id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0608018
Renato Renner
Renato Renner and Stefan Wolf and Juerg Wullschleger
The single-serving channel capacity
4 pages, latex
Proceedings of the 2006 IEEE International Symposium on Information Theory (ISIT)
null
null
cs.IT math.IT
null
In this paper we provide the answer to the following question: Given a noisy channel and epsilon>0, how many bits can be transmitted with an error of at most epsilon by a single use of the channel?
[ { "version": "v1", "created": "Thu, 3 Aug 2006 03:19:12 GMT" } ]
2007-07-16T00:00:00
[ [ "Renner", "Renato", "" ], [ "Wolf", "Stefan", "" ], [ "Wullschleger", "Juerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608019
Sebastian Brand
Sebastian Brand
Relation Variables in Qualitative Spatial Reasoning
14 pages; 27th German Conference on Artificial Intelligence (KI'04)
null
null
null
cs.AI
null
We study an alternative to the prevailing approach to modelling qualitative spatial reasoning (QSR) problems as constraint satisfaction problems. In the standard approach, a relation between objects is a constraint whereas in the alternative approach it is a variable. The relation-variable approach greatly simplifies integration and implementation of QSR. To substantiate this point, we discuss several QSR algorithms from the literature which in the relation-variable approach reduce to the customary constraint propagation algorithm enforcing generalised arc-consistency.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 03:24:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Brand", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0608020
Romain Pechoux
Jean-Yves Marion and Romain Pechoux
Quasi-friendly sup-interpretations
null
null
null
null
cs.CC
null
In a previous paper, the sup-interpretation method was proposed as a new tool to control memory resources of first order functional programs with pattern matching by static analysis. Basically, a sup-interpretation provides an upper bound on the size of function outputs. In this former work, a criterion, which can be applied to terminating as well as non-terminating programs, was developed in order to bound polynomially the stack frame size. In this paper, we suggest a new criterion which captures more algorithms computing values polynomially bounded in the size of the inputs. Since this work is related to quasi-interpretations, we compare the two notions obtaining two main features. The first one is that, given a program, we have heuristics for finding a sup-interpretation when we consider polynomials of bounded degree. The other one consists in the characterizations of the set of function computable in polynomial time and in polynomial space.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 13:05:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Marion", "Jean-Yves", "" ], [ "Pechoux", "Romain", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608021
Eyal Lubetzky
Noga Alon, Eyal Lubetzky
The Shannon capacity of a graph and the independence numbers of its powers
null
IEEE Trans. on Information Theory 52 (2006), 2172-2176
10.1109/TIT.2006.872856
null
cs.IT cs.DM math.IT
null
The independence numbers of powers of graphs have been long studied, under several definitions of graph products, and in particular, under the strong graph product. We show that the series of independence numbers in strong powers of a fixed graph can exhibit a complex structure, implying that the Shannon Capacity of a graph cannot be approximated (up to a sub-polynomial factor of the number of vertices) by any arbitrarily large, yet fixed, prefix of the series. This is true even if this prefix shows a significant increase of the independence number at a given power, after which it stabilizes for a while.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 14:46:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Alon", "Noga", "" ], [ "Lubetzky", "Eyal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608022
Joseph Y. Halpern
Joseph Y. Halpern and Sabina Petride
Expressing Security Properties Using Selective Interleaving Functions
null
null
null
null
cs.CR
null
McLean's notion of Selective Interleaving Functions (SIFs) is perhaps the best-known attempt to construct a framework for expressing various security properties. We examine the expressive power of SIFs carefully. We show that SIFs cannot capture nondeducibility on strategies (NOS). We also prove that the set of security properties expressed with SIFs is not closed under conjunction, from which it follows that separability is strictly stronger than double generalized noninterference. However, we show that if we generalize the notion of SIF in a natural way, then NOS is expressible, and the set of security properties expressible by generalized SIFs is closed under conjunction.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 20:15:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Petride", "Sabina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608023
Thomas Michel
Gerhard Wunder, Thomas Michel
Optimal resource allocation for OFDM multiuser channels
null
null
null
null
cs.IT math.IT
null
In this paper, a unifying framework for orthogonal frequency division multiplexing (OFDM) multiuser resource allocation is presented. The isolated seeming problems of maximizing a weighted sum of rates for a given power budget $\bar{P}$ and minimizing sum power for given rate requirements $\mathbf{\bar{R}}$ can be interpreted jointly in this framework. To this end we embed the problems in a higher dimensional space. Based on these results, we subsequently consider the combined problem of maximizing a weighted sum of rates under given rate requirements $\mathbf{\bar{R}}$ and a fixed power budget $\bar{P}$. This new problem is challenging, since the additional constraints do not allow to use the hitherto existing approaches. Interestingly, the optimal decoding orders turn out to be the ordering of the Lagrangian factors in all problems.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 08:12:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Wunder", "Gerhard", "" ], [ "Michel", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608024
Shujun Li Dr.
Shujun Li, Chengqing Li, Kwok-Tung Lo and Guanrong Chen
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation
8 pages, 10 figures, IEEE format
IEEE Transactions on Circuits and Systems-I: Regular Papers, vol. 55, no. 4, pp. 1055-1063, April 2008
10.1109/TCSI.2008.916540
null
cs.CR cs.MM
null
Recently Lin et al. proposed a method of using the underdetermined BSS (blind source separation) problem to realize image and speech encryption. In this paper, we give a cryptanalysis of this BSS-based encryption and point out that it is not secure against known/chosen-plaintext attack and chosen-ciphertext attack. In addition, there exist some other security defects: low sensitivity to part of the key and the plaintext, a ciphertext-only differential attack, divide-and-conquer (DAC) attack on part of the key. We also discuss the role of BSS in Lin et al.'s efforts towards cryptographically secure ciphers.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 11:32:44 GMT" } ]
2010-06-23T00:00:00
[ [ "Li", "Shujun", "" ], [ "Li", "Chengqing", "" ], [ "Lo", "Kwok-Tung", "" ], [ "Chen", "Guanrong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0608025
Dinesh Kumar
Dinesh Kumar (INRIA Sophia Antipolis), Eitan Altman (INRIA Sophia Antipolis), Jean-Marc Kelif (INRIA Sophia Antipolis)
User-Network Association in a WLAN-UMTS Hybrid Cell: Global & Individual Optimality
null
null
null
null
cs.NI
null
We study optimal user-network association in an integrated 802.11 WLAN and 3G-UMTS hybrid cell. Assuming saturated resource allocation on the downlink of WLAN and UMTS networks and a single QoS class of mobiles arriving at an average location in the hybrid cell, we formulate the problem with two different approaches: Global and Individual optimality. The Globally optimal association is formulated as an SMDP (Semi Markov Decision Process) connection routing decision problem where rewards comprise a financial gain component and an aggregate network throughput component. The corresponding Dynamic Programming equations are solved using Value Iteration method and a stationary optimal policy with neither convex nor concave type switching curve structure is obtained. Threshold type and symmetric switching curves are observed for the analogous homogenous network cases. The Individual optimality is studied under a non-cooperative dynamic game framework with expected service time of a mobile as the decision cost criteria. It is shown that individual optimality in a WLAN-UMTS hybrid cell, results in a threshold policy curve of descending staircase form with increasing Poisson arrival rate of mobiles.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 11:44:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Dinesh", "", "INRIA Sophia Antipolis" ], [ "Altman", "Eitan", "", "INRIA Sophia\n Antipolis" ], [ "Kelif", "Jean-Marc", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608026
Dinesh Kumar
Dinesh Kumar (INRIA Sophia Antipolis), Dhiman Barman, Eitan Altman (INRIA Sophia Antipolis), Jean-Marc Kelif (FT R&D)
New Cross-Layer Channel Switching Policy for TCP Transmission on 3G UMTS Downlink
null
null
null
null
cs.NI
null
In 3G UMTS, two main transport channels have been provided for downlink data transmission: a common FACH channel and a dedicated DCH channel. The performance of TCP in UMTS depends much on the channel switching policy used. In this paper, we propose and analyze three new basic threshold-based channel switching policies for UMTS that we name as QS (Queue Size), FS (Flow Size) and QSFS (QS & FS combined) policy. These policies significantly improve over a modified threshold policy in [1] by about 17% in response time metrics. We further propose and evaluate a new improved switching policy that we call FS-DCH (at-least flow-size threshold on DCH) policy. This policy is biased towards short TCP flows of few packets and is thus a cross-layer policy that improves the performance of TCP by giving priority to the initial few packets of a flow on the fast DCH channel. Extensive simulation results confirm this improvement for the case when number of TCP connections is low.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 11:53:04 GMT" } ]
2007-05-23T00:00:00
[ [ "Kumar", "Dinesh", "", "INRIA Sophia Antipolis" ], [ "Barman", "Dhiman", "", "INRIA Sophia Antipolis" ], [ "Altman", "Eitan", "", "INRIA Sophia Antipolis" ], [ "Kelif", "Jean-Marc", "", "FT R&D" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608027
Edwin Henneken
E. Henneken, M.J. Kurtz, G. Eichhorn, A. Accomazzi, C.S. Grant, D. Thompson, E. Bohlen, S.S. Murray
myADS-arXiv - a Tailor-Made, Open Access, Virtual Journal
4 pages, 2 figures, poster paper to appear in the proceedings of the LISA V conference
null
null
null
cs.DL astro-ph
null
The myADS-arXiv service provides the scientific community with a one stop shop for staying up-to-date with a researcher's field of interest. The service provides a powerful and unique filter on the enormous amount of bibliographic information added to the ADS on a daily basis. It also provides a complete view with the most relevant papers available in the subscriber's field of interest. With this service, the subscriber will get to know the lastest developments, popular trends and the most important papers. This makes the service not only unique from a technical point of view, but also from a content point of view. On this poster we will argue why myADS-arXiv is a tailor-made, open access, virtual journal and we will illustrate its unique character.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 15:23:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Henneken", "E.", "" ], [ "Kurtz", "M. J.", "" ], [ "Eichhorn", "G.", "" ], [ "Accomazzi", "A.", "" ], [ "Grant", "C. S.", "" ], [ "Thompson", "D.", "" ], [ "Bohlen", "E.", "" ], [ "Murray", "S. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, null ]
cs/0608028
Joseph Y. Halpern
Joseph Y. Halpern
Using Sets of Probability Measures to Represent Uncertainty
null
null
null
null
cs.AI
null
I explore the use of sets of probability measures as a representation of uncertainty.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 20:26:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0608029
Martin Wainwright
Alexandros G. Dimakis, Martin J. Wainwright
Guessing Facets: Polytope Structure and Improved LP Decoder
Appeared in International Symposium on Information Theory, Seattle, WA. July 2006. Revision: fixed author names in abstract (to be recognized as two separate authors)
null
null
null
cs.IT math.IT
null
A new approach for decoding binary linear codes by solving a linear program (LP) over a relaxed codeword polytope was recently proposed by Feldman et al. In this paper we investigate the structure of the polytope used in the LP relaxation decoding. We begin by showing that for expander codes, every fractional pseudocodeword always has at least a constant fraction of non-integral bits. We then prove that for expander codes, the active set of any fractional pseudocodeword is smaller by a constant fraction than the active set of any codeword. We exploit this fact to devise a decoding algorithm that provably outperforms the LP decoder for finite blocklengths. It proceeds by guessing facets of the polytope, and resolving the linear program on these facets. While the LP decoder succeeds only if the ML codeword has the highest likelihood over all pseudocodewords, we prove that for expander codes the proposed algorithm succeeds even with a constant number of pseudocodewords of higher likelihood. Moreover, the complexity of the proposed algorithm is only a constant factor larger than that of the LP decoder.
[ { "version": "v1", "created": "Sat, 5 Aug 2006 01:25:45 GMT" }, { "version": "v2", "created": "Fri, 11 Aug 2006 22:30:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608030
Ugo Dal Lago
Patrick Baillot, Ugo Dal Lago and Jean-Yves Moyen
On Quasi-Interpretations, Blind Abstractions and Implicit Complexity
18 pages
null
null
null
cs.PL cs.CC cs.LO
null
Quasi-interpretations are a technique to guarantee complexity bounds on first-order functional programs: with termination orderings they give in particular a sufficient condition for a program to be executable in polynomial time, called here the P-criterion. We study properties of the programs satisfying the P-criterion, in order to better understand its intensional expressive power. Given a program on binary lists, its blind abstraction is the nondeterministic program obtained by replacing lists by their lengths (natural numbers). A program is blindly polynomial if its blind abstraction terminates in polynomial time. We show that all programs satisfying a variant of the P-criterion are in fact blindly polynomial. Then we give two extensions of the P-criterion: one by relaxing the termination ordering condition, and the other one (the bounded value property) giving a necessary and sufficient condition for a program to be polynomial time executable, with memoisation.
[ { "version": "v1", "created": "Sun, 6 Aug 2006 07:20:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "" ], [ "Lago", "Ugo Dal", "" ], [ "Moyen", "Jean-Yves", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608031
Mikio Fujii
Mikio Fujii
Secure Positioning of Mobile Terminals with Simplex Radio Communication
8 pages, 4 figures
null
null
null
cs.CR
null
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several authors have proposed a secure positioning mechanism of mobile terminals which is based on the geometric property of wireless node placement, and on the postulate of modern physics that a propagation speed of information never exceeds the velocity of light. In particular, they utilize the measurements of the round-trip time of radio signal propagation and bidirectional communication for variants of the challenge-and-response. In this paper, we propose a novel means to construct the above mechanism by use of unidirectional communication instead of bidirectional communication. Our proposal is based on the assumption that a mobile terminal incorporates a high-precision inner clock in a tamper-resistant protected area. In positioning, the mobile terminal uses its inner clock and the time and location information broadcasted by radio from trusted stations. Our proposal has a major advantage in protecting the location privacy of mobile terminal users, because the mobile terminal need not provide any information to the trusted stations through positioning procedures. Besides, our proposal is free from the positioning error due to claimant's processing-time fluctuations in the challenge-and-response, and is well-suited for mobile terminals in the open air, or on the move at high speed, in terms of practical usage. We analyze the security, the functionality, and the feasibility of our proposal in comparison to previous proposals.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 05:49:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Fujii", "Mikio", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608032
Harald Zankl
Harald Zankl, Aart Middeldorp
Satisfying KBO Constraints
15 pages
null
null
null
cs.SC cs.LO
null
This paper presents two new approaches to prove termination of rewrite systems with the Knuth-Bendix order efficiently. The constraints for the weight function and for the precedence are encoded in (pseudo-)propositional logic and the resulting formula is tested for satisfiability. Any satisfying assignment represents a weight function and a precedence such that the induced Knuth-Bendix order orients the rules of the encoded rewrite system from left to right.
