006 22:56:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sharma",
"Aashish",
""
],
[
"Yurcik",
"William",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608035
|
Kohei Suenaga
|
Naoki Kobayashi, Kohei Suenaga, and Lucian Wischik
|
Resource Usage Analysis for the Pi-Calculus
| null |
Logical Methods in Computer Science, Volume 2, Issue 3 (September
13, 2006) lmcs:2246
|
10.2168/LMCS-2(3:4)2006
| null |
cs.PL cs.LO
| null |
We propose a type-based resource usage analysis for the π-calculus
extended with resource creation/access primitives. The goal of the resource
usage analysis is to statically check that a program accesses resources such as
files and memory in a valid manner. Our type system is an extension of previous
behavioral type systems for the π-calculus, and can guarantee the safety
property that no invalid access is performed, as well as the property that
necessary accesses (such as the close operation for a file) are eventually
performed unless the program diverges. A sound type inference algorithm for the
type system is also developed to free the programmer from the burden of writing
complex type annotations. Based on the algorithm, we have implemented a
prototype resource usage analyzer for the π-calculus. To the authors'
knowledge, ours is the first type-based resource usage analysis that deals with
an expressive concurrent language like the pi-calculus.
|
[
{
"version": "v1",
"created": "Mon, 7 Aug 2006 05:22:42 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Sep 2006 11:05:09 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Kobayashi",
"Naoki",
""
],
[
"Suenaga",
"Kohei",
""
],
[
"Wischik",
"Lucian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608036
|
Andre Hernich
|
Andre Hernich, Nicole Schweikardt
|
Reversal Complexity Revisited
|
19 pages, 2 figures
| null | null | null |
cs.CC
| null |
We study a generalized version of reversal bounded Turing machines where,
apart from several tapes on which the number of head reversals is bounded by
r(n), there are several further tapes on which head reversals remain
unrestricted, but size is bounded by s(n). Recently, such machines were
introduced as a formalization of a computation model that restricts random
access to external memory and internal memory space. Here, each of the tapes
with a restriction on the head reversals corresponds to an external memory
device, and the tapes of restricted size model internal memory. We use
ST(r(n),s(n),O(1)) to denote the class of all problems that can be solved by
deterministic Turing machines that comply to the above resource bounds.
Similarly, NST and RST, respectively, are used for the corresponding
nondeterministic and randomized classes.
While previous papers focused on lower bounds for particular problems,
including sorting, the set equality problem, and several query evaluation
problems, the present paper addresses the relations between the (R,N)ST-classes
and classical complexity classes and investigates the structural complexity of
the (R,N)ST-classes. Our main results are (1) a trade-off between internal
memory space and external memory head reversals, (2) correspondences between
the (R,N)ST-classes and ``classical'' time-bounded, space-bounded,
reversal-bounded, and circuit complexity classes, and (3) hierarchies of
(R)ST-classes in terms of increasing numbers of head reversals on external
memory tapes.
|
[
{
"version": "v1",
"created": "Mon, 7 Aug 2006 11:37:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hernich",
"Andre",
""
],
[
"Schweikardt",
"Nicole",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608037
|
Shaohua Li
|
Shaohua Li
|
Cascade hash tables: a series of multilevel double hashing schemes with
O(1) worst case lookup time
|
this manuscript is poorly written and contains little technical
novelty
| null | null | null |
cs.DS cs.AI
| null |
In this paper, the author proposes a series of multilevel double hashing
schemes called cascade hash tables. They use several levels of hash tables. In
each table, we use the common double hashing scheme. Higher level hash tables
work as fail-safes of lower level hash tables. By this strategy, it could
effectively reduce collisions in hash insertion. Thus it gains a constant worst
case lookup time with a relatively high load factor(70%-85%) in random
experiments. Different parameters of cascade hash tables are tested.
|
[
{
"version": "v1",
"created": "Mon, 7 Aug 2006 15:22:30 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Sep 2006 10:04:14 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Jun 2015 14:25:38 GMT"
}
] | 2015-06-26T00:00:00 |
[
[
"Li",
"Shaohua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0608038
|
Joachim Wehler
|
Joachim Wehler
|
Morphisms of Coloured Petri Nets
| null | null | null | null |
cs.SE
| null |
We introduce the concept of a morphism between coloured nets. Our definition
generalizes Petris definition for ordinary nets. A morphism of coloured nets
maps the topological space of the underlying undirected net as well as the
kernel and cokernel of the incidence map. The kernel are flows along the
transition-bordered fibres of the morphism, the cokernel are classes of
markings of the place-bordered fibres. The attachment of bindings, colours,
flows and marking classes to a subnet is formalized by using concepts from
sheaf theory. A coloured net is a sheaf-cosheaf pair over a Petri space and a
morphism between coloured nets is a morphism between such pairs. Coloured nets
and their morphisms form a category. We prove the existence of a product in the
subcategory of sort-respecting morphisms. After introducing markings our
concepts generalize to coloured Petri nets.
|
[
{
"version": "v1",
"created": "Mon, 7 Aug 2006 19:03:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wehler",
"Joachim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0608039
|
Norman Danner
|
Norman Danner and Chris Pollett
|
The weak pigeonhole principle for function classes in S^1_2
|
11 pages
|
Mathematical Logic Quarterly 52(6):575-584, 2006
|
10.1002/malq.200610015
| null |
cs.LO
| null |
It is well known that S^1_2 cannot prove the injective weak pigeonhole
principle for polynomial time functions unless RSA is insecure. In this note we
investigate the provability of the surjective (dual) weak pigeonhole principle
in S^1_2 for provably weaker function classes.
|
[
{
"version": "v1",
"created": "Mon, 7 Aug 2006 19:44:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Danner",
"Norman",
""
],
[
"Pollett",
"Chris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608040
|
Patrick Baillot
|
Patrick Baillot (LIPN), Marco Pedicini
|
An Embedding of the BSS Model of Computation in Light Affine
Lambda-Calculus
|
11 pages. A preliminary version appeared as Research Report IAC CNR
Roma, N.57 (11/2004), november 2004
|
8th International Workshop on Logic and Computational Complexity
Seattle, August 10 - 11, 2006 (Satellite Workshop of FLOC-LICS 2006),
\'{E}tats-Unis d'Am\'{e}rique (2006)
| null | null |
cs.LO
| null |
This paper brings together two lines of research: implicit characterization
of complexity classes by Linear Logic (LL) on the one hand, and computation
over an arbitrary ring in the Blum-Shub-Smale (BSS) model on the other. Given a
fixed ring structure K we define an extension of Terui's light affine
lambda-calculus typed in LAL (Light Affine Logic) with a basic type for K. We
show that this calculus captures the polynomial time function class FP(K):
every typed term can be evaluated in polynomial time and conversely every
polynomial time BSS machine over K can be simulated in this calculus.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 07:13:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Baillot",
"Patrick",
"",
"LIPN"
],
[
"Pedicini",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608041
|
Igor Sobrado
|
Igor Sobrado and Dave Uhring
|
The Dynamics of A Self-Forming Network
|
5 pages; 8 figures; 2 tables
| null | null | null |
cs.NI
| null |
This article describes our strategy for deploying self-forming ad hoc
networks based on the Internet Protocol version 6 and evaluates the dynamics of
this proposal. Among others, we suggest a technique called adaptive routing
that provides secure intelligent routing capabilities to computer communication
networks. This technique uses the flow label, supports hybrid metrics, network
load sharing, and is not restricted to evaluation of performance on first hop
routers when making routing decisions. Selective anycasting is an extension to
the anycast addressing model that supports exclusion of members of groups that
perform poorly or inappropriately on a per-host basis. Distributed name lookup
is suggested for integrating self-forming and global networks where they
coexist. At last, we pose an address hierarchy to support unmanaged discovery
of services in unknown networks.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 16:33:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sobrado",
"Igor",
""
],
[
"Uhring",
"Dave",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608042
|
Igal Sason
|
Gil Wiechman and Igal Sason
|
An Improved Sphere-Packing Bound for Finite-Length Codes on Symmetric
Memoryless Channels
|
Submitted to the IEEE Transactions on Information Theory (40 pages,
10 figures)
| null | null | null |
cs.IT math.IT
| null |
This paper derives an improved sphere-packing (ISP) bound for finite-length
codes whose transmission takes place over symmetric memoryless channels. We
first review classical results, i.e., the 1959 sphere-packing (SP59) bound of
Shannon for the Gaussian channel, and the 1967 sphere-packing (SP67) bound of
Shannon et al. for discrete memoryless channels. A recent improvement on the
SP67 bound, as suggested by Valembois and Fossorier, is also discussed. These
concepts are used for the derivation of a new lower bound on the decoding error
probability (referred to as the ISP bound) which is uniformly tighter than the
SP67 bound and its recent improved version. The ISP bound is applicable to
symmetric memoryless channels, and some of its applications are exemplified.
Its tightness is studied by comparing it with bounds on the ML decoding error
probability, and computer simulations of iteratively decoded turbo-like codes.
The paper also presents a technique which performs the entire calculation of
the SP59 bound in the logarithmic domain, thus facilitating the exact
calculation of this bound for moderate to large block lengths without the need
for the asymptotic approximations provided by Shannon.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 11:51:29 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Sep 2006 22:15:58 GMT"
},
{
"version": "v3",
"created": "Sat, 17 Mar 2007 15:50:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wiechman",
"Gil",
""
],
[
"Sason",
"Igal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608043
|
Babajide Afolabi
|
Babajide Afolabi (LORIA), Odile Thiery (LORIA)
|
Using Users' Expectations to Adapt Business Intelligence Systems
| null |
Advances in Knowledge Organization 10 (2006) 247-254
| null | null |
cs.IR
| null |
This paper takes a look at the general characteristics of business or
economic intelligence system. The role of the user within this type of system
is emphasized. We propose two models which we consider important in order to
adapt this system to the user. The first model is based on the definition of
decisional problem and the second on the four cognitive phases of human
learning. We also describe the application domain we are using to test these
models in this type of system.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 13:19:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Afolabi",
"Babajide",
"",
"LORIA"
],
[
"Thiery",
"Odile",
"",
"LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0608044
|
Jay Kumar Sundararajan
|
Jay Kumar Sundararajan, Muriel Medard, MinJi Kim, Atilla Eryilmaz,
Devavrat Shah, Ralf Koetter
|
Network Coding in a Multicast Switch
|
9 pages, submitted to IEEE INFOCOM 2007
| null |
10.1109/INFCOM.2007.137
| null |
cs.NI cs.IT math.IT
| null |
We consider the problem of serving multicast flows in a crossbar switch. We
show that linear network coding across packets of a flow can sustain traffic
patterns that cannot be served if network coding were not allowed. Thus,
network coding leads to a larger rate region in a multicast crossbar switch. We
demonstrate a traffic pattern which requires a switch speedup if coding is not
allowed, whereas, with coding the speedup requirement is eliminated completely.
In addition to throughput benefits, coding simplifies the characterization of
the rate region. We give a graph-theoretic characterization of the rate region
with fanout splitting and intra-flow coding, in terms of the stable set
polytope of the 'enhanced conflict graph' of the traffic pattern. Such a
formulation is not known in the case of fanout splitting without coding. We
show that computing the offline schedule (i.e. using prior knowledge of the
flow arrival rates) can be reduced to certain graph coloring problems. Finally,
we propose online algorithms (i.e. using only the current queue occupancy
information) for multicast scheduling based on our graph-theoretic formulation.
In particular, we show that a maximum weighted stable set algorithm stabilizes
the queues for all rates within the rate region.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 19:59:33 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Sundararajan",
"Jay Kumar",
""
],
[
"Medard",
"Muriel",
""
],
[
"Kim",
"MinJi",
""
],
[
"Eryilmaz",
"Atilla",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Koetter",
"Ralf",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608045
|
Fotis Georgatos Drs
|
Giannis Kouretis, Fotis Georgatos
|
LiveWN, cpu scavenging in the Grid Era
|
4 pages
| null | null | null |
cs.DC cs.NI
| null |
The goal of this research is to introduce an easy and versatile way to
provide and use Grid resources without the need of any OS installation or
middleware configuration. At the same time we provide an excellent training
tool for newer Grid users and people that want to experiment, without enforcing
any installation. We have been testing it thoroughly under different
circumstances with firm success.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 15:28:53 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Aug 2006 22:13:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kouretis",
"Giannis",
""
],
[
"Georgatos",
"Fotis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608046
|
Richard McClatchey
|
Arshad Ali, Richard McClatchey, Ashiq Anjum, Irfan Habib, Kamran
Soomro, Mohammed Asif, Ali Adil, Athar Mohsin
|
From Grid Middleware to a Grid Operating System
|
8 pages, 5 figures. Presented at the 7th IEEE/ACM International
Conference on Grid and Cooperative Computing. Changsha, China. October 2006
| null |
10.1109/GCC.2006.49
| null |
cs.DC
| null |
Grid computing has made substantial advances during the last decade. Grid
middleware such as Globus has contributed greatly in making this possible.
