id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
cs/0703070
Paul Fodor
Paul Fodor
Flexible Audio Streams
null
null
null
null
cs.HC
null
Tremendous research effort was invested in audio browsers and machine learning techniques to decode the structure of Web pages in order to put them into an audio format. In this paper, we address a simpler and efficient solution for the creation of an audio browser of VOICEXML generated from RSS/Atom stream feeds. We developed a multimodal (audio and graphical) portal application that offers RSS/Atom feeds. By utilizing sing our system, the user can interact using voice or graphic commands, listen and watch digital content, such as news, blogs feeds, podcasts, and even access email and personal schedules. The portal system permits the use of security credentials (user/password authentication) to collect secure RSS/Atom stream in the multimodal browser to connect the user to specific personal services. A series experiments have been conducted to evaluate the performance of the RSS reader and navigator. Our system is extremely beneficial for a wide range of applications, from interfaces for the visual impaired users to browsers for mobile telephonic interfaces.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 00:00:06 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 15:44:51 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 19:04:48 GMT" } ]
2011-11-09T00:00:00
[ [ "Fodor", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
cs/0703071
Paul Fodor
Paul Fodor
Automatic Annotation of XHTML Pages with Audio Components
null
null
null
null
cs.OH
null
In this paper we present Deiush, a multimodal system for browsing hypertext Web documents. The Deiush system is based on our novel approach to automatically annotate hypertext Web documents (i.e. XHTML pages) with browsable audio components. It combines two key technologies: (1) middleware automatic separation of Web documents through structural and semantic analysis which is annotated with audio components, transforming them into XHTML+VoiceXML format to represent multimodal dialog; and (2) Opera Browser, an already standardized browser which we adopt as an interface of the XHTML+VoiceXML output of annotating. This paper describes the annotation technology of Deiush and presents an initial system evaluation.
[ { "version": "v1", "created": "Wed, 14 Mar 2007 23:43:30 GMT" }, { "version": "v2", "created": "Tue, 27 Mar 2007 15:45:56 GMT" }, { "version": "v3", "created": "Wed, 2 May 2007 19:03:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0703072
Paul Fodor
Paul Fodor
Domain Directed Dialogs for Decision Processes
null
null
null
null
cs.OH
null
The search for a standardized optimum way to communicate using natural language dialog has involved a lot of research. However, due to the diversity of communication domains, we think that this is extremely difficult to achieve and different dialogue management techniques should be applied for different situations. Our work presents the basis of a communication mechanism that supports decision processes, is based on decision trees, and minimizes the number of steps (turn-takes) in the dialogue. The initial dialog workflow is automatically generated and the user's interaction with the system can also change the decision tree and create new dialog paths with optimized cost. The decision tree represents the chronological ordering of the actions (via the parent-child relationship) and uses an object frame to represent the information state (capturing the notion of context). This paper presents our framework, the formalism for interaction and dialogue, and an evaluation of the system compared to relevant dialog planning frameworks (i.e. finite state diagrams, frame-based, information state and planning-based dialogue systems).
[ { "version": "v1", "created": "Thu, 15 Mar 2007 00:08:50 GMT" }, { "version": "v2", "created": "Thu, 22 Mar 2007 14:54:41 GMT" }, { "version": "v3", "created": "Tue, 27 Mar 2007 15:41:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Fodor", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0703073
Mine Antoine
Antoine Min\'e (LIENS)
A New Numerical Abstract Domain Based on Difference-Bound Matrices
(update: reversed author first and last names)
Program As Data Objects II (PADOII) (05/2001) 155-172
null
null
cs.PL
null
This paper presents a new numerical abstract domain for static analysis by abstract interpretation. This domain allows us to represent invariants of the form (x-y<=c) and (+/-x<=c), where x and y are variables values and c is an integer or real constant. Abstract elements are represented by Difference-Bound Matrices, widely used by model-checkers, but we had to design new operators to meet the needs of abstract interpretation. The result is a complete lattice of infinite height featuring widening, narrowing and common transfer functions. We focus on giving an efficient O(n2) representation and graph-based O(n3) algorithms - where n is the number of variables|and claim that this domain always performs more precisely than the well-known interval domain. To illustrate the precision/cost tradeoff of this domain, we have implemented simple abstract interpreters for toy imperative and parallel languages which allowed us to prove some non-trivial algorithms correct.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 05:44:24 GMT" }, { "version": "v2", "created": "Fri, 16 Mar 2007 08:59:48 GMT" } ]
2016-08-14T00:00:00
[ [ "Miné", "Antoine", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0703074
Mine Antoine
Antoine Min\'e (LIENS)
Field-Sensitive Value Analysis of Embedded C Programs with Union Types and Pointer Arithmetics
(update: reversed author first and last names)
Languages, Compilers, and Tools for Embedded Systems (LCTES) (06/2006) 54-63
null
null
cs.PL
null
We propose a memory abstraction able to lift existing numerical static analyses to C programs containing union types, pointer casts, and arbitrary pointer arithmetics. Our framework is that of a combined points-to and data-value analysis. We abstract the contents of compound variables in a field-sensitive way, whether these fields contain numeric or pointer values, and use stock numerical abstract domains to find an overapproximation of all possible memory states--with the ability to discover relationships between variables. A main novelty of our approach is the dynamic mapping scheme we use to associate a flat collection of abstract cells of scalar type to the set of accessed memory locations, while taking care of byte-level aliases - i.e., C variables with incompatible types allocated in overlapping memory locations. We do not rely on static type information which can be misleading in C programs as it does not account for all the uses a memory zone may be put to. Our work was incorporated within the Astr\'{e}e static analyzer that checks for the absence of run-time-errors in embedded, safety-critical, numerical-intensive software. It replaces the former memory domain limited to well-typed, union-free, pointer-cast free data-structures. Early results demonstrate that this abstraction allows analyzing a larger class of C programs, without much cost overhead.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 05:46:39 GMT" }, { "version": "v2", "created": "Fri, 16 Mar 2007 08:58:00 GMT" } ]
2016-08-14T00:00:00
[ [ "Miné", "Antoine", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0703075
Mine Antoine
Antoine Min\'e (LIENS)
A Few Graph-Based Relational Numerical Abstract Domains
(update: reversed author first and last names)
Static Analysis Symposium (SAS) (09/2002) 117-132
null
null
cs.PL
null
This article presents the systematic design of a class of relational numerical abstract domains from non-relational ones. Constructed domains represent sets of invariants of the form (vj - vi in C), where vj and vi are two variables, and C lives in an abstraction of P(Z), P(Q), or P(R). We will call this family of domains weakly relational domains. The underlying concept allowing this construction is an extension of potential graphs and shortest-path closure algorithms in exotic-like algebras. Example constructions are given in order to retrieve well-known domains as well as new ones. Such domains can then be used in the Abstract Interpretation framework in order to design various static analyses. Amajor benfit of this construction is its modularity, allowing to quickly implement new abstract domains from existing ones.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 05:56:51 GMT" }, { "version": "v2", "created": "Fri, 16 Mar 2007 08:56:08 GMT" } ]
2016-08-14T00:00:00
[ [ "Miné", "Antoine", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0703076
Mine Antoine
Antoine Min\'e (LIENS)
Symbolic Methods to Enhance the Precision of Numerical Abstract Domains
(update: reversed author first and last names)
Verification, Abstract Interpretation and Model Checking (VMCAI) (01/2006) 348-363
null
null
cs.PL
null
We present lightweight and generic symbolic methods to improve the precison of numerical static analyses based on Abstract Interpretation. The main idea is to simplify numerical expressions before they are fed to abstract transfer functions. An important novelty is that these simplifications are performed on-the-fly, using information gathered dynamically by the analyzer. A first method, called "linearization," allows abstracting arbitrary expressions into affine forms with interval coefficients while simplifying them. A second method, called "symbolic constant propagation," enhances the simplification feature of the linearization by propagating assigned expressions in a symbolic way. Combined together, these methods increase the relationality level of numerical abstract domains and make them more robust against program transformations. We show how they can be integrated within the classical interval, octagon and polyhedron domains. These methods have been incorporated within the Astr\'{e}e static analyzer that checks for the absence of run-time errors in embedded critical avionics software. We present an experimental proof of their usefulness.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 06:05:40 GMT" }, { "version": "v2", "created": "Fri, 16 Mar 2007 08:54:46 GMT" } ]
2016-08-14T00:00:00
[ [ "Miné", "Antoine", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0703077
Mine Antoine
Antoine Min\'e (LIENS)
Relational Abstract Domains for the Detection of Floating-Point Run-Time Errors
(update: reversed author first and last names)
European Symposium on Programming (ESOP) (03/2004) 3-17
null
null
cs.PL
null
We present a new idea to adapt relational abstract domains to the analysis of IEEE 754-compliant floating-point numbers in order to statically detect, through abstract Interpretation-based static analyses, potential floating-point run-time exceptions such as overflows or invalid operations. In order to take the non-linearity of rounding into account, expressions are modeled as linear forms with interval coefficients. We show how to extend already existing numerical abstract domains, such as the octagon abstract domain, to efficiently abstract transfer functions based on interval linear forms. We discuss specific fixpoint stabilization techniques and give some experimental results.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 06:07:02 GMT" }, { "version": "v2", "created": "Fri, 16 Mar 2007 08:51:01 GMT" } ]
2016-08-14T00:00:00
[ [ "Miné", "Antoine", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0703078
Igor Bjelakovic
Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr and Holger Boche
Broadcast Capacity Region of Two-Phase Bidirectional Relaying
25 pages, 2 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2007.911158
null
cs.IT math.IT
null
In a three-node network a half-duplex relay node enables bidirectional communication between two nodes with a spectral efficient two phase protocol. In the first phase, two nodes transmit their message to the relay node, which decodes the messages and broadcast a re-encoded composition in the second phase. In this work we determine the capacity region of the broadcast phase. In this scenario each receiving node has perfect information about the message that is intended for the other node. The resulting set of achievable rates of the two-phase bidirectional relaying includes the region which can be achieved by applying XOR on the decoded messages at the relay node. We also prove the strong converse for the maximum error probability and show that this implies that the $[\eps_1,\eps_2]$-capacity region defined with respect to the average error probability is constant for small values of error parameters $\eps_1$, $\eps_2$.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 10:26:04 GMT" } ]
2016-11-17T00:00:00
[ [ "Oechtering", "Tobias J.", "" ], [ "Bjelakovic", "Igor", "" ], [ "Schnurr", "Clemens", "" ], [ "Boche", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703079
Hendrik Jan Hoogeboom
Joost Engelfriet, Hendrik Jan Hoogeboom
Automata with Nested Pebbles Capture First-Order Logic with Transitive Closure
Paper for Logical Methods in Computer Science, 27 pages, 1 figure
Logical Methods in Computer Science, Volume 3, Issue 2 (April 26, 2007) lmcs:2220
10.2168/LMCS-3(2:3)2007
null
cs.LO
null
String languages recognizable in (deterministic) log-space are characterized either by two-way (deterministic) multi-head automata, or following Immerman, by first-order logic with (deterministic) transitive closure. Here we elaborate this result, and match the number of heads to the arity of the transitive closure. More precisely, first-order logic with k-ary deterministic transitive closure has the same power as deterministic automata walking on their input with k heads, additionally using a finite set of nested pebbles. This result is valid for strings, ordered trees, and in general for families of graphs having a fixed automaton that can be used to traverse the nodes of each of the graphs in the family. Other examples of such families are grids, toruses, and rectangular mazes. For nondeterministic automata, the logic is restricted to positive occurrences of transitive closure. The special case of k=1 for trees, shows that single-head deterministic tree-walking automata with nested pebbles are characterized by first-order logic with unary deterministic transitive closure. This refines our earlier result that placed these automata between first-order and monadic second-order logic on trees.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 10:27:05 GMT" }, { "version": "v2", "created": "Thu, 26 Apr 2007 12:07:25 GMT" } ]
2017-01-11T00:00:00
[ [ "Engelfriet", "Joost", "" ], [ "Hoogeboom", "Hendrik Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703080
Paul Ioan Fodor
Joy Dutta, Paul Fodor
A Systematic Approach to Web-Application Development
null
null
null
null
cs.SE
null
Designing a web-application from a specification involves a series of well-planned and well executed steps leading to the final product. This often involves critical changes in design while testing the application, which itself is slow and cumbersome. Traditional approaches either fully automate the web-application development process, or let developers write everything from scratch. Our approach is based on a middle-ground, with precise control on the workflow and usage of a set of custom-made software tools to automate a significant part of code generation.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 12:55:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Dutta", "Joy", "" ], [ "Fodor", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
cs/0703081
Andre Hernich
Martin Grohe, Andre Hernich, Nicole Schweikardt
Randomized Computations on Large Data Sets: Tight Lower Bounds
29 pages, 2 figures, full version of PODS'06 paper
null
null
null
cs.DB cs.CC
null
We study the randomized version of a computation model (introduced by Grohe, Koch, and Schweikardt (ICALP'05); Grohe and Schweikardt (PODS'05)) that restricts random access to external memory and internal memory space. Essentially, this model can be viewed as a powerful version of a data stream model that puts no cost on sequential scans of external memory (as other models for data streams) and, in addition, (like other external memory models, but unlike streaming models), admits several large external memory devices that can be read and written to in parallel. We obtain tight lower bounds for the decision problems set equality, multiset equality, and checksort. More precisely, we show that any randomized one-sided-error bounded Monte Carlo algorithm for these problems must perform Omega(log N) random accesses to external memory devices, provided that the internal memory size is at most O(N^(1/4)/log N), where N denotes the size of the input data. From the lower bound on the set equality problem we can infer lower bounds on the worst case data complexity of query evaluation for the languages XQuery, XPath, and relational algebra on streaming data. More precisely, we show that there exist queries in XQuery, XPath, and relational algebra, such that any (randomized) Las Vegas algorithm that evaluates these queries must perform Omega(log N) random accesses to external memory devices, provided that the internal memory size is at most O(N^(1/4)/log N).