[ { "version": "v1", "created": "Sun, 6 Aug 2006 12:42:31 GMT" }, { "version": "v2", "created": "Tue, 3 Apr 2007 08:45:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Zankl", "Harald", "" ], [ "Middeldorp", "Aart", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608033
Roberto Bonato
Roberto Bonato (INRIA Futurs, LaBRI)
A Study on Learnability for Rigid Lambek Grammars
null
null
null
null
cs.LG
null
We present basic notions of Gold's "learnability in the limit" paradigm, first presented in 1967, a formalization of the cognitive process by which a native speaker gets to grasp the underlying grammar of his/her own native language by being exposed to well formed sentences generated by that grammar. Then we present Lambek grammars, a formalism issued from categorial grammars which, although not as expressive as needed for a full formalization of natural languages, is particularly suited to easily implement a natural interface between syntax and semantics. In the last part of this work, we present a learnability result for Rigid Lambek grammars from structured examples.
[ { "version": "v1", "created": "Sun, 6 Aug 2006 16:10:05 GMT" } ]
2009-09-29T00:00:00
[ [ "Bonato", "Roberto", "", "INRIA Futurs, LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0608034
William Yurcik
Aashish Sharma, William Yurcik
Security Assessment of E-Tax Filing Websites
9 pages
null
null
null
cs.CR
null
Technical security is only part of E-Commerce security operations; human usability and security perception play major and sometimes dominating factors. For instance, slick websites with impressive security icons but no real technical security are often perceived by users to be trustworthy (and thus more profitable) than plain vanilla websites that use powerful encryption for transmission and server protection. We study one important type of E-Commerce transaction website, E-Tax Filing, that is exposed to large populations. We assess a large number of international (5), Federal (USA), and state E-Tax filing websites (38) for both technical security protection and human perception of security. As a result of this assessment, we identify security best practices across these E-Tax Filing websites and recommend additional security techniques that have not been found in current use by E-Tax Filing websites.
[ { "version": "v1", "created": "Sun, 6 Aug 2006 22:56:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Sharma", "Aashish", "" ], [ "Yurcik", "William", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608035
Kohei Suenaga
Naoki Kobayashi, Kohei Suenaga, and Lucian Wischik
Resource Usage Analysis for the Pi-Calculus
null
Logical Methods in Computer Science, Volume 2, Issue 3 (September 13, 2006) lmcs:2246
10.2168/LMCS-2(3:4)2006
null
cs.PL cs.LO
null
We propose a type-based resource usage analysis for the π-calculus extended with resource creation/access primitives. The goal of the resource usage analysis is to statically check that a program accesses resources such as files and memory in a valid manner. Our type system is an extension of previous behavioral type systems for the π-calculus, and can guarantee the safety property that no invalid access is performed, as well as the property that necessary accesses (such as the close operation for a file) are eventually performed unless the program diverges. A sound type inference algorithm for the type system is also developed to free the programmer from the burden of writing complex type annotations. Based on the algorithm, we have implemented a prototype resource usage analyzer for the π-calculus. To the authors' knowledge, ours is the first type-based resource usage analysis that deals with an expressive concurrent language like the pi-calculus.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 05:22:42 GMT" }, { "version": "v2", "created": "Wed, 13 Sep 2006 11:05:09 GMT" } ]
2017-01-11T00:00:00
[ [ "Kobayashi", "Naoki", "" ], [ "Suenaga", "Kohei", "" ], [ "Wischik", "Lucian", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608036
Andre Hernich
Andre Hernich, Nicole Schweikardt
Reversal Complexity Revisited
19 pages, 2 figures
null
null
null
cs.CC
null
We study a generalized version of reversal bounded Turing machines where, apart from several tapes on which the number of head reversals is bounded by r(n), there are several further tapes on which head reversals remain unrestricted, but size is bounded by s(n). Recently, such machines were introduced as a formalization of a computation model that restricts random access to external memory and internal memory space. Here, each of the tapes with a restriction on the head reversals corresponds to an external memory device, and the tapes of restricted size model internal memory. We use ST(r(n),s(n),O(1)) to denote the class of all problems that can be solved by deterministic Turing machines that comply to the above resource bounds. Similarly, NST and RST, respectively, are used for the corresponding nondeterministic and randomized classes. While previous papers focused on lower bounds for particular problems, including sorting, the set equality problem, and several query evaluation problems, the present paper addresses the relations between the (R,N)ST-classes and classical complexity classes and investigates the structural complexity of the (R,N)ST-classes. Our main results are (1) a trade-off between internal memory space and external memory head reversals, (2) correspondences between the (R,N)ST-classes and ``classical'' time-bounded, space-bounded, reversal-bounded, and circuit complexity classes, and (3) hierarchies of (R)ST-classes in terms of increasing numbers of head reversals on external memory tapes.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 11:37:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Hernich", "Andre", "" ], [ "Schweikardt", "Nicole", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608037
Shaohua Li
Shaohua Li
Cascade hash tables: a series of multilevel double hashing schemes with O(1) worst case lookup time
this manuscript is poorly written and contains little technical novelty
null
null
null
cs.DS cs.AI
null
In this paper, the author proposes a series of multilevel double hashing schemes called cascade hash tables. They use several levels of hash tables. In each table, we use the common double hashing scheme. Higher level hash tables work as fail-safes of lower level hash tables. By this strategy, it could effectively reduce collisions in hash insertion. Thus it gains a constant worst case lookup time with a relatively high load factor(70%-85%) in random experiments. Different parameters of cascade hash tables are tested.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 15:22:30 GMT" }, { "version": "v2", "created": "Sun, 24 Sep 2006 10:04:14 GMT" }, { "version": "v3", "created": "Thu, 25 Jun 2015 14:25:38 GMT" } ]
2015-06-26T00:00:00
[ [ "Li", "Shaohua", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0608038
Joachim Wehler
Joachim Wehler
Morphisms of Coloured Petri Nets
null
null
null
null
cs.SE
null
We introduce the concept of a morphism between coloured nets. Our definition generalizes Petris definition for ordinary nets. A morphism of coloured nets maps the topological space of the underlying undirected net as well as the kernel and cokernel of the incidence map. The kernel are flows along the transition-bordered fibres of the morphism, the cokernel are classes of markings of the place-bordered fibres. The attachment of bindings, colours, flows and marking classes to a subnet is formalized by using concepts from sheaf theory. A coloured net is a sheaf-cosheaf pair over a Petri space and a morphism between coloured nets is a morphism between such pairs. Coloured nets and their morphisms form a category. We prove the existence of a product in the subcategory of sort-respecting morphisms. After introducing markings our concepts generalize to coloured Petri nets.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 19:03:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Wehler", "Joachim", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0608039
Norman Danner
Norman Danner and Chris Pollett
The weak pigeonhole principle for function classes in S^1_2
11 pages
Mathematical Logic Quarterly 52(6):575-584, 2006
10.1002/malq.200610015
null
cs.LO
null
It is well known that S^1_2 cannot prove the injective weak pigeonhole principle for polynomial time functions unless RSA is insecure. In this note we investigate the provability of the surjective (dual) weak pigeonhole principle in S^1_2 for provably weaker function classes.
[ { "version": "v1", "created": "Mon, 7 Aug 2006 19:44:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Danner", "Norman", "" ], [ "Pollett", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608040
Patrick Baillot
Patrick Baillot (LIPN), Marco Pedicini
An Embedding of the BSS Model of Computation in Light Affine Lambda-Calculus
11 pages. A preliminary version appeared as Research Report IAC CNR Roma, N.57 (11/2004), november 2004
8th International Workshop on Logic and Computational Complexity Seattle, August 10 - 11, 2006 (Satellite Workshop of FLOC-LICS 2006), \'{E}tats-Unis d'Am\'{e}rique (2006)
null
null
cs.LO
null
This paper brings together two lines of research: implicit characterization of complexity classes by Linear Logic (LL) on the one hand, and computation over an arbitrary ring in the Blum-Shub-Smale (BSS) model on the other. Given a fixed ring structure K we define an extension of Terui's light affine lambda-calculus typed in LAL (Light Affine Logic) with a basic type for K. We show that this calculus captures the polynomial time function class FP(K): every typed term can be evaluated in polynomial time and conversely every polynomial time BSS machine over K can be simulated in this calculus.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 07:13:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Baillot", "Patrick", "", "LIPN" ], [ "Pedicini", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608041
Igor Sobrado
Igor Sobrado and Dave Uhring
The Dynamics of A Self-Forming Network
5 pages; 8 figures; 2 tables
null
null
null
cs.NI
null
This article describes our strategy for deploying self-forming ad hoc networks based on the Internet Protocol version 6 and evaluates the dynamics of this proposal. Among others, we suggest a technique called adaptive routing that provides secure intelligent routing capabilities to computer communication networks. This technique uses the flow label, supports hybrid metrics, network load sharing, and is not restricted to evaluation of performance on first hop routers when making routing decisions. Selective anycasting is an extension to the anycast addressing model that supports exclusion of members of groups that perform poorly or inappropriately on a per-host basis. Distributed name lookup is suggested for integrating self-forming and global networks where they coexist. At last, we pose an address hierarchy to support unmanaged discovery of services in unknown networks.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 16:33:58 GMT" } ]
2007-05-23T00:00:00
[ [ "Sobrado", "Igor", "" ], [ "Uhring", "Dave", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608042
Igal Sason
Gil Wiechman and Igal Sason
An Improved Sphere-Packing Bound for Finite-Length Codes on Symmetric Memoryless Channels
Submitted to the IEEE Transactions on Information Theory (40 pages, 10 figures)
null
null
null
cs.IT math.IT
null
This paper derives an improved sphere-packing (ISP) bound for finite-length codes whose transmission takes place over symmetric memoryless channels. We first review classical results, i.e., the 1959 sphere-packing (SP59) bound of Shannon for the Gaussian channel, and the 1967 sphere-packing (SP67) bound of Shannon et al. for discrete memoryless channels. A recent improvement on the SP67 bound, as suggested by Valembois and Fossorier, is also discussed. These concepts are used for the derivation of a new lower bound on the decoding error probability (referred to as the ISP bound) which is uniformly tighter than the SP67 bound and its recent improved version. The ISP bound is applicable to symmetric memoryless channels, and some of its applications are exemplified. Its tightness is studied by comparing it with bounds on the ML decoding error probability, and computer simulations of iteratively decoded turbo-like codes. The paper also presents a technique which performs the entire calculation of the SP59 bound in the logarithmic domain, thus facilitating the exact calculation of this bound for moderate to large block lengths without the need for the asymptotic approximations provided by Shannon.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 11:51:29 GMT" }, { "version": "v2", "created": "Fri, 1 Sep 2006 22:15:58 GMT" }, { "version": "v3", "created": "Sat, 17 Mar 2007 15:50:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Wiechman", "Gil", "" ], [ "Sason", "Igal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608043
Babajide Afolabi
Babajide Afolabi (LORIA), Odile Thiery (LORIA)
Using Users' Expectations to Adapt Business Intelligence Systems
null
Advances in Knowledge Organization 10 (2006) 247-254
null
null
cs.IR
null
This paper takes a look at the general characteristics of business or economic intelligence system. The role of the user within this type of system is emphasized. We propose two models which we consider important in order to adapt this system to the user. The first model is based on the definition of decisional problem and the second on the four cognitive phases of human learning. We also describe the application domain we are using to test these models in this type of system.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 13:19:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Afolabi", "Babajide", "", "LORIA" ], [ "Thiery", "Odile", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0608044
Jay Kumar Sundararajan
Jay Kumar Sundararajan, Muriel Medard, MinJi Kim, Atilla Eryilmaz, Devavrat Shah, Ralf Koetter
Network Coding in a Multicast Switch
9 pages, submitted to IEEE INFOCOM 2007
null
10.1109/INFCOM.2007.137
null
cs.NI cs.IT math.IT
null