There are, however, significant barriers to the adoption of Grid computing in
other fields, most notably day-to-day user computing environments. We will
demonstrate in this paper that this is primarily due to the limitations of the
existing Grid middleware which does not take into account the needs of everyday
scientific and business users. In this paper we will formally advocate a Grid
Operating System and propose an architecture to migrate Grid computing into a
Grid operating system which we believe would help remove most of the technical
barriers to the adoption of Grid computing and make it relevant to the
day-to-day user. We believe this proposed transition to a Grid operating system
will drive more pervasive Grid computing research and application development
and deployment in future.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 17:41:26 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Ali",
"Arshad",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Anjum",
"Ashiq",
""
],
[
"Habib",
"Irfan",
""
],
[
"Soomro",
"Kamran",
""
],
[
"Asif",
"Mohammed",
""
],
[
"Adil",
"Ali",
""
],
[
"Mohsin",
"Athar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608047
|
Richard McClatchey
|
R. H. McClatchey, D. Manset, A. E. Solomonides
|
Lessons Learned from MammoGrid for Integrated Biomedical Solutions
|
10 pages, 1 figure. Presented at the 19th IEEE Symposium on
Computer-Based Medical Systems (CBMS 2006). Salt Lake City, USA. June 2006
| null |
10.1109/CBMS.2006.109
| null |
cs.DC
| null |
This paper presents an overview of the MammoGrid project and some of its
achievements. In terms of the global grid project, and European research in
particular, the project has successfully demonstrated the capacity of a
grid-based system to support effective collaboration between physicians,
including handling and querying image databases, as well as using grid
services, such as image standardization and Computer-Aided Detection (CADe) of
suspect or indicative features. In terms of scientific results, in radiology,
there have been significant epidemiological findings in the assessment of
breast density as a risk factor, but the results for CADe are less clear-cut.
Finally, the foundations of a technology transfer process to establish a
working MammoGrid plus system in Spain through the company Maat GKnowledge and
the collaboration of CIEMAT and hospitals in Extremadura.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 17:49:28 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"McClatchey",
"R. H.",
""
],
[
"Manset",
"D.",
""
],
[
"Solomonides",
"A. E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608048
|
Richard McClatchey
|
Ashiq Anjum, Richard McClatchey, Arshad Ali and Ian Willers
|
Bulk Scheduling with the DIANA Scheduler
|
12 pages, 11 figures. To be published in the IEEE Transactions in
Nuclear Science, IEEE Press. 2006
| null |
10.1109/TNS.2006.886047
| null |
cs.DC
| null |
Results from the research and development of a Data Intensive and Network
Aware (DIANA) scheduling engine, to be used primarily for data intensive
sciences such as physics analysis, are described. In Grid analyses, tasks can
involve thousands of computing, data handling, and network resources. The
central problem in the scheduling of these resources is the coordinated
management of computation and data at multiple locations and not just data
replication or movement. However, this can prove to be a rather costly
operation and efficient sing can be a challenge if compute and data resources
are mapped without considering network costs. We have implemented an adaptive
algorithm within the so-called DIANA Scheduler which takes into account data
location and size, network performance and computation capability in order to
enable efficient global scheduling. DIANA is a performance-aware and
economy-guided Meta Scheduler. It iteratively allocates each job to the site
that is most likely to produce the best performance as well as optimizing the
global queue for any remaining jobs. Therefore it is equally suitable whether a
single job is being submitted or bulk scheduling is being performed. Results
indicate that considerable performance improvements can be gained by adopting
the DIANA scheduling approach.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 17:53:15 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Anjum",
"Ashiq",
""
],
[
"McClatchey",
"Richard",
""
],
[
"Ali",
"Arshad",
""
],
[
"Willers",
"Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608049
|
Alberto Fernandez
|
Alberto Fernandez and Sergio Gomez
|
Solving non-uniqueness in agglomerative hierarchical clustering using
multidendrograms
|
Free Software for Agglomerative Hierarchical Clustering using
Multidendrograms available at
http://deim.urv.cat/~sgomez/multidendrograms.php
|
Journal of Classification 25 (2008) 43-65
|
10.1007/s00357-008-9004-x
| null |
cs.IR math.ST physics.data-an stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In agglomerative hierarchical clustering, pair-group methods suffer from a
problem of non-uniqueness when two or more distances between different clusters
coincide during the amalgamation process. The traditional approach for solving
this drawback has been to take any arbitrary criterion in order to break ties
between distances, which results in different hierarchical classifications
depending on the criterion followed. In this article we propose a
variable-group algorithm that consists in grouping more than two clusters at
the same time when ties occur. We give a tree representation for the results of
the algorithm, which we call a multidendrogram, as well as a generalization of
the Lance and Williams' formula which enables the implementation of the
algorithm in a recursive way.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 18:35:52 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jun 2009 17:10:51 GMT"
}
] | 2009-06-10T00:00:00 |
[
[
"Fernandez",
"Alberto",
""
],
[
"Gomez",
"Sergio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0608050
|
Matthieu Latapy
|
Pascal Pons and Matthieu Latapy
|
Post-Processing Hierarchical Community Structures: Quality Improvements
and Multi-scale View
| null |
Theoretical Computer Science, volume 412, issues 8-10, 4 March
2011, pages 892-900
|
10.1016/j.tcs.2010.11.041
| null |
cs.DS cond-mat.dis-nn physics.soc-ph
|
http://creativecommons.org/licenses/by/4.0/
|
Dense sub-graphs of sparse graphs (communities), which appear in most
real-world complex networks, play an important role in many contexts. Most
existing community detection algorithms produce a hierarchical structure of
community and seek a partition into communities that optimizes a given quality
function. We propose new methods to improve the results of any of these
algorithms. First we show how to optimize a general class of additive quality
functions (containing the modularity, the performance, and a new similarity
based quality function we propose) over a larger set of partitions than the
classical methods. Moreover, we define new multi-scale quality functions which
make it possible to detect the different scales at which meaningful community
structures appear, while classical approaches find only one partition.
|
[
{
"version": "v1",
"created": "Wed, 9 Aug 2006 09:23:06 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2021 15:13:55 GMT"
}
] | 2021-01-13T00:00:00 |
[
[
"Pons",
"Pascal",
""
],
[
"Latapy",
"Matthieu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0608051
|
Marco Maggesi
|
Andr\'e Hirschowitz, Marco Maggesi
|
Modules over Monads and Linearity
|
15 pages, too many changes to be summarized
| null | null | null |
cs.LO cs.PL
| null |
Inspired by the classical theory of modules over a monoid, we give a first
account of the natural notion of module over a monad. The associated notion of
morphism of left modules ("Linear" natural transformations) captures an
important property of compatibility with substitution, in the heterogeneous
case where "terms" and variables therein could be of different types as well as
in the homogeneous case. In this paper, we present basic constructions of
modules and we show examples concerning in particular abstract syntax and
lambda-calculus.
|
[
{
"version": "v1",
"created": "Fri, 11 Aug 2006 15:05:27 GMT"
},
{
"version": "v2",
"created": "Mon, 7 May 2007 10:52:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hirschowitz",
"André",
""
],
[
"Maggesi",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0608052
|
Alois Schl\"ogl
|
Alois Schl\"ogl
|
GDF - A general dataformat for biosignals
|
GDF v2.51 add support for SCP sections 7-11
| null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Biomedical signals are stored in many different data formats. Most formats
have been developed for a specific purpose of a specialized community for ECG
research, EEG analysis, sleep research, etc. So far none of the existing
formats can be considered a general purpose data format for biomedical signals.
In order to solve this problem and to unify the various needs of the various
biomedical signal processing fields, the so-called "General Data Format for
biomedical signals" (GDF) is developed. This GDF format is fully described and
specified. Software for reading and writing GDF data is implemented in
Octave/Matlab and C/C++ and provided through BioSig - an free and open source
software library for biomedical signal processing. BioSig privides also
converters from various data formats to GDF, and a viewing and scoring
software.
|
[
{
"version": "v1",
"created": "Fri, 11 Aug 2006 15:13:34 GMT"
},
{
"version": "v10",
"created": "Tue, 26 Mar 2013 13:11:01 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Aug 2006 15:26:50 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Jul 2008 09:48:07 GMT"
},
{
"version": "v4",
"created": "Mon, 27 Oct 2008 13:32:50 GMT"
},
{
"version": "v5",
"created": "Thu, 16 Jul 2009 09:25:21 GMT"
},
{
"version": "v6",
"created": "Tue, 1 Dec 2009 09:02:59 GMT"
},
{
"version": "v7",
"created": "Wed, 9 Mar 2011 16:28:03 GMT"
},
{
"version": "v8",
"created": "Mon, 27 Jun 2011 13:43:28 GMT"
},
{
"version": "v9",
"created": "Thu, 21 Mar 2013 13:03:10 GMT"
}
] | 2013-03-27T00:00:00 |
[
[
"Schlögl",
"Alois",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0608053
|
Susan Coppersmith
|
S.N. Coppersmith
|
Renormalization group approach to the P versus NP question
|
Original version had a conjecture that is known to be false. Revised
version corrects this error
| null | null | null |
cs.CC cond-mat.stat-mech
| null |
This paper argues that the ideas underlying the renormalization group
technique used to characterize phase transitions in condensed matter systems
could be useful for distinguishing computational complexity classes. The paper
presents a renormalization group transformation that maps an arbitrary Boolean
function of $N$ Boolean variables to one of $N-1$ variables. When this
transformation is applied repeatedly, the behavior of the resulting sequence of
functions is different for a generic Boolean function than for Boolean
functions that can be written as a polynomial of degree $\xi$ with $\xi \ll N$
as well as for functions that depend on composite variables such as the
arithmetic sum of the inputs. Being able to demonstrate that functions are
non-generic is of interest because it suggests an avenue for constructing an
algorithm capable of demonstrating that a given Boolean function cannot be
computed using resources that are bounded by a polynomial of $N$.
|
[
{
"version": "v1",
"created": "Fri, 11 Aug 2006 17:48:42 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Oct 2006 15:37:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Coppersmith",
"S. N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
cs/0608054
|
Luis Rademacher
|
Luis Rademacher, Santosh Vempala
|
Dispersion of Mass and the Complexity of Randomized Geometric Algorithms
|
Full version of L. Rademacher, S. Vempala: Dispersion of Mass and the
Complexity of Randomized Geometric Algorithms. Proc. 47th IEEE Annual Symp.
on Found. of Comp. Sci. (2006). A version of it to appear in Advances in
Mathematics
| null | null | null |
cs.CC cs.CG cs.DS math.FA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
How much can randomness help computation? Motivated by this general question
and by volume computation, one of the few instances where randomness provably
helps, we analyze a notion of dispersion and connect it to asymptotic convex
geometry. We obtain a nearly quadratic lower bound on the complexity of
randomized volume algorithms for convex bodies in R^n (the current best
algorithm has complexity roughly n^4, conjectured to be n^3). Our main tools,
dispersion of random determinants and dispersion of the length of a random
point from a convex body, are of independent interest and applicable more
generally; in particular, the latter is closely related to the variance
hypothesis from convex geometry. This geometric dispersion also leads to lower
bounds for matrix problems and property testing.
|
[
{
"version": "v1",
"created": "Sat, 12 Aug 2006 23:31:07 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Jun 2008 19:14:43 GMT"
}
] | 2008-06-17T00:00:00 |
[
[
"Rademacher",
"Luis",
""
],
[
"Vempala",
"Santosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
cs/0608055
|
Hao Chen
|
Hao Chen
|
MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves
| null | null | null | null |
cs.CR
| null |
For a secret sharing scheme, two parameters $d_{min}$ and $d_{cheat}$ are
defined in [12] and [13]. These two parameters measure the error-correcting
capability and the secret-recovering capability of the secret sharing scheme
against cheaters. Some general properties of the parameters have been studied
in [12,[9] and [13]. The MDS secret-sharing scheme was defined in [12] and it
is proved that MDS perfect secret sharing scheme can be constructed for any
monotone access structure. The famous Shamir $(k,n)$ threshold secret sharing
scheme is the MDS with $d_{min}=d_{cheat}=n-k+1$. In [3] we proposed the linear
secret sharing scheme from algebraic-geometric codes. In this paper the linear
secret sharing scheme from AG-codes on elliptic curves is studied and it is
shown that many of them are MDS linear secret sharing scheme.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 01:49:34 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Sep 2006 03:59:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chen",
"Hao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608056
|
Bin Dai
|
Bin Dai, Yuan Luo
|
Wiretap Channel With Side Information
| null | null | null | null |
cs.IT math.IT
| null |
This submission has been withdrawn by the author.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 06:20:20 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2006 04:39:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Bin",
""
],
[
"Luo",
"Yuan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608057
|
Lane A. Hemaspaandra
|
Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
|
Hybrid Elections Broaden Complexity-Theoretic Resistance to Control
| null | null | null |
URCS TR-2006-900
|
cs.GT cs.CC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Electoral control refers to attempts by an election's organizer ("the chair")
to influence the outcome by adding/deleting/partitioning voters or candidates.