[ { "version": "v1", "created": "Thu, 15 Mar 2007 12:58:36 GMT" } ]
2007-05-23T00:00:00
[ [ "Grohe", "Martin", "" ], [ "Hernich", "Andre", "" ], [ "Schweikardt", "Nicole", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0703082
Christian Rasch
Christian Rasch and Thomas Satzger
Remarks on the O(N) Implementation of the Fast Marching Method
7 pages, 2 figures
null
null
null
cs.NA
null
The fast marching algorithm computes an approximate solution to the eikonal equation in O(N log N) time, where the factor log N is due to the administration of a priority queue. Recently, Yatziv, Bartesaghi and Sapiro have suggested to use an untidy priority queue, reducing the overall complexity to O(N) at the price of a small error in the computed solution. In this paper, we give an explicit estimate of the error introduced, which is based on a discrete comparison principle. This estimates implies in particular that the choice of an accuracy level that is independent of the speed function F results in the complexity bound O(Fmax /Fmin N). A numerical experiment illustrates this robustness problem for large ratios Fmax /Fmin .
[ { "version": "v1", "created": "Thu, 15 Mar 2007 13:41:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Rasch", "Christian", "" ], [ "Satzger", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0703083
Frank McCown
Frank McCown and Michael L. Nelson
Characterization of Search Engine Caches
5 pages, 9 figures, IS&T Archiving 2007, May, 2007
null
null
null
cs.DL cs.CY
null
Search engines provide cached copies of indexed content so users will have something to "click on" if the remote resource is temporarily or permanently unavailable. Depending on their proprietary caching strategies, search engines will purge their indexes and caches of resources that exceed a threshold of unavailability. Although search engine caches are provided only as an aid to the interactive user, we are interested in building reliable preservation services from the aggregate of these limited caching services. But first, we must understand the contents of search engine caches. In this paper, we have examined the cached contents of Ask, Google, MSN and Yahoo to profile such things as overlap between index and cache, size, MIME type and "staleness" of the cached resources. We also examined the overlap of the various caches with the holdings of the Internet Archive.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 15:16:08 GMT" }, { "version": "v2", "created": "Thu, 15 Mar 2007 20:24:16 GMT" } ]
2007-05-23T00:00:00
[ [ "McCown", "Frank", "" ], [ "Nelson", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0703084
Mine Antoine
Antoine Min\'e (LIENS)
The Octagon Abstract Domain
(update: reversed author first and last names)
Analysis, Slicing and Transformation (AST) (10/2001) 310-319
null
null
cs.PL
null
This article presents a new numerical abstract domain for static analysis by abstract interpretation. It extends a former numerical abstract domain based on Difference-Bound Matrices and allows us to represent invariants of the form (+/-x+/-y<=c), where x and y are program variables and c is a real constant. We focus on giving an efficient representation based on Difference-Bound Matrices - O(n2) memory cost, where n is the number of variables - and graph-based algorithms for all common abstract operators - O(n3) time cost. This includes a normal form algorithm to test equivalence of representation and a widening operator to compute least fixpoint approximations.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 18:16:32 GMT" }, { "version": "v2", "created": "Fri, 16 Mar 2007 08:47:24 GMT" } ]
2016-08-14T00:00:00
[ [ "Miné", "Antoine", "", "LIENS" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0703085
Xiaoyang Gu
Xiaoyang Gu, Jack H. Lutz
Dimension and Relative Frequencies
null
null
null
null
cs.CC
null
We show how to calculate the finite-state dimension (equivalently, the finite-state compressibility) of a saturated sets $X$ consisting of {\em all} infinite sequences $S$ over a finite alphabet $\Sigma_m$ satisfying some given condition $P$ on the asymptotic frequencies with which various symbols from $\Sigma_m$ appear in $S$. When the condition $P$ completely specifies an empirical probability distribution $\pi$ over $\Sigma_m$, i.e., a limiting frequency of occurrence for {\em every} symbol in $\Sigma_m$, it has been known since 1949 that the Hausdorff dimension of $X$ is precisely $\CH(\pi)$, the Shannon entropy of $\pi$, and the finite-state dimension was proven to have this same value in 2001. The saturated sets were studied by Volkmann and Cajar decades ago. It got attention again only with the recent developments in multifractal analysis by Barreira, Saussol, Schmeling, and separately Olsen. However, the powerful methods they used -- ergodic theory and multifractal analysis -- do not yield a value for the finite-state (or even computable) dimension in an obvious manner. We give a pointwise characterization of finite-state dimensions of saturated sets. Simultaneously, we also show that their finite-state dimension and strong dimension coincide with their Hausdorff and packing dimension respectively, though the techniques we use are completely elementary. Our results automatically extend to less restrictive effective settings (e.g., constructive, computable, and polynomial-time dimensions).
[ { "version": "v1", "created": "Fri, 16 Mar 2007 02:42:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0703086
John Kouvakis
John Kouvakis, Fotis Georgatos
A Technical Report On Grid Benchmarking using SEE V.O
5 pages, 12 figures including tables of results, SEE VO
null
null
TR-MOD07-001
cs.PF
null
Grids include heterogeneous resources, which are based on different hardware and software architectures or components. In correspondence with this diversity of the infrastructure, the execution time of any single job, as well as the total grid performance can both be affected substantially, which can be demonstrated by measurements. Running a simple benchmarking suite can show this heterogeneity and give us results about the differences over the grid sites.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 21:06:06 GMT" }, { "version": "v2", "created": "Sun, 3 Jun 2007 06:50:30 GMT" } ]
2007-06-13T00:00:00
[ [ "Kouvakis", "John", "" ], [ "Georgatos", "Fotis", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
cs/0703087
Kristina Lerman
Kristina Lerman
Social Information Processing in Social News Aggregation
Extended version of the paper submitted to IEEE Internet Computing's special issue on Social Search
null
10.1109/MIC.2007.136
null
cs.CY cs.AI cs.HC cs.MA
null
The rise of the social media sites, such as blogs, wikis, Digg and Flickr among others, underscores the transformation of the Web to a participatory medium in which users are collaboratively creating, evaluating and distributing information. The innovations introduced by social media has lead to a new paradigm for interacting with information, what we call 'social information processing'. In this paper, we study how social news aggregator Digg exploits social information processing to solve the problems of document recommendation and rating. First, we show, by tracking stories over time, that social networks play an important role in document recommendation. The second contribution of this paper consists of two mathematical models. The first model describes how collaborative rating and promotion of stories emerges from the independent decisions made by many users. The second model describes how a user's influence, the number of promoted stories and the user's social network, changes in time. We find qualitative agreement between predictions of the model and user data gathered from Digg.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 22:37:22 GMT" }, { "version": "v2", "created": "Thu, 12 Apr 2007 23:38:57 GMT" } ]
2012-07-03T00:00:00
[ [ "Lerman", "Kristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0703088
Ignacio Vega-Paez M en C
Ignacio Vega-Paez and Carlos Alberto Hernandez-Hernandez
Plot 94 in ambiance X-Window
null
Proceedings in Information Systems Analysis and Synthesis ISAS 1995, 5th, International Symposium on Systems Research, Informatics and Cybernetics, pp. 135-139, August 16-20, 95, Baden-Baden, Germany
null
IBP-TR1995-01
cs.CV cs.GR
null
<PLOT > is a collection of routines to draw surfaces, contours and so on. In this work we are presenting a version, that functions over work stations with the operative system UNIX, that count with the graphic ambiance X-WINDOW with the tools XLIB and OSF/MOTIF. This implant was realized for the work stations DEC 5000-200, DEC IPX, and DEC ALFA of the CINVESTAV (Center of Investigation and Advanced Studies). Also implanted in SILICON GRAPHICS of the CENAC (National Center of Calculation of the Polytechnic National Institute
[ { "version": "v1", "created": "Fri, 16 Mar 2007 00:18:11 GMT" } ]
2011-07-13T00:00:00
[ [ "Vega-Paez", "Ignacio", "" ], [ "Hernandez-Hernandez", "Carlos Alberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/0703089
Ignacio Vega-Paez M en C
Ignacio Vega-Paez and Feliu D. Sagols T
Space Program Language (SPL/SQL) for the Relational Approach of the Spatial Databases
null
Proceedings in Information Systems Analysis and Synthesis ISAS 1995, 5th International Symposium on Systems Research, Informatics and Cybernetics, pp. 89-93 August 16-20, 95, Baden-Baden, Germany
null
IBP-TR1995-02
cs.DB cs.CG
null
In this project we are presenting a grammar which unify the design and development of spatial databases. In order to make it, we combine nominal and spatial information, the former is represented by the relational model and latter by a modification of the same model. The modification lets to represent spatial data structures (as Quadtrees, Octrees, etc.) in a integrated way. This grammar is important because with it we can create tools to build systems that combine spatial-nominal characteristics such as Geographical Information Systems (GIS), Hypermedia Systems, Computed Aided Design Systems (CAD), and so on
[ { "version": "v1", "created": "Fri, 16 Mar 2007 00:39:57 GMT" } ]
2011-07-14T00:00:00
[ [ "Vega-Paez", "Ignacio", "" ], [ "T", "Feliu D. Sagols", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
cs/0703090
Inderjeet Kaur
Kaur Inderjeet, Sharma Kanchan, Kulkarni.M
Orthogonal Frequency Division Multiplexing: An Overview
7 Pages, 5 Figures
null
null
null
cs.IT math.IT
null
Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier modulation scheme that provides efficient bandwidth utilization and robustness against time dispersive channels. This paper deals with the basic system model for OFDM based systems and with self-interference, or the corruption of desired signal by itself in OFDM systems. A simple transceiver based on OFDM modulation is presented. Important impairments in OFDM systems are mathematically analyzed
[ { "version": "v1", "created": "Fri, 16 Mar 2007 04:52:04 GMT" } ]
2011-11-09T00:00:00
[ [ "Inderjeet", "Kaur", "" ], [ "Kanchan", "Sharma", "" ], [ "M", "Kulkarni.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703091
Frederic Landragin
Fr\'ed\'eric Landragin (INRIA Lorraine - LORIA), Alexandre Denis (INRIA Lorraine - LORIA), Annalisa Ricci (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine - LORIA)
Multimodal Meaning Representation for Generic Dialogue Systems Architectures
null
Proceedings of the Fourth International Conference on Language Resources and Evaluation (LREC 2004) (2004) 521-524
null
null
cs.AI cs.MM
null
An unified language for the communicative acts between agents is essential for the design of multi-agents architectures. Whatever the type of interaction (linguistic, multimodal, including particular aspects such as force feedback), whatever the type of application (command dialogue, request dialogue, database querying), the concepts are common and we need a generic meta-model. In order to tend towards task-independent systems, we need to clarify the modules parameterization procedures. In this paper, we focus on the characteristics of a meta-model designed to represent meaning in linguistic and multimodal applications. This meta-model is called MMIL for MultiModal Interface Language, and has first been specified in the framework of the IST MIAMM European project. What we want to test here is how relevant is MMIL for a completely different context (a different task, a different interaction type, a different linguistic domain). We detail the exploitation of MMIL in the framework of the IST OZONE European project, and we draw the conclusions on the role of MMIL in the parameterization of task-independent dialogue managers.
[ { "version": "v1", "created": "Fri, 16 Mar 2007 15:37:47 GMT" } ]
2016-08-14T00:00:00
[ [ "Landragin", "Frédéric", "", "INRIA Lorraine - LORIA" ], [ "Denis", "Alexandre", "", "INRIA Lorraine - LORIA" ], [ "Ricci", "Annalisa", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
cs/0703092
Partha Basuchowdhuri
Partha Basuchowdhuri
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
9 pages, 4 figures
null
null
null
cs.CR
null
This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak's three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak's three-stage protocol is provided that makes it possible to deal with the man-in-the-middle attack.
[ { "version": "v1", "created": "Mon, 19 Mar 2007 08:13:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Basuchowdhuri", "Partha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0703093
Roman Vershynin
Roman Vershynin
Some problems in asymptotic convex geometry and random matrices motivated by numerical algorithms
12 pages, no figures. Based on the talk at the 2006 conference on Banach Spaces and their applications in analysis
Banach spaces and their applications in analysis, 209--218, Walter de Gruyter, Berlin, 2007
null
null
cs.CG cs.DS cs.NA
null
The simplex method in Linear Programming motivates several problems of asymptotic convex geometry. We discuss some conjectures and known results in two related directions -- computing the size of projections of high dimensional polytopes and estimating the norms of random matrices and their inverses.
