id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0703070
|
Paul Fodor
|
Paul Fodor
|
Flexible Audio Streams
| null | null | null | null |
cs.HC
| null |
Tremendous research effort was invested in audio browsers and machine
learning techniques to decode the structure of Web pages in order to put them
into an audio format. In this paper, we address a simpler and efficient
solution for the creation of an audio browser of VOICEXML generated from
RSS/Atom stream feeds. We developed a multimodal (audio and graphical) portal
application that offers RSS/Atom feeds. By utilizing sing our system, the user
can interact using voice or graphic commands, listen and watch digital content,
such as news, blogs feeds, podcasts, and even access email and personal
schedules. The portal system permits the use of security credentials
(user/password authentication) to collect secure RSS/Atom stream in the
multimodal browser to connect the user to specific personal services. A series
experiments have been conducted to evaluate the performance of the RSS reader
and navigator. Our system is extremely beneficial for a wide range of
applications, from interfaces for the visual impaired users to browsers for
mobile telephonic interfaces.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 00:00:06 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 15:44:51 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 19:04:48 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Fodor",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0703071
|
Paul Fodor
|
Paul Fodor
|
Automatic Annotation of XHTML Pages with Audio Components
| null | null | null | null |
cs.OH
| null |
In this paper we present Deiush, a multimodal system for browsing hypertext
Web documents. The Deiush system is based on our novel approach to
automatically annotate hypertext Web documents (i.e. XHTML pages) with
browsable audio components. It combines two key technologies: (1) middleware
automatic separation of Web documents through structural and semantic analysis
which is annotated with audio components, transforming them into XHTML+VoiceXML
format to represent multimodal dialog; and (2) Opera Browser, an already
standardized browser which we adopt as an interface of the XHTML+VoiceXML
output of annotating. This paper describes the annotation technology of Deiush
and presents an initial system evaluation.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2007 23:43:30 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Mar 2007 15:45:56 GMT"
},
{
"version": "v3",
"created": "Wed, 2 May 2007 19:03:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fodor",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0703072
|
Paul Fodor
|
Paul Fodor
|
Domain Directed Dialogs for Decision Processes
| null | null | null | null |
cs.OH
| null |
The search for a standardized optimum way to communicate using natural
language dialog has involved a lot of research. However, due to the diversity
of communication domains, we think that this is extremely difficult to achieve
and different dialogue management techniques should be applied for different
situations. Our work presents the basis of a communication mechanism that
supports decision processes, is based on decision trees, and minimizes the
number of steps (turn-takes) in the dialogue. The initial dialog workflow is
automatically generated and the user's interaction with the system can also
change the decision tree and create new dialog paths with optimized cost. The
decision tree represents the chronological ordering of the actions (via the
parent-child relationship) and uses an object frame to represent the
information state (capturing the notion of context). This paper presents our
framework, the formalism for interaction and dialogue, and an evaluation of the
system compared to relevant dialog planning frameworks (i.e. finite state
diagrams, frame-based, information state and planning-based dialogue systems).
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 00:08:50 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Mar 2007 14:54:41 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Mar 2007 15:41:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Fodor",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0703073
|
Mine Antoine
|
Antoine Min\'e (LIENS)
|
A New Numerical Abstract Domain Based on Difference-Bound Matrices
|
(update: reversed author first and last names)
|
Program As Data Objects II (PADOII) (05/2001) 155-172
| null | null |
cs.PL
| null |
This paper presents a new numerical abstract domain for static analysis by
abstract interpretation. This domain allows us to represent invariants of the
form (x-y<=c) and (+/-x<=c), where x and y are variables values and c is an
integer or real constant. Abstract elements are represented by Difference-Bound
Matrices, widely used by model-checkers, but we had to design new operators to
meet the needs of abstract interpretation. The result is a complete lattice of
infinite height featuring widening, narrowing and common transfer functions. We
focus on giving an efficient O(n2) representation and graph-based O(n3)
algorithms - where n is the number of variables|and claim that this domain
always performs more precisely than the well-known interval domain. To
illustrate the precision/cost tradeoff of this domain, we have implemented
simple abstract interpreters for toy imperative and parallel languages which
allowed us to prove some non-trivial algorithms correct.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 05:44:24 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2007 08:59:48 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Miné",
"Antoine",
"",
"LIENS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0703074
|
Mine Antoine
|
Antoine Min\'e (LIENS)
|
Field-Sensitive Value Analysis of Embedded C Programs with Union Types
and Pointer Arithmetics
|
(update: reversed author first and last names)
|
Languages, Compilers, and Tools for Embedded Systems (LCTES)
(06/2006) 54-63
| null | null |
cs.PL
| null |
We propose a memory abstraction able to lift existing numerical static
analyses to C programs containing union types, pointer casts, and arbitrary
pointer arithmetics. Our framework is that of a combined points-to and
data-value analysis. We abstract the contents of compound variables in a
field-sensitive way, whether these fields contain numeric or pointer values,
and use stock numerical abstract domains to find an overapproximation of all
possible memory states--with the ability to discover relationships between
variables. A main novelty of our approach is the dynamic mapping scheme we use
to associate a flat collection of abstract cells of scalar type to the set of
accessed memory locations, while taking care of byte-level aliases - i.e., C
variables with incompatible types allocated in overlapping memory locations. We
do not rely on static type information which can be misleading in C programs as
it does not account for all the uses a memory zone may be put to. Our work was
incorporated within the Astr\'{e}e static analyzer that checks for the absence
of run-time-errors in embedded, safety-critical, numerical-intensive software.