The groundbreaking work of Bartholdi, Tovey, and Trick [BTT92] on
(constructive) control proposes computational complexity as a means of
resisting control attempts: Look for election systems where the chair's task in
seeking control is itself computationally infeasible.
We introduce and study a method of combining two or more candidate-anonymous
election schemes in such a way that the combined scheme possesses all the
resistances to control (i.e., all the NP-hardnesses of control) possessed by
any of its constituents: It combines their strengths. From this and new
resistance constructions, we prove for the first time that there exists an
election scheme that is resistant to all twenty standard types of electoral
control.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 16:15:25 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Sep 2008 04:23:01 GMT"
}
] | 2008-09-26T00:00:00 |
[
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0608058
|
Dmitri Krioukov
|
Srinivas Shakkottai, Marina Fomenkov, Ryan Koga, Dmitri Krioukov, kc
claffy
|
Evolution of the Internet AS-Level Ecosystem
| null |
Eur. Phys. J. B 74, 271-278 (2010)
|
10.1140/epjb/e2010-00057-x
| null |
cs.NI cs.GT physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an analytically tractable model of Internet evolution at the level
of Autonomous Systems (ASs). We call our model the multiclass preferential
attachment (MPA) model. As its name suggests, it is based on preferential
attachment. All of its parameters are measurable from available Internet
topology data. Given the estimated values of these parameters, our analytic
results predict a definitive set of statistics characterizing the AS topology
structure. These statistics are not part of the model formulation. The MPA
model thus closes the "measure-model-validate-predict" loop, and provides
further evidence that preferential attachment is a driving force behind
Internet evolution.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 18:52:02 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Aug 2006 18:22:13 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Nov 2007 21:48:51 GMT"
},
{
"version": "v4",
"created": "Sun, 8 Feb 2009 08:55:29 GMT"
},
{
"version": "v5",
"created": "Fri, 9 Apr 2010 22:07:34 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Shakkottai",
"Srinivas",
""
],
[
"Fomenkov",
"Marina",
""
],
[
"Koga",
"Ryan",
""
],
[
"Krioukov",
"Dmitri",
""
],
[
"claffy",
"kc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0608059
|
Daniel Hirschkoff
|
Daniel Hirschkoff, Damien Pous
|
A Distribution Law for CCS and a New Congruence Result for the
pi-calculus
|
20 pages
|
Logical Methods in Computer Science, Volume 4, Issue 2 (May 14,
2008) lmcs:823
|
10.2168/LMCS-4(2:4)2008
| null |
cs.LO
| null |
We give an axiomatisation of strong bisimilarity on a small fragment of CCS
that does not feature the sum operator. This axiomatisation is then used to
derive congruence of strong bisimilarity in the finite pi-calculus in absence
of sum. To our knowledge, this is the only nontrivial subcalculus of the
pi-calculus that includes the full output prefix and for which strong
bisimilarity is a congruence.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 18:55:53 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Aug 2006 07:39:54 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Aug 2006 07:06:09 GMT"
},
{
"version": "v4",
"created": "Mon, 5 May 2008 13:53:14 GMT"
},
{
"version": "v5",
"created": "Wed, 14 May 2008 13:36:24 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Hirschkoff",
"Daniel",
""
],
[
"Pous",
"Damien",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608060
|
Syed Jafar
|
Syed A. Jafar, Krishna S. Gomadam
|
Duality and Capacity Region of AF Relay MAC and BC
|
33 pages
| null | null | null |
cs.IT math.IT
| null |
We consider multi-hop multiple access (MAC) and broadcast channels (BC) where
communication takes place with the assistance of relays that amplify and
forward (AF) their received signals. For a two hop parallel AF relay MAC,
assuming a sum power constraint across all relays we characterize optimal relay
amplification factors and the resulting capacity regions. We find that the
parallel AF relay MAC with total transmit power of the two users $P_1+P_2=P$
and total relay power $P_R$ is the dual of the parallel AF relay BC where the
MAC source nodes become the BC destination nodes, the MAC destination node
becomes the BC source node, the dual BC source transmit power is $P_R$ and the
total transmit power of the AF relays is $P$. The duality means that the
capacity region of the AF relay MAC with a sum power constraint $P$ on the
transmitters is the same as that of the dual BC. The duality relationship is
found to be useful in characterizing the capacity region of the AF relay BC as
the union of MAC capacity regions. The duality extends to distributed relays
with multiple antennas and more than 2 hops as well.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 20:03:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jafar",
"Syed A.",
""
],
[
"Gomadam",
"Krishna S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608061
|
Chengpu Wang
|
Chengpu Wang
|
Concurrent Processing Memory
|
35 pages, 16 figures
| null | null | null |
cs.DC cs.AR cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A theoretical memory with limited processing power and internal connectivity
at each element is proposed. This memory carries out parallel processing within
itself to solve generic array problems. The applicability of this in-memory
finest-grain massive SIMD approach is studied in some details. For an array of
N items, it reduces the total instruction cycle count of universal operations
such as insertion/deletion and match finding to ~ 1, local operations such as
filtering and template matching to ~ local operation size, and global
operations such as sum, finding global limit and sorting to ~\sqroot{N}
instruction cycles. It eliminates most streaming activities for data processing
purpose on the system bus. Yet it remains general-purposed, easy to use, pin
compatible with conventional memory, and practical for implementation.
|
[
{
"version": "v1",
"created": "Tue, 15 Aug 2006 01:42:49 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Apr 2007 02:21:08 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Sep 2010 21:11:55 GMT"
},
{
"version": "v4",
"created": "Mon, 20 Sep 2010 14:16:36 GMT"
},
{
"version": "v5",
"created": "Sat, 25 Sep 2010 02:49:23 GMT"
}
] | 2010-09-28T00:00:00 |
[
[
"Wang",
"Chengpu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0608062
|
Solomon Feferman
|
Solomon Feferman
|
Tarski's influence on computer science
| null |
Logical Methods in Computer Science, Volume 2, Issue 3 (September
27, 2006) lmcs:2248
|
10.2168/LMCS-2(3:6)2006
| null |
cs.GL cs.LO
| null |
The influence of Alfred Tarski on computer science was indirect but
significant in a number of directions and was in certain respects fundamental.
Here surveyed is the work of Tarski on the decision procedure for algebra and
geometry, the method of elimination of quantifiers, the semantics of formal
languages, modeltheoretic preservation theorems, and algebraic logic; various
connections of each with computer science are taken up.
|
[
{
"version": "v1",
"created": "Tue, 15 Aug 2006 16:40:24 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2006 09:43:52 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Feferman",
"Solomon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608063
|
Sylvain Pion
|
Sylvain Pion (INRIA Sophia Antipolis), Andreas Fabri
|
A Generic Lazy Evaluation Scheme for Exact Geometric Computations
| null | null | null | null |
cs.CG cs.PF
| null |
We present a generic C++ design to perform efficient and exact geometric
computations using lazy evaluations. Exact geometric computations are critical
for the robustness of geometric algorithms. Their efficiency is also critical
for most applications, hence the need for delaying the exact computations at
run time until they are actually needed. Our approach is generic and extensible
in the sense that it is possible to make it a library which users can extend to
their own geometric objects or primitives. It involves techniques such as
generic functor adaptors, dynamic polymorphism, reference counting for the
management of directed acyclic graphs and exception handling for detecting
cases where exact computations are needed. It also relies on multiple precision
arithmetic as well as interval arithmetic. We apply our approach to the whole
geometric kernel of CGAL.
|
[
{
"version": "v1",
"created": "Tue, 15 Aug 2006 19:24:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pion",
"Sylvain",
"",
"INRIA Sophia Antipolis"
],
[
"Fabri",
"Andreas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0608064
|
Lisi D'Alfonso
|
Lisi D'Alfonso, Gabriela Jeronimo, Pablo Solerno
|
A linear algebra approach to the differentiation index of generic DAE
systems
| null | null | null | null |
cs.SC math.AC
| null |
The notion of differentiation index for DAE systems of arbitrary order with
generic second members is discussed by means of the study of the behavior of
the ranks of certain Jacobian associated sub-matrices. As a by-product, we
obtain upper bounds for the regularity of the Hilbert-Kolchin function and the
order of the ideal associated to the DAE systems under consideration, not
depending on characteristic sets. Some quantitative and algorithmic results
concerning differential transcendence bases and induced equivalent explicit ODE
systems are also established.
|
[
{
"version": "v1",
"created": "Tue, 15 Aug 2006 21:57:24 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Aug 2007 15:47:32 GMT"
}
] | 2007-08-02T00:00:00 |
[
[
"D'Alfonso",
"Lisi",
""
],
[
"Jeronimo",
"Gabriela",
""
],
[
"Solerno",
"Pablo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
cs/0608065
|
Edita Pelantova
|
Lubom\'ira Balkov\'a, Edita Pelantov\'a, and Ond\v{r}ej Turek
|
Combinatorial and Arithmetical Properties of Infinite Words Associated
with Non-simple Quadratic Parry Numbers
|
15 pages
| null | null | null |
cs.DM
| null |
We study arithmetical and combinatorial properties of $\beta$-integers for
$\beta$ being the root of the equation $x^2=mx-n, m,n \in \mathbb N, m \geq
n+2\geq 3$. We determine with the accuracy of $\pm 1$ the maximal number of
$\beta$-fractional positions, which may arise as a result of addition of two
$\beta$-integers. For the infinite word $u_\beta$ coding distances between
consecutive $\beta$-integers, we determine precisely also the balance. The word
$u_\beta$ is the fixed point of the morphism $A \to A^{m-1}B$ and $B\to
A^{m-n-1}B$. In the case $n=1$ the corresponding infinite word $u_\beta$ is
sturmian and therefore 1-balanced. On the simplest non-sturmian example with
$n\geq 2$, we illustrate how closely the balance and arithmetical properties of
$\beta$-integers are related.
|
[
{
"version": "v1",
"created": "Wed, 16 Aug 2006 09:39:01 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Aug 2006 10:08:30 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Balková",
"Lubomíra",
""
],
[
"Pelantová",
"Edita",
""
],
[
"Turek",
"Ondřej",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0608066
|
Mariano Zelke
|
Mariano Zelke
|
k-Connectivity in the Semi-Streaming Model
|
13 pages, submitted to Theoretical Computer Science
| null | null | null |
cs.DM cs.DS
| null |
We present the first semi-streaming algorithms to determine k-connectivity of
an undirected graph with k being any constant. The semi-streaming model for
graph algorithms was introduced by Muthukrishnan in 2003 and turns out to be
useful when dealing with massive graphs streamed in from an external storage
device.