[ { "version": "v1", "created": "Mon, 19 Mar 2007 21:51:50 GMT" } ]
2016-12-23T00:00:00
[ [ "Vershynin", "Roman", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0703094
Olivier Powell
Olivier Powell and Sotiris Nikolesteas
Geographic Routing Around Obstacles in Wireless Sensor Networks
37 pages, 23 figures
null
null
null
cs.DC
null
Geographic routing is becoming the protocol of choice for many sensor network applications. The current state of the art is unsatisfactory: some algorithms are very efficient, however they require a preliminary planarization of the communication graph. Planarization induces overhead and is not realistic in many scenarios. On the otherhand, georouting algorithms which do not rely on planarization have fairly low success rates and either fail to route messages around all but the simplest obstacles or have a high topology control overhead (e.g. contour detection algorithms). To overcome these limitations, we propose GRIC, the first lightweight and efficient on demand (i.e. all-to-all) geographic routing algorithm which does not require planarization and has almost 100% delivery rates (when no obstacles are added). Furthermore, the excellent behavior of our algorithm is maintained even in the presence of large convex obstacles. The case of hard concave obstacles is also studied; such obstacles are hard instances for which performance diminishes.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 12:17:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Powell", "Olivier", "" ], [ "Nikolesteas", "Sotiris", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0703095
Jian Ma
Jian Ma and Zengqi Sun
Copula Component Analysis
null
null
null
null
cs.IR cs.AI
null
A framework named Copula Component Analysis (CCA) for blind source separation is proposed as a generalization of Independent Component Analysis (ICA). It differs from ICA which assumes independence of sources that the underlying components may be dependent with certain structure which is represented by Copula. By incorporating dependency structure, much accurate estimation can be made in principle in the case that the assumption of independence is invalidated. A two phrase inference method is introduced for CCA which is based on the notion of multidimensional ICA.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 14:52:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Ma", "Jian", "" ], [ "Sun", "Zengqi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0703096
Aleksandar Donev
Aleksandar Donev
Asynchronous Event-Driven Particle Algorithms
To appear in Simulation: Transactions of the Society for Modeling and Simulation International, 2008
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present, in a unifying way, the main components of three asynchronous event-driven algorithms for simulating physical systems of interacting particles. The first example, hard-particle molecular dynamics, is well-known. We also present a recently-developed diffusion kinetic Monte Carlo algorithm, as well as a novel stochastic molecular-dynamics algorithm that builds on the Direct Simulation Monte Carlo. We explain how to effectively combine asynchronous event-driven with classical time-driven or with synchronous event-driven handling. Finally, we discuss some promises and challenges for event-driven simulation of realistic physical systems.
[ { "version": "v1", "created": "Tue, 20 Mar 2007 16:52:20 GMT" }, { "version": "v2", "created": "Tue, 9 Sep 2008 19:13:32 GMT" } ]
2008-09-09T00:00:00
[ [ "Donev", "Aleksandar", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
cs/0703097
Lane A. Hemaspaandra
Gabor Erdelyi, Lane A. Hemaspaandra, Joerg Rothe, Holger Spakowski
On Approximating Optimal Weighted Lobbying, and Frequency of Correctness versus Average-Case Polynomial Time
null
null
null
URCS-TR-2007-914
cs.GT cs.CC cs.MA
null
We investigate issues related to two hard problems related to voting, the optimal weighted lobbying problem and the winner problem for Dodgson elections. Regarding the former, Christian et al. [CFRS06] showed that optimal lobbying is intractable in the sense of parameterized complexity. We provide an efficient greedy algorithm that achieves a logarithmic approximation ratio for this problem and even for a more general variant--optimal weighted lobbying. We prove that essentially no better approximation ratio than ours can be proven for this greedy algorithm. The problem of determining Dodgson winners is known to be complete for parallel access to NP [HHR97]. Homan and Hemaspaandra [HH06] proposed an efficient greedy heuristic for finding Dodgson winners with a guaranteed frequency of success, and their heuristic is a ``frequently self-knowingly correct algorithm.'' We prove that every distributional problem solvable in polynomial time on the average with respect to the uniform distribution has a frequently self-knowingly correct polynomial-time algorithm. Furthermore, we study some features of probability weight of correctness with respect to Procaccia and Rosenschein's junta distributions [PR07].
[ { "version": "v1", "created": "Tue, 20 Mar 2007 20:35:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Erdelyi", "Gabor", "" ], [ "Hemaspaandra", "Lane A.", "" ], [ "Rothe", "Joerg", "" ], [ "Spakowski", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0703098
Sergey Gubin
Sergey Gubin
Polynomial time algorithm for 3-SAT. Examples of use
19 pages
null
null
null
cs.CC cs.DM cs.DS cs.LO
null
The algorithm checks the propositional formulas for patterns of unsatisfiability.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 06:46:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703099
Nicolas Bonneau
E. Altman, K. Avrachenkov, N. Bonneau, M. Debbah, R. El-Azouzi, D. Sadoc Menasche
Constrained Cost-Coupled Stochastic Games with Independent State Processes
7 pages, submitted in september 2006 to Operations Research Letters
null
null
null
cs.IT cs.GT math.IT
null
We consider a non-cooperative constrained stochastic games with N players with the following special structure. With each player there is an associated controlled Markov chain. The transition probabilities of the i-th Markov chain depend only on the state and actions of controller i. The information structure that we consider is such that each player knows the state of its own MDP and its own actions. It does not know the states of, and the actions taken by other players. Finally, each player wishes to minimize a time-average cost function, and has constraints over other time-avrage cost functions. Both the cost that is minimized as well as those defining the constraints depend on the state and actions of all players. We study in this paper the existence of a Nash equilirium. Examples in power control in wireless communications are given.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 10:27:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Altman", "E.", "" ], [ "Avrachenkov", "K.", "" ], [ "Bonneau", "N.", "" ], [ "Debbah", "M.", "" ], [ "El-Azouzi", "R.", "" ], [ "Menasche", "D. Sadoc", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703100
Rajmohan Rajaraman
Guolong Lin and Rajmohan Rajaraman
Approximation Algorithms for Multiprocessor Scheduling under Uncertainty
12 pages, 2 encapsulated postscript figures
null
null
null
cs.DC cs.CC cs.DS
null
Motivated by applications in grid computing and project management, we study multiprocessor scheduling in scenarios where there is uncertainty in the successful execution of jobs when assigned to processors. We consider the problem of multiprocessor scheduling under uncertainty, in which we are given n unit-time jobs and m machines, a directed acyclic graph C giving the dependencies among the jobs, and for every job j and machine i, the probability p_{ij} of the successful completion of job j when scheduled on machine i in any given particular step. The goal of the problem is to find a schedule that minimizes the expected makespan, that is, the expected completion time of all the jobs. The problem of multiprocessor scheduling under uncertainty was introduced by Malewicz and was shown to be NP-hard even when all the jobs are independent. In this paper, we present polynomial-time approximation algorithms for the problem, for special cases of the dag C. We obtain an O(log(n))-approximation for the case of independent jobs, an O(log(m)log(n)log(n+m)/loglog(n+m))-approximation when C is a collection of disjoint chains, an O(log(m)log^2(n))-approximation when C is a collection of directed out- or in-trees, and an O(log(m)log^2(n)log(n+m)/loglog(n+m))-approximation when C is a directed forest.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 20:35:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Lin", "Guolong", "" ], [ "Rajaraman", "Rajmohan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703101
Thomas M. Breuel
Thomas M. Breuel
A Note on Approximate Nearest Neighbor Methods
The report was originally written in 2005 and does not reference information after that date
null
null
null
cs.IR cs.CC cs.CV
null
A number of authors have described randomized algorithms for solving the epsilon-approximate nearest neighbor problem. In this note I point out that the epsilon-approximate nearest neighbor property often fails to be a useful approximation property, since epsilon-approximate solutions fail to satisfy the necessary preconditions for using nearest neighbors for classification and related tasks.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 20:47:33 GMT" } ]
2007-05-23T00:00:00
[ [ "Breuel", "Thomas M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
cs/0703102
Ashish Kumar
Ashish Kumar Singh, Adnan Aziz, Sriram Vishwanath, Michael Orshansky
Generation of Efficient Codes for Realizing Boolean Functions in Nanotechnologies
6 pages, 5 Figures
null
null
null
cs.IT cs.DM math.IT
null
We address the challenge of implementing reliable computation of Boolean functions in future nanocircuit fabrics. Such fabrics are projected to have very high defect rates. We overcome this limitation by using a combination of cheap but unreliable nanodevices and reliable but expensive CMOS devices. In our approach, defect tolerance is achieved through a novel coding of Boolean functions; specifically, we exploit the dont cares of Boolean functions encountered in multi-level Boolean logic networks for constructing better codes. We show that compared to direct application of existing coding techniques, the coding overhead in terms of extra bits can be reduced, on average by 23%, and savings can go up to 34%. We demonstrate that by incorporating efficient coding techniques more than a 40% average yield improvement is possible in case of 1% and 0.1% defect rates. With 0.1% defect density, the savings can be up to 90%.
[ { "version": "v1", "created": "Wed, 21 Mar 2007 21:30:25 GMT" }, { "version": "v2", "created": "Wed, 11 Apr 2007 20:35:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Singh", "Ashish Kumar", "" ], [ "Aziz", "Adnan", "" ], [ "Vishwanath", "Sriram", "" ], [ "Orshansky", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703103
Jia Tao
Jia Tao, Shashi Gadia, Tsz Shing Cheng
Concept of a Value in Multilevel Security Databases
This paper has been withdrawn
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 03:31:27 GMT" }, { "version": "v2", "created": "Thu, 25 Jun 2009 21:55:56 GMT" }, { "version": "v3", "created": "Tue, 30 Jun 2009 00:07:21 GMT" } ]
2009-06-30T00:00:00
[ [ "Tao", "Jia", "" ], [ "Gadia", "Shashi", "" ], [ "Cheng", "Tsz Shing", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0703104
Hajime Matsui
Hajime Matsui, Seiichi Mita
Encoding via Gr\"obner bases and discrete Fourier transforms for several types of algebraic codes
5 pages, 4 figures, To be presented at IEEE International Symposium on Information Theory 2007
null
null
null
cs.IT math.IT
null
We propose a novel encoding scheme for algebraic codes such as codes on algebraic curves, multidimensional cyclic codes, and hyperbolic cascaded Reed-Solomon codes and present numerical examples. We employ the recurrence from the Gr\"obner basis of the locator ideal for a set of rational points and the two-dimensional inverse discrete Fourier transform. We generalize the functioning of the generator polynomial for Reed-Solomon codes and develop systematic encoding for various algebraic codes.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 04:52:35 GMT" }, { "version": "v2", "created": "Wed, 2 May 2007 12:25:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Matsui", "Hajime", "" ], [ "Mita", "Seiichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703105
Yingquan Wu
Yingquan Wu
New List Decoding Algorithms for Reed-Solomon and BCH Codes
null
IEEE Trans. Inform. Theory, Aug. 2008
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we devise a rational curve fitting algorithm and apply it to the list decoding of Reed-Solomon and BCH codes. The proposed list decoding algorithms exhibit the following significant properties. 1 The algorithm corrects up to $n(1-\sqrt{1-D})$ errors for a (generalized) $(n, k, d=n-k+1)$ Reed-Solomon code, which matches the Johnson bound, where $D\eqdef \frac{d}{n}$ denotes the normalized minimum distance. In comparison with the Guruswami-Sudan algorithm, which exhibits the same list correction capability, the former requires multiplicity, which dictates the algorithmic complexity, $O(n(1-\sqrt{1-D}))$, whereas the latter requires multiplicity $O(n^2(1-D))$. With the up-to-date most efficient implementation, the former has complexity $O(n^{6}(1-\sqrt{1-D})^{7/2})$, whereas the latter has complexity $O(n^{10}(1-D)^4)$. 2. With the multiplicity set to one, the derivative list correction capability precisely sits in between the conventional hard-decision decoding and the optimal list decoding. Moreover, the number of candidate codewords is upper bounded by a constant for a fixed code rate and thus, the derivative algorithm exhibits quadratic complexity $O(n^2)$. 3. By utilizing the unique properties of the Berlekamp algorithm, the algorithm corrects up to $\frac{n}{2}(1-\sqrt{1-2D})$ errors for a narrow-sense $(n, k, d)$ binary BCH code, which matches the Johnson bound for binary codes. The algorithmic complexity is $O(n^{6}(1-\sqrt{1-2D})^7)$.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 05:29:48 GMT" }, { "version": "v2", "created": "Fri, 22 Jun 2007 01:54:29 GMT" }, { "version": "v3", "created": "Wed, 10 Dec 2008 18:39:11 GMT" } ]
2008-12-10T00:00:00
[ [ "Wu", "Yingquan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703106
Paul Wang
Shengbao Wang
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications
A work in progress, any comment and suggestion will be highly appreciated by the author
null
null
null
cs.CR
null
In this paper, we present a new identity-based encryption (IBE) scheme using bilinear pairings. Our IBE scheme enjoys the same \textsf{Key Extraction} and \textsf{Decryption} algorithms with the famous IBE scheme of Boneh and Franklin (BF-IBE for short), while differs from the latter in that it has modified \textsf{Setup} and \textsf{Encryption} algorithms. Compared with BF-IBE, we show that ours are more practical in a multiple private key generator (PKG) environment, mainly due to that the session secret $g_{ID}$ could be pre-computed \emph{before} any interaction, and the sender could encrypt a message using $g_{ID}$ prior to negotiating with the intended recipient(s). As an application of our IBE scheme, we also derive an escrowed ElGamal scheme which possesses certain good properties in practice.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 08:05:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Wang", "Shengbao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0703107
Arnaud Legout
Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Nikitas Liogkas (UCLA), Eddie Kohler (UCLA), Lixia Zhang (UCLA)
Clustering and Sharing Incentives in BitTorrent Systems
This article is the author version of a paper accepted at ACM SIGMETRICS'2007. In particular, this paper is different from the technical report inria-00112066, version 1 - 21 November 2006. The technical report inria-00112066, version 1 - 21 November 2006 is a extended version of this paper (same title and authors, but different content) Version 2 is the same content as version 1, but with a different class in order to match the camera ready format for SIGMETRICS
Dans ACM SIGMETRICS'2007 (2007)
null
null
cs.NI
null
Peer-to-peer protocols play an increasingly instrumental role in Internet content distribution. It is therefore important to gain a complete understanding of how these protocols behave in practice and how their operating parameters affect overall system performance. This paper presents the first detailed experimental investigation of the peer selection strategy in the popular BitTorrent protocol. By observing more than 40 nodes in instrumented private torrents, we validate three protocol properties that, though believed to hold, have not been previously demonstrated experimentally: the clustering of similar-bandwidth peers, the effectiveness of BitTorrent's sharing incentives, and the peers' high uplink utilization. In addition, we observe that BitTorrent's modified choking algorithm in seed state provides uniform service to all peers, and that an underprovisioned initial seed leads to absence of peer clustering and less effective sharing incentives. Based on our results, we provide guidelines for seed provisioning by content providers, and discuss a tracker protocol extension that addresses an identified limitation of the protocol.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 08:16:02 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 06:27:16 GMT" } ]
2016-08-14T00:00:00
[ [ "Legout", "Arnaud", "", "INRIA Sophia Antipolis / INRIA Rhône-Alpes" ], [ "Liogkas", "Nikitas", "", "UCLA" ], [ "Kohler", "Eddie", "", "UCLA" ], [ "Zhang", "Lixia", "", "UCLA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0703108
Sourav Dhar
Sourav Dhar, Rabindranath Bera, K.Mal
Wireless Lan to Support Multimedia Communication Using Spread Spectrum Technology
URSI 0ctober 22-29 2005, 4pages, 6 figures
null
null
null
cs.NI
null
Wireless LAN is currently enjoying rapid deployment in University departments, business offices, hospitals and homes. It becomes an inexpensive technology and allows multiple numbers of the households to simultaneously access the internet while roaming about the house. In the present work, the design and development of a wireless LAN is highlighted which utilizes direct sequence spread spectrum (DSSS) technology at 900MHz RF carrier frequency in its physical layer. This provides enormous security in the physical layer and hence it is very difficult to hack or jam the network. The installation cost is also less due to the use of 900 MHz RF carrier frequency..