It replaces the former memory domain limited to well-typed, union-free,
pointer-cast free data-structures. Early results demonstrate that this
abstraction allows analyzing a larger class of C programs, without much cost
overhead.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 05:46:39 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2007 08:58:00 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Miné",
"Antoine",
"",
"LIENS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0703075
|
Mine Antoine
|
Antoine Min\'e (LIENS)
|
A Few Graph-Based Relational Numerical Abstract Domains
|
(update: reversed author first and last names)
|
Static Analysis Symposium (SAS) (09/2002) 117-132
| null | null |
cs.PL
| null |
This article presents the systematic design of a class of relational
numerical abstract domains from non-relational ones. Constructed domains
represent sets of invariants of the form (vj - vi in C), where vj and vi are
two variables, and C lives in an abstraction of P(Z), P(Q), or P(R). We will
call this family of domains weakly relational domains. The underlying concept
allowing this construction is an extension of potential graphs and
shortest-path closure algorithms in exotic-like algebras. Example constructions
are given in order to retrieve well-known domains as well as new ones. Such
domains can then be used in the Abstract Interpretation framework in order to
design various static analyses. Amajor benfit of this construction is its
modularity, allowing to quickly implement new abstract domains from existing
ones.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 05:56:51 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2007 08:56:08 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Miné",
"Antoine",
"",
"LIENS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0703076
|
Mine Antoine
|
Antoine Min\'e (LIENS)
|
Symbolic Methods to Enhance the Precision of Numerical Abstract Domains
|
(update: reversed author first and last names)
|
Verification, Abstract Interpretation and Model Checking (VMCAI)
(01/2006) 348-363
| null | null |
cs.PL
| null |
We present lightweight and generic symbolic methods to improve the precison
of numerical static analyses based on Abstract Interpretation. The main idea is
to simplify numerical expressions before they are fed to abstract transfer
functions. An important novelty is that these simplifications are performed
on-the-fly, using information gathered dynamically by the analyzer. A first
method, called "linearization," allows abstracting arbitrary expressions into
affine forms with interval coefficients while simplifying them. A second
method, called "symbolic constant propagation," enhances the simplification
feature of the linearization by propagating assigned expressions in a symbolic
way. Combined together, these methods increase the relationality level of
numerical abstract domains and make them more robust against program
transformations. We show how they can be integrated within the classical
interval, octagon and polyhedron domains. These methods have been incorporated
within the Astr\'{e}e static analyzer that checks for the absence of run-time
errors in embedded critical avionics software. We present an experimental proof
of their usefulness.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 06:05:40 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2007 08:54:46 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Miné",
"Antoine",
"",
"LIENS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0703077
|
Mine Antoine
|
Antoine Min\'e (LIENS)
|
Relational Abstract Domains for the Detection of Floating-Point Run-Time
Errors
|
(update: reversed author first and last names)
|
European Symposium on Programming (ESOP) (03/2004) 3-17
| null | null |
cs.PL
| null |
We present a new idea to adapt relational abstract domains to the analysis of
IEEE 754-compliant floating-point numbers in order to statically detect,
through abstract Interpretation-based static analyses, potential floating-point
run-time exceptions such as overflows or invalid operations. In order to take
the non-linearity of rounding into account, expressions are modeled as linear
forms with interval coefficients. We show how to extend already existing
numerical abstract domains, such as the octagon abstract domain, to efficiently
abstract transfer functions based on interval linear forms. We discuss specific
fixpoint stabilization techniques and give some experimental results.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 06:07:02 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2007 08:51:01 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Miné",
"Antoine",
"",
"LIENS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0703078
|
Igor Bjelakovic
|
Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr and Holger
Boche
|
Broadcast Capacity Region of Two-Phase Bidirectional Relaying
|
25 pages, 2 figures, submitted to IEEE Transactions on Information
Theory
| null |
10.1109/TIT.2007.911158
| null |
cs.IT math.IT
| null |
In a three-node network a half-duplex relay node enables bidirectional
communication between two nodes with a spectral efficient two phase protocol.
In the first phase, two nodes transmit their message to the relay node, which
decodes the messages and broadcast a re-encoded composition in the second
phase. In this work we determine the capacity region of the broadcast phase. In
this scenario each receiving node has perfect information about the message
that is intended for the other node. The resulting set of achievable rates of
the two-phase bidirectional relaying includes the region which can be achieved
by applying XOR on the decoded messages at the relay node. We also prove the
strong converse for the maximum error probability and show that this implies
that the $[\eps_1,\eps_2]$-capacity region defined with respect to the average
error probability is constant for small values of error parameters $\eps_1$,
$\eps_2$.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 10:26:04 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Oechtering",
"Tobias J.",
""
],
[
"Bjelakovic",
"Igor",
""
],
[
"Schnurr",
"Clemens",
""
],
[
"Boche",
"Holger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703079
|
Hendrik Jan Hoogeboom
|
Joost Engelfriet, Hendrik Jan Hoogeboom
|
Automata with Nested Pebbles Capture First-Order Logic with Transitive
Closure
|
Paper for Logical Methods in Computer Science, 27 pages, 1 figure
|
Logical Methods in Computer Science, Volume 3, Issue 2 (April 26,
2007) lmcs:2220
|
10.2168/LMCS-3(2:3)2007
| null |
cs.LO
| null |
String languages recognizable in (deterministic) log-space are characterized
either by two-way (deterministic) multi-head automata, or following Immerman,
by first-order logic with (deterministic) transitive closure. Here we elaborate
this result, and match the number of heads to the arity of the transitive
closure. More precisely, first-order logic with k-ary deterministic transitive
closure has the same power as deterministic automata walking on their input
with k heads, additionally using a finite set of nested pebbles. This result is
valid for strings, ordered trees, and in general for families of graphs having
a fixed automaton that can be used to traverse the nodes of each of the graphs
in the family. Other examples of such families are grids, toruses, and
rectangular mazes. For nondeterministic automata, the logic is restricted to
positive occurrences of transitive closure.
The special case of k=1 for trees, shows that single-head deterministic
tree-walking automata with nested pebbles are characterized by first-order
logic with unary deterministic transitive closure. This refines our earlier
result that placed these automata between first-order and monadic second-order
logic on trees.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 10:27:05 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Apr 2007 12:07:25 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Engelfriet",
"Joost",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703080
|
Paul Ioan Fodor
|
Joy Dutta, Paul Fodor
|
A Systematic Approach to Web-Application Development
| null | null | null | null |
cs.SE
| null |
Designing a web-application from a specification involves a series of
well-planned and well executed steps leading to the final product. This often
involves critical changes in design while testing the application, which itself
is slow and cumbersome. Traditional approaches either fully automate the
web-application development process, or let developers write everything from
scratch. Our approach is based on a middle-ground, with precise control on the
workflow and usage of a set of custom-made software tools to automate a
significant part of code generation.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 12:55:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dutta",
"Joy",
""
],
[
"Fodor",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0703081
|
Andre Hernich
|
Martin Grohe, Andre Hernich, Nicole Schweikardt
|
Randomized Computations on Large Data Sets: Tight Lower Bounds
|
29 pages, 2 figures, full version of PODS'06 paper
| null | null | null |
cs.DB cs.CC
| null |
We study the randomized version of a computation model (introduced by Grohe,
Koch, and Schweikardt (ICALP'05); Grohe and Schweikardt (PODS'05)) that
restricts random access to external memory and internal memory space.