Our two semi-streaming algorithms each compute a sparse subgraph of an input
graph G and can use this subgraph in a postprocessing step to decide
k-connectivity of G. To this end the first algorithm reads the input stream
only once and uses time O(k^2*n) to process each input edge. The second
algorithm reads the input k+1 times and needs time O(k+alpha(n)) per input
edge. Using its constructed subgraph the second algorithm can also generate all
l-separators of the input graph for all l<k.
|
[
{
"version": "v1",
"created": "Wed, 16 Aug 2006 10:37:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Zelke",
"Mariano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0608067
|
Tetsushi Matsui
|
Tetsushi Matsui
|
On Polynomial Time Computable Numbers
|
19 pages
| null | null | null |
cs.CC
| null |
It will be shown that the polynomial time computable numbers form a field,
and especially an algebraically closed field.
|
[
{
"version": "v1",
"created": "Wed, 16 Aug 2006 15:26:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Matsui",
"Tetsushi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608068
|
Ke Liu
|
Ke Liu, Nael Abu-Ghazaleh
|
The Aligned-Coordinated Geographical Routing for Multihop Wireless
Networks
| null |
ijsnet 2008
| null | null |
cs.NI cs.DC
| null |
The stateless, low overhead and distributed nature of the Geographic routing
protocols attract a lot of research attentions recently. Since the geographic
routing would face void problems, leading to complementary routing such as
perimeter routing which degrades the performance of geographic routing, most
research works are focus on optimizing this complementary part of geographic
routing to improve it. The greedy forwarding part of geographic routing
provides an optimal routing performance in terms of path stretch. If the
geographic routing could adapt the greedy forwarding more, its performance
would be enhanced much more than to optimize the complementary routing such as
perimeter routings. Our work is the first time to do so. The aligned physical
coordinate is used to do the greedy forwarding routing decision which would
lead more greedy forwarding. We evaluate our design to most geographic routing
protocols, showing it helps much and maintain the stateless nature of
geographic routing.
|
[
{
"version": "v1",
"created": "Wed, 16 Aug 2006 17:06:37 GMT"
}
] | 2008-03-28T00:00:00 |
[
[
"Liu",
"Ke",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608069
|
Ke Liu
|
Ke Liu, Nael Abu-Ghazaleh, Kyoung-Don Kang
|
JiTS: Just-in-Time Scheduling for Real-Time Sensor Data Dissemination
| null |
PerCom 2006
| null | null |
cs.NI cs.DC cs.PF
| null |
We consider the problem of real-time data dissemination in wireless sensor
networks, in which data are associated with deadlines and it is desired for
data to reach the sink(s) by their deadlines. To this end, existing real-time
data dissemination work have developed packet scheduling schemes that
prioritize packets according to their deadlines. In this paper, we first
demonstrate that not only the scheduling discipline but also the routing
protocol has a significant impact on the success of real-time sensor data
dissemination. We show that the shortest path routing using the minimum number
of hops leads to considerably better performance than Geographical Forwarding,
which has often been used in existing real-time data dissemination work. We
also observe that packet prioritization by itself is not enough for real-time
data dissemination, since many high priority packets may simultaneously contend
for network resources, deteriorating the network performance. Instead,
real-time packets could be judiciously delayed to avoid severe contention as
long as their deadlines can be met. Based on this observation, we propose a
Just-in-Time Scheduling (JiTS) algorithm for scheduling data transmissions to
alleviate the shortcomings of the existing solutions. We explore several
policies for non-uniformly delaying data at different intermediate nodes to
account for the higher expected contention as the packet gets closer to the
sink(s). By an extensive simulation study, we demonstrate that JiTS can
significantly improve the deadline miss ratio and packet drop ratio compared to
existing approaches in various situations. Notably, JiTS improves the
performance requiring neither lower layer support nor synchronization among the
sensor nodes.
|
[
{
"version": "v1",
"created": "Wed, 16 Aug 2006 17:21:40 GMT"
}
] | 2008-03-28T00:00:00 |
[
[
"Liu",
"Ke",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
],
[
"Kang",
"Kyoung-Don",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0608070
|
Haim Permuter Henry
|
Haim Permuter, Tsachy Weissman and Andrea Goldsmith
|
Finite State Channels with Time-Invariant Deterministic Feedback
| null | null | null | null |
cs.IT math.IT
| null |
We consider capacity of discrete-time channels with feedback for the general
case where the feedback is a time-invariant deterministic function of the
output samples. Under the assumption that the channel states take values in a
finite alphabet, we find an achievable rate and an upper bound on the capacity.
We further show that when the channel is indecomposable, and has no intersymbol
interference (ISI), its capacity is given by the limit of the maximum of the
(normalized) directed information between the input $X^N$ and the output $Y^N$,
i.e. $C = \lim_{N \to \infty} \frac{1}{N} \max I(X^N \to Y^N)$, where the
maximization is taken over the causal conditioning probability
$Q(x^N||z^{N-1})$ defined in this paper. The capacity result is used to show
that the source-channel separation theorem holds for time-invariant determinist
feedback. We also show that if the state of the channel is known both at the
encoder and the decoder then feedback does not increase capacity.
|
[
{
"version": "v1",
"created": "Thu, 17 Aug 2006 14:35:20 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Permuter",
"Haim",
""
],
[
"Weissman",
"Tsachy",
""
],
[
"Goldsmith",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608071
|
Avi Steiner
|
Avi Steiner, Amichai Sanderovich, Shlomo Shamai (Shitz)
|
Broadcast Cooperation Strategies for Two Colocated Users
| null | null | null | null |
cs.IT math.IT
| null |
This work considers the problem of communication from a single transmitter,
over a network with colocated users, through an independent block Rayleigh
fading channel. The colocation nature of the users allows cooperation, which
increases the overall achievable rate, from the transmitter to the destined
user. The transmitter is ignorant of the fading coefficients, while receivers
have access to perfect channel state information (CSI). This gives rise to the
multi-layer broadcast approach used by the transmitter. The broadcast approach
allows, in our network setting, to improve the cooperation between the
colocated users. That is due to the nature of broadcasting, where the better
the channel quality, the more layers that can be decoded. The cooperation
between the users is performed over an additive white Gaussian channels (AWGN),
with a relaying power constraint, and unlimited bandwidth. Three commonly used
cooperation techniques are studied: amplify-forward (AF), compress-forward
(CF), and decode-forward (DF). These methods are extended using the broadcast
approach, for the case of relaxed decoding delay constraint. For this case a
separated processing of the layers, which includes multi-session cooperation is
shown to be beneficial. Further, closed form expressions for infinitely many AF
sessions and recursive expressions for the more complex CF are given. Numerical
results for the various cooperation strategies demonstrate the efficiency of
multi-session cooperation.
|
[
{
"version": "v1",
"created": "Thu, 17 Aug 2006 14:35:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Steiner",
"Avi",
"",
"Shitz"
],
[
"Sanderovich",
"Amichai",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608072
|
Dandan Luo
|
Dandan Luo, Yunmin Zhu
|
Applications of Random Parameter Matrices Kalman Filtering in Uncertain
Observation and Multi-Model Systems
|
4 figures
| null | null | null |
cs.IT math.IT
| null |
This paper considers the Linear Minimum Variance recursive state estimation
for the linear discrete time dynamic system with random state transition and
measurement matrices, i.e., random parameter matrices Kalman filtering. It is
shown that such system can be converted to a linear dynamic system with
deterministic parameter matrices but state-dependent process and measurement
noises. It is proved that under mild conditions, the recursive state estimation
of this system is still of the form of a modified Kalman filtering. More
importantly, this result can be applied to Kalman filtering with intermittent
and partial observations as well as randomly variant dynamic systems.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 00:15:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Luo",
"Dandan",
""
],
[
"Zhu",
"Yunmin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608073
|
Leonid Litinskii
|
Leonid B. Litinskii
|
Parametrical Neural Networks and Some Other Similar Architectures
|
15 pages, 2 figures, accepted for publication in "Optical Memory &
Neural Networks" (2006)
| null | null | null |
cs.CV cs.NE
| null |
A review of works on associative neural networks accomplished during last
four years in the Institute of Optical Neural Technologies RAS is given. The
presentation is based on description of parametrical neural networks (PNN). For
today PNN have record recognizing characteristics (storage capacity, noise
immunity and speed of operation). Presentation of basic ideas and principles is
accentuated.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 08:28:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Litinskii",
"Leonid B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0608074
|
Oleg Verbitsky
|
Johannes Koebler and Oleg Verbitsky
|
From Invariants to Canonization in Parallel
|
14 pages. A minor correction in the proof of Theorem 4.1 made
| null | null | null |
cs.CC
| null |
A function $f$ of a graph is called a complete graph invariant if the
isomorphism of graphs $G$ and $H$ is equivalent to the equality $f(G)=f(H)$.
If, in addition, $f(G)$ is a graph isomorphic to $G$, then $f$ is called a
canonical form for graphs. Gurevich proves that graphs have a polynomial-time
computable canonical form exactly when they have a polynomial-time computable
complete invariant. We extend this equivalence to the polylogarithmic-time
model of parallel computation for classes of graphs with bounded rigidity index
and for classes of graphs with small separators. In particular, our results
apply to three representative classes of graphs embeddable into a fixed
surface, namely, to 5-connected graphs, to 3-connected graphs admitting a
polyhedral embedding, and 3-connected graphs admitting a large-edge-width
embedding. Another application covers graphs with bounded treewidth. Since in
the latter case an NC complete-invariant algorithm is known, we conclude that
graphs of bounded treewidth have a canonical form (and even a canonical
labeling) computable in NC.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 09:46:09 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Sep 2007 11:24:10 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Sep 2007 14:33:12 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Dec 2007 13:04:10 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Koebler",
"Johannes",
""
],
[
"Verbitsky",
"Oleg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608075
|
Jean-Philippe Diguet
|
Nader Ben Amor (LESTER, CES), Yannick Le Moullec (LESTER),
Jean-Philippe Diguet (LESTER), Jean Luc Philippe (LESTER), Mohamed Abid (CES)
|
Design of multimedia processor based on metric computation
| null |
Advances in Engineering Software (Elsevier) Vol.36 No.7 (2005)
448-458
|
10.1016/j.advengsoft.2005.01.010
| null |
cs.AR
| null |
Media-processing applications, such as signal processing, 2D and 3D graphics
rendering, and image compression, are the dominant workloads in many embedded
systems today. The real-time constraints of those media applications have
taxing demands on today's processor performances with low cost, low power and
reduced design delay. To satisfy those challenges, a fast and efficient
strategy consists in upgrading a low cost general purpose processor core. This
approach is based on the personalization of a general RISC processor core
according the target multimedia application requirements. Thus, if the extra
cost is justified, the general purpose processor GPP core can be enforced with
instruction level coprocessors, coarse grain dedicated hardware, ad hoc
memories or new GPP cores. In this way the final design solution is tailored to
the application requirements. The proposed approach is based on three main
steps: the first one is the analysis of the targeted application using
efficient metrics. The second step is the selection of the appropriate
architecture template according to the first step results and recommendations.
The third step is the architecture generation. This approach is experimented
using various image and video algorithms showing its feasibility.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 13:12:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Amor",
"Nader Ben",
"",
"LESTER, CES"
],
[
"Moullec",
"Yannick Le",
"",
"LESTER"
],
[
"Diguet",
"Jean-Philippe",
"",
"LESTER"
],
[
"Philippe",
"Jean Luc",
"",
"LESTER"
],
[
"Abid",
"Mohamed",
"",
"CES"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0608076
|
J\"urg Wullschleger
|
J\"urg Wullschleger
|
Oblivious-Transfer Amplification
|
PhD thesis, March 2007, ETH Zurich, 125 pages. Full version of the
EUROCRYPT 2007 paper. Errors in the computational part corrected
| null | null | null |
cs.CR
| null |
Oblivious transfer is a primitive of paramount importance in cryptography or,
more precisely, two- and multi-party computation due to its universality.
Unfortunately, oblivious transfer cannot be achieved in an unconditionally
secure way for both parties from scratch. Therefore, it is a natural question
what information-theoretic primitives or computational assumptions oblivious
transfer can be based on.
The results in our thesis are threefold. First, we present a protocol that
implements oblivious transfer from a weakened oblivious transfer called
universal oblivious transfer, where one of the two players may get additional
information. Our reduction is about twice as efficient as previous results.
Weak oblivious transfer is an even weaker form of oblivious transfer, where
both players may obtain additional information about the other player's input,
and where the output can contain errors. We give a new, weaker definition of
weak oblivious transfer, as well as new reductions with a more detailed
analysis.