[ { "version": "v1", "created": "Thu, 22 Mar 2007 11:07:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Dhar", "Sourav", "" ], [ "Bera", "Rabindranath", "" ], [ "Mal", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0703109
Daniel Lemire
Owen Kaser and Daniel Lemire
Tag-Cloud Drawing: Algorithms for Cloud Visualization
To appear in proceedings of Tagging and Metadata for Social Information Organization (WWW 2007)
null
null
null
cs.DS
null
Tag clouds provide an aggregate of tag-usage statistics. They are typically sent as in-line HTML to browsers. However, display mechanisms suited for ordinary text are not ideal for tags, because font sizes may vary widely on a line. As well, the typical layout does not account for relationships that may be known between tags. This paper presents models and algorithms to improve the display of tag clouds that consist of in-line HTML, as well as algorithms that use nested tables to achieve a more general 2-dimensional layout in which tag relationships are considered. The first algorithms leverage prior work in typesetting and rectangle packing, whereas the second group of algorithms leverage prior work in Electronic Design Automation. Experiments show our algorithms can be efficiently implemented and perform well.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 14:54:48 GMT" }, { "version": "v2", "created": "Mon, 7 May 2007 17:59:20 GMT" } ]
2009-04-22T00:00:00
[ [ "Kaser", "Owen", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
cs/0703110
Ketan Mulmuley D
Jonah Blasiak, Ketan D. Mulmuley, Milind Sohoni
Geometric Complexity Theory IV: nonstandard quantum group for the Kronecker problem
145 pages. This is the final journal version to appear in the Memoirs of the American Mathematical Society
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kronecker coefficient g_{\lambda \mu \nu} is the multiplicity of the GL(V)\times GL(W)-irreducible V_\lambda \otimes W_\mu in the restriction of the GL(X)-irreducible X_\nu via the natural map GL(V)\times GL(W) \to GL(V \otimes W), where V, W are \mathbb{C}-vector spaces and X = V \otimes W. A fundamental open problem in algebraic combinatorics is to find a positive combinatorial formula for these coefficients. We construct two quantum objects for this problem, which we call the nonstandard quantum group and nonstandard Hecke algebra. We show that the nonstandard quantum group has a compact real form and its representations are completely reducible, that the nonstandard Hecke algebra is semisimple, and that they satisfy an analog of quantum Schur-Weyl duality. Using these nonstandard objects as a guide, we follow the approach of Adsul, Sohoni, and Subrahmanyam to construct, in the case dim(V) = dim(W) =2, a representation \check{X}_\nu of the nonstandard quantum group that specializes to Res_{GL(V) \times GL(W)} X_\nu at q=1. We then define a global crystal basis +HNSTC(\nu) of \check{X}_\nu that solves the two-row Kronecker problem: the number of highest weight elements of +HNSTC(\nu) of weight (\lambda,\mu) is the Kronecker coefficient g_{\lambda \mu \nu}. We go on to develop the beginnings of a graphical calculus for this basis, along the lines of the U_q(\sl_2) graphical calculus, and use this to organize the crystal components of +HNSTC(\nu) into eight families. This yields a fairly simple, explicit and positive formula for two-row Kronecker coefficients, generalizing a formula of Brown, van Willigenburg, and Zabrocki. As a byproduct of the approach, we also obtain a rule for the decomposition of Res_{GL_2 \times GL_2 \rtimes \S_2} X_\nu into irreducibles.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 15:35:29 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 21:48:50 GMT" }, { "version": "v3", "created": "Tue, 4 Oct 2011 20:43:54 GMT" }, { "version": "v4", "created": "Thu, 6 Jun 2013 20:47:14 GMT" } ]
2013-06-10T00:00:00
[ [ "Blasiak", "Jonah", "" ], [ "Mulmuley", "Ketan D.", "" ], [ "Sohoni", "Milind", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0703111
Jia Liu
Jia Liu and Y. Thomas Hou
Maximum Weighted Sum Rate of Multi-Antenna Broadcast Channels
null
null
null
null
cs.IT math.IT
null
Recently, researchers showed that dirty paper coding (DPC) is the optimal transmission strategy for multiple-input multiple-output broadcast channels (MIMO-BC). In this paper, we study how to determine the maximum weighted sum of DPC rates through solving the maximum weighted sum rate problem of the dual MIMO multiple access channel (MIMO-MAC) with a sum power constraint. We first simplify the maximum weighted sum rate problem such that enumerating all possible decoding orders in the dual MIMO-MAC is unnecessary. We then design an efficient algorithm based on conjugate gradient projection (CGP) to solve the maximum weighted sum rate problem. Our proposed CGP method utilizes the powerful concept of Hessian conjugacy. We also develop a rigorous algorithm to solve the projection problem. We show that CGP enjoys provable convergence, nice scalability, and great efficiency for large MIMO-BC systems.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 17:20:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Jia", "" ], [ "Hou", "Y. Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703112
Bharath Ramesh
Bharath Ramesh and Srinidhi Varadarajan
User-level DSM System for Modern High-Performance Interconnection Networks
6 pages, 5 figures
null
null
null
cs.DC
null
In this paper, we introduce a new user-level DSM system which has the ability to directly interact with underlying interconnection networks. The DSM system provides the application programmer a flexible API to program parallel applications either using shared memory semantics over physically distributed memory or to use an efficient remote memory demand paging technique. We also introduce a new time slice based memory consistency protocol which is used by the DSM system. We present preliminary results from our implementation on a small Opteron Linux cluster interconnected over Myrinet.
[ { "version": "v1", "created": "Thu, 22 Mar 2007 19:15:00 GMT" } ]
2007-05-23T00:00:00
[ [ "Ramesh", "Bharath", "" ], [ "Varadarajan", "Srinidhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0703113
Kamel Aouiche
Kamel Aouiche and Jerome Darmont and Omar Boussaid and Fadila Bentayeb
Automatic Selection of Bitmap Join Indexes in Data Warehouses
null
null
null
null
cs.DB
null
The queries defined on data warehouses are complex and use several join operations that induce an expensive computational cost. This cost becomes even more prohibitive when queries access very large volumes of data. To improve response time, data warehouse administrators generally use indexing techniques such as star join indexes or bitmap join indexes. This task is nevertheless complex and fastidious. Our solution lies in the field of data warehouse auto-administration. In this framework, we propose an automatic index selection strategy. We exploit a data mining technique ; more precisely frequent itemset mining, in order to determine a set of candidate indexes from a given workload. Then, we propose several cost models allowing to create an index configuration composed by the indexes providing the best profit. These models evaluate the cost of accessing data using bitmap join indexes, and the cost of updating and storing these indexes.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 04:25:36 GMT" } ]
2009-09-29T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Darmont", "Jerome", "" ], [ "Boussaid", "Omar", "" ], [ "Bentayeb", "Fadila", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0703114
Kamel Aouiche
Kamel Aouiche and Pierre-Emmanuel Jouve and Jerome Darmont
Clustering-Based Materialized View Selection in Data Warehouses
null
null
null
null
cs.DB
null
Materialized view selection is a non-trivial task. Hence, its complexity must be reduced. A judicious choice of views must be cost-driven and influenced by the workload experienced by the system. In this paper, we propose a framework for materialized view selection that exploits a data mining technique (clustering), in order to determine clusters of similar queries. We also propose a view merging algorithm that builds a set of candidate views, as well as a greedy process for selecting a set of views to materialize. This selection is based on cost models that evaluate the cost of accessing data using views and the cost of storing these views. To validate our strategy, we executed a workload of decision-support queries on a test data warehouse, with and without using our strategy. Our experimental results demonstrate its efficiency, even when storage space is limited.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 04:31:35 GMT" } ]
2016-08-31T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Jouve", "Pierre-Emmanuel", "" ], [ "Darmont", "Jerome", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
cs/0703115
Victor Kryssanov
Victor V. Kryssanov, Evgeny L. Kuleshov, Frank J. Rinaldo, Hitoshi Ogawa
We cite as we communicate: A communication model for the citation process
12 pages, 4 figures in the new version. A preprint originally completed in March, 2007; new version with a slightly expanded discussion and new figures added
null
null
null
cs.DL cs.CY physics.data-an
null
Building on ideas from linguistics, psychology, and social sciences about the possible mechanisms of human decision-making, we propose a novel theoretical framework for the citation analysis. Given the existing trend to investigate citation statistics in the context of various forms of power and Zipfian laws, we show that the popular models of citation have poor predictive ability and can hardly provide for an adequate explanation of the observed behavior of the empirical data. An alternative model is then derived, using the apparatus of statistical mechanics. The model is applied to approximate the citation frequencies of scientific articles from two large collections, and it demonstrates a predictive potential much superior to the one of any of the citation models known to the authors from the literature. Some analytical properties of the developed model are discussed, and conclusions are drawn. Directions for future work are also given at the paper's end.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 05:30:45 GMT" }, { "version": "v2", "created": "Mon, 18 Jun 2007 10:38:06 GMT" } ]
2007-06-18T00:00:00
[ [ "Kryssanov", "Victor V.", "" ], [ "Kuleshov", "Evgeny L.", "" ], [ "Rinaldo", "Frank J.", "" ], [ "Ogawa", "Hitoshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
cs/0703116
Roberto Bagnara
Roberto Bagnara, Patricia M. Hill, Andrea Pescetti, Enea Zaffanella
On the Design of Generic Static Analyzers for Modern Imperative Languages
72 pages
null
null
null
cs.PL cs.LO
null
The design and implementation of precise static analyzers for significant fragments of modern imperative languages like C, C++, Java and Python is a challenging problem. In this paper, we consider a core imperative language that has several features found in mainstream languages such as those including recursive functions, run-time system and user-defined exceptions, and a realistic data and memory model. For this language we provide a concrete semantics --characterizing both finite and infinite computations-- and a generic abstract semantics that we prove sound with respect to the concrete one. We say the abstract semantics is generic since it is designed to be completely parametric on the analysis domains: in particular, it provides support for \emph{relational} domains (i.e., abstract domains that can capture the relationships between different data objects). We also sketch how the proposed methodology can be extended to accommodate a larger language that includes pointers, compound data objects and non-structured control flow mechanisms. The approach, which is based on structured, big-step $\mathrm{G}^\infty\mathrm{SOS}$ operational semantics and on abstract interpretation, is modular in that the overall static analyzer is naturally partitioned into components with clearly identified responsibilities and interfaces, something that greatly simplifies both the proof of correctness and the implementation.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 09:47:15 GMT" }, { "version": "v2", "created": "Thu, 28 Jun 2007 10:56:42 GMT" } ]
2007-06-28T00:00:00
[ [ "Bagnara", "Roberto", "" ], [ "Hill", "Patricia M.", "" ], [ "Pescetti", "Andrea", "" ], [ "Zaffanella", "Enea", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703117
Juan J. Merelo Pr.