Essentially, this model can be viewed as a powerful version of a data stream
model that puts no cost on sequential scans of external memory (as other models
for data streams) and, in addition, (like other external memory models, but
unlike streaming models), admits several large external memory devices that can
be read and written to in parallel.
We obtain tight lower bounds for the decision problems set equality, multiset
equality, and checksort. More precisely, we show that any randomized
one-sided-error bounded Monte Carlo algorithm for these problems must perform
Omega(log N) random accesses to external memory devices, provided that the
internal memory size is at most O(N^(1/4)/log N), where N denotes the size of
the input data.
From the lower bound on the set equality problem we can infer lower bounds on
the worst case data complexity of query evaluation for the languages XQuery,
XPath, and relational algebra on streaming data. More precisely, we show that
there exist queries in XQuery, XPath, and relational algebra, such that any
(randomized) Las Vegas algorithm that evaluates these queries must perform
Omega(log N) random accesses to external memory devices, provided that the
internal memory size is at most O(N^(1/4)/log N).
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 12:58:36 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Grohe",
"Martin",
""
],
[
"Hernich",
"Andre",
""
],
[
"Schweikardt",
"Nicole",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0703082
|
Christian Rasch
|
Christian Rasch and Thomas Satzger
|
Remarks on the O(N) Implementation of the Fast Marching Method
|
7 pages, 2 figures
| null | null | null |
cs.NA
| null |
The fast marching algorithm computes an approximate solution to the eikonal
equation in O(N log N) time, where the factor log N is due to the
administration of a priority queue. Recently, Yatziv, Bartesaghi and Sapiro
have suggested to use an untidy priority queue, reducing the overall complexity
to O(N) at the price of a small error in the computed solution. In this paper,
we give an explicit estimate of the error introduced, which is based on a
discrete comparison principle. This estimates implies in particular that the
choice of an accuracy level that is independent of the speed function F results
in the complexity bound O(Fmax /Fmin N). A numerical experiment illustrates
this robustness problem for large ratios Fmax /Fmin .
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 13:41:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Rasch",
"Christian",
""
],
[
"Satzger",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0703083
|
Frank McCown
|
Frank McCown and Michael L. Nelson
|
Characterization of Search Engine Caches
|
5 pages, 9 figures, IS&T Archiving 2007, May, 2007
| null | null | null |
cs.DL cs.CY
| null |
Search engines provide cached copies of indexed content so users will have
something to "click on" if the remote resource is temporarily or permanently
unavailable. Depending on their proprietary caching strategies, search engines
will purge their indexes and caches of resources that exceed a threshold of
unavailability. Although search engine caches are provided only as an aid to
the interactive user, we are interested in building reliable preservation
services from the aggregate of these limited caching services. But first, we
must understand the contents of search engine caches. In this paper, we have
examined the cached contents of Ask, Google, MSN and Yahoo to profile such
things as overlap between index and cache, size, MIME type and "staleness" of
the cached resources. We also examined the overlap of the various caches with
the holdings of the Internet Archive.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 15:16:08 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2007 20:24:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"McCown",
"Frank",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0703084
|
Mine Antoine
|
Antoine Min\'e (LIENS)
|
The Octagon Abstract Domain
|
(update: reversed author first and last names)
|
Analysis, Slicing and Transformation (AST) (10/2001) 310-319
| null | null |
cs.PL
| null |
This article presents a new numerical abstract domain for static analysis by
abstract interpretation. It extends a former numerical abstract domain based on
Difference-Bound Matrices and allows us to represent invariants of the form
(+/-x+/-y<=c), where x and y are program variables and c is a real constant. We
focus on giving an efficient representation based on Difference-Bound Matrices
- O(n2) memory cost, where n is the number of variables - and graph-based
algorithms for all common abstract operators - O(n3) time cost. This includes a
normal form algorithm to test equivalence of representation and a widening
operator to compute least fixpoint approximations.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 18:16:32 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2007 08:47:24 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Miné",
"Antoine",
"",
"LIENS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0703085
|
Xiaoyang Gu
|
Xiaoyang Gu, Jack H. Lutz
|
Dimension and Relative Frequencies
| null | null | null | null |
cs.CC
| null |
We show how to calculate the finite-state dimension (equivalently, the
finite-state compressibility) of a saturated sets $X$ consisting of {\em all}
infinite sequences $S$ over a finite alphabet $\Sigma_m$ satisfying some given
condition $P$ on the asymptotic frequencies with which various symbols from
$\Sigma_m$ appear in $S$. When the condition $P$ completely specifies an
empirical probability distribution $\pi$ over $\Sigma_m$, i.e., a limiting
frequency of occurrence for {\em every} symbol in $\Sigma_m$, it has been known
since 1949 that the Hausdorff dimension of $X$ is precisely $\CH(\pi)$, the
Shannon entropy of $\pi$, and the finite-state dimension was proven to have
this same value in 2001.
The saturated sets were studied by Volkmann and Cajar decades ago. It got
attention again only with the recent developments in multifractal analysis by
Barreira, Saussol, Schmeling, and separately Olsen. However, the powerful
methods they used -- ergodic theory and multifractal analysis -- do not yield a
value for the finite-state (or even computable) dimension in an obvious manner.
We give a pointwise characterization of finite-state dimensions of saturated
sets. Simultaneously, we also show that their finite-state dimension and strong
dimension coincide with their Hausdorff and packing dimension respectively,
though the techniques we use are completely elementary. Our results
automatically extend to less restrictive effective settings (e.g.,
constructive, computable, and polynomial-time dimensions).