Finally, we carry over our results to the computational setting and show how
a weak oblivious transfer that is sometimes incorrect and only mildly secure
against computationally bounded adversaries can be strengthened.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 15:58:23 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Nov 2006 20:24:27 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Apr 2007 21:47:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wullschleger",
"Jürg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608077
|
Vinay Kolar
|
Vinay Kolar and Nael Abu-Ghazaleh
|
The Effect of Scheduling on Link Capacity in Multi-hopWireless Networks
|
11 pages
| null | null | null |
cs.NI cs.AR cs.PF
| null |
Existing models of Multi-Hop Wireless Networks (MHWNs) assume that
interference estimators of link quality such as observed busy time predict the
capacity of the links. We show that these estimators do not capture the
intricate interactions that occur at the scheduling level, which have a large
impact on effective link capacity under contention based MAC protocols. We
observe that scheduling problems arise only among those interfering sources
whose concurrent transmissions cannot be prevented by the MAC protocol's
collision management mechanisms; other interfering sources can arbitrate the
medium and coexist successfully. Based on this observation, we propose a
methodology for rating links and show that it achieves high correlation with
observed behavior in simulation. We then use this rating as part of a
branch-and-bound framework based on a linear programming formulation for
traffic engineering in static MHWNs and show that it achieves considerable
improvement in performance relative to interference based models.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 16:45:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kolar",
"Vinay",
""
],
[
"Abu-Ghazaleh",
"Nael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0608078
|
Aidan Thompson
|
A. Slepoy, A. P. Thompson, M. D. Peters
|
Searching for Globally Optimal Functional Forms for Inter-Atomic
Potentials Using Parallel Tempering and Genetic Programming
| null | null | null | null |
cs.NE cs.AI
| null |
We develop a Genetic Programming-based methodology that enables discovery of
novel functional forms for classical inter-atomic force-fields, used in
molecular dynamics simulations. Unlike previous efforts in the field, that fit
only the parameters to the fixed functional forms, we instead use a novel
algorithm to search the space of many possible functional forms. While a
follow-on practical procedure will use experimental and {\it ab inito} data to
find an optimal functional form for a forcefield, we first validate the
approach using a manufactured solution. This validation has the advantage of a
well-defined metric of success. We manufactured a training set of atomic
coordinate data with an associated set of global energies using the well-known
Lennard-Jones inter-atomic potential. We performed an automatic functional form
fitting procedure starting with a population of random functions, using a
genetic programming functional formulation, and a parallel tempering
Metropolis-based optimization algorithm. Our massively-parallel method
independently discovered the Lennard-Jones function after searching for several
hours on 100 processors and covering a miniscule portion of the configuration
space. We find that the method is suitable for unsupervised discovery of
functional forms for inter-atomic potentials/force-fields. We also find that
our parallel tempering Metropolis-based approach significantly improves the
optimization convergence time, and takes good advantage of the parallel cluster
architecture.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 23:17:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Slepoy",
"A.",
""
],
[
"Thompson",
"A. P.",
""
],
[
"Peters",
"M. D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0608079
|
Anna Gilbert
|
A. C. Gilbert, M. J. Strauss, J. A. Tropp, and R. Vershynin
|
Algorithmic linear dimension reduction in the l_1 norm for sparse
vectors
| null | null | null | null |
cs.DS
| null |
This paper develops a new method for recovering m-sparse signals that is
simultaneously uniform and quick. We present a reconstruction algorithm whose
run time, O(m log^2(m) log^2(d)), is sublinear in the length d of the signal.
The reconstruction error is within a logarithmic factor (in m) of the optimal
m-term approximation error in l_1. In particular, the algorithm recovers
m-sparse signals perfectly and noisy signals are recovered with polylogarithmic
distortion. Our algorithm makes O(m log^2 (d)) measurements, which is within a
logarithmic factor of optimal. We also present a small-space implementation of
the algorithm. These sketching techniques and the corresponding reconstruction
algorithms provide an algorithmic dimension reduction in the l_1 norm. In
particular, vectors of support m in dimension d can be linearly embedded into
O(m log^2 d) dimensions with polylogarithmic distortion. We can reconstruct a
vector from its low-dimensional sketch in time O(m log^2(m) log^2(d)).
Furthermore, this reconstruction is stable and robust under small
perturbations.
|
[
{
"version": "v1",
"created": "Sat, 19 Aug 2006 01:55:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gilbert",
"A. C.",
""
],
[
"Strauss",
"M. J.",
""
],
[
"Tropp",
"J. A.",
""
],
[
"Vershynin",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0608080
|
Hao Chen
|
Hao Chen and Jianhua Li
|
Lower Bounds on the Algebraic Immunity of Boolean Functions
| null | null | null | null |
cs.CR
| null |
From the motivation of algebraic attacks to stream and block
ciphers([1,2,7,13,14,15]), the concept of {\em algebraic immunity} (AI) was
introduced in [21] and studied in [3,5,10,11,17,18,19,20,21]. High algebraic
immunity is a necessary condition for resisting algebraic attacks. In this
paper, we give some lower bounds on algebraic immunity of Boolean functions.
The results are applied to give lower bounds on AI of symmetric Boolean
functions and rotation symmetric Boolean functions. Some balanced rotation
symmetric Boolean functions with their AI near the maximum possible value
$\lceil \frac{n}{2}\rceil$ are constructed.
|
[
{
"version": "v1",
"created": "Sat, 19 Aug 2006 02:46:28 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Aug 2006 02:59:30 GMT"
},
{
"version": "v3",
"created": "Sun, 3 Sep 2006 02:47:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chen",
"Hao",
""
],
[
"Li",
"Jianhua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608081
|
Lane A. Hemaspaandra
|
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
|
How Hard Is Bribery in Elections?
|
Earlier version appears in Proc. of AAAI-06, pp. 641-646, 2006
| null | null |
URCS TR-2006-895
|
cs.GT cs.CC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the complexity of influencing elections through bribery: How
computationally complex is it for an external actor to determine whether by a
certain amount of bribing voters a specified candidate can be made the
election's winner? We study this problem for election systems as varied as
scoring protocols and Dodgson voting, and in a variety of settings regarding
homogeneous-vs.-nonhomogeneous electorate bribability,
bounded-size-vs.-arbitrary-sized candidate sets, weighted-vs.-unweighted
voters, and succinct-vs.-nonsuccinct input specification. We obtain both
polynomial-time bribery algorithms and proofs of the intractability of bribery,
and indeed our results show that the complexity of bribery is extremely
sensitive to the setting. For example, we find settings in which bribery is
NP-complete but manipulation (by voters) is in P, and we find settings in which
bribing weighted voters is NP-complete but bribing voters with individual bribe
thresholds is in P. For the broad class of elections (including plurality,
Borda, k-approval, and veto) known as scoring protocols, we prove a dichotomy
result for bribery of weighted voters: We find a simple-to-evaluate condition
that classifies every case as either NP-complete or in P.
|
[
{
"version": "v1",
"created": "Sat, 19 Aug 2006 23:24:03 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 21:43:43 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Aug 2008 21:22:28 GMT"
}
] | 2008-08-23T00:00:00 |
[
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Edith",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0608082
|
S. M. Nazrul Alam
|
S. M. Nazrul Alam and Peter Marbach
|
Competition and Request Routing Policies in Content Delivery Networks
| null | null | null | null |
cs.NI
| null |
The role of competition and monetary benefits in the design of Content
Delivery Networks (CDNs) is largely an unexplored area. In this paper, we
investigate the effect of competition among the competitive web based CDNs and
show that little difference in their performance may cause significant
financial gain/loss. It turns out that the economy of scale effect is very
significant for the success of a CDN in a competitive market. So CDN peering
might be a good idea. Since performance and conforming to the service level
agreement (SLA) with content providers is very important, we then focus on
designing CDN from this perspective. We provide an asymptotically optimal
static request routing policy for a CDN under a model where a CDN company
guarantees a certain level of user latency to the content providers in the SLA.
|
[
{
"version": "v1",
"created": "Sun, 20 Aug 2006 04:00:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Alam",
"S. M. Nazrul",
""
],
[
"Marbach",
"Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608083
|
Paul M. Aoki
|
Paul M. Aoki, Margaret H. Szymanski, Luke Plurkowski, James D.
Thornton, Allison Woodruff, Weilie Yi
|
Where's the "Party" in "Multi-Party"? Analyzing the Structure of
Small-Group Sociable Talk
|
10 pages
|
Proc. ACM Conf. on Computer Supported Cooperative Work, Banff,
Alberta, Canada, Nov. 2006, 393-402. ACM Press.
|
10.1145/1180875.1180934
| null |
cs.HC
| null |
Spontaneous multi-party interaction - conversation among groups of three or
more participants - is part of daily life. While automated modeling of such
interactions has received increased attention in ubiquitous computing research,
there is little applied research on the organization of this highly dynamic and
spontaneous sociable interaction within small groups. We report here on an
applied conversation analytic study of small-group sociable talk, emphasizing
structural and temporal aspects that can inform computational models. In
particular, we examine the mechanics of multiple simultaneous conversational
floors - how participants initiate a new floor amidst an on-going floor, and
how they subsequently show their affiliation with one floor over another. We
also discuss the implications of these findings for the design of "smart"
multi-party applications.
|
[
{
"version": "v1",
"created": "Mon, 21 Aug 2006 01:42:52 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Sep 2006 03:57:25 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Aoki",
"Paul M.",
""
],
[
"Szymanski",
"Margaret H.",
""
],
[
"Plurkowski",
"Luke",
""
],
[
"Thornton",
"James D.",
""
],
[
"Woodruff",
"Allison",
""
],
[
"Yi",
"Weilie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0608084
|
James Aspnes
|
Dana Angluin and James Aspnes and David Eisenstat and Eric Ruppert
|
The computational power of population protocols
|
Combined version of OPODIS 2005 and PODC 2006 papers; submitted to
Distributed Computing
| null | null | null |
cs.CC cs.DC
| null |
We consider the model of population protocols introduced by Angluin et al.,
in which anonymous finite-state agents stably compute a predicate of the
multiset of their inputs via two-way interactions in the all-pairs family of
communication networks. We prove that all predicates stably computable in this
model (and certain generalizations of it) are semilinear, answering a central
open question about the power of the model. Removing the assumption of two-way
interaction, we also consider several variants of the model in which agents
communicate by anonymous message-passing where the recipient of each message is
chosen by an adversary and the sender is not identified to the recipient. These
one-way models are distinguished by whether messages are delivered immediately
or after a delay, whether a sender can record that it has sent a message, and
whether a recipient can queue incoming messages, refusing to accept new
messages until it has had a chance to send out messages of its own. We
characterize the classes of predicates stably computable in each of these
one-way models using natural subclasses of the semilinear predicates.
|
[
{
"version": "v1",
"created": "Mon, 21 Aug 2006 23:17:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Angluin",
"Dana",
""
],
[
"Aspnes",
"James",
""
],
[
"Eisenstat",
"David",
""
],
[
"Ruppert",
"Eric",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608085
|
Nandakishore Santhi
|
Nandakishore Santhi, Alexander Vardy
|
A Quadratic Time-Space Tradeoff for Unrestricted Deterministic Decision
Branching Programs
|
Withdrawn
| null | null | null |
cs.CC cs.DM cs.IT math.IT
| null |
For a decision problem from coding theory, we prove a quadratic expected
time-space tradeoff of the form $\eT\eS=\Omega(\tfrac{n^2}{q})$ for $q$-way
deterministic decision branching programs, where $q\geq 2$. Here $\eT$ is the
expected computation time and $\eS$ is the expected space, when all inputs are
equally likely. This bound is to our knowledge, the first such to show an
exponential size requirement whenever $\eT = O(n^2)$. Previous exponential size
tradeoffs for Boolean decision branching programs were valid for
time-restricted models with $T=o(n\log_2{n})$. Proving quadratic time-space
tradeoffs for unrestricted time decision branching programs has been a major
goal of recent research -- this goal has already been achieved for
multiple-output branching programs two decades ago. We also show the first
quadratic time-space tradeoffs for Boolean decision branching programs
verifying circular convolution, matrix-vector multiplication and discrete
Fourier transform. Furthermore, we demonstrate a constructive Boolean decision
function which has a quadratic expected time-space tradeoff in the Boolean
deterministic decision branching program model. When $q$ is a constant the
tradeoff results derived here for decision functions verifying various
functions are order-comparable to previously known tradeoff bounds for
calculating the corresponding multiple-output functions.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2006 04:28:27 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Nov 2010 23:19:54 GMT"
}
] | 2020-01-21T00:00:00 |
[
[
"Santhi",
"Nandakishore",
""
],
[
"Vardy",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608086
|
Nandakishore Santhi
|
Nandakishore Santhi, Alexander Vardy
|
Analog Codes on Graphs
|
18 pages, 15 figures, Portions appeared in Proceedings of the
International Symposium on Information Theory (ISIT), Yokohama, Japan, July
2003
| null | null | null |
cs.IT cs.DM math.IT
| null |
We consider the problem of transmission of a sequence of real data produced
by a Nyquist sampled band-limited analog source over a band-limited analog
channel, which introduces an additive white Gaussian noise. An analog coding
scheme is described, which can achieve a mean-squared error distortion
proportional to $(1+SNR)^{-B}$ for a bandwidth expansion factor of $B/R$, where
$0 < R < 1$ is the rate of individual component binary codes used in the
construction and $B \geq 1$ is an integer. Thus, over a wide range of SNR
values, the proposed code performs much better than any single previously known
analog coding system.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2006 05:04:48 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Santhi",
"Nandakishore",
""
],
[
"Vardy",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608087
|
Nandakishore Santhi
|
Nandakishore Santhi, Alexander Vardy
|
On an Improvement over R\'enyi's Equivocation Bound
|
8 pages, 6 figures, To be presented at the 44-th Annual Allerton
Conference on Communication, Control, and Computing, September 2006
| null | null | null |
cs.IT cs.DM math.IT
| null |
We consider the problem of estimating the probability of error in
multi-hypothesis testing when MAP criterion is used. This probability, which is
also known as the Bayes risk is an important measure in many communication and
information theory problems. In general, the exact Bayes risk can be difficult
to obtain. Many upper and lower bounds are known in literature. One such upper
bound is the equivocation bound due to R\'enyi which is of great philosophical
interest because it connects the Bayes risk to conditional entropy. Here we
give a simple derivation for an improved equivocation bound.