J.L.J. Laredo, E.A. Eiben, M. Schoenauer, P.A. Castillo, A.M. Mora, F. Fernandez, J.J. Merelo
Self-adaptive Gossip Policies for Distributed Population-based Algorithms
Submitted to Europar 2007
null
null
null
cs.DC
null
Gossipping has demonstrate to be an efficient mechanism for spreading information among P2P networks. Within the context of P2P computing, we propose the so-called Evolvable Agent Model for distributed population-based algorithms which uses gossipping as communication policy, and represents every individual as a self-scheduled single thread. The model avoids obsolete nodes in the population by defining a self-adaptive refresh rate which depends on the latency and bandwidth of the network. Such a mechanism balances the migration rate to the congestion of the links pursuing global population coherence. We perform an experimental evaluation of this model on a real parallel system and observe how solution quality and algorithm speed scale with the number of processors with this seamless approach.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 11:29:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Laredo", "J. L. J.", "" ], [ "Eiben", "E. A.", "" ], [ "Schoenauer", "M.", "" ], [ "Castillo", "P. A.", "" ], [ "Mora", "A. M.", "" ], [ "Fernandez", "F.", "" ], [ "Merelo", "J. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0703118
Andreas de Vries
Andreas de Vries
Mathematical model of interest matchmaking in electronic social networks
6 pages, 3 figures
Applied Mathematics 5 (16) 2014, 2619-2629
10.4236/am.2014.516250
null
cs.CY cs.AI
null
The problem of matchmaking in electronic social networks is formulated as an optimization problem. In particular, a function measuring the matching degree of fields of interest of a search profile with those of an advertising profile is proposed.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 12:42:20 GMT" }, { "version": "v2", "created": "Sat, 24 Mar 2007 09:47:49 GMT" } ]
2015-02-03T00:00:00
[ [ "de Vries", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0703119
Daniel A. Spielman
Samuel I. Daitch and Daniel A. Spielman
Support-Graph Preconditioners for 2-Dimensional Trusses
null
null
null
null
cs.NA
null
We use support theory, in particular the fretsaw extensions of Shklarski and Toledo, to design preconditioners for the stiffness matrices of 2-dimensional truss structures that are stiffly connected. Provided that all the lengths of the trusses are within constant factors of each other, that the angles at the corners of the triangles are bounded away from 0 and $\pi$, and that the elastic moduli and cross-sectional areas of all the truss elements are within constant factors of each other, our preconditioners allow us to solve linear equations in the stiffness matrices to accuracy $\epsilon$ in time $O (n^{5/4} (\log^{2}n \log \log n)^{3/4} \log (1/\epsilon))$.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 15:03:34 GMT" }, { "version": "v2", "created": "Mon, 26 Mar 2007 18:09:29 GMT" } ]
2007-05-23T00:00:00
[ [ "Daitch", "Samuel I.", "" ], [ "Spielman", "Daniel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
cs/0703120
Hari Palaiyanur
Hari Palaiyanur and Anant Sahai
Sequential decoding for lossless streaming source coding with side information
42 pages, Submitted to IT Transactions
null
null
null
cs.IT math.IT
null
The problem of lossless fixed-rate streaming coding of discrete memoryless sources with side information at the decoder is studied. A random time-varying tree-code is used to sequentially bin strings and a Stack Algorithm with a variable bias uses the side information to give a delay-universal coding system for lossless source coding with side information. The scheme is shown to give exponentially decaying probability of error with delay, with exponent equal to Gallager's random coding exponent for sources with side information. The mean of the random variable of computation for the stack decoder is bounded, and conditions on the bias are given to guarantee a finite $\rho^{th}$ moment for $0 \leq \rho \leq 1$. Further, the problem is also studied in the case where there is a discrete memoryless channel between encoder and decoder. The same scheme is slightly modified to give a joint-source channel encoder and Stack Algorithm-based sequential decoder using side information. Again, by a suitable choice of bias, the probability of error decays exponentially with delay and the random variable of computation has a finite mean. Simulation results for several examples are given.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 17:58:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Palaiyanur", "Hari", "" ], [ "Sahai", "Anant", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703121
Bruno Salvy
Alin Bostan (INRIA Rocquencourt), Fr\'ed\'eric Chyzak (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt), Gr\'egoire Lecerf (LM-Versailles), \'Eric Schost
Differential Equations for Algebraic Functions
null
ISSAC'07, pages 25--32, ACM Press, 2007.
10.1145/1277548.1277553
null
cs.SC math.CA
null
It is classical that univariate algebraic functions satisfy linear differential equations with polynomial coefficients. Linear recurrences follow for the coefficients of their power series expansions. We show that the linear differential equation of minimal order has coefficients whose degree is cubic in the degree of the function. We also show that there exists a linear differential equation of order linear in the degree whose coefficients are only of quadratic degree. Furthermore, we prove the existence of recurrences of order and degree close to optimal. We study the complexity of computing these differential equations and recurrences. We deduce a fast algorithm for the expansion of algebraic series.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 19:20:35 GMT" }, { "version": "v2", "created": "Fri, 14 Sep 2007 13:44:07 GMT" } ]
2008-04-03T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Chyzak", "Frédéric", "", "INRIA\n Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ], [ "Lecerf", "Grégoire", "", "LM-Versailles" ], [ "Schost", "Éric", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" } ]
cs/0703122
Richard Kr\'alovi\v{c}
Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}
Rapid Almost-Complete Broadcasting in Faulty Networks
Conference: Sirocco 2007
null
null
null
cs.DC
null
This paper studies the problem of broadcasting in synchronous point-to-point networks, where one initiator owns a piece of information that has to be transmitted to all other vertices as fast as possible. The model of fractional dynamic faults with threshold is considered: in every step either a fixed number $T$, or a fraction $\alpha$, of sent messages can be lost depending on which quantity is larger. As the main result we show that in complete graphs and hypercubes it is possible to inform all but a constant number of vertices, exhibiting only a logarithmic slowdown, i.e. in time $O(D\log n)$ where $D$ is the diameter of the network and $n$ is the number of vertices. Moreover, for complete graphs under some additional conditions (sense of direction, or $\alpha<0.55$) the remaining constant number of vertices can be informed in the same time, i.e. $O(\log n)$.
[ { "version": "v1", "created": "Fri, 23 Mar 2007 22:38:06 GMT" } ]
2007-05-23T00:00:00
[ [ "Královič", "Rastislav", "" ], [ "Královič", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0703123
Mohammad H. Taghavi N.
Mohammad H. Taghavi and Paul H. Siegel
Adaptive Methods for Linear Programming Decoding
22 pages, 8 figures. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Detectability of failures of linear programming (LP) decoding and the potential for improvement by adding new constraints motivate the use of an adaptive approach in selecting the constraints for the underlying LP problem. In this paper, we make a first step in studying this method, and show that it can significantly reduce the complexity of the problem, which was originally exponential in the maximum check-node degree. We further show that adaptively adding new constraints, e.g. by combining parity checks, can provide large gains in the performance.
[ { "version": "v1", "created": "Sat, 24 Mar 2007 02:32:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Taghavi", "Mohammad H.", "" ], [ "Siegel", "Paul H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703124
Cheng-Yuan Liou
Cheng-Yuan Liou, Tai-Hei Wu, Chia-Ying Lee
Modelling Complexity in Musical Rhythm
21 pages, 13 figures, 2 tables
Complexity 15(4) (2010) 19~30 final form at http://www3.interscience.wiley.com/cgi-bin/fulltext/123191810/PDFSTART
null
null
cs.AI
null
This paper constructs a tree structure for the music rhythm using the L-system. It models the structure as an automata and derives its complexity. It also solves the complexity for the L-system. This complexity can resolve the similarity between trees. This complexity serves as a measure of psychological complexity for rhythms. It resolves the music complexity of various compositions including the Mozart effect K488. Keyword: music perception, psychological complexity, rhythm, L-system, automata, temporal associative memory, inverse problem, rewriting rule, bracketed string, tree similarity
[ { "version": "v1", "created": "Mon, 26 Mar 2007 07:37:11 GMT" } ]
2010-03-10T00:00:00
[ [ "Liou", "Cheng-Yuan", "" ], [ "Wu", "Tai-Hei", "" ], [ "Lee", "Chia-Ying", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0703125
Vladimir Pestov
Vladimir Pestov
Intrinsic dimension of a dataset: what properties does one expect?
6 pages, 6 figures, 1 table, latex with IEEE macros, final submission to Proceedings of the 22nd IJCNN (Orlando, FL, August 12-17, 2007)
Proceedings of the 20th International Joint Conference on Neural Networks (IJCNN'2007), Orlando, Florida (Aug. 12--17, 2007), pp. 1775--1780.
10.1109/IJCNN.2007.4371431
null
cs.LG
null
We propose an axiomatic approach to the concept of an intrinsic dimension of a dataset, based on a viewpoint of geometry of high-dimensional structures. Our first axiom postulates that high values of dimension be indicative of the presence of the curse of dimensionality (in a certain precise mathematical sense). The second axiom requires the dimension to depend smoothly on a distance between datasets (so that the dimension of a dataset and that of an approximating principal manifold would be close to each other). The third axiom is a normalization condition: the dimension of the Euclidean $n$-sphere $\s^n$ is $\Theta(n)$. We give an example of a dimension function satisfying our axioms, even though it is in general computationally unfeasible, and discuss a computationally cheap function satisfying most but not all of our axioms (the ``intrinsic dimensionality'' of Ch\'avez et al.)
[ { "version": "v1", "created": "Sun, 25 Mar 2007 01:19:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Pestov", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
cs/0703126
Michele Tucci
Michele Tucci
Evolutionary Socioeconomics: Notes on the Computer Simulation according to the de Finetti - Simon Principia
PDF, 29 pages, 3 graphs; minor changes
null
null
null
cs.CY
null
The present note includes explanatory comments about the synergic interaction within the sphere of the socioeconomic analysis between the two following theoretical frameworks. (I). The Darwinian evolutionary model. (II). The computer simulation in accordance with the principia established by Bruno de Finetti and Herbert Simon.
[ { "version": "v1", "created": "Sun, 25 Mar 2007 12:46:19 GMT" }, { "version": "v2", "created": "Mon, 9 Apr 2007 14:36:23 GMT" } ]
2007-05-23T00:00:00
[ [ "Tucci", "Michele", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
cs/0703127
Alexander Zhdanov
Alexander Zhdanov
Isochronous Data Transmission With Rates Close to Channel Capacity
null
null
null
null
cs.IT math.IT
null
The existing ARQ schemes (including a hybrid ARQ) have a throughput depending on packet error probability. In this paper we describe a strategy for delay tolerant applications which provide a constant throughput until the algorithm robustness criterion is not failed. The algorithm robustness criterion is applied to find the optimum size of the retransmission block in the assumption of the small changes of coding rate within the rate compatible codes family.
[ { "version": "v1", "created": "Sun, 25 Mar 2007 20:45:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhdanov", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703128
Andrew Adamatzky
Andrew Adamatzky
Physarum machine: Implementation of Kolmogorov-Uspensky machine in biological substrat
First presented at Los Alamos "Unconventional Computation 2007" conference, Santa Fe, NM, 20-23 March 2007
Paralllel Processing Letters Vol. 17, No. 4 (December 2007) pp. 455-467
10.1142/S0129626407003150
null
cs.AR cs.CC
null
We implement Kolmogorov-Uspensky machine on a plasmodium of true slime mold {\em Physarum polycephalum}. We provide experimental findings on realization of the machine instructions, illustrate basic operations, and elements of programming.
[ { "version": "v1", "created": "Mon, 26 Mar 2007 01:51:25 GMT" }, { "version": "v2", "created": "Sun, 8 Apr 2007 08:29:51 GMT" } ]
2010-11-23T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/0703129
Joseph Geraci
Joseph Geraci, Frank Van Bussel
A theorem on the quantum evaluation of Weight Enumerators for a certain class of Cyclic Codes with a note on Cyclotomic cosets
null
null
null
null
cs.IT math.IT quant-ph
null
This note is a stripped down version of a published paper on the Potts partition function, where we concentrate solely on the linear coding aspect of our approach. It is meant as a resource for people interested in coding theory but who do not know much of the mathematics involved and how quantum computation may provide a speed up in the computation of a very important quantity in coding theory. We provide a theorem on the quantum computation of the Weight Enumerator polynomial for a restricted family of cyclic codes. The complexity of obtaining an exact evaluation is $O(k^{2s}(\log q)^{2})$, where $s$ is a parameter which determines the class of cyclic codes in question, $q$ is the characteristic of the finite field over which the code is defined, and $k$ is the dimension of the code. We also provide an overview of cyclotomic cosets and discuss applications including how they can be used to speed up the computation of the weight enumerator polynomial (which is related to the Potts partition function). We also give an algorithm which returns the coset leaders and the size of each coset from the list $\{0,1,2,...,N-1\}$, whose time complexity is soft-O(N). This algorithm uses standard techniques but we include it as a resource for students. Note that cyclotomic cosets do not improve the asymptotic complexity of the computation of weight enumerators.