We consider the problem of serving multicast flows in a crossbar switch. We show that linear network coding across packets of a flow can sustain traffic patterns that cannot be served if network coding were not allowed. Thus, network coding leads to a larger rate region in a multicast crossbar switch. We demonstrate a traffic pattern which requires a switch speedup if coding is not allowed, whereas, with coding the speedup requirement is eliminated completely. In addition to throughput benefits, coding simplifies the characterization of the rate region. We give a graph-theoretic characterization of the rate region with fanout splitting and intra-flow coding, in terms of the stable set polytope of the 'enhanced conflict graph' of the traffic pattern. Such a formulation is not known in the case of fanout splitting without coding. We show that computing the offline schedule (i.e. using prior knowledge of the flow arrival rates) can be reduced to certain graph coloring problems. Finally, we propose online algorithms (i.e. using only the current queue occupancy information) for multicast scheduling based on our graph-theoretic formulation. In particular, we show that a maximum weighted stable set algorithm stabilizes the queues for all rates within the rate region.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 19:59:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Sundararajan", "Jay Kumar", "" ], [ "Medard", "Muriel", "" ], [ "Kim", "MinJi", "" ], [ "Eryilmaz", "Atilla", "" ], [ "Shah", "Devavrat", "" ], [ "Koetter", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608045
Fotis Georgatos Drs
Giannis Kouretis, Fotis Georgatos
LiveWN, cpu scavenging in the Grid Era
4 pages
null
null
null
cs.DC cs.NI
null
The goal of this research is to introduce an easy and versatile way to provide and use Grid resources without the need of any OS installation or middleware configuration. At the same time we provide an excellent training tool for newer Grid users and people that want to experiment, without enforcing any installation. We have been testing it thoroughly under different circumstances with firm success.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 15:28:53 GMT" }, { "version": "v2", "created": "Tue, 8 Aug 2006 22:13:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Kouretis", "Giannis", "" ], [ "Georgatos", "Fotis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608046
Richard McClatchey
Arshad Ali, Richard McClatchey, Ashiq Anjum, Irfan Habib, Kamran Soomro, Mohammed Asif, Ali Adil, Athar Mohsin
From Grid Middleware to a Grid Operating System
8 pages, 5 figures. Presented at the 7th IEEE/ACM International Conference on Grid and Cooperative Computing. Changsha, China. October 2006
null
10.1109/GCC.2006.49
null
cs.DC
null
Grid computing has made substantial advances during the last decade. Grid middleware such as Globus has contributed greatly in making this possible. There are, however, significant barriers to the adoption of Grid computing in other fields, most notably day-to-day user computing environments. We will demonstrate in this paper that this is primarily due to the limitations of the existing Grid middleware which does not take into account the needs of everyday scientific and business users. In this paper we will formally advocate a Grid Operating System and propose an architecture to migrate Grid computing into a Grid operating system which we believe would help remove most of the technical barriers to the adoption of Grid computing and make it relevant to the day-to-day user. We believe this proposed transition to a Grid operating system will drive more pervasive Grid computing research and application development and deployment in future.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 17:41:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Ali", "Arshad", "" ], [ "McClatchey", "Richard", "" ], [ "Anjum", "Ashiq", "" ], [ "Habib", "Irfan", "" ], [ "Soomro", "Kamran", "" ], [ "Asif", "Mohammed", "" ], [ "Adil", "Ali", "" ], [ "Mohsin", "Athar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608047
Richard McClatchey
R. H. McClatchey, D. Manset, A. E. Solomonides
Lessons Learned from MammoGrid for Integrated Biomedical Solutions
10 pages, 1 figure. Presented at the 19th IEEE Symposium on Computer-Based Medical Systems (CBMS 2006). Salt Lake City, USA. June 2006
null
10.1109/CBMS.2006.109
null
cs.DC
null
This paper presents an overview of the MammoGrid project and some of its achievements. In terms of the global grid project, and European research in particular, the project has successfully demonstrated the capacity of a grid-based system to support effective collaboration between physicians, including handling and querying image databases, as well as using grid services, such as image standardization and Computer-Aided Detection (CADe) of suspect or indicative features. In terms of scientific results, in radiology, there have been significant epidemiological findings in the assessment of breast density as a risk factor, but the results for CADe are less clear-cut. Finally, the foundations of a technology transfer process to establish a working MammoGrid plus system in Spain through the company Maat GKnowledge and the collaboration of CIEMAT and hospitals in Extremadura.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 17:49:28 GMT" } ]
2016-11-17T00:00:00
[ [ "McClatchey", "R. H.", "" ], [ "Manset", "D.", "" ], [ "Solomonides", "A. E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608048
Richard McClatchey
Ashiq Anjum, Richard McClatchey, Arshad Ali and Ian Willers
Bulk Scheduling with the DIANA Scheduler
12 pages, 11 figures. To be published in the IEEE Transactions in Nuclear Science, IEEE Press. 2006
null
10.1109/TNS.2006.886047
null
cs.DC
null
Results from the research and development of a Data Intensive and Network Aware (DIANA) scheduling engine, to be used primarily for data intensive sciences such as physics analysis, are described. In Grid analyses, tasks can involve thousands of computing, data handling, and network resources. The central problem in the scheduling of these resources is the coordinated management of computation and data at multiple locations and not just data replication or movement. However, this can prove to be a rather costly operation and efficient sing can be a challenge if compute and data resources are mapped without considering network costs. We have implemented an adaptive algorithm within the so-called DIANA Scheduler which takes into account data location and size, network performance and computation capability in order to enable efficient global scheduling. DIANA is a performance-aware and economy-guided Meta Scheduler. It iteratively allocates each job to the site that is most likely to produce the best performance as well as optimizing the global queue for any remaining jobs. Therefore it is equally suitable whether a single job is being submitted or bulk scheduling is being performed. Results indicate that considerable performance improvements can be gained by adopting the DIANA scheduling approach.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 17:53:15 GMT" } ]
2009-11-11T00:00:00
[ [ "Anjum", "Ashiq", "" ], [ "McClatchey", "Richard", "" ], [ "Ali", "Arshad", "" ], [ "Willers", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608049
Alberto Fernandez
Alberto Fernandez and Sergio Gomez
Solving non-uniqueness in agglomerative hierarchical clustering using multidendrograms
Free Software for Agglomerative Hierarchical Clustering using Multidendrograms available at http://deim.urv.cat/~sgomez/multidendrograms.php
Journal of Classification 25 (2008) 43-65
10.1007/s00357-008-9004-x
null
cs.IR math.ST physics.data-an stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In agglomerative hierarchical clustering, pair-group methods suffer from a problem of non-uniqueness when two or more distances between different clusters coincide during the amalgamation process. The traditional approach for solving this drawback has been to take any arbitrary criterion in order to break ties between distances, which results in different hierarchical classifications depending on the criterion followed. In this article we propose a variable-group algorithm that consists in grouping more than two clusters at the same time when ties occur. We give a tree representation for the results of the algorithm, which we call a multidendrogram, as well as a generalization of the Lance and Williams' formula which enables the implementation of the algorithm in a recursive way.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 18:35:52 GMT" }, { "version": "v2", "created": "Wed, 10 Jun 2009 17:10:51 GMT" } ]
2009-06-10T00:00:00
[ [ "Fernandez", "Alberto", "" ], [ "Gomez", "Sergio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
cs/0608050
Matthieu Latapy
Pascal Pons and Matthieu Latapy
Post-Processing Hierarchical Community Structures: Quality Improvements and Multi-scale View
null
Theoretical Computer Science, volume 412, issues 8-10, 4 March 2011, pages 892-900
10.1016/j.tcs.2010.11.041
null
cs.DS cond-mat.dis-nn physics.soc-ph
http://creativecommons.org/licenses/by/4.0/
Dense sub-graphs of sparse graphs (communities), which appear in most real-world complex networks, play an important role in many contexts. Most existing community detection algorithms produce a hierarchical structure of community and seek a partition into communities that optimizes a given quality function. We propose new methods to improve the results of any of these algorithms. First we show how to optimize a general class of additive quality functions (containing the modularity, the performance, and a new similarity based quality function we propose) over a larger set of partitions than the classical methods. Moreover, we define new multi-scale quality functions which make it possible to detect the different scales at which meaningful community structures appear, while classical approaches find only one partition.
[ { "version": "v1", "created": "Wed, 9 Aug 2006 09:23:06 GMT" }, { "version": "v2", "created": "Tue, 12 Jan 2021 15:13:55 GMT" } ]
2021-01-13T00:00:00
[ [ "Pons", "Pascal", "" ], [ "Latapy", "Matthieu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0608051
Marco Maggesi
Andr\'e Hirschowitz, Marco Maggesi
Modules over Monads and Linearity
15 pages, too many changes to be summarized
null
null
null
cs.LO cs.PL
null
Inspired by the classical theory of modules over a monoid, we give a first account of the natural notion of module over a monad. The associated notion of morphism of left modules ("Linear" natural transformations) captures an important property of compatibility with substitution, in the heterogeneous case where "terms" and variables therein could be of different types as well as in the homogeneous case. In this paper, we present basic constructions of modules and we show examples concerning in particular abstract syntax and lambda-calculus.
[ { "version": "v1", "created": "Fri, 11 Aug 2006 15:05:27 GMT" }, { "version": "v2", "created": "Mon, 7 May 2007 10:52:12 GMT" } ]
2007-05-23T00:00:00
[ [ "Hirschowitz", "André", "" ], [ "Maggesi", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0608052
Alois Schl\"ogl
Alois Schl\"ogl
GDF - A general dataformat for biosignals
GDF v2.51 add support for SCP sections 7-11
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biomedical signals are stored in many different data formats. Most formats have been developed for a specific purpose of a specialized community for ECG research, EEG analysis, sleep research, etc. So far none of the existing formats can be considered a general purpose data format for biomedical signals. In order to solve this problem and to unify the various needs of the various biomedical signal processing fields, the so-called "General Data Format for biomedical signals" (GDF) is developed. This GDF format is fully described and specified. Software for reading and writing GDF data is implemented in Octave/Matlab and C/C++ and provided through BioSig - an free and open source software library for biomedical signal processing. BioSig privides also converters from various data formats to GDF, and a viewing and scoring software.
[ { "version": "v1", "created": "Fri, 11 Aug 2006 15:13:34 GMT" }, { "version": "v10", "created": "Tue, 26 Mar 2013 13:11:01 GMT" }, { "version": "v2", "created": "Thu, 17 Aug 2006 15:26:50 GMT" }, { "version": "v3", "created": "Thu, 3 Jul 2008 09:48:07 GMT" }, { "version": "v4", "created": "Mon, 27 Oct 2008 13:32:50 GMT" }, { "version": "v5", "created": "Thu, 16 Jul 2009 09:25:21 GMT" }, { "version": "v6", "created": "Tue, 1 Dec 2009 09:02:59 GMT" }, { "version": "v7", "created": "Wed, 9 Mar 2011 16:28:03 GMT" }, { "version": "v8", "created": "Mon, 27 Jun 2011 13:43:28 GMT" }, { "version": "v9", "created": "Thu, 21 Mar 2013 13:03:10 GMT" } ]
2013-03-27T00:00:00
[ [ "Schlögl", "Alois", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0608053
Susan Coppersmith
S.N. Coppersmith
Renormalization group approach to the P versus NP question
Original version had a conjecture that is known to be false. Revised version corrects this error
null
null
null
cs.CC cond-mat.stat-mech
null
This paper argues that the ideas underlying the renormalization group technique used to characterize phase transitions in condensed matter systems could be useful for distinguishing computational complexity classes. The paper presents a renormalization group transformation that maps an arbitrary Boolean function of $N$ Boolean variables to one of $N-1$ variables. When this transformation is applied repeatedly, the behavior of the resulting sequence of functions is different for a generic Boolean function than for Boolean functions that can be written as a polynomial of degree $\xi$ with $\xi \ll N$ as well as for functions that depend on composite variables such as the arithmetic sum of the inputs. Being able to demonstrate that functions are non-generic is of interest because it suggests an avenue for constructing an algorithm capable of demonstrating that a given Boolean function cannot be computed using resources that are bounded by a polynomial of $N$.
[ { "version": "v1", "created": "Fri, 11 Aug 2006 17:48:42 GMT" }, { "version": "v2", "created": "Sun, 1 Oct 2006 15:37:15 GMT" } ]
2007-05-23T00:00:00
[ [ "Coppersmith", "S. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
cs/0608054
Luis Rademacher
Luis Rademacher, Santosh Vempala
Dispersion of Mass and the Complexity of Randomized Geometric Algorithms
Full version of L. Rademacher, S. Vempala: Dispersion of Mass and the Complexity of Randomized Geometric Algorithms. Proc. 47th IEEE Annual Symp. on Found. of Comp. Sci. (2006). A version of it to appear in Advances in Mathematics
null
null
null
cs.CC cs.CG cs.DS math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How much can randomness help computation? Motivated by this general question and by volume computation, one of the few instances where randomness provably helps, we analyze a notion of dispersion and connect it to asymptotic convex geometry. We obtain a nearly quadratic lower bound on the complexity of randomized volume algorithms for convex bodies in R^n (the current best algorithm has complexity roughly n^4, conjectured to be n^3). Our main tools, dispersion of random determinants and dispersion of the length of a random point from a convex body, are of independent interest and applicable more generally; in particular, the latter is closely related to the variance hypothesis from convex geometry. This geometric dispersion also leads to lower bounds for matrix problems and property testing.