We then give some typical examples of problems where these bounds can be of
use. We first consider a binary hypothesis testing problem for which the exact
Bayes risk is difficult to derive. In such problems bounds are of interest.
Furthermore using the bounds on Bayes risk derived in the paper and a random
coding argument, we prove a lower bound on equivocation valid for most random
codes over memoryless channels.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2006 05:56:33 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Santhi",
"Nandakishore",
""
],
[
"Vardy",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608088
|
Petter Holme
|
Petter Holme, Josh Karlin, Stephanie Forrest
|
Radial Structure of the Internet
| null |
Proc. R. Soc. A 463, (2007) 1231-1246
|
10.1098/rspa.2007.1820
| null |
cs.NI physics.soc-ph
| null |
The structure of the Internet at the Autonomous System (AS) level has been
studied by both the Physics and Computer Science communities. We extend this
work to include features of the core and the periphery, taking a radial
perspective on AS network structure. New methods for plotting AS data are
described, and they are used to analyze data sets that have been extended to
contain edges missing from earlier collections. In particular, the average
distance from one vertex to the rest of the network is used as the baseline
metric for investigating radial structure. Common vertex-specific quantities
are plotted against this metric to reveal distinctive characteristics of
central and peripheral vertices. Two data sets are analyzed using these
measures as well as two common generative models (Barabasi-Albert and Inet). We
find a clear distinction between the highly connected core and a sparse
periphery. We also find that the periphery has a more complex structure than
that predicted by degree distribution or the two generative models.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2006 22:33:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Holme",
"Petter",
""
],
[
"Karlin",
"Josh",
""
],
[
"Forrest",
"Stephanie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0608089
|
Shuchin Aeron
|
Shuchin Aeron and Venkatesh Saligrama
|
Wireless ad-hoc networks: Strategies and Scaling laws for the fixed SNR
regime
|
26 pages single column, submitted to Transactions on Information
Theory
|
IEEE Transactions on Information Theory, Volume 53, No. 6, June
2007, pp. 2044-2059
|
10.1109/TIT.2007.896858
| null |
cs.IT math.IT
| null |
This paper deals with throughput scaling laws for random ad-hoc wireless
networks in a rich scattering environment. We develop schemes to optimize the
ratio, $\rho(n)$ of achievable network sum capacity to the sum of the
point-to-point capacities of source-destinations pairs operating in isolation.
For fixed SNR networks, i.e., where the worst case SNR over the
source-destination pairs is fixed independent of $n$, we show that
collaborative strategies yield a scaling law of $\rho(n) = {\cal
O}(\frac{1}{n^{1/3}})$ in contrast to multi-hop strategies which yield a
scaling law of $\rho(n) = {\cal O}(\frac{1}{\sqrt{n}})$. While, networks where
worst case SNR goes to zero, do not preclude the possibility of collaboration,
multi-hop strategies achieve optimal throughput. The plausible reason is that
the gains due to collaboration cannot offset the effect of vanishing receive
SNR. This suggests that for fixed SNR networks, a network designer should look
for network protocols that exploit collaboration. The fact that most current
networks operate in a fixed SNR interference limited environment provides
further motivation for considering this regime.
|
[
{
"version": "v1",
"created": "Wed, 23 Aug 2006 02:02:16 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Aeron",
"Shuchin",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0608090
|
Gun Srijuntongsiri
|
Gun Srijuntongsiri and Stephen A. Vavasis
|
A Condition Number Analysis of a Line-Surface Intersection Algorithm
| null | null | null | null |
cs.NA cs.CG
| null |
We propose an algorithm based on Newton's method and subdivision for finding
all zeros of a polynomial system in a bounded region of the plane. This
algorithm can be used to find the intersections between a line and a surface,
which has applications in graphics and computer-aided geometric design. The
algorithm can operate on polynomials represented in any basis that satisfies a
few conditions. The power basis, the Bernstein basis, and the first-kind
Chebyshev basis are among those compatible with the algorithm. The main novelty
of our algorithm is an analysis showing that its running is bounded only in
terms of the condition number of the polynomial's zeros and a constant
depending on the polynomial basis.
|
[
{
"version": "v1",
"created": "Wed, 23 Aug 2006 03:47:07 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Oct 2007 03:16:05 GMT"
}
] | 2007-10-22T00:00:00 |
[
[
"Srijuntongsiri",
"Gun",
""
],
[
"Vavasis",
"Stephen A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0608091
|
Jan Van den Bussche
|
Floris Geerts, Peter Revesz, Jan Van den Bussche
|
On-line topological simplification of weighted graphs
|
This is the full techreport corresponding to the paper "On-line
maintenance of simplified weighted graphs for efficient distance queries" in
the proceedings of ACM-GIS 2006
|
Proceedings ACM-GIS 2006, ACM Press
| null | null |
cs.DS cs.DB
| null |
We describe two efficient on-line algorithms to simplify weighted graphs by
eliminating degree-two vertices. Our algorithms are on-line in that they react
to updates on the data, keeping the simplification up-to-date. The supported
updates are insertions of vertices and edges; hence, our algorithms are
partially dynamic. We provide both analytical and empirical evaluations of the
efficiency of our approaches. Specifically, we prove an O(log n) upper bound on
the amortized time complexity of our maintenance algorithms, with n the number
of insertions.
|
[
{
"version": "v1",
"created": "Wed, 23 Aug 2006 20:08:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Geerts",
"Floris",
""
],
[
"Revesz",
"Peter",
""
],
[
"Bussche",
"Jan Van den",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0608092
|
Danny Dolev
|
Ariel Daliot and Danny Dolev
|
Self-Stabilizing Byzantine Pulse Synchronization
|
An updated version. The original version appeared as TR-2005-84, The
Hebrew university, Aug. 2005
| null | null |
TR-2005-84
|
cs.DC
| null |
The ``Pulse Synchronization'' problem can be loosely described as targeting
to invoke a recurring distributed event as simultaneously as possible at the
different nodes and with a frequency that is as regular as possible. This
target becomes surprisingly subtle and difficult to achieve when facing both
transient and permanent failures. In this paper we present an algorithm for
pulse synchronization that self-stabilizes while at the same time tolerating a
permanent presence of Byzantine faults. The Byzantine nodes might incessantly
try to de-synchronize the correct nodes. Transient failures might throw the
system into an arbitrary state in which correct nodes have no common notion
what-so-ever, such as time or round numbers, and can thus not infer anything
from their own local states upon the state of other correct nodes. The
presented algorithm grants nodes the ability to infer that eventually all
correct nodes will invoke their pulses within a very short time interval of
each other and will do so regularly.
Pulse synchronization has previously been shown to be a powerful tool for
designing general self-stabilizing Byzantine algorithms and is hitherto the
only method that provides for the general design of efficient practical
protocols in the confluence of these two fault models. The difficulty, in
general, to design any algorithm in this fault model may be indicated by the
remarkably few algorithms resilient to both fault models. The few published
self-stabilizing Byzantine algorithms are typically complicated and sometimes
converge from an arbitrary initial state only after exponential or super
exponential time.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2006 16:07:07 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2006 03:24:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608093
|
Alexander Evako
|
Alexander Evako
|
Connection between continuous and digital n-manifolds and the Poincare
conjecture
|
39 pages, 26 figures
| null | null | null |
cs.DM cs.CV math.AT
| null |
We introduce LCL covers of closed n-dimensional manifolds by n-dimensional
disks and study their properties. We show that any LCL cover of an
n-dimensional sphere can be converted to the minimal LCL cover, which consists
of 2n+2 disks. We prove that an LCL collection of n-disks is a cover of a
continuous n-sphere if and only if the intersection graph of this collection is
a digital n-sphere. Using a link between LCL covers of closed continuous
n-manifolds and digital n-manifolds, we find conditions where a continuous
closed three-dimensional manifold is the three-dimensional sphere. We discuss a
connection between the classification problems for closed continuous
three-dimensional manifolds and digital three-manifolds.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2006 17:45:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Evako",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
cs/0608094
|
Hector Zenil
|
Hector Zenil
|
On Universality in Real Computation
|
Paper in French. 10 pages. Forthcoming a detailed English version
| null | null | null |
cs.CC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Models of computation operating over the real numbers and computing a larger
class of functions compared to the class of general recursive functions
invariably introduce a non-finite element of infinite information encoded in an
arbitrary non-computable number or non-recursive function. In this paper we
show that Turing universality is only possible at every Turing degree but not
over all, in that sense universality at the first level is elegantly well
defined while universality at higher degrees is at least ambiguous. We propose
a concept of universal relativity and universal jump between levels in the
arithmetical and analytical hierarchy.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2006 21:21:21 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Aug 2006 02:18:35 GMT"
},
{
"version": "v3",
"created": "Sun, 3 Dec 2006 01:50:58 GMT"
},
{
"version": "v4",
"created": "Sun, 11 Feb 2007 22:06:45 GMT"
},
{
"version": "v5",
"created": "Tue, 1 Jun 2010 02:03:51 GMT"
},
{
"version": "v6",
"created": "Fri, 17 Dec 2010 01:25:29 GMT"
}
] | 2010-12-20T00:00:00 |
[
[
"Zenil",
"Hector",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608095
|
Markus Mueller
|
Markus Mueller
|
Stationary Algorithmic Probability
|
13 pages, 5 figures. Added an example of a positive recurrent
computer set
|
Theoretical Computer Science 411 pp. 113-130 (2010)
| null | null |
cs.IT cs.CC math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Kolmogorov complexity and algorithmic probability are defined only up to an
additive resp. multiplicative constant, since their actual values depend on the
choice of the universal reference computer. In this paper, we analyze a natural
approach to eliminate this machine-dependence.
Our method is to assign algorithmic probabilities to the different computers
themselves, based on the idea that "unnatural" computers should be hard to
emulate. Therefore, we study the Markov process of universal computers randomly
emulating each other. The corresponding stationary distribution, if it existed,
would give a natural and machine-independent probability measure on the
computers, and also on the binary strings.
Unfortunately, we show that no stationary distribution exists on the set of
all computers; thus, this method cannot eliminate machine-dependence. Moreover,
we show that the reason for failure has a clear and interesting physical
interpretation, suggesting that every other conceivable attempt to get rid of
those additive constants must fail in principle, too.