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2007 02:42:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gu",
"Xiaoyang",
""
],
[
"Lutz",
"Jack H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0703086
|
John Kouvakis
|
John Kouvakis, Fotis Georgatos
|
A Technical Report On Grid Benchmarking using SEE V.O
|
5 pages, 12 figures including tables of results, SEE VO
| null | null |
TR-MOD07-001
|
cs.PF
| null |
Grids include heterogeneous resources, which are based on different hardware
and software architectures or components. In correspondence with this diversity
of the infrastructure, the execution time of any single job, as well as the
total grid performance can both be affected substantially, which can be
demonstrated by measurements. Running a simple benchmarking suite can show this
heterogeneity and give us results about the differences over the grid sites.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 21:06:06 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Jun 2007 06:50:30 GMT"
}
] | 2007-06-13T00:00:00 |
[
[
"Kouvakis",
"John",
""
],
[
"Georgatos",
"Fotis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
cs/0703087
|
Kristina Lerman
|
Kristina Lerman
|
Social Information Processing in Social News Aggregation
|
Extended version of the paper submitted to IEEE Internet Computing's
special issue on Social Search
| null |
10.1109/MIC.2007.136
| null |
cs.CY cs.AI cs.HC cs.MA
| null |
The rise of the social media sites, such as blogs, wikis, Digg and Flickr
among others, underscores the transformation of the Web to a participatory
medium in which users are collaboratively creating, evaluating and distributing
information. The innovations introduced by social media has lead to a new
paradigm for interacting with information, what we call 'social information
processing'. In this paper, we study how social news aggregator Digg exploits
social information processing to solve the problems of document recommendation
and rating. First, we show, by tracking stories over time, that social networks
play an important role in document recommendation. The second contribution of
this paper consists of two mathematical models. The first model describes how
collaborative rating and promotion of stories emerges from the independent
decisions made by many users. The second model describes how a user's
influence, the number of promoted stories and the user's social network,
changes in time. We find qualitative agreement between predictions of the model
and user data gathered from Digg.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 22:37:22 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2007 23:38:57 GMT"
}
] | 2012-07-03T00:00:00 |
[
[
"Lerman",
"Kristina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0703088
|
Ignacio Vega-Paez M en C
|
Ignacio Vega-Paez and Carlos Alberto Hernandez-Hernandez
|
Plot 94 in ambiance X-Window
| null |
Proceedings in Information Systems Analysis and Synthesis ISAS
1995, 5th, International Symposium on Systems Research, Informatics and
Cybernetics, pp. 135-139, August 16-20, 95, Baden-Baden, Germany
| null |
IBP-TR1995-01
|
cs.CV cs.GR
| null |
<PLOT > is a collection of routines to draw surfaces, contours and so on. In
this work we are presenting a version, that functions over work stations with
the operative system UNIX, that count with the graphic ambiance X-WINDOW with
the tools XLIB and OSF/MOTIF. This implant was realized for the work stations
DEC 5000-200, DEC IPX, and DEC ALFA of the CINVESTAV (Center of Investigation
and Advanced Studies). Also implanted in SILICON GRAPHICS of the CENAC
(National Center of Calculation of the Polytechnic National Institute
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2007 00:18:11 GMT"
}
] | 2011-07-13T00:00:00 |
[
[
"Vega-Paez",
"Ignacio",
""
],
[
"Hernandez-Hernandez",
"Carlos Alberto",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0703089
|
Ignacio Vega-Paez M en C
|
Ignacio Vega-Paez and Feliu D. Sagols T
|
Space Program Language (SPL/SQL) for the Relational Approach of the
Spatial Databases
| null |
Proceedings in Information Systems Analysis and Synthesis ISAS
1995, 5th International Symposium on Systems Research, Informatics and
Cybernetics, pp. 89-93 August 16-20, 95, Baden-Baden, Germany
| null |
IBP-TR1995-02
|
cs.DB cs.CG
| null |
In this project we are presenting a grammar which unify the design and
development of spatial databases. In order to make it, we combine nominal and
spatial information, the former is represented by the relational model and
latter by a modification of the same model. The modification lets to represent
spatial data structures (as Quadtrees, Octrees, etc.) in a integrated way. This
grammar is important because with it we can create tools to build systems that
combine spatial-nominal characteristics such as Geographical Information
Systems (GIS), Hypermedia Systems, Computed Aided Design Systems (CAD), and so
on
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2007 00:39:57 GMT"
}
] | 2011-07-14T00:00:00 |
[
[
"Vega-Paez",
"Ignacio",
""
],
[
"T",
"Feliu D. Sagols",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0703090
|
Inderjeet Kaur
|
Kaur Inderjeet, Sharma Kanchan, Kulkarni.M
|
Orthogonal Frequency Division Multiplexing: An Overview
|
7 Pages, 5 Figures
| null | null | null |
cs.IT math.IT
| null |
Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier
modulation scheme that provides efficient bandwidth utilization and robustness
against time dispersive channels. This paper deals with the basic system model
for OFDM based systems and with self-interference, or the corruption of desired
signal by itself in OFDM systems. A simple transceiver based on OFDM modulation
is presented. Important impairments in OFDM systems are mathematically analyzed
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2007 04:52:04 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Inderjeet",
"Kaur",
""
],
[
"Kanchan",
"Sharma",
""
],
[
"M",
"Kulkarni.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703091
|
Frederic Landragin
|
Fr\'ed\'eric Landragin (INRIA Lorraine - LORIA), Alexandre Denis
(INRIA Lorraine - LORIA), Annalisa Ricci (INRIA Lorraine - LORIA), Laurent
Romary (INRIA Lorraine - LORIA)
|
Multimodal Meaning Representation for Generic Dialogue Systems
Architectures
| null |
Proceedings of the Fourth International Conference on Language
Resources and Evaluation (LREC 2004) (2004) 521-524
| null | null |
cs.AI cs.MM
| null |
An unified language for the communicative acts between agents is essential
for the design of multi-agents architectures. Whatever the type of interaction
(linguistic, multimodal, including particular aspects such as force feedback),
whatever the type of application (command dialogue, request dialogue, database
querying), the concepts are common and we need a generic meta-model. In order
to tend towards task-independent systems, we need to clarify the modules
parameterization procedures. In this paper, we focus on the characteristics of
a meta-model designed to represent meaning in linguistic and multimodal
applications. This meta-model is called MMIL for MultiModal Interface Language,
and has first been specified in the framework of the IST MIAMM European
project. What we want to test here is how relevant is MMIL for a completely
different context (a different task, a different interaction type, a different
linguistic domain). We detail the exploitation of MMIL in the framework of the
IST OZONE European project, and we draw the conclusions on the role of MMIL in
the parameterization of task-independent dialogue managers.