[ { "version": "v1", "created": "Sat, 12 Aug 2006 23:31:07 GMT" }, { "version": "v2", "created": "Tue, 17 Jun 2008 19:14:43 GMT" } ]
2008-06-17T00:00:00
[ [ "Rademacher", "Luis", "" ], [ "Vempala", "Santosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" } ]
cs/0608055
Hao Chen
Hao Chen
MDS Ideal Secret Sharing Scheme from AG-codes on Elliptic Curves
null
null
null
null
cs.CR
null
For a secret sharing scheme, two parameters $d_{min}$ and $d_{cheat}$ are defined in [12] and [13]. These two parameters measure the error-correcting capability and the secret-recovering capability of the secret sharing scheme against cheaters. Some general properties of the parameters have been studied in [12,[9] and [13]. The MDS secret-sharing scheme was defined in [12] and it is proved that MDS perfect secret sharing scheme can be constructed for any monotone access structure. The famous Shamir $(k,n)$ threshold secret sharing scheme is the MDS with $d_{min}=d_{cheat}=n-k+1$. In [3] we proposed the linear secret sharing scheme from algebraic-geometric codes. In this paper the linear secret sharing scheme from AG-codes on elliptic curves is studied and it is shown that many of them are MDS linear secret sharing scheme.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 01:49:34 GMT" }, { "version": "v2", "created": "Sun, 3 Sep 2006 03:59:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608056
Bin Dai
Bin Dai, Yuan Luo
Wiretap Channel With Side Information
null
null
null
null
cs.IT math.IT
null
This submission has been withdrawn by the author.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 06:20:20 GMT" }, { "version": "v2", "created": "Fri, 25 Aug 2006 04:39:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Dai", "Bin", "" ], [ "Luo", "Yuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608057
Lane A. Hemaspaandra
Edith Hemaspaandra, Lane A. Hemaspaandra, Joerg Rothe
Hybrid Elections Broaden Complexity-Theoretic Resistance to Control
null
null
null
URCS TR-2006-900
cs.GT cs.CC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Electoral control refers to attempts by an election's organizer ("the chair") to influence the outcome by adding/deleting/partitioning voters or candidates. The groundbreaking work of Bartholdi, Tovey, and Trick [BTT92] on (constructive) control proposes computational complexity as a means of resisting control attempts: Look for election systems where the chair's task in seeking control is itself computationally infeasible. We introduce and study a method of combining two or more candidate-anonymous election schemes in such a way that the combined scheme possesses all the resistances to control (i.e., all the NP-hardnesses of control) possessed by any of its constituents: It combines their strengths. From this and new resistance constructions, we prove for the first time that there exists an election scheme that is resistant to all twenty standard types of electoral control.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 16:15:25 GMT" }, { "version": "v2", "created": "Fri, 26 Sep 2008 04:23:01 GMT" } ]
2008-09-26T00:00:00
[ [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0608058
Dmitri Krioukov
Srinivas Shakkottai, Marina Fomenkov, Ryan Koga, Dmitri Krioukov, kc claffy
Evolution of the Internet AS-Level Ecosystem
null
Eur. Phys. J. B 74, 271-278 (2010)
10.1140/epjb/e2010-00057-x
null
cs.NI cs.GT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an analytically tractable model of Internet evolution at the level of Autonomous Systems (ASs). We call our model the multiclass preferential attachment (MPA) model. As its name suggests, it is based on preferential attachment. All of its parameters are measurable from available Internet topology data. Given the estimated values of these parameters, our analytic results predict a definitive set of statistics characterizing the AS topology structure. These statistics are not part of the model formulation. The MPA model thus closes the "measure-model-validate-predict" loop, and provides further evidence that preferential attachment is a driving force behind Internet evolution.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 18:52:02 GMT" }, { "version": "v2", "created": "Fri, 18 Aug 2006 18:22:13 GMT" }, { "version": "v3", "created": "Wed, 7 Nov 2007 21:48:51 GMT" }, { "version": "v4", "created": "Sun, 8 Feb 2009 08:55:29 GMT" }, { "version": "v5", "created": "Fri, 9 Apr 2010 22:07:34 GMT" } ]
2010-04-13T00:00:00
[ [ "Shakkottai", "Srinivas", "" ], [ "Fomenkov", "Marina", "" ], [ "Koga", "Ryan", "" ], [ "Krioukov", "Dmitri", "" ], [ "claffy", "kc", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0608059
Daniel Hirschkoff
Daniel Hirschkoff, Damien Pous
A Distribution Law for CCS and a New Congruence Result for the pi-calculus
20 pages
Logical Methods in Computer Science, Volume 4, Issue 2 (May 14, 2008) lmcs:823
10.2168/LMCS-4(2:4)2008
null
cs.LO
null
We give an axiomatisation of strong bisimilarity on a small fragment of CCS that does not feature the sum operator. This axiomatisation is then used to derive congruence of strong bisimilarity in the finite pi-calculus in absence of sum. To our knowledge, this is the only nontrivial subcalculus of the pi-calculus that includes the full output prefix and for which strong bisimilarity is a congruence.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 18:55:53 GMT" }, { "version": "v2", "created": "Wed, 16 Aug 2006 07:39:54 GMT" }, { "version": "v3", "created": "Thu, 17 Aug 2006 07:06:09 GMT" }, { "version": "v4", "created": "Mon, 5 May 2008 13:53:14 GMT" }, { "version": "v5", "created": "Wed, 14 May 2008 13:36:24 GMT" } ]
2015-07-01T00:00:00
[ [ "Hirschkoff", "Daniel", "" ], [ "Pous", "Damien", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608060
Syed Jafar
Syed A. Jafar, Krishna S. Gomadam
Duality and Capacity Region of AF Relay MAC and BC
33 pages
null
null
null
cs.IT math.IT
null
We consider multi-hop multiple access (MAC) and broadcast channels (BC) where communication takes place with the assistance of relays that amplify and forward (AF) their received signals. For a two hop parallel AF relay MAC, assuming a sum power constraint across all relays we characterize optimal relay amplification factors and the resulting capacity regions. We find that the parallel AF relay MAC with total transmit power of the two users $P_1+P_2=P$ and total relay power $P_R$ is the dual of the parallel AF relay BC where the MAC source nodes become the BC destination nodes, the MAC destination node becomes the BC source node, the dual BC source transmit power is $P_R$ and the total transmit power of the AF relays is $P$. The duality means that the capacity region of the AF relay MAC with a sum power constraint $P$ on the transmitters is the same as that of the dual BC. The duality relationship is found to be useful in characterizing the capacity region of the AF relay BC as the union of MAC capacity regions. The duality extends to distributed relays with multiple antennas and more than 2 hops as well.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 20:03:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Jafar", "Syed A.", "" ], [ "Gomadam", "Krishna S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608061
Chengpu Wang
Chengpu Wang
Concurrent Processing Memory
35 pages, 16 figures
null
null
null
cs.DC cs.AR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A theoretical memory with limited processing power and internal connectivity at each element is proposed. This memory carries out parallel processing within itself to solve generic array problems. The applicability of this in-memory finest-grain massive SIMD approach is studied in some details. For an array of N items, it reduces the total instruction cycle count of universal operations such as insertion/deletion and match finding to ~ 1, local operations such as filtering and template matching to ~ local operation size, and global operations such as sum, finding global limit and sorting to ~\sqroot{N} instruction cycles. It eliminates most streaming activities for data processing purpose on the system bus. Yet it remains general-purposed, easy to use, pin compatible with conventional memory, and practical for implementation.
[ { "version": "v1", "created": "Tue, 15 Aug 2006 01:42:49 GMT" }, { "version": "v2", "created": "Sun, 8 Apr 2007 02:21:08 GMT" }, { "version": "v3", "created": "Tue, 14 Sep 2010 21:11:55 GMT" }, { "version": "v4", "created": "Mon, 20 Sep 2010 14:16:36 GMT" }, { "version": "v5", "created": "Sat, 25 Sep 2010 02:49:23 GMT" } ]
2010-09-28T00:00:00
[ [ "Wang", "Chengpu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0608062
Solomon Feferman
Solomon Feferman
Tarski's influence on computer science
null
Logical Methods in Computer Science, Volume 2, Issue 3 (September 27, 2006) lmcs:2248
10.2168/LMCS-2(3:6)2006
null
cs.GL cs.LO
null
The influence of Alfred Tarski on computer science was indirect but significant in a number of directions and was in certain respects fundamental. Here surveyed is the work of Tarski on the decision procedure for algebra and geometry, the method of elimination of quantifiers, the semantics of formal languages, modeltheoretic preservation theorems, and algebraic logic; various connections of each with computer science are taken up.
[ { "version": "v1", "created": "Tue, 15 Aug 2006 16:40:24 GMT" }, { "version": "v2", "created": "Wed, 27 Sep 2006 09:43:52 GMT" } ]
2017-01-11T00:00:00
[ [ "Feferman", "Solomon", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608063
Sylvain Pion
Sylvain Pion (INRIA Sophia Antipolis), Andreas Fabri
A Generic Lazy Evaluation Scheme for Exact Geometric Computations
null
null
null
null
cs.CG cs.PF
null
We present a generic C++ design to perform efficient and exact geometric computations using lazy evaluations. Exact geometric computations are critical for the robustness of geometric algorithms. Their efficiency is also critical for most applications, hence the need for delaying the exact computations at run time until they are actually needed. Our approach is generic and extensible in the sense that it is possible to make it a library which users can extend to their own geometric objects or primitives. It involves techniques such as generic functor adaptors, dynamic polymorphism, reference counting for the management of directed acyclic graphs and exception handling for detecting cases where exact computations are needed. It also relies on multiple precision arithmetic as well as interval arithmetic. We apply our approach to the whole geometric kernel of CGAL.
[ { "version": "v1", "created": "Tue, 15 Aug 2006 19:24:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Pion", "Sylvain", "", "INRIA Sophia Antipolis" ], [ "Fabri", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0608064
Lisi D'Alfonso
Lisi D'Alfonso, Gabriela Jeronimo, Pablo Solerno
A linear algebra approach to the differentiation index of generic DAE systems
null
null
null
null
cs.SC math.AC
null
The notion of differentiation index for DAE systems of arbitrary order with generic second members is discussed by means of the study of the behavior of the ranks of certain Jacobian associated sub-matrices. As a by-product, we obtain upper bounds for the regularity of the Hilbert-Kolchin function and the order of the ideal associated to the DAE systems under consideration, not depending on characteristic sets. Some quantitative and algorithmic results concerning differential transcendence bases and induced equivalent explicit ODE systems are also established.
[ { "version": "v1", "created": "Tue, 15 Aug 2006 21:57:24 GMT" }, { "version": "v2", "created": "Thu, 2 Aug 2007 15:47:32 GMT" } ]
2007-08-02T00:00:00
[ [ "D'Alfonso", "Lisi", "" ], [ "Jeronimo", "Gabriela", "" ], [ "Solerno", "Pablo", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
cs/0608065
Edita Pelantova
Lubom\'ira Balkov\'a, Edita Pelantov\'a, and Ond\v{r}ej Turek
Combinatorial and Arithmetical Properties of Infinite Words Associated with Non-simple Quadratic Parry Numbers
15 pages
null
null
null
cs.DM
null
We study arithmetical and combinatorial properties of $\beta$-integers for $\beta$ being the root of the equation $x^2=mx-n, m,n \in \mathbb N, m \geq n+2\geq 3$. We determine with the accuracy of $\pm 1$ the maximal number of $\beta$-fractional positions, which may arise as a result of addition of two $\beta$-integers. For the infinite word $u_\beta$ coding distances between consecutive $\beta$-integers, we determine precisely also the balance. The word $u_\beta$ is the fixed point of the morphism $A \to A^{m-1}B$ and $B\to A^{m-n-1}B$. In the case $n=1$ the corresponding infinite word $u_\beta$ is sturmian and therefore 1-balanced. On the simplest non-sturmian example with $n\geq 2$, we illustrate how closely the balance and arithmetical properties of $\beta$-integers are related.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 09:39:01 GMT" }, { "version": "v2", "created": "Thu, 17 Aug 2006 10:08:30 GMT" } ]
2007-05-23T00:00:00
[ [ "Balková", "Lubomíra", "" ], [ "Pelantová", "Edita", "" ], [ "Turek", "Ondřej", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0608066
Mariano Zelke
Mariano Zelke
k-Connectivity in the Semi-Streaming Model
13 pages, submitted to Theoretical Computer Science
null
null
null
cs.DM cs.DS
null
We present the first semi-streaming algorithms to determine k-connectivity of an undirected graph with k being any constant. The semi-streaming model for graph algorithms was introduced by Muthukrishnan in 2003 and turns out to be useful when dealing with massive graphs streamed in from an external storage device. Our two semi-streaming algorithms each compute a sparse subgraph of an input graph G and can use this subgraph in a postprocessing step to decide k-connectivity of G. To this end the first algorithm reads the input stream only once and uses time O(k^2*n) to process each input edge. The second algorithm reads the input k+1 times and needs time O(k+alpha(n)) per input edge. Using its constructed subgraph the second algorithm can also generate all l-separators of the input graph for all l<k.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 10:37:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Zelke", "Mariano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0608067
Tetsushi Matsui
Tetsushi Matsui
On Polynomial Time Computable Numbers
19 pages
null
null
null
cs.CC
null
It will be shown that the polynomial time computable numbers form a field, and especially an algebraically closed field.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 15:26:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Matsui", "Tetsushi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608068
Ke Liu
Ke Liu, Nael Abu-Ghazaleh
The Aligned-Coordinated Geographical Routing for Multihop Wireless Networks
null
ijsnet 2008
null
null
cs.NI cs.DC
null
The stateless, low overhead and distributed nature of the Geographic routing protocols attract a lot of research attentions recently. Since the geographic routing would face void problems, leading to complementary routing such as perimeter routing which degrades the performance of geographic routing, most research works are focus on optimizing this complementary part of geographic routing to improve it. The greedy forwarding part of geographic routing provides an optimal routing performance in terms of path stretch. If the geographic routing could adapt the greedy forwarding more, its performance would be enhanced much more than to optimize the complementary routing such as perimeter routings. Our work is the first time to do so. The aligned physical coordinate is used to do the greedy forwarding routing decision which would lead more greedy forwarding. We evaluate our design to most geographic routing protocols, showing it helps much and maintain the stateless nature of geographic routing.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 17:06:37 GMT" } ]
2008-03-28T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608069
Ke Liu
Ke Liu, Nael Abu-Ghazaleh, Kyoung-Don Kang
JiTS: Just-in-Time Scheduling for Real-Time Sensor Data Dissemination
null
PerCom 2006
null
null
cs.NI cs.DC cs.PF
null
We consider the problem of real-time data dissemination in wireless sensor networks, in which data are associated with deadlines and it is desired for data to reach the sink(s) by their deadlines. To this end, existing real-time data dissemination work have developed packet scheduling schemes that prioritize packets according to their deadlines. In this paper, we first demonstrate that not only the scheduling discipline but also the routing protocol has a significant impact on the success of real-time sensor data dissemination. We show that the shortest path routing using the minimum number of hops leads to considerably better performance than Geographical Forwarding, which has often been used in existing real-time data dissemination work. We also observe that packet prioritization by itself is not enough for real-time data dissemination, since many high priority packets may simultaneously contend for network resources, deteriorating the network performance. Instead, real-time packets could be judiciously delayed to avoid severe contention as long as their deadlines can be met. Based on this observation, we propose a Just-in-Time Scheduling (JiTS) algorithm for scheduling data transmissions to alleviate the shortcomings of the existing solutions. We explore several policies for non-uniformly delaying data at different intermediate nodes to account for the higher expected contention as the packet gets closer to the sink(s). By an extensive simulation study, we demonstrate that JiTS can significantly improve the deadline miss ratio and packet drop ratio compared to existing approaches in various situations. Notably, JiTS improves the performance requiring neither lower layer support nor synchronization among the sensor nodes.
[ { "version": "v1", "created": "Wed, 16 Aug 2006 17:21:40 GMT" } ]
2008-03-28T00:00:00
[ [ "Liu", "Ke", "" ], [ "Abu-Ghazaleh", "Nael", "" ], [ "Kang", "Kyoung-Don", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0608070
Haim Permuter Henry
Haim Permuter, Tsachy Weissman and Andrea Goldsmith
Finite State Channels with Time-Invariant Deterministic Feedback
null
null
null
null
cs.IT math.IT
null
We consider capacity of discrete-time channels with feedback for the general case where the feedback is a time-invariant deterministic function of the output samples. Under the assumption that the channel states take values in a finite alphabet, we find an achievable rate and an upper bound on the capacity. We further show that when the channel is indecomposable, and has no intersymbol interference (ISI), its capacity is given by the limit of the maximum of the (normalized) directed information between the input $X^N$ and the output $Y^N$, i.e. $C = \lim_{N \to \infty} \frac{1}{N} \max I(X^N \to Y^N)$, where the maximization is taken over the causal conditioning probability $Q(x^N||z^{N-1})$ defined in this paper. The capacity result is used to show that the source-channel separation theorem holds for time-invariant determinist feedback. We also show that if the state of the channel is known both at the encoder and the decoder then feedback does not increase capacity.