[ { "version": "v1", "created": "Mon, 26 Mar 2007 07:17:50 GMT" }, { "version": "v2", "created": "Sat, 2 Feb 2008 06:37:22 GMT" }, { "version": "v3", "created": "Thu, 13 Mar 2008 20:32:54 GMT" }, { "version": "v4", "created": "Sun, 16 Mar 2008 03:38:08 GMT" } ]
2008-03-17T00:00:00
[ [ "Geraci", "Joseph", "" ], [ "Van Bussel", "Frank", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
cs/0703130
Robert Jeansoulin
Omar Doukari (LSIS), Robert Jeansoulin (IGM-LabInfo)
Space-contained conflict revision, for geographic information
14 pages
Proc. of 10th AGILE International Conference on Geographic Information Science, AGILE 2007. (07/05/2007) 1-14
null
null
cs.AI
null
Using qualitative reasoning with geographic information, contrarily, for instance, with robotics, looks not only fastidious (i.e.: encoding knowledge Propositional Logics PL), but appears to be computational complex, and not tractable at all, most of the time. However, knowledge fusion or revision, is a common operation performed when users merge several different data sets in a unique decision making process, without much support. Introducing logics would be a great improvement, and we propose in this paper, means for deciding -a priori- if one application can benefit from a complete revision, under only the assumption of a conjecture that we name the "containment conjecture", which limits the size of the minimal conflicts to revise. We demonstrate that this conjecture brings us the interesting computational property of performing a not-provable but global, revision, made of many local revisions, at a tractable size. We illustrate this approach on an application.
[ { "version": "v1", "created": "Mon, 26 Mar 2007 12:18:32 GMT" } ]
2007-05-23T00:00:00
[ [ "Doukari", "Omar", "", "LSIS" ], [ "Jeansoulin", "Robert", "", "IGM-LabInfo" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0703131
Stevan Harnad
Stevan Harnad
Open Access Scientometrics and the UK Research Assessment Exercise
null
null
null
null
cs.IR cs.DL
null
Scientometric predictors of research performance need to be validated by showing that they have a high correlation with the external criterion they are trying to predict. The UK Research Assessment Exercise (RAE), together with the growing movement toward making the full-texts of research articles freely available on the web -- offer a unique opportunity to test and validate a wealth of old and new scientometric predictors, through multiple regression analysis: Publications, journal impact factors, citations, co-citations, citation chronometrics (age, growth, latency to peak, decay rate), hub/authority scores, h-index, prior funding, student counts, co-authorship scores, endogamy/exogamy, textual proximity, download/co-downloads and their chronometrics, etc. can all be tested and validated jointly, discipline by discipline, against their RAE panel rankings in the forthcoming parallel panel-based and metric RAE in 2008. The weights of each predictor can be calibrated to maximize the joint correlation with the rankings. Open Access Scientometrics will provide powerful new means of navigating, evaluating, predicting and analyzing the growing Open Access database, as well as powerful incentives for making it grow faster. ~
[ { "version": "v1", "created": "Mon, 26 Mar 2007 15:40:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Harnad", "Stevan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
cs/0703132
Leonid Peshkin
Leonid Peshkin
Structure induction by lossless graph compression
10 pages, 7 figures, 2 tables published in Proceedings of the Data Compression Conference, 2007
In proceedings of the Data Compression Conference, 2007, pp 53-62, published by the IEEE Computer Society Press
10.1109/DCC.2007.73
null
cs.DS cs.IT cs.LG math.IT
null
This work is motivated by the necessity to automate the discovery of structure in vast and evergrowing collection of relational data commonly represented as graphs, for example genomic networks. A novel algorithm, dubbed Graphitour, for structure induction by lossless graph compression is presented and illustrated by a clear and broadly known case of nested structure in a DNA molecule. This work extends to graphs some well established approaches to grammatical inference previously applied only to strings. The bottom-up graph compression problem is related to the maximum cardinality (non-bipartite) maximum cardinality matching problem. The algorithm accepts a variety of graph types including directed graphs and graphs with labeled nodes and arcs. The resulting structure could be used for representation and classification of graphs.
[ { "version": "v1", "created": "Tue, 27 Mar 2007 05:46:31 GMT" } ]
2017-05-25T00:00:00
[ [ "Peshkin", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703133
Edith Elkind
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldberg
Computing Good Nash Equilibria in Graphical Games
25 pages. Short version appears in ACM EC'07
null
null
null
cs.GT cs.DS cs.MA
null
This paper addresses the problem of fair equilibrium selection in graphical games. Our approach is based on the data structure called the {\em best response policy}, which was proposed by Kearns et al. \cite{kls} as a way to represent all Nash equilibria of a graphical game. In \cite{egg}, it was shown that the best response policy has polynomial size as long as the underlying graph is a path. In this paper, we show that if the underlying graph is a bounded-degree tree and the best response policy has polynomial size then there is an efficient algorithm which constructs a Nash equilibrium that guarantees certain payoffs to all participants. Another attractive solution concept is a Nash equilibrium that maximizes the social welfare. We show that, while exactly computing the latter is infeasible (we prove that solving this problem may involve algebraic numbers of an arbitrarily high degree), there exists an FPTAS for finding such an equilibrium as long as the best response policy has polynomial size. These two algorithms can be combined to produce Nash equilibria that satisfy various fairness criteria.
[ { "version": "v1", "created": "Tue, 27 Mar 2007 16:15:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Elkind", "Edith", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Goldberg", "Paul W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
cs/0703134
Manuel Cebri\'an
Manuel Cebrian, Manuel Alfonseca and Alfonso Ortega
Automatic Generation of Benchmarks for Plagiarism Detection Tools using Grammatical Evolution
This paper has been withdrawn
null
null
null
cs.NE cs.IT math.IT
null
This paper has been withdrawn by the authors due to a major rewriting.
[ { "version": "v1", "created": "Tue, 27 Mar 2007 16:57:39 GMT" }, { "version": "v2", "created": "Fri, 30 Mar 2007 09:22:58 GMT" }, { "version": "v3", "created": "Fri, 20 Apr 2007 16:24:31 GMT" }, { "version": "v4", "created": "Tue, 12 Jun 2007 12:17:29 GMT" }, { "version": "v5", "created": "Mon, 7 Jan 2008 13:04:20 GMT" } ]
2008-01-07T00:00:00
[ [ "Cebrian", "Manuel", "" ], [ "Alfonseca", "Manuel", "" ], [ "Ortega", "Alfonso", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703135
Leonid Peshkin
Virginia Savova and Leonid Peshkin
Dependency Parsing with Dynamic Bayesian Network
6 pages
In proceedings of American Association for Artificial Intelligence AAAI 2005
null
null
cs.CL cs.AI
null
Exact parsing with finite state automata is deemed inappropriate because of the unbounded non-locality languages overwhelmingly exhibit. We propose a way to structure the parsing task in order to make it amenable to local classification methods. This allows us to build a Dynamic Bayesian Network which uncovers the syntactic dependency structure of English sentences. Experiments with the Wall Street Journal demonstrate that the model successfully learns from labeled data.
[ { "version": "v1", "created": "Tue, 27 Mar 2007 22:12:25 GMT" } ]
2009-09-29T00:00:00
[ [ "Savova", "Virginia", "" ], [ "Peshkin", "Leonid", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/0703136
Manuel Cebrian
Manuel Freire, Manuel Cebrian and Emilio del Rosal
Uncovering Plagiarism Networks
19 pages, 3 figures
null
null
null
cs.IT cs.SI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Plagiarism detection in educational programming assignments is still a problematic issue in terms of resource waste, ethical controversy, legal risks, and technical complexity. This paper presents AC, a modular plagiarism detection system. The design is portable across platforms and assignment formats and provides easy extraction into the internal assignment representation. Multiple similarity measures have been incorporated, both existing and newly-developed. Statistical analysis and several graphical visualizations aid in the interpretation of analysis results. The system has been evaluated with a survey that encompasses several academic semesters of use at the authors' institution.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 14:13:45 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 15:33:12 GMT" }, { "version": "v3", "created": "Tue, 3 Jul 2007 13:34:29 GMT" }, { "version": "v4", "created": "Wed, 2 Jan 2008 19:37:31 GMT" }, { "version": "v5", "created": "Mon, 21 Jul 2008 08:03:02 GMT" }, { "version": "v6", "created": "Thu, 1 Oct 2009 05:15:32 GMT" }, { "version": "v7", "created": "Mon, 14 Feb 2011 08:56:01 GMT" } ]
2011-02-15T00:00:00
[ [ "Freire", "Manuel", "" ], [ "Cebrian", "Manuel", "" ], [ "del Rosal", "Emilio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703137
Rajesh Sudarsan
Rajesh Sudarsan and Calvin J. Ribbens
ReSHAPE: A Framework for Dynamic Resizing and Scheduling of Homogeneous Applications in a Parallel Environment
15 pages, 10 figures, 5 tables Submitted to International Conference on Parallel Processing (ICPP'07)
null
null
null
cs.DC
null
Applications in science and engineering often require huge computational resources for solving problems within a reasonable time frame. Parallel supercomputers provide the computational infrastructure for solving such problems. A traditional application scheduler running on a parallel cluster only supports static scheduling where the number of processors allocated to an application remains fixed throughout the lifetime of execution of the job. Due to the unpredictability in job arrival times and varying resource requirements, static scheduling can result in idle system resources thereby decreasing the overall system throughput. In this paper we present a prototype framework called ReSHAPE, which supports dynamic resizing of parallel MPI applications executed on distributed memory platforms. The framework includes a scheduler that supports resizing of applications, an API to enable applications to interact with the scheduler, and a library that makes resizing viable. Applications executed using the ReSHAPE scheduler framework can expand to take advantage of additional free processors or can shrink to accommodate a high priority application, without getting suspended. In our research, we have mainly focused on structured applications that have two-dimensional data arrays distributed across a two-dimensional processor grid. The resize library includes algorithms for processor selection and processor mapping. Experimental results show that the ReSHAPE framework can improve individual job turn-around time and overall system throughput.
[ { "version": "v1", "created": "Tue, 27 Mar 2007 23:27:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Sudarsan", "Rajesh", "" ], [ "Ribbens", "Calvin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
cs/0703138
Leonid Peshkin
Leonid Peshkin and Virginia Savova
Reinforcement Learning for Adaptive Routing
null
In Proceedings of the Intnl Joint Conf on Neural Networks (IJCNN), 2002
null
null
cs.LG cs.AI cs.NI
null
Reinforcement learning means learning a policy--a mapping of observations into actions--based on feedback from the environment. The learning can be viewed as browsing a set of policies while evaluating them by trial through interaction with the environment. We present an application of gradient ascent algorithm for reinforcement learning to a complex domain of packet routing in network communication and compare the performance of this algorithm to other routing methods on a benchmark problem.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 04:41:54 GMT" } ]
2017-05-25T00:00:00
[ [ "Peshkin", "Leonid", "" ], [ "Savova", "Virginia", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0703139
Emmanuel Lochin
Emmanuel Lochin and Pascal Anelli
TCP throughput guarantee in the DiffServ Assured Forwarding service: what about the results?
null
null
null
null
cs.NI
null
Since the proposition of Quality of Service architectures by the IETF, the interaction between TCP and the QoS services has been intensively studied. This paper proposes to look forward to the results obtained in terms of TCP throughput guarantee in the DiffServ Assured Forwarding (DiffServ/AF) service and to present an overview of the different proposals to solve the problem. It has been demonstrated that the standardized IETF DiffServ conditioners such as the token bucket color marker and the time sliding window color maker were not good TCP traffic descriptors. Starting with this point, several propositions have been made and most of them presents new marking schemes in order to replace or improve the traditional token bucket color marker. The main problem is that TCP congestion control is not designed to work with the AF service. Indeed, both mechanisms are antagonists. TCP has the property to share in a fair manner the bottleneck bandwidth between flows while DiffServ network provides a level of service controllable and predictable. In this paper, we build a classification of all the propositions made during these last years and compare them. As a result, we will see that these conditioning schemes can be separated in three sets of action level and that the conditioning at the network edge level is the most accepted one. We conclude that the problem is still unsolved and that TCP, conditioned or not conditioned, remains inappropriate to the DiffServ/AF service.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 06:01:38 GMT" }, { "version": "v2", "created": "Wed, 21 Nov 2007 16:54:28 GMT" }, { "version": "v3", "created": "Thu, 13 Dec 2007 15:36:25 GMT" } ]
2007-12-13T00:00:00
[ [ "Lochin", "Emmanuel", "" ], [ "Anelli", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
cs/0703140
Daniele Beauquier
Dani\`ele Beauquier (LACL), Fr\'ed\'eric Gauche (LACL)
How to Guarantee Secrecy for Cryptographic Protocols
19 pages
Rapport interne (03/2007)
null
null
cs.CR
null
In this paper we propose a general definition of secrecy for cryptographic protocols in the Dolev-Yao model. We give a sufficient condition ensuring secrecy for protocols where rules have encryption depth at most two, that is satisfied by almost all practical protocols. The only allowed primitives in the class of protocols we consider are pairing and encryption with atomic keys. Moreover, we describe an algorithm of practical interest which transforms a cryptographic protocol into a secure one from the point of view of secrecy, without changing its original goal with respect to secrecy of nonces and keys, provided the protocol satisfies some conditions. These conditions are not very restrictive and are satisfied for most practical protocols.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 08:03:03 GMT" } ]
2007-05-23T00:00:00
[ [ "Beauquier", "Danièle", "", "LACL" ], [ "Gauche", "Frédéric", "", "LACL" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
cs/0703141
Mitsuru Hamada
Mitsuru Hamada
Constructive Conjugate Codes for Quantum Error Correction and Cryptography
10 pages, 1 figure. Ver.2: statement in Theorem 7.1 was revised to a more general one, which the proof (unchanged except a couple of lines after Eq.(11)) had really implied. A corollary to this theorem was added. Annotative parts on achievable rates (mainly after the proof of Theorem 7.1) were revised
null
null
null
cs.IT math.IT
null
A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum error-correcting code. It is known that conjugate code pairs are applicable to quantum cryptography. In this work, a polynomial construction of conjugate code pairs is presented. The constructed pairs achieve the highest known achievable rate on additive channels, and are decodable with algorithms of polynomial complexity.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 12:24:31 GMT" }, { "version": "v2", "created": "Thu, 29 Mar 2007 14:42:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Hamada", "Mitsuru", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703142
Andrea Conti
Marco Chiani, Andrea Conti, Velio Tralli
Pragmatic Space-Time Trellis Codes for Block Fading Channels
null
null
null
null
cs.IT math.IT
null
A pragmatic approach for the construction of space-time codes over block fading channels is investigated. The approach consists in using common convolutional encoders and Viterbi decoders with suitable generators and rates, thus greatly simplifying the implementation of space-time codes. For the design of pragmatic space-time codes a methodology is proposed and applied, based on the extension of the concept of generalized transfer function for convolutional codes over block fading channels. Our search algorithm produces the convolutional encoder generators of pragmatic space-time codes for various number of states, number of antennas and fading rate. Finally it is shown that, for the investigated cases, the performance of pragmatic space-time codes is better than that of previously known space-time codes, confirming that they are a valuable choice in terms of both implementation complexity and performance.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 13:50:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Chiani", "Marco", "" ], [ "Conti", "Andrea", "" ], [ "Tralli", "Velio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703143
Alireza Bayesteh
Alireza Bayesteh and Amir K. Khandani
How much feedback is required in MIMO Broadcast Channels?