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2007 15:37:47 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Landragin",
"Frédéric",
"",
"INRIA Lorraine - LORIA"
],
[
"Denis",
"Alexandre",
"",
"INRIA Lorraine - LORIA"
],
[
"Ricci",
"Annalisa",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
cs/0703092
|
Partha Basuchowdhuri
|
Partha Basuchowdhuri
|
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum
Protocol
|
9 pages, 4 figures
| null | null | null |
cs.CR
| null |
This paper compares the popular quantum key distribution (QKD) protocol BB84
with the more recent Kak's three-stage protocol and the latter is shown to be
more secure. A theoretical representation of an authentication-aided version of
Kak's three-stage protocol is provided that makes it possible to deal with the
man-in-the-middle attack.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2007 08:13:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Basuchowdhuri",
"Partha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0703093
|
Roman Vershynin
|
Roman Vershynin
|
Some problems in asymptotic convex geometry and random matrices
motivated by numerical algorithms
|
12 pages, no figures. Based on the talk at the 2006 conference on
Banach Spaces and their applications in analysis
|
Banach spaces and their applications in analysis, 209--218, Walter
de Gruyter, Berlin, 2007
| null | null |
cs.CG cs.DS cs.NA
| null |
The simplex method in Linear Programming motivates several problems of
asymptotic convex geometry. We discuss some conjectures and known results in
two related directions -- computing the size of projections of high dimensional
polytopes and estimating the norms of random matrices and their inverses.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2007 21:51:50 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Vershynin",
"Roman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0703094
|
Olivier Powell
|
Olivier Powell and Sotiris Nikolesteas
|
Geographic Routing Around Obstacles in Wireless Sensor Networks
|
37 pages, 23 figures
| null | null | null |
cs.DC
| null |
Geographic routing is becoming the protocol of choice for many sensor network
applications. The current state of the art is unsatisfactory: some algorithms
are very efficient, however they require a preliminary planarization of the
communication graph. Planarization induces overhead and is not realistic in
many scenarios. On the otherhand, georouting algorithms which do not rely on
planarization have fairly low success rates and either fail to route messages
around all but the simplest obstacles or have a high topology control overhead
(e.g. contour detection algorithms). To overcome these limitations, we propose
GRIC, the first lightweight and efficient on demand (i.e. all-to-all)
geographic routing algorithm which does not require planarization and has
almost 100% delivery rates (when no obstacles are added). Furthermore, the
excellent behavior of our algorithm is maintained even in the presence of large
convex obstacles. The case of hard concave obstacles is also studied; such
obstacles are hard instances for which performance diminishes.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2007 12:17:57 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Powell",
"Olivier",
""
],
[
"Nikolesteas",
"Sotiris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0703095
|
Jian Ma
|
Jian Ma and Zengqi Sun
|
Copula Component Analysis
| null | null | null | null |
cs.IR cs.AI
| null |
A framework named Copula Component Analysis (CCA) for blind source separation
is proposed as a generalization of Independent Component Analysis (ICA). It
differs from ICA which assumes independence of sources that the underlying
components may be dependent with certain structure which is represented by
Copula. By incorporating dependency structure, much accurate estimation can be
made in principle in the case that the assumption of independence is
invalidated. A two phrase inference method is introduced for CCA which is based
on the notion of multidimensional ICA.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2007 14:52:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ma",
"Jian",
""
],
[
"Sun",
"Zengqi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0703096
|
Aleksandar Donev
|
Aleksandar Donev
|
Asynchronous Event-Driven Particle Algorithms
|
To appear in Simulation: Transactions of the Society for Modeling and
Simulation International, 2008
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present, in a unifying way, the main components of three asynchronous
event-driven algorithms for simulating physical systems of interacting
particles. The first example, hard-particle molecular dynamics, is well-known.
We also present a recently-developed diffusion kinetic Monte Carlo algorithm,
as well as a novel stochastic molecular-dynamics algorithm that builds on the
Direct Simulation Monte Carlo. We explain how to effectively combine
asynchronous event-driven with classical time-driven or with synchronous
event-driven handling. Finally, we discuss some promises and challenges for
event-driven simulation of realistic physical systems.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2007 16:52:20 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Sep 2008 19:13:32 GMT"
}
] | 2008-09-09T00:00:00 |
[
[
"Donev",
"Aleksandar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0703097
|
Lane A. Hemaspaandra
|
Gabor Erdelyi, Lane A. Hemaspaandra, Joerg Rothe, Holger Spakowski
|
On Approximating Optimal Weighted Lobbying, and Frequency of Correctness
versus Average-Case Polynomial Time
| null | null | null |
URCS-TR-2007-914
|
cs.GT cs.CC cs.MA
| null |
We investigate issues related to two hard problems related to voting, the
optimal weighted lobbying problem and the winner problem for Dodgson elections.
Regarding the former, Christian et al. [CFRS06] showed that optimal lobbying is
intractable in the sense of parameterized complexity. We provide an efficient
greedy algorithm that achieves a logarithmic approximation ratio for this
problem and even for a more general variant--optimal weighted lobbying. We
prove that essentially no better approximation ratio than ours can be proven
for this greedy algorithm.
The problem of determining Dodgson winners is known to be complete for
parallel access to NP [HHR97]. Homan and Hemaspaandra [HH06] proposed an
efficient greedy heuristic for finding Dodgson winners with a guaranteed
frequency of success, and their heuristic is a ``frequently self-knowingly
correct algorithm.'' We prove that every distributional problem solvable in
polynomial time on the average with respect to the uniform distribution has a
frequently self-knowingly correct polynomial-time algorithm. Furthermore, we
study some features of probability weight of correctness with respect to
Procaccia and Rosenschein's junta distributions [PR07].