[ { "version": "v1", "created": "Thu, 17 Aug 2006 14:35:20 GMT" } ]
2009-09-29T00:00:00
[ [ "Permuter", "Haim", "" ], [ "Weissman", "Tsachy", "" ], [ "Goldsmith", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608071
Avi Steiner
Avi Steiner, Amichai Sanderovich, Shlomo Shamai (Shitz)
Broadcast Cooperation Strategies for Two Colocated Users
null
null
null
null
cs.IT math.IT
null
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocation nature of the users allows cooperation, which increases the overall achievable rate, from the transmitter to the destined user. The transmitter is ignorant of the fading coefficients, while receivers have access to perfect channel state information (CSI). This gives rise to the multi-layer broadcast approach used by the transmitter. The broadcast approach allows, in our network setting, to improve the cooperation between the colocated users. That is due to the nature of broadcasting, where the better the channel quality, the more layers that can be decoded. The cooperation between the users is performed over an additive white Gaussian channels (AWGN), with a relaying power constraint, and unlimited bandwidth. Three commonly used cooperation techniques are studied: amplify-forward (AF), compress-forward (CF), and decode-forward (DF). These methods are extended using the broadcast approach, for the case of relaxed decoding delay constraint. For this case a separated processing of the layers, which includes multi-session cooperation is shown to be beneficial. Further, closed form expressions for infinitely many AF sessions and recursive expressions for the more complex CF are given. Numerical results for the various cooperation strategies demonstrate the efficiency of multi-session cooperation.
[ { "version": "v1", "created": "Thu, 17 Aug 2006 14:35:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Steiner", "Avi", "", "Shitz" ], [ "Sanderovich", "Amichai", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608072
Dandan Luo
Dandan Luo, Yunmin Zhu
Applications of Random Parameter Matrices Kalman Filtering in Uncertain Observation and Multi-Model Systems
4 figures
null
null
null
cs.IT math.IT
null
This paper considers the Linear Minimum Variance recursive state estimation for the linear discrete time dynamic system with random state transition and measurement matrices, i.e., random parameter matrices Kalman filtering. It is shown that such system can be converted to a linear dynamic system with deterministic parameter matrices but state-dependent process and measurement noises. It is proved that under mild conditions, the recursive state estimation of this system is still of the form of a modified Kalman filtering. More importantly, this result can be applied to Kalman filtering with intermittent and partial observations as well as randomly variant dynamic systems.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 00:15:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Luo", "Dandan", "" ], [ "Zhu", "Yunmin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608073
Leonid Litinskii
Leonid B. Litinskii
Parametrical Neural Networks and Some Other Similar Architectures
15 pages, 2 figures, accepted for publication in "Optical Memory & Neural Networks" (2006)
null
null
null
cs.CV cs.NE
null
A review of works on associative neural networks accomplished during last four years in the Institute of Optical Neural Technologies RAS is given. The presentation is based on description of parametrical neural networks (PNN). For today PNN have record recognizing characteristics (storage capacity, noise immunity and speed of operation). Presentation of basic ideas and principles is accentuated.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 08:28:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Litinskii", "Leonid B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0608074
Oleg Verbitsky
Johannes Koebler and Oleg Verbitsky
From Invariants to Canonization in Parallel
14 pages. A minor correction in the proof of Theorem 4.1 made
null
null
null
cs.CC
null
A function $f$ of a graph is called a complete graph invariant if the isomorphism of graphs $G$ and $H$ is equivalent to the equality $f(G)=f(H)$. If, in addition, $f(G)$ is a graph isomorphic to $G$, then $f$ is called a canonical form for graphs. Gurevich proves that graphs have a polynomial-time computable canonical form exactly when they have a polynomial-time computable complete invariant. We extend this equivalence to the polylogarithmic-time model of parallel computation for classes of graphs with bounded rigidity index and for classes of graphs with small separators. In particular, our results apply to three representative classes of graphs embeddable into a fixed surface, namely, to 5-connected graphs, to 3-connected graphs admitting a polyhedral embedding, and 3-connected graphs admitting a large-edge-width embedding. Another application covers graphs with bounded treewidth. Since in the latter case an NC complete-invariant algorithm is known, we conclude that graphs of bounded treewidth have a canonical form (and even a canonical labeling) computable in NC.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 09:46:09 GMT" }, { "version": "v2", "created": "Tue, 11 Sep 2007 11:24:10 GMT" }, { "version": "v3", "created": "Fri, 14 Sep 2007 14:33:12 GMT" }, { "version": "v4", "created": "Fri, 14 Dec 2007 13:04:10 GMT" } ]
2011-11-09T00:00:00
[ [ "Koebler", "Johannes", "" ], [ "Verbitsky", "Oleg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608075
Jean-Philippe Diguet
Nader Ben Amor (LESTER, CES), Yannick Le Moullec (LESTER), Jean-Philippe Diguet (LESTER), Jean Luc Philippe (LESTER), Mohamed Abid (CES)
Design of multimedia processor based on metric computation
null
Advances in Engineering Software (Elsevier) Vol.36 No.7 (2005) 448-458
10.1016/j.advengsoft.2005.01.010
null
cs.AR
null
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-time constraints of those media applications have taxing demands on today's processor performances with low cost, low power and reduced design delay. To satisfy those challenges, a fast and efficient strategy consists in upgrading a low cost general purpose processor core. This approach is based on the personalization of a general RISC processor core according the target multimedia application requirements. Thus, if the extra cost is justified, the general purpose processor GPP core can be enforced with instruction level coprocessors, coarse grain dedicated hardware, ad hoc memories or new GPP cores. In this way the final design solution is tailored to the application requirements. The proposed approach is based on three main steps: the first one is the analysis of the targeted application using efficient metrics. The second step is the selection of the appropriate architecture template according to the first step results and recommendations. The third step is the architecture generation. This approach is experimented using various image and video algorithms showing its feasibility.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 13:12:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Amor", "Nader Ben", "", "LESTER, CES" ], [ "Moullec", "Yannick Le", "", "LESTER" ], [ "Diguet", "Jean-Philippe", "", "LESTER" ], [ "Philippe", "Jean Luc", "", "LESTER" ], [ "Abid", "Mohamed", "", "CES" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
cs/0608076
J\"urg Wullschleger
J\"urg Wullschleger
Oblivious-Transfer Amplification
PhD thesis, March 2007, ETH Zurich, 125 pages. Full version of the EUROCRYPT 2007 paper. Errors in the computational part corrected
null
null
null
cs.CR
null
Oblivious transfer is a primitive of paramount importance in cryptography or, more precisely, two- and multi-party computation due to its universality. Unfortunately, oblivious transfer cannot be achieved in an unconditionally secure way for both parties from scratch. Therefore, it is a natural question what information-theoretic primitives or computational assumptions oblivious transfer can be based on. The results in our thesis are threefold. First, we present a protocol that implements oblivious transfer from a weakened oblivious transfer called universal oblivious transfer, where one of the two players may get additional information. Our reduction is about twice as efficient as previous results. Weak oblivious transfer is an even weaker form of oblivious transfer, where both players may obtain additional information about the other player's input, and where the output can contain errors. We give a new, weaker definition of weak oblivious transfer, as well as new reductions with a more detailed analysis. Finally, we carry over our results to the computational setting and show how a weak oblivious transfer that is sometimes incorrect and only mildly secure against computationally bounded adversaries can be strengthened.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 15:58:23 GMT" }, { "version": "v2", "created": "Thu, 9 Nov 2006 20:24:27 GMT" }, { "version": "v3", "created": "Thu, 12 Apr 2007 21:47:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Wullschleger", "Jürg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608077
Vinay Kolar
Vinay Kolar and Nael Abu-Ghazaleh
The Effect of Scheduling on Link Capacity in Multi-hopWireless Networks
11 pages
null
null
null
cs.NI cs.AR cs.PF
null
Existing models of Multi-Hop Wireless Networks (MHWNs) assume that interference estimators of link quality such as observed busy time predict the capacity of the links. We show that these estimators do not capture the intricate interactions that occur at the scheduling level, which have a large impact on effective link capacity under contention based MAC protocols. We observe that scheduling problems arise only among those interfering sources whose concurrent transmissions cannot be prevented by the MAC protocol's collision management mechanisms; other interfering sources can arbitrate the medium and coexist successfully. Based on this observation, we propose a methodology for rating links and show that it achieves high correlation with observed behavior in simulation. We then use this rating as part of a branch-and-bound framework based on a linear programming formulation for traffic engineering in static MHWNs and show that it achieves considerable improvement in performance relative to interference based models.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 16:45:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Kolar", "Vinay", "" ], [ "Abu-Ghazaleh", "Nael", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0608078
Aidan Thompson
A. Slepoy, A. P. Thompson, M. D. Peters
Searching for Globally Optimal Functional Forms for Inter-Atomic Potentials Using Parallel Tempering and Genetic Programming
null
null
null
null
cs.NE cs.AI
null
We develop a Genetic Programming-based methodology that enables discovery of novel functional forms for classical inter-atomic force-fields, used in molecular dynamics simulations. Unlike previous efforts in the field, that fit only the parameters to the fixed functional forms, we instead use a novel algorithm to search the space of many possible functional forms. While a follow-on practical procedure will use experimental and {\it ab inito} data to find an optimal functional form for a forcefield, we first validate the approach using a manufactured solution. This validation has the advantage of a well-defined metric of success. We manufactured a training set of atomic coordinate data with an associated set of global energies using the well-known Lennard-Jones inter-atomic potential. We performed an automatic functional form fitting procedure starting with a population of random functions, using a genetic programming functional formulation, and a parallel tempering Metropolis-based optimization algorithm. Our massively-parallel method independently discovered the Lennard-Jones function after searching for several hours on 100 processors and covering a miniscule portion of the configuration space. We find that the method is suitable for unsupervised discovery of functional forms for inter-atomic potentials/force-fields. We also find that our parallel tempering Metropolis-based approach significantly improves the optimization convergence time, and takes good advantage of the parallel cluster architecture.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 23:17:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Slepoy", "A.", "" ], [ "Thompson", "A. P.", "" ], [ "Peters", "M. D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0608079
Anna Gilbert
A. C. Gilbert, M. J. Strauss, J. A. Tropp, and R. Vershynin
Algorithmic linear dimension reduction in the l_1 norm for sparse vectors
null
null
null
null
cs.DS
null
This paper develops a new method for recovering m-sparse signals that is simultaneously uniform and quick. We present a reconstruction algorithm whose run time, O(m log^2(m) log^2(d)), is sublinear in the length d of the signal. The reconstruction error is within a logarithmic factor (in m) of the optimal m-term approximation error in l_1. In particular, the algorithm recovers m-sparse signals perfectly and noisy signals are recovered with polylogarithmic distortion. Our algorithm makes O(m log^2 (d)) measurements, which is within a logarithmic factor of optimal. We also present a small-space implementation of the algorithm. These sketching techniques and the corresponding reconstruction algorithms provide an algorithmic dimension reduction in the l_1 norm. In particular, vectors of support m in dimension d can be linearly embedded into O(m log^2 d) dimensions with polylogarithmic distortion. We can reconstruct a vector from its low-dimensional sketch in time O(m log^2(m) log^2(d)). Furthermore, this reconstruction is stable and robust under small perturbations.
[ { "version": "v1", "created": "Sat, 19 Aug 2006 01:55:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gilbert", "A. C.", "" ], [ "Strauss", "M. J.", "" ], [ "Tropp", "J. A.", "" ], [ "Vershynin", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0608080
Hao Chen
Hao Chen and Jianhua Li
Lower Bounds on the Algebraic Immunity of Boolean Functions
null
null
null
null
cs.CR
null
From the motivation of algebraic attacks to stream and block ciphers([1,2,7,13,14,15]), the concept of {\em algebraic immunity} (AI) was introduced in [21] and studied in [3,5,10,11,17,18,19,20,21]. High algebraic immunity is a necessary condition for resisting algebraic attacks. In this paper, we give some lower bounds on algebraic immunity of Boolean functions. The results are applied to give lower bounds on AI of symmetric Boolean functions and rotation symmetric Boolean functions. Some balanced rotation symmetric Boolean functions with their AI near the maximum possible value $\lceil \frac{n}{2}\rceil$ are constructed.
[ { "version": "v1", "created": "Sat, 19 Aug 2006 02:46:28 GMT" }, { "version": "v2", "created": "Sun, 27 Aug 2006 02:59:30 GMT" }, { "version": "v3", "created": "Sun, 3 Sep 2006 02:47:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Chen", "Hao", "" ], [ "Li", "Jianhua", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608081
Lane A. Hemaspaandra
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
How Hard Is Bribery in Elections?
Earlier version appears in Proc. of AAAI-06, pp. 641-646, 2006
null
null
URCS TR-2006-895
cs.GT cs.CC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the complexity of influencing elections through bribery: How computationally complex is it for an external actor to determine whether by a certain amount of bribing voters a specified candidate can be made the election's winner? We study this problem for election systems as varied as scoring protocols and Dodgson voting, and in a variety of settings regarding homogeneous-vs.-nonhomogeneous electorate bribability, bounded-size-vs.-arbitrary-sized candidate sets, weighted-vs.-unweighted voters, and succinct-vs.-nonsuccinct input specification. We obtain both polynomial-time bribery algorithms and proofs of the intractability of bribery, and indeed our results show that the complexity of bribery is extremely sensitive to the setting. For example, we find settings in which bribery is NP-complete but manipulation (by voters) is in P, and we find settings in which bribing weighted voters is NP-complete but bribing voters with individual bribe thresholds is in P. For the broad class of elections (including plurality, Borda, k-approval, and veto) known as scoring protocols, we prove a dichotomy result for bribery of weighted voters: We find a simple-to-evaluate condition that classifies every case as either NP-complete or in P.
[ { "version": "v1", "created": "Sat, 19 Aug 2006 23:24:03 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2006 21:43:43 GMT" }, { "version": "v3", "created": "Fri, 22 Aug 2008 21:22:28 GMT" } ]
2008-08-23T00:00:00
[ [ "Faliszewski", "Piotr", "" ], [ "Hemaspaandra", "Edith", "" ], [ "Hemaspaandra", "Lane A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0608082
S. M. Nazrul Alam
S. M. Nazrul Alam and Peter Marbach
Competition and Request Routing Policies in Content Delivery Networks
null
null
null
null
cs.NI
null
The role of competition and monetary benefits in the design of Content Delivery Networks (CDNs) is largely an unexplored area. In this paper, we investigate the effect of competition among the competitive web based CDNs and show that little difference in their performance may cause significant financial gain/loss. It turns out that the economy of scale effect is very significant for the success of a CDN in a competitive market. So CDN peering might be a good idea. Since performance and conforming to the service level agreement (SLA) with content providers is very important, we then focus on designing CDN from this perspective. We provide an asymptotically optimal static request routing policy for a CDN under a model where a CDN company guarantees a certain level of user latency to the content providers in the SLA.