Submitted to IEEE Trans. on Inform. Theory
null
null
null
cs.IT math.IT
null
In this paper, a downlink communication system, in which a Base Station (BS) equipped with M antennas communicates with N users each equipped with K receive antennas ($K \leq M$), is considered. It is assumed that the receivers have perfect Channel State Information (CSI), while the BS only knows the partial CSI, provided by the receivers via feedback. The minimum amount of feedback required at the BS, to achieve the maximum sum-rate capacity in the asymptotic case of $N \to \infty$ and different ranges of SNR is studied. In the fixed and low SNR regimes, it is demonstrated that to achieve the maximum sum-rate, an infinite amount of feedback is required. Moreover, in order to reduce the gap to the optimum sum-rate to zero, in the fixed SNR regime, the minimum amount of feedback scales as $\theta(\ln \ln \ln N)$, which is achievable by the Random Beam-Forming scheme proposed in [14]. In the high SNR regime, two cases are considered; in the case of $K < M$, it is proved that the minimum amount of feedback bits to reduce the gap between the achievable sum-rate and the maximum sum-rate to zero grows logaritmically with SNR, which is achievable by the "Generalized Random Beam-Forming" scheme, proposed in [18]. In the case of $K = M$, it is shown that by using the Random Beam-Forming scheme and the total amount of feedback not growing with SNR, the maximum sum-rate capacity is achieved.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 16:16:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703144
Mehdi Ansari Sadrabadi Mr.
Mehdi Ansari Sadrabadi, Mohammad Ali Maddah-Ali and Amir K. Khandani
On The Capacity Of Time-Varying Channels With Periodic Feedback
9 pages, 1 figure, Journal
null
null
null
cs.IT math.IT
null
The capacity of time-varying channels with periodic feedback at the transmitter is evaluated. It is assumed that the channel state information is perfectly known at the receiver and is fed back to the transmitter at the regular time-intervals. The system capacity is investigated in two cases: i) finite state Markov channel, and ii) additive white Gaussian noise channel with time-correlated fading. In the first case, it is shown that the capacity is achievable by multiplexing multiple codebooks across the channel. In the second case, the channel capacity and the optimal adaptive coding is obtained. It is shown that the optimal adaptation can be achieved by a single Gaussian codebook, while adaptively allocating the total power based on the side information at the transmitter.
[ { "version": "v1", "created": "Wed, 28 Mar 2007 18:46:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Sadrabadi", "Mehdi Ansari", "" ], [ "Maddah-Ali", "Mohammad Ali", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703145
Sandeep Murthy
Sandeep Murthy
The Simultaneous Triple Product Property and Group-theoretic Results for the Exponent of Matrix Multiplication
14 pages
null
null
null
cs.DS cs.CC math.GR
null
We describe certain special consequences of certain elementary methods from group theory for studying the algebraic complexity of matrix multiplication, as developed by H. Cohn, C. Umans et. al. in 2003 and 2005. The measure of complexity here is the exponent of matrix multiplication, a real parameter between 2 and 3, which has been conjectured to be 2. More specifically, a finite group may simultaneously "realize" several independent matrix multiplications via its regular algebra if it has a family of triples of "index" subsets which satisfy the so-called simultaneous triple product property (STPP), in which case the complexity of these several multiplications does not exceed the rank (complexity) of the algebra. This leads to bounds for the exponent in terms of the size of the group and the sizes of its STPP triples, as well as the dimensions of its distinct irreducible representations. Wreath products of Abelian with symmetric groups appear especially important, in this regard, and we give an example of such a group which shows that the exponent is less than 2.84, and could be possibly be as small as 2.02 depending on the number of simultaneous matrix multiplications it realizes.
[ { "version": "v1", "created": "Thu, 29 Mar 2007 02:55:17 GMT" }, { "version": "v2", "created": "Fri, 30 Mar 2007 02:17:28 GMT" }, { "version": "v3", "created": "Mon, 2 Apr 2007 13:39:15 GMT" }, { "version": "v4", "created": "Tue, 3 Apr 2007 16:52:16 GMT" } ]
2007-05-23T00:00:00
[ [ "Murthy", "Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
cs/0703146
Sergey Gubin
Sergey Gubin
A Polynomial Time Algorithm for SAT
Update, 30 pages
null
null
MCCCC 23,24,25
cs.CC cs.DM cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Article presents the compatibility matrix method and illustrates it with the application to P vs NP problem. The method is a generalization of descriptive geometry: in the method, we draft problems and solve them utilizing the image creation technique. The method reveals: P = NP = PSPACE
[ { "version": "v1", "created": "Thu, 29 Mar 2007 07:36:30 GMT" }, { "version": "v2", "created": "Fri, 30 Mar 2007 17:51:21 GMT" }, { "version": "v3", "created": "Tue, 10 Feb 2009 06:23:54 GMT" }, { "version": "v4", "created": "Mon, 7 May 2012 08:29:28 GMT" } ]
2012-05-08T00:00:00
[ [ "Gubin", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703147
Maurice Margenstern
Maurice Margenstern
The finite tiling problem is undecidable in the hyperbolic plane
null
The Finite Tiling Problem Is Undecidable in the Hyperbolic Plane, International Journal of Foundations of Computer Science, 19(4), (2008), 971-982
10.1142/S0129054108006078
null
cs.CG cs.DM
null
In this paper, we consider the finite tiling problem which was proved undecidable in the Euclidean plane by Jarkko Kari in 1994. Here, we prove that the same problem for the hyperbolic plane is also undecidable.
[ { "version": "v1", "created": "Thu, 29 Mar 2007 14:23:59 GMT" } ]
2009-07-07T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0703148
Joseph Y. Halpern
Joseph Y. Halpern
Computer Science and Game Theory: A Brief Survey
To appear; Palgrave Dictionary of Economics
null
null
null
cs.GT econ.TH
null
There has been a remarkable increase in work at the interface of computer science and game theory in the past decade. In this article I survey some of the main themes of work in the area, with a focus on the work in computer science. Given the length constraints, I make no attempt at being comprehensive, especially since other surveys are also available, and a comprehensive survey book will appear shortly.
[ { "version": "v1", "created": "Thu, 29 Mar 2007 18:43:58 GMT" } ]
2021-09-07T00:00:00
[ [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Economics", "code": "econ.TH", "description": "Includes theoretical contributions to Contract Theory, Decision Theory, Game Theory, General Equilibrium, Growth, Learning and Evolution, Macroeconomics, Market and Mechanism Design, and Social Choice.", "span": "(Theoretical Economics)" } ]
cs/0703149
Christof Teuscher
Christof Teuscher
Exploring Logic Artificial Chemistries: An Illogical Attempt?
null
The First IEEE Symposium on Artificial Life, April 1-5, 2007, Hawaii, USA
10.1109/ALIFE.2007.367659
null
cs.NE nlin.AO
null
Robustness to a wide variety of negative factors and the ability to self-repair is an inherent and natural characteristic of all life forms on earth. As opposed to nature, man-made systems are in most cases not inherently robust and a significant effort has to be made in order to make them resistant against failures. This can be done in a wide variety of ways and on various system levels. In the field of digital systems, for example, techniques such as triple modular redundancy (TMR) are frequently used, which results in a considerable hardware overhead. Biologically-inspired computing by means of bio-chemical metaphors offers alternative paradigms, which need to be explored and evaluated. Here, we are interested to evaluate the potential of nature-inspired artificial chemistries and membrane systems as an alternative information representing and processing paradigm in order to obtain robust and spatially extended Boolean computing systems in a distributed environment. We investigate conceptual approaches inspired by artificial chemistries and membrane systems and compare proof-of-concepts. First, we show, that elementary logical functions can be implemented. Second, we illustrate how they can be made more robust and how they can be assembled to larger-scale systems. Finally, we discuss the implications for and paths to possible genuine implementations. Compared to the main body of work in artificial chemistries, we take a very pragmatic and implementation-oriented approach and are interested in realizing Boolean computations only. The results emphasize that artificial chemistries can be used to implement Boolean logic in a spatially extended and distributed environment and can also be made highly robust, but at a significant price.
[ { "version": "v1", "created": "Thu, 29 Mar 2007 20:57:00 GMT" } ]
2016-11-15T00:00:00
[ [ "Teuscher", "Christof", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
cs/0703150
Steven G. Johnson
Xuancheng Shao and Steven G. Johnson
Type-II/III DCT/DST algorithms with reduced number of arithmetic operations
9 pages
Signal Processing vol. 88, issue 6, p. 1553-1564 (2008)
10.1016/j.sigpro.2008.01.004
null
cs.NA cs.DS cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present algorithms for the discrete cosine transform (DCT) and discrete sine transform (DST), of types II and III, that achieve a lower count of real multiplications and additions than previously published algorithms, without sacrificing numerical accuracy. Asymptotically, the operation count is reduced from ~ 2N log_2 N to ~ (17/9) N log_2 N for a power-of-two transform size N. Furthermore, we show that a further N multiplications may be saved by a certain rescaling of the inputs or outputs, generalizing a well-known technique for N=8 by Arai et al. These results are derived by considering the DCT to be a special case of a DFT of length 4N, with certain symmetries, and then pruning redundant operations from a recent improved fast Fourier transform algorithm (based on a recursive rescaling of the conjugate-pair split radix algorithm). The improved algorithms for DCT-III, DST-II, and DST-III follow immediately from the improved count for the DCT-II.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 00:53:48 GMT" }, { "version": "v2", "created": "Thu, 29 Jan 2009 19:05:59 GMT" } ]
2009-09-29T00:00:00
[ [ "Shao", "Xuancheng", "" ], [ "Johnson", "Steven G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
cs/0703151
Shahab Oveis Gharan
Shahab Oveis Gharan, Alireza Bayesteh, and Amir K. Khandani
Asymptotic Analysis of Amplify and Forward Relaying in a Parallel MIMO Relay Network
null
null
null
null
cs.IT math.IT
null
This paper considers the setup of a parallel MIMO relay network in which $K$ relays, each equipped with $N$ antennas, assist the transmitter and the receiver, each equipped with $M$ antennas, in the half-duplex mode, under the assumption that $N\geq{M}$. This setup has been studied in the literature like in \cite{nabar}, \cite{nabar2}, and \cite{qr}. In this paper, a simple scheme, the so-called Incremental Cooperative Beamforming, is introduced and shown to achieve the capacity of the network in the asymptotic case of $K\to{\infty}$ with a gap no more than $O(\frac{1}{\log(K)})$. This result is shown to hold, as long as the power of the relays scales as $\omega(\frac{\log^9(K)}{K})$. Finally, the asymptotic SNR behavior is studied and it is proved that the proposed scheme achieves the full multiplexing gain, regardless of the number of relays.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 06:47:21 GMT" } ]
2007-07-13T00:00:00
[ [ "Gharan", "Shahab Oveis", "" ], [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703152
Ugo Dal Lago
Ugo Dal Lago, Andrea Masini, Margherita Zorzi
Quantum Lambda Calculi with Classical Control: Syntax and Expressive Power
25 pages
null
null
null
cs.LO
null
We study an untyped lambda calculus with quantum data and classical control. This work stems from previous proposals by Selinger and Valiron and by Van Tonder. We focus on syntax and expressiveness, rather than (denotational) semantics. We prove subject reduction, confluence and a standardization theorem. Moreover, we prove the computational equivalence of the proposed calculus with a suitable class of quantum circuit families.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 08:59:43 GMT" } ]
2007-05-23T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Masini", "Andrea", "" ], [ "Zorzi", "Margherita", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/0703153
Maurice Margenstern
Maurice Margenstern
The periodic domino problem is undecidable in the hyperbolic plane
null
null
null
null
cs.CG cs.DM
null
In this paper, we consider the periodic tiling problem which was proved undecidable in the Euclidean plane by Yu. Gurevich and I. Koriakov in 1972. Here, we prove that the same problem for the hyperbolic plane is also undecidable.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 09:31:40 GMT" } ]
2007-05-23T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
cs/0703154
Tobias Koch
Tobias Koch, Amos Lapidoth, and Paul P. Sotiriadis
A Hot Channel
to be presented at 2007 IEEE Information Theory Workshop (ITW), replaced with version that will appear in the proceedings
null
10.1109/ITW.2007.4313127
null
cs.IT math.IT
null
This paper studies on-chip communication with non-ideal heat sinks. A channel model is proposed where the variance of the additive noise depends on the weighted sum of the past channel input powers. It is shown that, depending on the weights, the capacity can be either bounded or unbounded in the input power. A necessary condition and a sufficient condition for the capacity to be bounded are presented.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 14:09:38 GMT" }, { "version": "v2", "created": "Wed, 4 Apr 2007 13:07:59 GMT" }, { "version": "v3", "created": "Tue, 3 Jul 2007 09:34:14 GMT" } ]
2016-11-15T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ], [ "Sotiriadis", "Paul P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
cs/0703155
Amey Karkare
Amey Karkare, Uday Khedker, Amitabha Sanyal
Liveness of Heap Data for Functional Programs
Accepted at Heap Analysis and Verification workshop (HAV 2007), a satellite workshop of ETAPS 2007 (No formal proceedings for workshop); 15 pages
null
null
null
cs.PL
null
Functional programming languages use garbage collection for heap memory management. Ideally, garbage collectors should reclaim all objects that are dead at the time of garbage collection. An object is dead at an execution instant if it is not used in future. Garbage collectors collect only those dead objects that are not reachable from any program variable. This is because they are not able to distinguish between reachable objects that are dead and reachable objects that are live. In this paper, we describe a static analysis to discover reachable dead objects in programs written in first-order, eager functional programming languages. The results of this technique can be used to make reachable dead objects unreachable, thereby allowing garbage collectors to reclaim more dead objects.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 16:06:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Karkare", "Amey", "" ], [ "Khedker", "Uday", "" ], [ "Sanyal", "Amitabha", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
cs/0703156
Fadi Badra
Mathieu D'Aquin (KMI), Fadi Badra (INRIA Lorraine - LORIA), Sandrine Lafrogne (INRIA Lorraine - LORIA), Jean Lieber (INRIA Lorraine - LORIA), Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine - LORIA)
Case Base Mining for Adaptation Knowledge Acquisition
null
Dans Twentieth International Joint Conference on Artificial Intelligence - IJCAI'07 (2007) 750--755
null
null
cs.AI
null
In case-based reasoning, the adaptation of a source case in order to solve the target problem is at the same time crucial and difficult to implement. The reason for this difficulty is that, in general, adaptation strongly depends on domain-dependent knowledge. This fact motivates research on adaptation knowledge acquisition (AKA). This paper presents an approach to AKA based on the principles and techniques of knowledge discovery from databases and data-mining. It is implemented in CABAMAKA, a system that explores the variations within the case base to elicit adaptation knowledge. This system has been successfully tested in an application of case-based reasoning to decision support in the domain of breast cancer treatment.