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2007 20:35:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Erdelyi",
"Gabor",
""
],
[
"Hemaspaandra",
"Lane A.",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Spakowski",
"Holger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0703098
|
Sergey Gubin
|
Sergey Gubin
|
Polynomial time algorithm for 3-SAT. Examples of use
|
19 pages
| null | null | null |
cs.CC cs.DM cs.DS cs.LO
| null |
The algorithm checks the propositional formulas for patterns of
unsatisfiability.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2007 06:46:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gubin",
"Sergey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703099
|
Nicolas Bonneau
|
E. Altman, K. Avrachenkov, N. Bonneau, M. Debbah, R. El-Azouzi, D.
Sadoc Menasche
|
Constrained Cost-Coupled Stochastic Games with Independent State
Processes
|
7 pages, submitted in september 2006 to Operations Research Letters
| null | null | null |
cs.IT cs.GT math.IT
| null |
We consider a non-cooperative constrained stochastic games with N players
with the following special structure. With each player there is an associated
controlled Markov chain. The transition probabilities of the i-th Markov chain
depend only on the state and actions of controller i. The information structure
that we consider is such that each player knows the state of its own MDP and
its own actions. It does not know the states of, and the actions taken by other
players. Finally, each player wishes to minimize a time-average cost function,
and has constraints over other time-avrage cost functions. Both the cost that
is minimized as well as those defining the constraints depend on the state and
actions of all players. We study in this paper the existence of a Nash
equilirium. Examples in power control in wireless communications are given.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2007 10:27:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Altman",
"E.",
""
],
[
"Avrachenkov",
"K.",
""
],
[
"Bonneau",
"N.",
""
],
[
"Debbah",
"M.",
""
],
[
"El-Azouzi",
"R.",
""
],
[
"Menasche",
"D. Sadoc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703100
|
Rajmohan Rajaraman
|
Guolong Lin and Rajmohan Rajaraman
|
Approximation Algorithms for Multiprocessor Scheduling under Uncertainty
|
12 pages, 2 encapsulated postscript figures
| null | null | null |
cs.DC cs.CC cs.DS
| null |
Motivated by applications in grid computing and project management, we study
multiprocessor scheduling in scenarios where there is uncertainty in the
successful execution of jobs when assigned to processors. We consider the
problem of multiprocessor scheduling under uncertainty, in which we are given n
unit-time jobs and m machines, a directed acyclic graph C giving the
dependencies among the jobs, and for every job j and machine i, the probability
p_{ij} of the successful completion of job j when scheduled on machine i in any
given particular step. The goal of the problem is to find a schedule that
minimizes the expected makespan, that is, the expected completion time of all
the jobs.
The problem of multiprocessor scheduling under uncertainty was introduced by
Malewicz and was shown to be NP-hard even when all the jobs are independent. In
this paper, we present polynomial-time approximation algorithms for the
problem, for special cases of the dag C. We obtain an O(log(n))-approximation
for the case of independent jobs, an
O(log(m)log(n)log(n+m)/loglog(n+m))-approximation when C is a collection of
disjoint chains, an O(log(m)log^2(n))-approximation when C is a collection of
directed out- or in-trees, and an
O(log(m)log^2(n)log(n+m)/loglog(n+m))-approximation when C is a directed
forest.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2007 20:35:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lin",
"Guolong",
""
],
[
"Rajaraman",
"Rajmohan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703101
|
Thomas M. Breuel
|
Thomas M. Breuel
|
A Note on Approximate Nearest Neighbor Methods
|
The report was originally written in 2005 and does not reference
information after that date
| null | null | null |
cs.IR cs.CC cs.CV
| null |
A number of authors have described randomized algorithms for solving the
epsilon-approximate nearest neighbor problem. In this note I point out that the
epsilon-approximate nearest neighbor property often fails to be a useful
approximation property, since epsilon-approximate solutions fail to satisfy the
necessary preconditions for using nearest neighbors for classification and
related tasks.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2007 20:47:33 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Breuel",
"Thomas M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
cs/0703102
|
Ashish Kumar
|
Ashish Kumar Singh, Adnan Aziz, Sriram Vishwanath, Michael Orshansky
|
Generation of Efficient Codes for Realizing Boolean Functions in
Nanotechnologies
|
6 pages, 5 Figures
| null | null | null |
cs.IT cs.DM math.IT
| null |
We address the challenge of implementing reliable computation of Boolean
functions in future nanocircuit fabrics. Such fabrics are projected to have
very high defect rates. We overcome this limitation by using a combination of
cheap but unreliable nanodevices and reliable but expensive CMOS devices. In
our approach, defect tolerance is achieved through a novel coding of Boolean
functions; specifically, we exploit the dont cares of Boolean functions
encountered in multi-level Boolean logic networks for constructing better
codes. We show that compared to direct application of existing coding
techniques, the coding overhead in terms of extra bits can be reduced, on
average by 23%, and savings can go up to 34%. We demonstrate that by
incorporating efficient coding techniques more than a 40% average yield
improvement is possible in case of 1% and 0.1% defect rates. With 0.1% defect
density, the savings can be up to 90%.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2007 21:30:25 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Apr 2007 20:35:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Singh",
"Ashish Kumar",
""
],
[
"Aziz",
"Adnan",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Orshansky",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703103
|
Jia Tao
|
Jia Tao, Shashi Gadia, Tsz Shing Cheng
|
Concept of a Value in Multilevel Security Databases
|
This paper has been withdrawn
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper has been withdrawn.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 03:31:27 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jun 2009 21:55:56 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Jun 2009 00:07:21 GMT"
}
] | 2009-06-30T00:00:00 |
[
[
"Tao",
"Jia",
""
],
[
"Gadia",
"Shashi",
""
],
[
"Cheng",
"Tsz Shing",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0703104
|
Hajime Matsui
|
Hajime Matsui, Seiichi Mita
|
Encoding via Gr\"obner bases and discrete Fourier transforms for several
types of algebraic codes
|
5 pages, 4 figures, To be presented at IEEE International Symposium
on Information Theory 2007
| null | null | null |
cs.IT math.IT
| null |
We propose a novel encoding scheme for algebraic codes such as codes on
algebraic curves, multidimensional cyclic codes, and hyperbolic cascaded
Reed-Solomon codes and present numerical examples. We employ the recurrence
from the Gr\"obner basis of the locator ideal for a set of rational points and
the two-dimensional inverse discrete Fourier transform. We generalize the
functioning of the generator polynomial for Reed-Solomon codes and develop
systematic encoding for various algebraic codes.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 04:52:35 GMT"
},
{
"version": "v2",
"created": "Wed, 2 May 2007 12:25:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Matsui",
"Hajime",
""
],
[
"Mita",
"Seiichi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703105
|
Yingquan Wu
|
Yingquan Wu
|
New List Decoding Algorithms for Reed-Solomon and BCH Codes
| null |
IEEE Trans. Inform. Theory, Aug. 2008
| null | null |
cs.IT cs.CC math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we devise a rational curve fitting algorithm and apply it to
the list decoding of Reed-Solomon and BCH codes. The proposed list decoding
algorithms exhibit the following significant properties. 1 The algorithm
corrects up to $n(1-\sqrt{1-D})$ errors for a (generalized) $(n, k, d=n-k+1)$
Reed-Solomon code, which matches the Johnson bound, where $D\eqdef \frac{d}{n}$
denotes the normalized minimum distance. In comparison with the Guruswami-Sudan
algorithm, which exhibits the same list correction capability, the former
requires multiplicity, which dictates the algorithmic complexity,
$O(n(1-\sqrt{1-D}))$, whereas the latter requires multiplicity $O(n^2(1-D))$.