[ { "version": "v1", "created": "Sun, 20 Aug 2006 04:00:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Alam", "S. M. Nazrul", "" ], [ "Marbach", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608083
Paul M. Aoki
Paul M. Aoki, Margaret H. Szymanski, Luke Plurkowski, James D. Thornton, Allison Woodruff, Weilie Yi
Where's the "Party" in "Multi-Party"? Analyzing the Structure of Small-Group Sociable Talk
10 pages
Proc. ACM Conf. on Computer Supported Cooperative Work, Banff, Alberta, Canada, Nov. 2006, 393-402. ACM Press.
10.1145/1180875.1180934
null
cs.HC
null
Spontaneous multi-party interaction - conversation among groups of three or more participants - is part of daily life. While automated modeling of such interactions has received increased attention in ubiquitous computing research, there is little applied research on the organization of this highly dynamic and spontaneous sociable interaction within small groups. We report here on an applied conversation analytic study of small-group sociable talk, emphasizing structural and temporal aspects that can inform computational models. In particular, we examine the mechanics of multiple simultaneous conversational floors - how participants initiate a new floor amidst an on-going floor, and how they subsequently show their affiliation with one floor over another. We also discuss the implications of these findings for the design of "smart" multi-party applications.
[ { "version": "v1", "created": "Mon, 21 Aug 2006 01:42:52 GMT" }, { "version": "v2", "created": "Thu, 14 Sep 2006 03:57:25 GMT" } ]
2007-05-23T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Szymanski", "Margaret H.", "" ], [ "Plurkowski", "Luke", "" ], [ "Thornton", "James D.", "" ], [ "Woodruff", "Allison", "" ], [ "Yi", "Weilie", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0608084
James Aspnes
Dana Angluin and James Aspnes and David Eisenstat and Eric Ruppert
The computational power of population protocols
Combined version of OPODIS 2005 and PODC 2006 papers; submitted to Distributed Computing
null
null
null
cs.CC cs.DC
null
We consider the model of population protocols introduced by Angluin et al., in which anonymous finite-state agents stably compute a predicate of the multiset of their inputs via two-way interactions in the all-pairs family of communication networks. We prove that all predicates stably computable in this model (and certain generalizations of it) are semilinear, answering a central open question about the power of the model. Removing the assumption of two-way interaction, we also consider several variants of the model in which agents communicate by anonymous message-passing where the recipient of each message is chosen by an adversary and the sender is not identified to the recipient. These one-way models are distinguished by whether messages are delivered immediately or after a delay, whether a sender can record that it has sent a message, and whether a recipient can queue incoming messages, refusing to accept new messages until it has had a chance to send out messages of its own. We characterize the classes of predicates stably computable in each of these one-way models using natural subclasses of the semilinear predicates.
[ { "version": "v1", "created": "Mon, 21 Aug 2006 23:17:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Angluin", "Dana", "" ], [ "Aspnes", "James", "" ], [ "Eisenstat", "David", "" ], [ "Ruppert", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608085
Nandakishore Santhi
Nandakishore Santhi, Alexander Vardy
A Quadratic Time-Space Tradeoff for Unrestricted Deterministic Decision Branching Programs
Withdrawn
null
null
null
cs.CC cs.DM cs.IT math.IT
null
For a decision problem from coding theory, we prove a quadratic expected time-space tradeoff of the form $\eT\eS=\Omega(\tfrac{n^2}{q})$ for $q$-way deterministic decision branching programs, where $q\geq 2$. Here $\eT$ is the expected computation time and $\eS$ is the expected space, when all inputs are equally likely. This bound is to our knowledge, the first such to show an exponential size requirement whenever $\eT = O(n^2)$. Previous exponential size tradeoffs for Boolean decision branching programs were valid for time-restricted models with $T=o(n\log_2{n})$. Proving quadratic time-space tradeoffs for unrestricted time decision branching programs has been a major goal of recent research -- this goal has already been achieved for multiple-output branching programs two decades ago. We also show the first quadratic time-space tradeoffs for Boolean decision branching programs verifying circular convolution, matrix-vector multiplication and discrete Fourier transform. Furthermore, we demonstrate a constructive Boolean decision function which has a quadratic expected time-space tradeoff in the Boolean deterministic decision branching program model. When $q$ is a constant the tradeoff results derived here for decision functions verifying various functions are order-comparable to previously known tradeoff bounds for calculating the corresponding multiple-output functions.
[ { "version": "v1", "created": "Tue, 22 Aug 2006 04:28:27 GMT" }, { "version": "v2", "created": "Wed, 17 Nov 2010 23:19:54 GMT" } ]
2020-01-21T00:00:00
[ [ "Santhi", "Nandakishore", "" ], [ "Vardy", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608086
Nandakishore Santhi
Nandakishore Santhi, Alexander Vardy
Analog Codes on Graphs
18 pages, 15 figures, Portions appeared in Proceedings of the International Symposium on Information Theory (ISIT), Yokohama, Japan, July 2003
null
null
null
cs.IT cs.DM math.IT
null
We consider the problem of transmission of a sequence of real data produced by a Nyquist sampled band-limited analog source over a band-limited analog channel, which introduces an additive white Gaussian noise. An analog coding scheme is described, which can achieve a mean-squared error distortion proportional to $(1+SNR)^{-B}$ for a bandwidth expansion factor of $B/R$, where $0 < R < 1$ is the rate of individual component binary codes used in the construction and $B \geq 1$ is an integer. Thus, over a wide range of SNR values, the proposed code performs much better than any single previously known analog coding system.
[ { "version": "v1", "created": "Tue, 22 Aug 2006 05:04:48 GMT" } ]
2007-07-16T00:00:00
[ [ "Santhi", "Nandakishore", "" ], [ "Vardy", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608087
Nandakishore Santhi
Nandakishore Santhi, Alexander Vardy
On an Improvement over R\'enyi's Equivocation Bound
8 pages, 6 figures, To be presented at the 44-th Annual Allerton Conference on Communication, Control, and Computing, September 2006
null
null
null
cs.IT cs.DM math.IT
null
We consider the problem of estimating the probability of error in multi-hypothesis testing when MAP criterion is used. This probability, which is also known as the Bayes risk is an important measure in many communication and information theory problems. In general, the exact Bayes risk can be difficult to obtain. Many upper and lower bounds are known in literature. One such upper bound is the equivocation bound due to R\'enyi which is of great philosophical interest because it connects the Bayes risk to conditional entropy. Here we give a simple derivation for an improved equivocation bound. We then give some typical examples of problems where these bounds can be of use. We first consider a binary hypothesis testing problem for which the exact Bayes risk is difficult to derive. In such problems bounds are of interest. Furthermore using the bounds on Bayes risk derived in the paper and a random coding argument, we prove a lower bound on equivocation valid for most random codes over memoryless channels.
[ { "version": "v1", "created": "Tue, 22 Aug 2006 05:56:33 GMT" } ]
2007-07-16T00:00:00
[ [ "Santhi", "Nandakishore", "" ], [ "Vardy", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608088
Petter Holme
Petter Holme, Josh Karlin, Stephanie Forrest
Radial Structure of the Internet
null
Proc. R. Soc. A 463, (2007) 1231-1246
10.1098/rspa.2007.1820
null
cs.NI physics.soc-ph
null
The structure of the Internet at the Autonomous System (AS) level has been studied by both the Physics and Computer Science communities. We extend this work to include features of the core and the periphery, taking a radial perspective on AS network structure. New methods for plotting AS data are described, and they are used to analyze data sets that have been extended to contain edges missing from earlier collections. In particular, the average distance from one vertex to the rest of the network is used as the baseline metric for investigating radial structure. Common vertex-specific quantities are plotted against this metric to reveal distinctive characteristics of central and peripheral vertices. Two data sets are analyzed using these measures as well as two common generative models (Barabasi-Albert and Inet). We find a clear distinction between the highly connected core and a sparse periphery. We also find that the periphery has a more complex structure than that predicted by degree distribution or the two generative models.
[ { "version": "v1", "created": "Tue, 22 Aug 2006 22:33:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Holme", "Petter", "" ], [ "Karlin", "Josh", "" ], [ "Forrest", "Stephanie", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
cs/0608089
Shuchin Aeron
Shuchin Aeron and Venkatesh Saligrama
Wireless ad-hoc networks: Strategies and Scaling laws for the fixed SNR regime
26 pages single column, submitted to Transactions on Information Theory
IEEE Transactions on Information Theory, Volume 53, No. 6, June 2007, pp. 2044-2059
10.1109/TIT.2007.896858
null
cs.IT math.IT
null
This paper deals with throughput scaling laws for random ad-hoc wireless networks in a rich scattering environment. We develop schemes to optimize the ratio, $\rho(n)$ of achievable network sum capacity to the sum of the point-to-point capacities of source-destinations pairs operating in isolation. For fixed SNR networks, i.e., where the worst case SNR over the source-destination pairs is fixed independent of $n$, we show that collaborative strategies yield a scaling law of $\rho(n) = {\cal O}(\frac{1}{n^{1/3}})$ in contrast to multi-hop strategies which yield a scaling law of $\rho(n) = {\cal O}(\frac{1}{\sqrt{n}})$. While, networks where worst case SNR goes to zero, do not preclude the possibility of collaboration, multi-hop strategies achieve optimal throughput. The plausible reason is that the gains due to collaboration cannot offset the effect of vanishing receive SNR. This suggests that for fixed SNR networks, a network designer should look for network protocols that exploit collaboration. The fact that most current networks operate in a fixed SNR interference limited environment provides further motivation for considering this regime.
[ { "version": "v1", "created": "Wed, 23 Aug 2006 02:02:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Aeron", "Shuchin", "" ], [ "Saligrama", "Venkatesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0608090
Gun Srijuntongsiri
Gun Srijuntongsiri and Stephen A. Vavasis
A Condition Number Analysis of a Line-Surface Intersection Algorithm
null
null
null
null
cs.NA cs.CG
null
We propose an algorithm based on Newton's method and subdivision for finding all zeros of a polynomial system in a bounded region of the plane. This algorithm can be used to find the intersections between a line and a surface, which has applications in graphics and computer-aided geometric design. The algorithm can operate on polynomials represented in any basis that satisfies a few conditions. The power basis, the Bernstein basis, and the first-kind Chebyshev basis are among those compatible with the algorithm. The main novelty of our algorithm is an analysis showing that its running is bounded only in terms of the condition number of the polynomial's zeros and a constant depending on the polynomial basis.
[ { "version": "v1", "created": "Wed, 23 Aug 2006 03:47:07 GMT" }, { "version": "v2", "created": "Mon, 22 Oct 2007 03:16:05 GMT" } ]
2007-10-22T00:00:00
[ [ "Srijuntongsiri", "Gun", "" ], [ "Vavasis", "Stephen A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0608091
Jan Van den Bussche
Floris Geerts, Peter Revesz, Jan Van den Bussche
On-line topological simplification of weighted graphs
This is the full techreport corresponding to the paper "On-line maintenance of simplified weighted graphs for efficient distance queries" in the proceedings of ACM-GIS 2006
Proceedings ACM-GIS 2006, ACM Press
null
null
cs.DS cs.DB
null
We describe two efficient on-line algorithms to simplify weighted graphs by eliminating degree-two vertices. Our algorithms are on-line in that they react to updates on the data, keeping the simplification up-to-date. The supported updates are insertions of vertices and edges; hence, our algorithms are partially dynamic. We provide both analytical and empirical evaluations of the efficiency of our approaches. Specifically, we prove an O(log n) upper bound on the amortized time complexity of our maintenance algorithms, with n the number of insertions.
[ { "version": "v1", "created": "Wed, 23 Aug 2006 20:08:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Geerts", "Floris", "" ], [ "Revesz", "Peter", "" ], [ "Bussche", "Jan Van den", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0608092
Danny Dolev
Ariel Daliot and Danny Dolev
Self-Stabilizing Byzantine Pulse Synchronization
An updated version. The original version appeared as TR-2005-84, The Hebrew university, Aug. 2005
null
null
TR-2005-84
cs.DC
null
The ``Pulse Synchronization'' problem can be loosely described as targeting to invoke a recurring distributed event as simultaneously as possible at the different nodes and with a frequency that is as regular as possible. This target becomes surprisingly subtle and difficult to achieve when facing both transient and permanent failures. In this paper we present an algorithm for pulse synchronization that self-stabilizes while at the same time tolerating a permanent presence of Byzantine faults. The Byzantine nodes might incessantly try to de-synchronize the correct nodes. Transient failures might throw the system into an arbitrary state in which correct nodes have no common notion what-so-ever, such as time or round numbers, and can thus not infer anything from their own local states upon the state of other correct nodes. The presented algorithm grants nodes the ability to infer that eventually all correct nodes will invoke their pulses within a very short time interval of each other and will do so regularly. Pulse synchronization has previously been shown to be a powerful tool for designing general self-stabilizing Byzantine algorithms and is hitherto the only method that provides for the general design of efficient practical protocols in the confluence of these two fault models. The difficulty, in general, to design any algorithm in this fault model may be indicated by the remarkably few algorithms resilient to both fault models. The few published self-stabilizing Byzantine algorithms are typically complicated and sometimes converge from an arbitrary initial state only after exponential or super exponential time.
[ { "version": "v1", "created": "Thu, 24 Aug 2006 16:07:07 GMT" }, { "version": "v2", "created": "Fri, 25 Aug 2006 03:24:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Daliot", "Ariel", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608093
Alexander Evako
Alexander Evako
Connection between continuous and digital n-manifolds and the Poincare conjecture
39 pages, 26 figures
null
null
null
cs.DM cs.CV math.AT
null
We introduce LCL covers of closed n-dimensional manifolds by n-dimensional disks and study their properties. We show that any LCL cover of an n-dimensional sphere can be converted to the minimal LCL cover, which consists of 2n+2 disks. We prove that an LCL collection of n-disks is a cover of a continuous n-sphere if and only if the intersection graph of this collection is a digital n-sphere. Using a link between LCL covers of closed continuous n-manifolds and digital n-manifolds, we find conditions where a continuous closed three-dimensional manifold is the three-dimensional sphere. We discuss a connection between the classification problems for closed continuous three-dimensional manifolds and digital three-manifolds.