[ { "version": "v1", "created": "Fri, 30 Mar 2007 16:16:11 GMT" } ]
2007-05-23T00:00:00
[ [ "D'Aquin", "Mathieu", "", "KMI" ], [ "Badra", "Fadi", "", "INRIA Lorraine - LORIA" ], [ "Lafrogne", "Sandrine", "", "INRIA Lorraine - LORIA" ], [ "Lieber", "Jean", "", "INRIA Lorraine - LORIA" ], [ "Napoli", "Amedeo", "", "INRIA Lorraine - LORIA" ], [ "Szathmary", "Laszlo", "", "INRIA Lorraine -\n LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
cs/9301101
null
Lawrence C. Paulson
Verifying the Unification Algorithm in LCF
null
Science of Computer Programming 5 (1985), 143-170
null
null
cs.LO
null
Manna and Waldinger's theory of substitutions and unification has been verified using the Cambridge LCF theorem prover. A proof of the monotonicity of substitution is presented in detail, as an example of interaction with LCF. Translating the theory into LCF's domain-theoretic logic is largely straightforward. Well-founded induction on a complex ordering is translated into nested structural inductions. Correctness of unification is expressed using predicates for such properties as idempotence and most-generality. The verification is presented as a series of lemmas. The LCF proofs are compared with the original ones, and with other approaches. It appears difficult to find a logic that is both simple and flexible, especially for proving termination.
[ { "version": "v1", "created": "Fri, 29 Sep 2000 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301102
null
Lawrence C. Paulson
Constructing Recursion Operators in Intuitionistic Type Theory
null
Journal of Symbolic Computation 2 (1986), 325-355
null
null
cs.LO
null
Martin-L\"of's Intuitionistic Theory of Types is becoming popular for formal reasoning about computer programs. To handle recursion schemes other than primitive recursion, a theory of well-founded relations is presented. Using primitive recursion over higher types, induction and recursion are formally derived for a large class of well-founded relations. Included are < on natural numbers, and relations formed by inverse images, addition, multiplication, and exponentiation of other relations. The constructions are given in full detail to allow their use in theorem provers for Type Theory, such as Nuprl. The theory is compared with work in the field of ordinal recursion over higher types.
[ { "version": "v1", "created": "Tue, 31 Oct 2000 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301103
null
Lawrence C. Paulson
Proving Termination of Normalization Functions for Conditional Expressions
null
Journal of Automated Reasoning 2 (1986), 63-74
null
null
cs.LO
null
Boyer and Moore have discussed a recursive function that puts conditional expressions into normal form [1]. It is difficult to prove that this function terminates on all inputs. Three termination proofs are compared: (1) using a measure function, (2) in domain theory using LCF, (3) showing that its recursion relation, defined by the pattern of recursive calls, is well-founded. The last two proofs are essentially the same though conducted in markedly different logical frameworks. An obviously total variant of the normalize function is presented as the `computational meaning' of those two proofs. A related function makes nested recursive calls. The three termination proofs become more complex: termination and correctness must be proved simultaneously. The recursion relation approach seems flexible enough to handle subtle termination proofs where previously domain theory seemed essential.
[ { "version": "v1", "created": "Mon, 2 Oct 2000 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301104
null
Lawrence C. Paulson
Natural Deduction as Higher-Order Resolution
null
Journal of Logic Programming 3 (1986), 237-258
null
null
cs.LO
null
An interactive theorem prover, Isabelle, is under development. In LCF, each inference rule is represented by one function for forwards proof and another (a tactic) for backwards proof. In Isabelle, each inference rule is represented by a Horn clause. Resolution gives both forwards and backwards proof, supporting a large class of logics. Isabelle has been used to prove theorems in Martin-L\"of's Constructive Type Theory. Quantifiers pose several difficulties: substitution, bound variables, Skolemization. Isabelle's representation of logical syntax is the typed lambda-calculus, requiring higher- order unification. It may have potential for logic programming. Depth-first subgoaling along inference rules constitutes a higher-order Prolog.
[ { "version": "v1", "created": "Tue, 31 Oct 2000 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301105
null
Lawrence C. Paulson
The Foundation of a Generic Theorem Prover
null
Journal of Automated Reasoning 5 (1989), 363-397
null
null
cs.LO
null
Isabelle is an interactive theorem prover that supports a variety of logics. It represents rules as propositions (not as functions) and builds proofs by combining rules. These operations constitute a meta-logic (or `logical framework') in which the object-logics are formalized. Isabelle is now based on higher-order logic -- a precise and well-understood foundation. Examples illustrate use of this meta-logic to formalize logics and proofs. Axioms for first-order logic are shown sound and complete. Backwards proof is formalized by meta-reasoning about object-level entailment. Higher-order logic has several practical advantages over other meta-logics. Many proof techniques are known, such as Huet's higher-order unification procedure.
[ { "version": "v1", "created": "Tue, 31 Oct 2000 00:00:00 GMT" } ]
2009-09-25T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301106
null
Lawrence C. Paulson
Isabelle: The Next 700 Theorem Provers
null
published in P. Odifreddi (editor), Logic and Computer Science (Academic Press, 1990), 361-386
null
null
cs.LO
null
Isabelle is a generic theorem prover, designed for interactive reasoning in a variety of formal theories. At present it provides useful proof procedures for Constructive Type Theory, various first-order logics, Zermelo-Fraenkel set theory, and higher-order logic. This survey of Isabelle serves as an introduction to the literature. It explains why generic theorem proving is beneficial. It gives a thorough history of Isabelle, beginning with its origins in the LCF system. It presents an account of how logics are represented, illustrated using classical logic. The approach is compared with the Edinburgh Logical Framework. Several of the Isabelle object-logics are presented.
[ { "version": "v1", "created": "Tue, 31 Oct 2000 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301107
null
Lawrence C. Paulson
A Formulation of the Simple Theory of Types (for Isabelle)
null
published in P. Martin-L\"of & G. Mints (editors), COLOG-88: International Conf. in Computer Logic (Springer LNCS 417, 1990), 246-274
null
null
cs.LO
null
Simple type theory is formulated for use with the generic theorem prover Isabelle. This requires explicit type inference rules. There are function, product, and subset types, which may be empty. Descriptions (the eta-operator) introduce the Axiom of Choice. Higher-order logic is obtained through reflection between formulae and terms of type bool. Recursive types and functions can be formally constructed. Isabelle proof procedures are described. The logic appears suitable for general mathematics as well as computational problems.
[ { "version": "v1", "created": "Tue, 31 Oct 2000 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301108
null
Lawrence C. Paulson
A Higher-Order Implementation of Rewriting
null
Science of Computer Programming 3 (1983), 119-149
null
null
cs.LO
null
Many automatic theorem-provers rely on rewriting. Using theorems as rewrite rules helps to simplify the subgoals that arise during a proof. LCF is an interactive theorem-prover intended for reasoning about computation. Its implementation of rewriting is presented in detail. LCF provides a family of rewriting functions, and operators to combine them. A succession of functions is described, from pattern matching primitives to the rewriting tool that performs most inferences in LCF proofs. The design is highly modular. Each function performs a basic, specific task, such as recognizing a certain form of tautology. Each operator implements one method of building a rewriting function from simpler ones. These pieces can be put together in numerous ways, yielding a variety of rewrit- ing strategies. The approach involves programming with higher-order functions. Rewriting functions are data values, produced by computation on other rewriting functions. The code is in daily use at Cambridge, demonstrating the practical use of functional programming.
[ { "version": "v1", "created": "Thu, 29 Mar 2001 00:00:00 GMT" } ]
2016-08-31T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301109
null
Lawrence C. Paulson and Andrew W. Smith
Logic Programming, Functional Programming, and Inductive Definitions
null
published in P. Schroeder-Heister (editor), Extensions of Logic Programming (Springer, 1991), 283-310
null
null
cs.LO
null
An attempt at unifying logic and functional programming is reported. As a starting point, we take the view that "logic programs" are not about logic but constitute inductive definitions of sets and relations. A skeletal language design based on these considerations is sketched and a prototype implementation discussed.
[ { "version": "v1", "created": "Thu, 29 Mar 2001 00:00:00 GMT" } ]
2016-08-31T00:00:00
[ [ "Paulson", "Lawrence C.", "" ], [ "Smith", "Andrew W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301110
null
Lawrence C. Paulson
Designing a Theorem Prover
null
published in S. Abramsky, D. M. Gabbay, T. S. E. Maibaum (editors), Handbook of Logic in Computer Science, Vol II (Oxford, 1992), 415-475
null
null
cs.LO
null
A step-by-step presentation of the code for a small theorem prover introduces theorem-proving techniques. The programming language used is Standard ML. The prover operates on a sequent calculus formulation of first-order logic, which is briefly explained. The implementation of unification and logical inference is shown. The prover is demonstrated on several small examples, including one that shows its limitations. The final part of the paper is a survey of contemporary research on interactive theorem proving.
[ { "version": "v1", "created": "Thu, 29 Mar 2001 00:00:00 GMT" } ]
2016-08-31T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
cs/9301111
Maggie McLoughlin
Donald E. Knuth
Nested satisfiability
null
Acta Inform. 28 (1990), no. 1, 1--6
null
Knuth migration 11/2004
cs.CC
null
A special case of the satisfiability problem, in which the clauses have a hierarchical structure, is shown to be solvable in linear time, assuming that the clauses have been represented in a convenient way.
[ { "version": "v1", "created": "Mon, 1 Jan 1990 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Knuth", "Donald E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
cs/9301112
Maggie McLoughlin
Donald E. Knuth
A note on digitized angles
null
Electronic Publishing 3 (1990), no. 2, 99--104
null
Knuth migration 11/2004
cs.GR
null
We study the configurations of pixels that occur when two digitized straight lines meet each other.
[ { "version": "v1", "created": "Sun, 1 Apr 1990 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Knuth", "Donald E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
cs/9301113
Maggie McLoughlin
Donald E. Knuth
Textbook examples of recursion
null
Artificial intelligence and mathematical theory of computation
null
Knuth migration 11/2004 207-229, Academic Press, Boston, MA, 1991
cs.CC
null
We discuss properties of recursive schemas related to McCarthy's ``91 function'' and to Takeuchi's triple recursion. Several theorems are proposed as interesting candidates for machine verification, and some intriguing open questions are raised.
[ { "version": "v1", "created": "Thu, 1 Aug 1991 00:00:00 GMT" } ]
2008-02-03T00:00:00
[ [ "Knuth", "Donald E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]