With the up-to-date most efficient implementation, the former has complexity
$O(n^{6}(1-\sqrt{1-D})^{7/2})$, whereas the latter has complexity
$O(n^{10}(1-D)^4)$. 2. With the multiplicity set to one, the derivative list
correction capability precisely sits in between the conventional hard-decision
decoding and the optimal list decoding. Moreover, the number of candidate
codewords is upper bounded by a constant for a fixed code rate and thus, the
derivative algorithm exhibits quadratic complexity $O(n^2)$. 3. By utilizing
the unique properties of the Berlekamp algorithm, the algorithm corrects up to
$\frac{n}{2}(1-\sqrt{1-2D})$ errors for a narrow-sense $(n, k, d)$ binary BCH
code, which matches the Johnson bound for binary codes. The algorithmic
complexity is $O(n^{6}(1-\sqrt{1-2D})^7)$.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 05:29:48 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jun 2007 01:54:29 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Dec 2008 18:39:11 GMT"
}
] | 2008-12-10T00:00:00 |
[
[
"Wu",
"Yingquan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703106
|
Paul Wang
|
Shengbao Wang
|
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments
and Its Applications
|
A work in progress, any comment and suggestion will be highly
appreciated by the author
| null | null | null |
cs.CR
| null |
In this paper, we present a new identity-based encryption (IBE) scheme using
bilinear pairings. Our IBE scheme enjoys the same \textsf{Key Extraction} and
\textsf{Decryption} algorithms with the famous IBE scheme of Boneh and Franklin
(BF-IBE for short), while differs from the latter in that it has modified
\textsf{Setup} and \textsf{Encryption} algorithms.
Compared with BF-IBE, we show that ours are more practical in a multiple
private key generator (PKG) environment, mainly due to that the session secret
$g_{ID}$ could be pre-computed \emph{before} any interaction, and the sender
could encrypt a message using $g_{ID}$ prior to negotiating with the intended
recipient(s). As an application of our IBE scheme, we also derive an escrowed
ElGamal scheme which possesses certain good properties in practice.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 08:05:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Wang",
"Shengbao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0703107
|
Arnaud Legout
|
Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Nikitas
Liogkas (UCLA), Eddie Kohler (UCLA), Lixia Zhang (UCLA)
|
Clustering and Sharing Incentives in BitTorrent Systems
|
This article is the author version of a paper accepted at ACM
SIGMETRICS'2007. In particular, this paper is different from the technical
report inria-00112066, version 1 - 21 November 2006. The technical report
inria-00112066, version 1 - 21 November 2006 is a extended version of this
paper (same title and authors, but different content) Version 2 is the same
content as version 1, but with a different class in order to match the camera
ready format for SIGMETRICS
|
Dans ACM SIGMETRICS'2007 (2007)
| null | null |
cs.NI
| null |
Peer-to-peer protocols play an increasingly instrumental role in Internet
content distribution. It is therefore important to gain a complete
understanding of how these protocols behave in practice and how their operating
parameters affect overall system performance. This paper presents the first
detailed experimental investigation of the peer selection strategy in the
popular BitTorrent protocol. By observing more than 40 nodes in instrumented
private torrents, we validate three protocol properties that, though believed
to hold, have not been previously demonstrated experimentally: the clustering
of similar-bandwidth peers, the effectiveness of BitTorrent's sharing
incentives, and the peers' high uplink utilization. In addition, we observe
that BitTorrent's modified choking algorithm in seed state provides uniform
service to all peers, and that an underprovisioned initial seed leads to
absence of peer clustering and less effective sharing incentives. Based on our
results, we provide guidelines for seed provisioning by content providers, and
discuss a tracker protocol extension that addresses an identified limitation of
the protocol.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 08:16:02 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 06:27:16 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Legout",
"Arnaud",
"",
"INRIA Sophia Antipolis / INRIA Rhône-Alpes"
],
[
"Liogkas",
"Nikitas",
"",
"UCLA"
],
[
"Kohler",
"Eddie",
"",
"UCLA"
],
[
"Zhang",
"Lixia",
"",
"UCLA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0703108
|
Sourav Dhar
|
Sourav Dhar, Rabindranath Bera, K.Mal
|
Wireless Lan to Support Multimedia Communication Using Spread Spectrum
Technology
|
URSI 0ctober 22-29 2005, 4pages, 6 figures
| null | null | null |
cs.NI
| null |
Wireless LAN is currently enjoying rapid deployment in University
departments, business offices, hospitals and homes. It becomes an inexpensive
technology and allows multiple numbers of the households to simultaneously
access the internet while roaming about the house. In the present work, the
design and development of a wireless LAN is highlighted which utilizes direct
sequence spread spectrum (DSSS) technology at 900MHz RF carrier frequency in
its physical layer. This provides enormous security in the physical layer and
hence it is very difficult to hack or jam the network. The installation cost is
also less due to the use of 900 MHz RF carrier frequency..