However, we show that restricting to some subclass of computers might help to
get rid of some amount of machine-dependence in some situations, and the
resulting stationary computer and string probabilities have beautiful
properties.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 00:44:45 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Sep 2006 19:52:23 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Oct 2006 13:38:47 GMT"
},
{
"version": "v4",
"created": "Wed, 8 Oct 2008 23:01:26 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Feb 2009 21:59:43 GMT"
}
] | 2010-03-29T00:00:00 |
[
[
"Mueller",
"Markus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
cs/0608096
|
Danny Dolev
|
Ariel Daliot, Danny Dolev and Hanna Parnas
|
Linear-time Self-stabilizing Byzantine Clock Synchronization
|
This is a corrected version. The original paper appeared in OPODIS'03
|
Proc. of 7th International Conference on Principles of Distributed
Systems (OPODIS'03 La Martinique, France), December, 2003
| null | null |
cs.DC
| null |
Clock synchronization is a very fundamental task in distributed system. It
thus makes sense to require an underlying clock synchronization mechanism to be
highly fault-tolerant. A self-stabilizing algorithm seeks to attain
synchronization once lost; a Byzantine algorithm assumes synchronization is
never lost and focuses on containing the influence of the permanent presence of
faulty nodes. There are efficient self-stabilizing solutions for clock
synchronization as well as efficient solutions that are resilient to Byzantine
faults. In contrast, to the best of our knowledge there is no practical
solution that is self-stabilizing while tolerating the permanent presence of
Byzantine nodes. We present the first linear-time self-stabilizing Byzantine
clock synchronization algorithm. Our deterministic clock synchronization
algorithm is based on the observation that all clock synchronization algorithms
require events for exchanging clock values and re-synchronizing the clocks to
within safe bounds. These events usually need to happen synchronously at the
different nodes. In classic Byzantine algorithms this is fulfilled or aided by
having the clocks initially close to each other and thus the actual clock
values can be used for synchronizing the events. This implies that clock values
cannot differ arbitrarily, which necessarily renders these solutions to be
non-stabilizing. Our scheme suggests using an underlying distributed pulse
synchronization module that is uncorrelated to the clock values.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 03:11:28 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
],
[
"Parnas",
"Hanna",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608097
|
Angelo B. Mingarelli
|
Angelo B. Mingarelli
|
A study of fuzzy and many-valued logics in cellular automata
|
Corrected version: Tables 1, 3 and 4 have a missing left-most
diagonal, thus resulting in misleading data output. Minor typos in the text
corrected as a result. Note that all table values are truncations of actual
values
|
J. Cellular Automata, 1 (3) (2006), 233-252
| null | null |
cs.LO cs.CC
| null |
In this paper we provide an analytical study of the theory of multi-valued
and fuzzy cellular automata where the fuzziness appears as the result of the
application of an underlying multi-valued or continuous logic as opposed to
standard logic as used conventionally. Using the disjunctive normal form of any
one of the 255 ECA's so defined, we modify the underlying logic structure and
redefine the ECA within the framework of this new logic. The idea here is to
show that the evolution of space-time diagrams of ECA's under even a
probabilistic logic can exhibit non-chaotic behavior. This is looked at
specifically for Probabilistic Rule 110, in contrast with Boolean Rule 110
which is known to be capable of universal computation.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 09:21:49 GMT"
},
{
"version": "v2",
"created": "Mon, 28 May 2007 08:41:37 GMT"
}
] | 2007-06-13T00:00:00 |
[
[
"Mingarelli",
"Angelo B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608098
|
Arvind Parthasarathy
|
Arvind Parthasarathy
|
Improved Content Based Image Watermarking
|
24 pages
| null | null | null |
cs.CR
| null |
This paper presents a robust and transparent scheme of watermarking that
exploits the human visual systems' sensitivity to frequency, along with local
image characteristics obtained from the spatial domain. The underlying idea is
generating a visual mask based on the visual systems' perception of image
content. This mask is used to embed a decimal sequence while keeping its
amplitude below the distortion sensitivity of the image pixel. We consider
texture, luminance, corner and the edge information in the image to generate a
mask that makes the addition of the watermark imperceptible to the human eye.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 12:55:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Parthasarathy",
"Arvind",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0608099
|
Tomi Janhunen
|
Tomi Janhunen and Emilia Oikarinen
|
Automated verification of weak equivalence within the SMODELS system
|
48 pages, 7 figures, 2 tables
| null | null | null |
cs.AI cs.LO
| null |
In answer set programming (ASP), a problem at hand is solved by (i) writing a
logic program whose answer sets correspond to the solutions of the problem, and
by (ii) computing the answer sets of the program using an answer set solver as
a search engine. Typically, a programmer creates a series of gradually
improving logic programs for a particular problem when optimizing program
length and execution time on a particular solver. This leads the programmer to
a meta-level problem of ensuring that the programs are equivalent, i.e., they
give rise to the same answer sets. To ease answer set programming at
methodological level, we propose a translation-based method for verifying the
equivalence of logic programs. The basic idea is to translate logic programs P
and Q under consideration into a single logic program EQT(P,Q) whose answer
sets (if such exist) yield counter-examples to the equivalence of P and Q. The
method is developed here in a slightly more general setting by taking the
visibility of atoms properly into account when comparing answer sets. The
translation-based approach presented in the paper has been implemented as a
translator called lpeq that enables the verification of weak equivalence within
the smodels system using the same search engine as for the search of models.
Our experiments with lpeq and smodels suggest that establishing the equivalence
of logic programs in this way is in certain cases much faster than naive
cross-checking of answer sets.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 13:12:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Janhunen",
"Tomi",
""
],
[
"Oikarinen",
"Emilia",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608100
|
Peter Turney
|
Peter D. Turney (National Research Council of Canada)
|
Similarity of Semantic Relations
|
related work available at http://purl.org/peter.turney/
|
Computational Linguistics, (2006), 32(3), 379-416
|
10.1162/coli.2006.32.3.379
|
NRC-48775
|
cs.CL cs.IR cs.LG
| null |
There are at least two kinds of similarity. Relational similarity is
correspondence between relations, in contrast with attributional similarity,
which is correspondence between attributes. When two words have a high degree
of attributional similarity, we call them synonyms. When two pairs of words
have a high degree of relational similarity, we say that their relations are
analogous. For example, the word pair mason:stone is analogous to the pair
carpenter:wood. This paper introduces Latent Relational Analysis (LRA), a
method for measuring relational similarity. LRA has potential applications in
many areas, including information extraction, word sense disambiguation, and
information retrieval. Recently the Vector Space Model (VSM) of information
retrieval has been adapted to measuring relational similarity, achieving a
score of 47% on a collection of 374 college-level multiple-choice word analogy
questions. In the VSM approach, the relation between a pair of words is
characterized by a vector of frequencies of predefined patterns in a large
corpus. LRA extends the VSM approach in three ways: (1) the patterns are
derived automatically from the corpus, (2) the Singular Value Decomposition
(SVD) is used to smooth the frequency data, and (3) automatically generated
synonyms are used to explore variations of the word pairs. LRA achieves 56% on
the 374 analogy questions, statistically equivalent to the average human score
of 57%. On the related problem of classifying semantic relations, LRA achieves
similar gains over the VSM.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 14:35:11 GMT"
}
] | 2020-08-20T00:00:00 |
[
[
"Turney",
"Peter D.",
"",
"National Research Council of Canada"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0608101
|
Gregory Gutin
|
G. Gutin, A. Rafiey, A. Yeo
|
Minimum Cost Homomorphisms to Semicomplete Bipartite Digraphs
| null | null | null | null |
cs.DM cs.CC
| null |
For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a homomorphism of
$D$ to $H$ if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ If, moreover, each
vertex $u \in V(D)$ is associated with costs $c_i(u), i \in V(H)$, then the
cost of the homomorphism $f$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. For each fixed
digraph $H$, we have the {\em minimum cost homomorphism problem for} $H$. The
problem is to decide, for an input graph $D$ with costs $c_i(u),$ $u \in V(D),
i\in V(H)$, whether there exists a homomorphism of $D$ to $H$ and, if one
exists, to find one of minimum cost. Minimum cost homomorphism problems
encompass (or are related to) many well studied optimization problems. We
describe a dichotomy of the minimum cost homomorphism problem for semicomplete
multipartite digraphs $H$. This solves an open problem from an earlier paper.
To obtain the dichotomy of this paper, we introduce and study a new notion, a
$k$-Min-Max ordering of digraphs.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 17:47:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gutin",
"G.",
""
],
[
"Rafiey",
"A.",
""
],
[
"Yeo",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608102
|
Jochen Mundinger
|
Jochen Mundinger, Jean-Yves Le Boudec
|
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
|
17 pages, 6 figures
| null | null |
LCA-REPORT-2006-009
|
cs.PF
| null |
The application of decentralized reputation systems is a promising approach
to ensure cooperation and fairness, as well as to address random failures and
malicious attacks in Mobile Ad-Hoc Networks. However, they are potentially
vulnerable to liars. With our work, we provide a first step to analyzing
robustness of a reputation system based on a deviation test. Using a mean-field
approach to our stochastic process model, we show that liars have no impact
unless their number exceeds a certain threshold (phase transition). We give
precise formulae for the critical values and thus provide guidelines for an
optimal choice of parameters.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 18:12:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Mundinger",
"Jochen",
""
],
[
"Boudec",
"Jean-Yves Le",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0608103
|
Miroslaw Truszczynski
|
V.W. Marek, I. Niemela and M. Truszczynski]
|
Logic programs with monotone abstract constraint atoms
|
33 pages
| null | null | null |
cs.AI cs.LO
| null |
We introduce and study logic programs whose clauses are built out of monotone
constraint atoms. We show that the operational concept of the one-step
provability operator generalizes to programs with monotone constraint atoms,
but the generalization involves nondeterminism. Our main results demonstrate
that our formalism is a common generalization of (1) normal logic programming
with its semantics of models, supported models and stable models, (2) logic
programming with weight atoms (lparse programs) with the semantics of stable
models, as defined by Niemela, Simons and Soininen, and (3) of disjunctive
logic programming with the possible-model semantics of Sakama and Inoue.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2006 18:24:18 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Marek",
"V. W.",
""
],
[
"Niemela",
"I.",
""
],
[
"Truszczynski]",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608104
|
Uday Khedker
|
Uday Khedker, Amitabha Sanyal, and Amey Karkare
|
Heap Reference Analysis Using Access Graphs
|
Accepted for printing by ACM TOPLAS. This version incorporates
referees' comments
|
ACM TOPLAS, 30(1), 2007
|
10.1145/1290520.1290521
| null |
cs.PL cs.SE
| null |
Despite significant progress in the theory and practice of program analysis,
analysing properties of heap data has not reached the same level of maturity as
the analysis of static and stack data. The spatial and temporal structure of
stack and static data is well understood while that of heap data seems
arbitrary and is unbounded. We devise bounded representations which summarize
properties of the heap data. This summarization is based on the structure of
the program which manipulates the heap. The resulting summary representations
are certain kinds of graphs called access graphs. The boundedness of these
representations and the monotonicity of the operations to manipulate them make
it possible to compute them through data flow analysis.
An important application which benefits from heap reference analysis is
garbage collection, where currently liveness is conservatively approximated by
reachability from program variables. As a consequence, current garbage
collectors leave a lot of garbage uncollected, a fact which has been confirmed
by several empirical studies. We propose the first ever end-to-end static
analysis to distinguish live objects from reachable objects. We use this
information to make dead objects unreachable by modifying the program. This
application is interesting because it requires discovering data flow
information representing complex semantics. In particular, we discover four
properties of heap data: liveness, aliasing, availability, and anticipability.
Together, they cover all combinations of directions of analysis (i.e. forward
and backward) and confluence of information (i.e. union and intersection). Our
analysis can also be used for plugging memory leaks in C/C++ languages.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2006 11:15:00 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Nov 2006 06:37:51 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Sep 2007 14:52:17 GMT"
}
] | 2013-04-25T00:00:00 |
[
[
"Khedker",
"Uday",
""
],
[
"Sanyal",
"Amitabha",
""
],
[
"Karkare",
"Amey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0608105
|
Hui Guo
|
Hui Guo, Ying Jiang
|
Application Layer Definition and Analyses of Controller Area Network Bus
for Wire Harness Assembly Machine
|
6 pages, 2 figures, 4 tables
| null | null | null |
cs.RO cs.NI
| null |
With the feature of multi-master bus access, nondestructive contention-based
arbitration and flexible configuration, Controller Area Network (CAN) bus is
applied into the control system of Wire Harness Assembly Machine (WHAM). To
accomplish desired goal, the specific features of the CAN bus is analyzed by
compared with other field buses and the functional performances in the CAN bus
system of WHAM is discussed. Then the application layer planning of CAN bus for
dynamic priority is presented. The critical issue for the use of CAN bus system
in WHAM is the data transfer rate between different nodes. So processing
efficient model is introduced to assist analyzing data transfer procedure.
Through the model, it is convenient to verify the real time feature of the CAN
bus system in WHAM.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2006 12:42:38 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Aug 2006 13:40:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Guo",
"Hui",
""
],
[
"Jiang",
"Ying",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608106
|
Philippe Moser
|
Philippe Moser
|
Lp Computable Functions and Fourier Series
|
corrected abstract
| null | null | null |
cs.CC
| null |
This paper studies how well computable functions can be approximated by their
Fourier series. To this end, we equip the space of Lp-computable functions
(computable Lebesgue integrable functions) with a size notion, by introducing
Lp-computable Baire categories.
We show that Lp-computable Baire categories satisfy the following three basic
properties. Singleton sets {f} (where f is Lp-computable) are meager, suitable
infinite unions of meager sets are meager, and the whole space of Lp-computable
functions is not meager. We give an alternative characterization of meager sets
via Banach Mazur games.