[ { "version": "v1", "created": "Thu, 24 Aug 2006 17:45:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Evako", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" } ]
cs/0608094
Hector Zenil
Hector Zenil
On Universality in Real Computation
Paper in French. 10 pages. Forthcoming a detailed English version
null
null
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Models of computation operating over the real numbers and computing a larger class of functions compared to the class of general recursive functions invariably introduce a non-finite element of infinite information encoded in an arbitrary non-computable number or non-recursive function. In this paper we show that Turing universality is only possible at every Turing degree but not over all, in that sense universality at the first level is elegantly well defined while universality at higher degrees is at least ambiguous. We propose a concept of universal relativity and universal jump between levels in the arithmetical and analytical hierarchy.
[ { "version": "v1", "created": "Thu, 24 Aug 2006 21:21:21 GMT" }, { "version": "v2", "created": "Mon, 28 Aug 2006 02:18:35 GMT" }, { "version": "v3", "created": "Sun, 3 Dec 2006 01:50:58 GMT" }, { "version": "v4", "created": "Sun, 11 Feb 2007 22:06:45 GMT" }, { "version": "v5", "created": "Tue, 1 Jun 2010 02:03:51 GMT" }, { "version": "v6", "created": "Fri, 17 Dec 2010 01:25:29 GMT" } ]
2010-12-20T00:00:00
[ [ "Zenil", "Hector", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608095
Markus Mueller
Markus Mueller
Stationary Algorithmic Probability
13 pages, 5 figures. Added an example of a positive recurrent computer set
Theoretical Computer Science 411 pp. 113-130 (2010)
null
null
cs.IT cs.CC math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kolmogorov complexity and algorithmic probability are defined only up to an additive resp. multiplicative constant, since their actual values depend on the choice of the universal reference computer. In this paper, we analyze a natural approach to eliminate this machine-dependence. Our method is to assign algorithmic probabilities to the different computers themselves, based on the idea that "unnatural" computers should be hard to emulate. Therefore, we study the Markov process of universal computers randomly emulating each other. The corresponding stationary distribution, if it existed, would give a natural and machine-independent probability measure on the computers, and also on the binary strings. Unfortunately, we show that no stationary distribution exists on the set of all computers; thus, this method cannot eliminate machine-dependence. Moreover, we show that the reason for failure has a clear and interesting physical interpretation, suggesting that every other conceivable attempt to get rid of those additive constants must fail in principle, too. However, we show that restricting to some subclass of computers might help to get rid of some amount of machine-dependence in some situations, and the resulting stationary computer and string probabilities have beautiful properties.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 00:44:45 GMT" }, { "version": "v2", "created": "Thu, 14 Sep 2006 19:52:23 GMT" }, { "version": "v3", "created": "Thu, 5 Oct 2006 13:38:47 GMT" }, { "version": "v4", "created": "Wed, 8 Oct 2008 23:01:26 GMT" }, { "version": "v5", "created": "Wed, 4 Feb 2009 21:59:43 GMT" } ]
2010-03-29T00:00:00
[ [ "Mueller", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
cs/0608096
Danny Dolev
Ariel Daliot, Danny Dolev and Hanna Parnas
Linear-time Self-stabilizing Byzantine Clock Synchronization
This is a corrected version. The original paper appeared in OPODIS'03
Proc. of 7th International Conference on Principles of Distributed Systems (OPODIS'03 La Martinique, France), December, 2003
null
null
cs.DC
null
Clock synchronization is a very fundamental task in distributed system. It thus makes sense to require an underlying clock synchronization mechanism to be highly fault-tolerant. A self-stabilizing algorithm seeks to attain synchronization once lost; a Byzantine algorithm assumes synchronization is never lost and focuses on containing the influence of the permanent presence of faulty nodes. There are efficient self-stabilizing solutions for clock synchronization as well as efficient solutions that are resilient to Byzantine faults. In contrast, to the best of our knowledge there is no practical solution that is self-stabilizing while tolerating the permanent presence of Byzantine nodes. We present the first linear-time self-stabilizing Byzantine clock synchronization algorithm. Our deterministic clock synchronization algorithm is based on the observation that all clock synchronization algorithms require events for exchanging clock values and re-synchronizing the clocks to within safe bounds. These events usually need to happen synchronously at the different nodes. In classic Byzantine algorithms this is fulfilled or aided by having the clocks initially close to each other and thus the actual clock values can be used for synchronizing the events. This implies that clock values cannot differ arbitrarily, which necessarily renders these solutions to be non-stabilizing. Our scheme suggests using an underlying distributed pulse synchronization module that is uncorrelated to the clock values.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 03:11:28 GMT" } ]
2007-05-23T00:00:00
[ [ "Daliot", "Ariel", "" ], [ "Dolev", "Danny", "" ], [ "Parnas", "Hanna", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608097
Angelo B. Mingarelli
Angelo B. Mingarelli
A study of fuzzy and many-valued logics in cellular automata
Corrected version: Tables 1, 3 and 4 have a missing left-most diagonal, thus resulting in misleading data output. Minor typos in the text corrected as a result. Note that all table values are truncations of actual values
J. Cellular Automata, 1 (3) (2006), 233-252
null
null
cs.LO cs.CC
null
In this paper we provide an analytical study of the theory of multi-valued and fuzzy cellular automata where the fuzziness appears as the result of the application of an underlying multi-valued or continuous logic as opposed to standard logic as used conventionally. Using the disjunctive normal form of any one of the 255 ECA's so defined, we modify the underlying logic structure and redefine the ECA within the framework of this new logic. The idea here is to show that the evolution of space-time diagrams of ECA's under even a probabilistic logic can exhibit non-chaotic behavior. This is looked at specifically for Probabilistic Rule 110, in contrast with Boolean Rule 110 which is known to be capable of universal computation.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 09:21:49 GMT" }, { "version": "v2", "created": "Mon, 28 May 2007 08:41:37 GMT" } ]
2007-06-13T00:00:00
[ [ "Mingarelli", "Angelo B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608098
Arvind Parthasarathy
Arvind Parthasarathy
Improved Content Based Image Watermarking
24 pages
null
null
null
cs.CR
null
This paper presents a robust and transparent scheme of watermarking that exploits the human visual systems' sensitivity to frequency, along with local image characteristics obtained from the spatial domain. The underlying idea is generating a visual mask based on the visual systems' perception of image content. This mask is used to embed a decimal sequence while keeping its amplitude below the distortion sensitivity of the image pixel. We consider texture, luminance, corner and the edge information in the image to generate a mask that makes the addition of the watermark imperceptible to the human eye.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 12:55:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Parthasarathy", "Arvind", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0608099
Tomi Janhunen
Tomi Janhunen and Emilia Oikarinen
Automated verification of weak equivalence within the SMODELS system
48 pages, 7 figures, 2 tables
null
null
null
cs.AI cs.LO
null
In answer set programming (ASP), a problem at hand is solved by (i) writing a logic program whose answer sets correspond to the solutions of the problem, and by (ii) computing the answer sets of the program using an answer set solver as a search engine. Typically, a programmer creates a series of gradually improving logic programs for a particular problem when optimizing program length and execution time on a particular solver. This leads the programmer to a meta-level problem of ensuring that the programs are equivalent, i.e., they give rise to the same answer sets. To ease answer set programming at methodological level, we propose a translation-based method for verifying the equivalence of logic programs. The basic idea is to translate logic programs P and Q under consideration into a single logic program EQT(P,Q) whose answer sets (if such exist) yield counter-examples to the equivalence of P and Q. The method is developed here in a slightly more general setting by taking the visibility of atoms properly into account when comparing answer sets. The translation-based approach presented in the paper has been implemented as a translator called lpeq that enables the verification of weak equivalence within the smodels system using the same search engine as for the search of models. Our experiments with lpeq and smodels suggest that establishing the equivalence of logic programs in this way is in certain cases much faster than naive cross-checking of answer sets.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 13:12:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Janhunen", "Tomi", "" ], [ "Oikarinen", "Emilia", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608100
Peter Turney
Peter D. Turney (National Research Council of Canada)
Similarity of Semantic Relations
related work available at http://purl.org/peter.turney/
Computational Linguistics, (2006), 32(3), 379-416
10.1162/coli.2006.32.3.379
NRC-48775
cs.CL cs.IR cs.LG
null
There are at least two kinds of similarity. Relational similarity is correspondence between relations, in contrast with attributional similarity, which is correspondence between attributes. When two words have a high degree of attributional similarity, we call them synonyms. When two pairs of words have a high degree of relational similarity, we say that their relations are analogous. For example, the word pair mason:stone is analogous to the pair carpenter:wood. This paper introduces Latent Relational Analysis (LRA), a method for measuring relational similarity. LRA has potential applications in many areas, including information extraction, word sense disambiguation, and information retrieval. Recently the Vector Space Model (VSM) of information retrieval has been adapted to measuring relational similarity, achieving a score of 47% on a collection of 374 college-level multiple-choice word analogy questions. In the VSM approach, the relation between a pair of words is characterized by a vector of frequencies of predefined patterns in a large corpus. LRA extends the VSM approach in three ways: (1) the patterns are derived automatically from the corpus, (2) the Singular Value Decomposition (SVD) is used to smooth the frequency data, and (3) automatically generated synonyms are used to explore variations of the word pairs. LRA achieves 56% on the 374 analogy questions, statistically equivalent to the average human score of 57%. On the related problem of classifying semantic relations, LRA achieves similar gains over the VSM.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 14:35:11 GMT" } ]
2020-08-20T00:00:00
[ [ "Turney", "Peter D.", "", "National Research Council of Canada" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0608101
Gregory Gutin
G. Gutin, A. Rafiey, A. Yeo
Minimum Cost Homomorphisms to Semicomplete Bipartite Digraphs
null
null
null
null
cs.DM cs.CC
null
For digraphs $D$ and $H$, a mapping $f: V(D)\dom V(H)$ is a homomorphism of $D$ to $H$ if $uv\in A(D)$ implies $f(u)f(v)\in A(H).$ If, moreover, each vertex $u \in V(D)$ is associated with costs $c_i(u), i \in V(H)$, then the cost of the homomorphism $f$ is $\sum_{u\in V(D)}c_{f(u)}(u)$. For each fixed digraph $H$, we have the {\em minimum cost homomorphism problem for} $H$. The problem is to decide, for an input graph $D$ with costs $c_i(u),$ $u \in V(D), i\in V(H)$, whether there exists a homomorphism of $D$ to $H$ and, if one exists, to find one of minimum cost. Minimum cost homomorphism problems encompass (or are related to) many well studied optimization problems. We describe a dichotomy of the minimum cost homomorphism problem for semicomplete multipartite digraphs $H$. This solves an open problem from an earlier paper. To obtain the dichotomy of this paper, we introduce and study a new notion, a $k$-Min-Max ordering of digraphs.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 17:47:34 GMT" } ]
2007-05-23T00:00:00
[ [ "Gutin", "G.", "" ], [ "Rafiey", "A.", "" ], [ "Yeo", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608102
Jochen Mundinger
Jochen Mundinger, Jean-Yves Le Boudec
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
17 pages, 6 figures
null
null
LCA-REPORT-2006-009
cs.PF
null
The application of decentralized reputation systems is a promising approach to ensure cooperation and fairness, as well as to address random failures and malicious attacks in Mobile Ad-Hoc Networks. However, they are potentially vulnerable to liars. With our work, we provide a first step to analyzing robustness of a reputation system based on a deviation test. Using a mean-field approach to our stochastic process model, we show that liars have no impact unless their number exceeds a certain threshold (phase transition). We give precise formulae for the critical values and thus provide guidelines for an optimal choice of parameters.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 18:12:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Mundinger", "Jochen", "" ], [ "Boudec", "Jean-Yves Le", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0608103
Miroslaw Truszczynski
V.W. Marek, I. Niemela and M. Truszczynski]
Logic programs with monotone abstract constraint atoms
33 pages
null
null
null
cs.AI cs.LO
null
We introduce and study logic programs whose clauses are built out of monotone constraint atoms. We show that the operational concept of the one-step provability operator generalizes to programs with monotone constraint atoms, but the generalization involves nondeterminism. Our main results demonstrate that our formalism is a common generalization of (1) normal logic programming with its semantics of models, supported models and stable models, (2) logic programming with weight atoms (lparse programs) with the semantics of stable models, as defined by Niemela, Simons and Soininen, and (3) of disjunctive logic programming with the possible-model semantics of Sakama and Inoue.
[ { "version": "v1", "created": "Fri, 25 Aug 2006 18:24:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Marek", "V. W.", "" ], [ "Niemela", "I.", "" ], [ "Truszczynski]", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608104
Uday Khedker
Uday Khedker, Amitabha Sanyal, and Amey Karkare
Heap Reference Analysis Using Access Graphs
Accepted for printing by ACM TOPLAS. This version incorporates referees' comments
ACM TOPLAS, 30(1), 2007
10.1145/1290520.1290521
null
cs.PL cs.SE
null
Despite significant progress in the theory and practice of program analysis, analysing properties of heap data has not reached the same level of maturity as the analysis of static and stack data. The spatial and temporal structure of stack and static data is well understood while that of heap data seems arbitrary and is unbounded. We devise bounded representations which summarize properties of the heap data. This summarization is based on the structure of the program which manipulates the heap. The resulting summary representations are certain kinds of graphs called access graphs. The boundedness of these representations and the monotonicity of the operations to manipulate them make it possible to compute them through data flow analysis. An important application which benefits from heap reference analysis is garbage collection, where currently liveness is conservatively approximated by reachability from program variables. As a consequence, current garbage collectors leave a lot of garbage uncollected, a fact which has been confirmed by several empirical studies. We propose the first ever end-to-end static analysis to distinguish live objects from reachable objects. We use this information to make dead objects unreachable by modifying the program. This application is interesting because it requires discovering data flow information representing complex semantics. In particular, we discover four properties of heap data: liveness, aliasing, availability, and anticipability. Together, they cover all combinations of directions of analysis (i.e. forward and backward) and confluence of information (i.e. union and intersection). Our analysis can also be used for plugging memory leaks in C/C++ languages.