We study the convergence of Fourier series for Lp-computable functions and
show that whereas for every p>1, the Fourier series of every Lp-computable
function f converges to f in the Lp norm, the set of L1-computable functions
whose Fourier series does not diverge almost everywhere is meager.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2006 12:50:36 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 09:03:15 GMT"
},
{
"version": "v3",
"created": "Fri, 11 May 2007 12:44:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Moser",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0608107
|
Fionn Murtagh
|
Fionn Murtagh
|
The Haar Wavelet Transform of a Dendrogram
|
38 pp, 8 figures. Forthcoming in Journal of Classification
|
Journal of Classification, 24, 3-32, 2007
|
10.1007/s00357-007-0007-9
| null |
cs.IR
| null |
We describe a new wavelet transform, for use on hierarchies or binary rooted
trees. The theoretical framework of this approach to data analysis is
described. Case studies are used to further exemplify this approach. A first
set of application studies deals with data array smoothing, or filtering. A
second set of application studies relates to hierarchical tree condensation.
Finally, a third study explores the wavelet decomposition, and the
reproducibility of data sets such as text, including a new perspective on the
generation or computability of such data objects.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2006 17:05:07 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Feb 2007 21:09:45 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Feb 2007 20:33:37 GMT"
}
] | 2011-06-14T00:00:00 |
[
[
"Murtagh",
"Fionn",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
cs/0608108
|
Nicolas Brodu
|
Nicolas Brodu
|
Spherical Indexing for Neighborhood Queries
|
9 pages, 10 figures. The source code is available at
http://nicolas.brodu.free.fr/en/programmation/neighand/index.html
| null | null | null |
cs.DS cs.CG
| null |
This is an algorithm for finding neighbors when the objects can freely move
and have no predefined position. The query consists in finding neighbors for a
center location and a given radius. Space is discretized in cubic cells. This
algorithm introduces a direct spherical indexing that gives the list of all
cells making up the query sphere, for any radius and any center location. It
can additionally take in account both cyclic and non-cyclic regions of
interest. Finding only the K nearest neighbors naturally benefits from the
spherical indexing by minimally running through the sphere from center to edge,
and reducing the maximum distance when K neighbors have been found.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 00:12:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Brodu",
"Nicolas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0608109
|
Michael Hohensee
|
Michael Hohensee
|
Realistic Boundary Conditions for Ad Hoc Network Node Mobility Models
and a New Approach to the Random Waypoint Model
|
12 pages
| null | null | null |
cs.NI
| null |
In this paper, we examine the cause of the border effect observed in many
mobility models used to construct simulations of ad hoc networking protocol
performance. We specify conditions under which a node mobility model must
produce spatial mobile node distribution functions that obey the diffusion
equation. In particular demonstrate that these conditions are satisfied by the
random direction (RD) model. We show that it is possible to construct mobility
models that attain uniform steady-state distributions without resorting to
reflection or ``wrapping'' of nodes at the border of a test region. Finally, we
show that the random waypoint (RWP) model may be reproduced by the application
of a ``volume rule'' to an RD model. This volume rule violates the assumptions
that lead to the diffusion equation. We suggest a generalization of the RWP
model that can provide more uniform mobile node distributions.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 16:06:53 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Hohensee",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0608110
|
Robert Colvin
|
Robert Colvin, Ian J. Hayes and Paul Strooper
|
Calculating modules in contextual logic program refinement
| null | null | null | null |
cs.LO
| null |
The refinement calculus for logic programs is a framework for deriving logic
programs from specifications. It is based on a wide-spectrum language that can
express both specifications and code, and a refinement relation that models the
notion of correct implementation. In this paper we extend and generalise
earlier work on contextual refinement. Contextual refinement simplifies the
refinement process by abstractly capturing the context of a subcomponent of a
program, which typically includes information about the values of the free
variables. This paper also extends and generalises module refinement. A module
is a collection of procedures that operate on a common data type; module
refinement between a specification module A and an implementation module C
allows calls to the procedures of A to be systematically replaced with calls to
the corresponding procedures of C. Based on the conditions for module
refinement, we present a method for calculating an implementation module from a
specification module. Both contextual and module refinement within the
refinement calculus have been generalised from earlier work and the results are
presented in a unified framework.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 05:31:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Colvin",
"Robert",
""
],
[
"Hayes",
"Ian J.",
""
],
[
"Strooper",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0608111
|
Ali Mesbah
|
Ali Mesbah, Arie van Deursen
|
An Architectural Style for Ajax
|
2nd revision: references ordered, images resized, typos
|
Proceedings of the 6th Working IEEE/IFIP Conference on Software
Architecture (WICSA'07). IEEE Computer Society, 2007
|
10.1109/WICSA.2007.7
|
TUD-SERG-2006-016
|
cs.SE
| null |
A new breed of web application, dubbed AJAX, is emerging in response to a
limited degree of interactivity in large-grain stateless Web interactions. At
the heart of this new approach lies a single page interaction model that
facilitates rich interactivity. We have studied and experimented with several
AJAX frameworks trying to understand their architectural properties. In this
paper, we summarize three of these frameworks and examine their properties and
introduce the SPIAR architectural style. We describe the guiding software
engineering principles and the constraints chosen to induce the desired
properties. The style emphasizes user interface component development, and
intermediary delta-communication between client/server components, to improve
user interactivity and ease of development. In addition, we use the concepts
and principles to discuss various open issues in AJAX frameworks and
application development.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 10:10:32 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Oct 2006 13:10:16 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Mesbah",
"Ali",
""
],
[
"van Deursen",
"Arie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0608112
|
Benoit Hudzia
|
B. Hudzia, L. McDermott, T.N. Illahi and M-T. Kechadi
|
Entity Based Peer-to-Peer in a Data Grid Environment
| null |
B. Hudzia, L. McDermott, T.N. Illahi, and M-T. Kechadi, "Entity
Based Peer-to-Peer in a Data Grid Environment", The 17th IMACS World Congress
Scientific Computation, Applied Mathematics and Simulation, Paris, France,
July, 11-15, 2005
| null | null |
cs.DC
| null |
During the last decade there has been a huge interest in Grid technologies,
and numerous Grid projects have been initiated with various visions of the
Grid. While all these visions have the same goal of resource sharing, they
differ in the functionality that a Grid supports, the grid characterisation,
programming environments, etc. In this paper we present a new Grid system
dedicated to deal with data issues, called DGET (Data Grid Environment and
Tools). DGET is characterized by its peer-to-peer communication system and
entity-based architecture, therefore, taking advantage of the main
functionality of both systems; P2P and Grid. DGET is currently under
development and a prototype implementing the main components is in its first
phase of testing. In this paper we limit our description to the system
architectural features and to the main differences with other systems.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 11:58:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hudzia",
"B.",
""
],
[
"McDermott",
"L.",
""
],
[
"Illahi",
"T. N.",
""
],
[
"Kechadi",
"M-T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608113
|
Benoit Hudzia
|
B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi
|
A Java Based Architecture of P2P-Grid Middleware
| null |
B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi, 'A Java Based
Architecture of P2P-Grid Middleware', The 2006 International Conference on
Parallel and Distributed Processing Techniques and Applications, June 26-29,
2006, Las Vegas, USA
| null | null |
cs.DC
| null |
During the last decade there has been a huge interest in Grid technologies,
and numerous Grid projects have been initiated with various visions of the
Grid. While all these visions have the same goal of resource sharing, they
differ in the functionality that a Grid supports, characterization, programming
environments, etc. We present a new Grid system dedicated to dealing with data
issues, called DGET (Data Grid Environment and Tools). DGET is characterized by
its peerto- peer communication system and entity-based architecture, therefore,
taking advantage of the main functionality of both systems; P2P and Grid. DGET
is currently under development and a prototype implementing the main components
is in its first phase of testing. In this paper we limit our description to the
system architectural features and to the main differences with other systems.
Keywords: Grid Computing, Peer to Peer, Peer to Peer Grid
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:11:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hudzia",
"B.",
""
],
[
"Ellahi",
"T. N.",
""
],
[
"McDermott",
"L.",
""
],
[
"Kechadi",
"T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608114
|
Benoit Hudzia
|
Benoit Hudzia and Serge Petiton
|
Reliable multicast fault tolerant MPI in the Grid environment
| null |
Benoit Hudzia and Serge Petiton, "Reliable multicast fault
tolerant MPI in the Grid environment", International Conference GRIDnet,
october 2004
| null | null |
cs.DC
| null |
Grid environments have recently been developed with low stretch and overheads
that increase with the logarithm of the number of nodes in the system. Getting
and sending data to/from a large numbers of nodes is gaining importance due to
an increasing number of independent data providers and the heterogeneity of the
network/Grid. One of the key challenges is to achieve a balance between low
bandwidth consumption and good reliability. In this paper we present an
implementation of a reliable multicast protocol over a fault tolerant MPI:
MPICHV2. It can provide one way to solve the problem of transferring large
chunks of data between applications running on a grid with limited network
links. We first show that we can achieve similar performance as the MPICH-P4
implementation by using multicast with data compression in a cluster. Next, we
provide a theoretical cluster organization and GRID network architecture to
harness the performance provided by using multicast. Finally, we present the
conclusion and future work.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:14:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hudzia",
"Benoit",
""
],
[
"Petiton",
"Serge",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608115
|
Leonid Litinskii
|
Leonid B. Litinskii, Dmitry E. Romanov
|
Neural Network Clustering Based on Distances Between Objects
|
7 pages,4 figures, presentation on ICANN (Athens, Greece, 2006)
| null | null | null |
cs.CV cs.NE
| null |
We present an algorithm of clustering of many-dimensional objects, where only
the distances between objects are used. Centers of classes are found with the
aid of neuron-like procedure with lateral inhibition. The result of clustering
does not depend on starting conditions. Our algorithm makes it possible to give
an idea about classes that really exist in the empirical data. The results of
computer simulations are presented.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:24:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Litinskii",
"Leonid B.",
""
],
[
"Romanov",
"Dmitry E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
cs/0608116
|
Benoit Hudzia
|
T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi
|
Transparent Migration of Multi-Threaded Applications on a Java Based
Grid
| null |
T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi, Transparent
Migration of Multi-Threaded Applications on a Java Based Grid, The IASTED
International Conference on Web Technologies, Applications, and Services
(WTAS 2006), July 17-19, 2006, Alberta, Canada
| null | null |
cs.DC
| null |
Grid computing has enabled pooling a very large number of heterogeneous
resource administered by different security domains. Applications are
dynamically deployed on the resources available at the time. Dynamic nature of
the resources and applications requirements makes needs the grid middleware to
support the ability of migrating a running application to a different resource.
Especially, Grid applications are typically long running and thus stoping them
and starting them from scratch is not a feasible option. This paper presents an
overview of migration support in a java based grid middleware called DGET.
Migration support in DGET includes multi-threaded migration and asynchronous
migration as well.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 13:29:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ellahi",
"T. N.",
""
],
[
"Hudzia",
"B.",
""
],
[
"McDermott",
"L.",
""
],
[
"Kechadi",
"T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0608117
|
Chih-Chun Wang
|
Chih-Chun Wang (Purdue University)
|
Code Annealing and the Suppressing Effect of the Cyclically Lifted LDPC
Code Ensemble
|
To appear in the Proc. 2006 IEEE Information Theory Workshop,
Chengdu, China
| null | null | null |
cs.IT math.IT
| null |
Code annealing, a new method of designing good codes of short block length,
is proposed, which is then concatenated with cyclic lifting to create finite
codes of low frame error rate (FER) error floors without performance outliers.
The stopping set analysis is performed on the cyclically lifted code ensemble
assuming uniformly random lifting sequences, and the suppressing effect/weight
of the cyclic lifting is identified for the first time, based on which the
ensemble FER error floor can be analytically determined and a scaling law is
derived. Both the first-order and high-order suppressing effects are discussed
and quantified by different methods including the explicit expression, an
algorithmic upper bound, and an algebraic lower bound.
The mismatch between the suppressing weight and the stopping distances
explains the dramatic performance discrepancy among different cyclically lifted
codes when the underlying base codes have degree 2 variable nodes or not. For
the former case, a degree augmentation method is further introduced to mitigate
this metric mismatch, and a systematic method of constructing irregular codes
of low FER error floors is presented. Both regular and irregular codes of very
low FER error floors are reported, for which the improvement factor ranges from
10^6-10^4 when compared to the classic graph-based code ensembles.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 14:10:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Chih-Chun",
"",
"Purdue University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.