[ { "version": "v1", "created": "Mon, 28 Aug 2006 11:15:00 GMT" }, { "version": "v2", "created": "Wed, 22 Nov 2006 06:37:51 GMT" }, { "version": "v3", "created": "Sat, 1 Sep 2007 14:52:17 GMT" } ]
2013-04-25T00:00:00
[ [ "Khedker", "Uday", "" ], [ "Sanyal", "Amitabha", "" ], [ "Karkare", "Amey", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0608105
Hui Guo
Hui Guo, Ying Jiang
Application Layer Definition and Analyses of Controller Area Network Bus for Wire Harness Assembly Machine
6 pages, 2 figures, 4 tables
null
null
null
cs.RO cs.NI
null
With the feature of multi-master bus access, nondestructive contention-based arbitration and flexible configuration, Controller Area Network (CAN) bus is applied into the control system of Wire Harness Assembly Machine (WHAM). To accomplish desired goal, the specific features of the CAN bus is analyzed by compared with other field buses and the functional performances in the CAN bus system of WHAM is discussed. Then the application layer planning of CAN bus for dynamic priority is presented. The critical issue for the use of CAN bus system in WHAM is the data transfer rate between different nodes. So processing efficient model is introduced to assist analyzing data transfer procedure. Through the model, it is convenient to verify the real time feature of the CAN bus system in WHAM.
[ { "version": "v1", "created": "Mon, 28 Aug 2006 12:42:38 GMT" }, { "version": "v2", "created": "Thu, 31 Aug 2006 13:40:42 GMT" } ]
2007-05-23T00:00:00
[ [ "Guo", "Hui", "" ], [ "Jiang", "Ying", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608106
Philippe Moser
Philippe Moser
Lp Computable Functions and Fourier Series
corrected abstract
null
null
null
cs.CC
null
This paper studies how well computable functions can be approximated by their Fourier series. To this end, we equip the space of Lp-computable functions (computable Lebesgue integrable functions) with a size notion, by introducing Lp-computable Baire categories. We show that Lp-computable Baire categories satisfy the following three basic properties. Singleton sets {f} (where f is Lp-computable) are meager, suitable infinite unions of meager sets are meager, and the whole space of Lp-computable functions is not meager. We give an alternative characterization of meager sets via Banach Mazur games. We study the convergence of Fourier series for Lp-computable functions and show that whereas for every p>1, the Fourier series of every Lp-computable function f converges to f in the Lp norm, the set of L1-computable functions whose Fourier series does not diverge almost everywhere is meager.
[ { "version": "v1", "created": "Mon, 28 Aug 2006 12:50:36 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 09:03:15 GMT" }, { "version": "v3", "created": "Fri, 11 May 2007 12:44:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Moser", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0608107
Fionn Murtagh
Fionn Murtagh
The Haar Wavelet Transform of a Dendrogram
38 pp, 8 figures. Forthcoming in Journal of Classification
Journal of Classification, 24, 3-32, 2007
10.1007/s00357-007-0007-9
null
cs.IR
null
We describe a new wavelet transform, for use on hierarchies or binary rooted trees. The theoretical framework of this approach to data analysis is described. Case studies are used to further exemplify this approach. A first set of application studies deals with data array smoothing, or filtering. A second set of application studies relates to hierarchical tree condensation. Finally, a third study explores the wavelet decomposition, and the reproducibility of data sets such as text, including a new perspective on the generation or computability of such data objects.
[ { "version": "v1", "created": "Mon, 28 Aug 2006 17:05:07 GMT" }, { "version": "v2", "created": "Sat, 10 Feb 2007 21:09:45 GMT" }, { "version": "v3", "created": "Mon, 19 Feb 2007 20:33:37 GMT" } ]
2011-06-14T00:00:00
[ [ "Murtagh", "Fionn", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
cs/0608108
Nicolas Brodu
Nicolas Brodu
Spherical Indexing for Neighborhood Queries
9 pages, 10 figures. The source code is available at http://nicolas.brodu.free.fr/en/programmation/neighand/index.html
null
null
null
cs.DS cs.CG
null
This is an algorithm for finding neighbors when the objects can freely move and have no predefined position. The query consists in finding neighbors for a center location and a given radius. Space is discretized in cubic cells. This algorithm introduces a direct spherical indexing that gives the list of all cells making up the query sphere, for any radius and any center location. It can additionally take in account both cyclic and non-cyclic regions of interest. Finding only the K nearest neighbors naturally benefits from the spherical indexing by minimally running through the sphere from center to edge, and reducing the maximum distance when K neighbors have been found.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 00:12:55 GMT" } ]
2007-05-23T00:00:00
[ [ "Brodu", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0608109
Michael Hohensee
Michael Hohensee
Realistic Boundary Conditions for Ad Hoc Network Node Mobility Models and a New Approach to the Random Waypoint Model
12 pages
null
null
null
cs.NI
null
In this paper, we examine the cause of the border effect observed in many mobility models used to construct simulations of ad hoc networking protocol performance. We specify conditions under which a node mobility model must produce spatial mobile node distribution functions that obey the diffusion equation. In particular demonstrate that these conditions are satisfied by the random direction (RD) model. We show that it is possible to construct mobility models that attain uniform steady-state distributions without resorting to reflection or ``wrapping'' of nodes at the border of a test region. Finally, we show that the random waypoint (RWP) model may be reproduced by the application of a ``volume rule'' to an RD model. This volume rule violates the assumptions that lead to the diffusion equation. We suggest a generalization of the RWP model that can provide more uniform mobile node distributions.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 16:06:53 GMT" } ]
2009-09-29T00:00:00
[ [ "Hohensee", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0608110
Robert Colvin
Robert Colvin, Ian J. Hayes and Paul Strooper
Calculating modules in contextual logic program refinement
null
null
null
null
cs.LO
null
The refinement calculus for logic programs is a framework for deriving logic programs from specifications. It is based on a wide-spectrum language that can express both specifications and code, and a refinement relation that models the notion of correct implementation. In this paper we extend and generalise earlier work on contextual refinement. Contextual refinement simplifies the refinement process by abstractly capturing the context of a subcomponent of a program, which typically includes information about the values of the free variables. This paper also extends and generalises module refinement. A module is a collection of procedures that operate on a common data type; module refinement between a specification module A and an implementation module C allows calls to the procedures of A to be systematically replaced with calls to the corresponding procedures of C. Based on the conditions for module refinement, we present a method for calculating an implementation module from a specification module. Both contextual and module refinement within the refinement calculus have been generalised from earlier work and the results are presented in a unified framework.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 05:31:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Colvin", "Robert", "" ], [ "Hayes", "Ian J.", "" ], [ "Strooper", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0608111
Ali Mesbah
Ali Mesbah, Arie van Deursen
An Architectural Style for Ajax
2nd revision: references ordered, images resized, typos
Proceedings of the 6th Working IEEE/IFIP Conference on Software Architecture (WICSA'07). IEEE Computer Society, 2007
10.1109/WICSA.2007.7
TUD-SERG-2006-016
cs.SE
null
A new breed of web application, dubbed AJAX, is emerging in response to a limited degree of interactivity in large-grain stateless Web interactions. At the heart of this new approach lies a single page interaction model that facilitates rich interactivity. We have studied and experimented with several AJAX frameworks trying to understand their architectural properties. In this paper, we summarize three of these frameworks and examine their properties and introduce the SPIAR architectural style. We describe the guiding software engineering principles and the constraints chosen to induce the desired properties. The style emphasizes user interface component development, and intermediary delta-communication between client/server components, to improve user interactivity and ease of development. In addition, we use the concepts and principles to discuss various open issues in AJAX frameworks and application development.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 10:10:32 GMT" }, { "version": "v2", "created": "Mon, 2 Oct 2006 13:10:16 GMT" } ]
2016-11-18T00:00:00
[ [ "Mesbah", "Ali", "" ], [ "van Deursen", "Arie", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0608112
Benoit Hudzia
B. Hudzia, L. McDermott, T.N. Illahi and M-T. Kechadi
Entity Based Peer-to-Peer in a Data Grid Environment
null
B. Hudzia, L. McDermott, T.N. Illahi, and M-T. Kechadi, "Entity Based Peer-to-Peer in a Data Grid Environment", The 17th IMACS World Congress Scientific Computation, Applied Mathematics and Simulation, Paris, France, July, 11-15, 2005
null
null
cs.DC
null
During the last decade there has been a huge interest in Grid technologies, and numerous Grid projects have been initiated with various visions of the Grid. While all these visions have the same goal of resource sharing, they differ in the functionality that a Grid supports, the grid characterisation, programming environments, etc. In this paper we present a new Grid system dedicated to deal with data issues, called DGET (Data Grid Environment and Tools). DGET is characterized by its peer-to-peer communication system and entity-based architecture, therefore, taking advantage of the main functionality of both systems; P2P and Grid. DGET is currently under development and a prototype implementing the main components is in its first phase of testing. In this paper we limit our description to the system architectural features and to the main differences with other systems.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 11:58:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "B.", "" ], [ "McDermott", "L.", "" ], [ "Illahi", "T. N.", "" ], [ "Kechadi", "M-T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608113
Benoit Hudzia
B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi
A Java Based Architecture of P2P-Grid Middleware
null
B. Hudzia, T. N. Ellahi, L. McDermott, T. Kechadi, 'A Java Based Architecture of P2P-Grid Middleware', The 2006 International Conference on Parallel and Distributed Processing Techniques and Applications, June 26-29, 2006, Las Vegas, USA
null
null
cs.DC
null
During the last decade there has been a huge interest in Grid technologies, and numerous Grid projects have been initiated with various visions of the Grid. While all these visions have the same goal of resource sharing, they differ in the functionality that a Grid supports, characterization, programming environments, etc. We present a new Grid system dedicated to dealing with data issues, called DGET (Data Grid Environment and Tools). DGET is characterized by its peerto- peer communication system and entity-based architecture, therefore, taking advantage of the main functionality of both systems; P2P and Grid. DGET is currently under development and a prototype implementing the main components is in its first phase of testing. In this paper we limit our description to the system architectural features and to the main differences with other systems. Keywords: Grid Computing, Peer to Peer, Peer to Peer Grid
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:11:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "B.", "" ], [ "Ellahi", "T. N.", "" ], [ "McDermott", "L.", "" ], [ "Kechadi", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608114
Benoit Hudzia
Benoit Hudzia and Serge Petiton
Reliable multicast fault tolerant MPI in the Grid environment
null
Benoit Hudzia and Serge Petiton, "Reliable multicast fault tolerant MPI in the Grid environment", International Conference GRIDnet, october 2004
null
null
cs.DC
null
Grid environments have recently been developed with low stretch and overheads that increase with the logarithm of the number of nodes in the system. Getting and sending data to/from a large numbers of nodes is gaining importance due to an increasing number of independent data providers and the heterogeneity of the network/Grid. One of the key challenges is to achieve a balance between low bandwidth consumption and good reliability. In this paper we present an implementation of a reliable multicast protocol over a fault tolerant MPI: MPICHV2. It can provide one way to solve the problem of transferring large chunks of data between applications running on a grid with limited network links. We first show that we can achieve similar performance as the MPICH-P4 implementation by using multicast with data compression in a cluster. Next, we provide a theoretical cluster organization and GRID network architecture to harness the performance provided by using multicast. Finally, we present the conclusion and future work.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:14:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Hudzia", "Benoit", "" ], [ "Petiton", "Serge", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608115
Leonid Litinskii
Leonid B. Litinskii, Dmitry E. Romanov
Neural Network Clustering Based on Distances Between Objects
7 pages,4 figures, presentation on ICANN (Athens, Greece, 2006)
null
null
null
cs.CV cs.NE
null
We present an algorithm of clustering of many-dimensional objects, where only the distances between objects are used. Centers of classes are found with the aid of neuron-like procedure with lateral inhibition. The result of clustering does not depend on starting conditions. Our algorithm makes it possible to give an idea about classes that really exist in the empirical data. The results of computer simulations are presented.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:24:37 GMT" } ]
2007-05-23T00:00:00
[ [ "Litinskii", "Leonid B.", "" ], [ "Romanov", "Dmitry E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
cs/0608116
Benoit Hudzia
T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi
Transparent Migration of Multi-Threaded Applications on a Java Based Grid
null
T. N. Ellahi, B. Hudzia, L. McDermott, T. Kechadi, Transparent Migration of Multi-Threaded Applications on a Java Based Grid, The IASTED International Conference on Web Technologies, Applications, and Services (WTAS 2006), July 17-19, 2006, Alberta, Canada
null
null
cs.DC
null
Grid computing has enabled pooling a very large number of heterogeneous resource administered by different security domains. Applications are dynamically deployed on the resources available at the time. Dynamic nature of the resources and applications requirements makes needs the grid middleware to support the ability of migrating a running application to a different resource. Especially, Grid applications are typically long running and thus stoping them and starting them from scratch is not a feasible option. This paper presents an overview of migration support in a java based grid middleware called DGET. Migration support in DGET includes multi-threaded migration and asynchronous migration as well.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 13:29:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Ellahi", "T. N.", "" ], [ "Hudzia", "B.", "" ], [ "McDermott", "L.", "" ], [ "Kechadi", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0608117
Chih-Chun Wang
Chih-Chun Wang (Purdue University)
Code Annealing and the Suppressing Effect of the Cyclically Lifted LDPC Code Ensemble
To appear in the Proc. 2006 IEEE Information Theory Workshop, Chengdu, China
null
null
null
cs.IT math.IT
null
Code annealing, a new method of designing good codes of short block length, is proposed, which is then concatenated with cyclic lifting to create finite codes of low frame error rate (FER) error floors without performance outliers. The stopping set analysis is performed on the cyclically lifted code ensemble assuming uniformly random lifting sequences, and the suppressing effect/weight of the cyclic lifting is identified for the first time, based on which the ensemble FER error floor can be analytically determined and a scaling law is derived. Both the first-order and high-order suppressing effects are discussed and quantified by different methods including the explicit expression, an algorithmic upper bound, and an algebraic lower bound. The mismatch between the suppressing weight and the stopping distances explains the dramatic performance discrepancy among different cyclically lifted codes when the underlying base codes have degree 2 variable nodes or not. For the former case, a degree augmentation method is further introduced to mitigate this metric mismatch, and a systematic method of constructing irregular codes of low FER error floors is presented. Both regular and irregular codes of very low FER error floors are reported, for which the improvement factor ranges from 10^6-10^4 when compared to the classic graph-based code ensembles.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 14:10:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "", "Purdue University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]