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 11:07:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Dhar",
"Sourav",
""
],
[
"Bera",
"Rabindranath",
""
],
[
"Mal",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0703109
|
Daniel Lemire
|
Owen Kaser and Daniel Lemire
|
Tag-Cloud Drawing: Algorithms for Cloud Visualization
|
To appear in proceedings of Tagging and Metadata for Social
Information Organization (WWW 2007)
| null | null | null |
cs.DS
| null |
Tag clouds provide an aggregate of tag-usage statistics. They are typically
sent as in-line HTML to browsers. However, display mechanisms suited for
ordinary text are not ideal for tags, because font sizes may vary widely on a
line. As well, the typical layout does not account for relationships that may
be known between tags. This paper presents models and algorithms to improve the
display of tag clouds that consist of in-line HTML, as well as algorithms that
use nested tables to achieve a more general 2-dimensional layout in which tag
relationships are considered. The first algorithms leverage prior work in
typesetting and rectangle packing, whereas the second group of algorithms
leverage prior work in Electronic Design Automation. Experiments show our
algorithms can be efficiently implemented and perform well.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 14:54:48 GMT"
},
{
"version": "v2",
"created": "Mon, 7 May 2007 17:59:20 GMT"
}
] | 2009-04-22T00:00:00 |
[
[
"Kaser",
"Owen",
""
],
[
"Lemire",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0703110
|
Ketan Mulmuley D
|
Jonah Blasiak, Ketan D. Mulmuley, Milind Sohoni
|
Geometric Complexity Theory IV: nonstandard quantum group for the
Kronecker problem
|
145 pages. This is the final journal version to appear in the Memoirs
of the American Mathematical Society
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Kronecker coefficient g_{\lambda \mu \nu} is the multiplicity of the
GL(V)\times GL(W)-irreducible V_\lambda \otimes W_\mu in the restriction of the
GL(X)-irreducible X_\nu via the natural map GL(V)\times GL(W) \to GL(V \otimes
W), where V, W are \mathbb{C}-vector spaces and X = V \otimes W. A fundamental
open problem in algebraic combinatorics is to find a positive combinatorial
formula for these coefficients.
We construct two quantum objects for this problem, which we call the
nonstandard quantum group and nonstandard Hecke algebra. We show that the
nonstandard quantum group has a compact real form and its representations are
completely reducible, that the nonstandard Hecke algebra is semisimple, and
that they satisfy an analog of quantum Schur-Weyl duality.
Using these nonstandard objects as a guide, we follow the approach of Adsul,
Sohoni, and Subrahmanyam to construct, in the case dim(V) = dim(W) =2, a
representation \check{X}_\nu of the nonstandard quantum group that specializes
to Res_{GL(V) \times GL(W)} X_\nu at q=1. We then define a global crystal basis
+HNSTC(\nu) of \check{X}_\nu that solves the two-row Kronecker problem: the
number of highest weight elements of +HNSTC(\nu) of weight (\lambda,\mu) is the
Kronecker coefficient g_{\lambda \mu \nu}. We go on to develop the beginnings
of a graphical calculus for this basis, along the lines of the U_q(\sl_2)
graphical calculus, and use this to organize the crystal components of
+HNSTC(\nu) into eight families. This yields a fairly simple, explicit and
positive formula for two-row Kronecker coefficients, generalizing a formula of
Brown, van Willigenburg, and Zabrocki. As a byproduct of the approach, we also
obtain a rule for the decomposition of Res_{GL_2 \times GL_2 \rtimes \S_2}
X_\nu into irreducibles.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 15:35:29 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 21:48:50 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Oct 2011 20:43:54 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Jun 2013 20:47:14 GMT"
}
] | 2013-06-10T00:00:00 |
[
[
"Blasiak",
"Jonah",
""
],
[
"Mulmuley",
"Ketan D.",
""
],
[
"Sohoni",
"Milind",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0703111
|
Jia Liu
|
Jia Liu and Y. Thomas Hou
|
Maximum Weighted Sum Rate of Multi-Antenna Broadcast Channels
| null | null | null | null |
cs.IT math.IT
| null |
Recently, researchers showed that dirty paper coding (DPC) is the optimal
transmission strategy for multiple-input multiple-output broadcast channels
(MIMO-BC). In this paper, we study how to determine the maximum weighted sum of
DPC rates through solving the maximum weighted sum rate problem of the dual
MIMO multiple access channel (MIMO-MAC) with a sum power constraint. We first
simplify the maximum weighted sum rate problem such that enumerating all
possible decoding orders in the dual MIMO-MAC is unnecessary. We then design an
efficient algorithm based on conjugate gradient projection (CGP) to solve the
maximum weighted sum rate problem. Our proposed CGP method utilizes the
powerful concept of Hessian conjugacy. We also develop a rigorous algorithm to
solve the projection problem. We show that CGP enjoys provable convergence,
nice scalability, and great efficiency for large MIMO-BC systems.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 17:20:02 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Jia",
""
],
[
"Hou",
"Y. Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703112
|
Bharath Ramesh
|
Bharath Ramesh and Srinidhi Varadarajan
|
User-level DSM System for Modern High-Performance Interconnection
Networks
|
6 pages, 5 figures
| null | null | null |
cs.DC
| null |
In this paper, we introduce a new user-level DSM system which has the ability
to directly interact with underlying interconnection networks. The DSM system
provides the application programmer a flexible API to program parallel
applications either using shared memory semantics over physically distributed
memory or to use an efficient remote memory demand paging technique. We also
introduce a new time slice based memory consistency protocol which is used by
the DSM system. We present preliminary results from our implementation on a
small Opteron Linux cluster interconnected over Myrinet.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2007 19:15:00 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ramesh",
"Bharath",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0703113
|
Kamel Aouiche
|
Kamel Aouiche and Jerome Darmont and Omar Boussaid and Fadila Bentayeb
|
Automatic Selection of Bitmap Join Indexes in Data Warehouses
| null | null | null | null |
cs.DB
| null |
The queries defined on data warehouses are complex and use several join
operations that induce an expensive computational cost. This cost becomes even
more prohibitive when queries access very large volumes of data. To improve
response time, data warehouse administrators generally use indexing techniques
such as star join indexes or bitmap join indexes. This task is nevertheless
complex and fastidious. Our solution lies in the field of data warehouse
auto-administration. In this framework, we propose an automatic index selection
strategy. We exploit a data mining technique ; more precisely frequent itemset
mining, in order to determine a set of candidate indexes from a given workload.
Then, we propose several cost models allowing to create an index configuration
composed by the indexes providing the best profit. These models evaluate the
cost of accessing data using bitmap join indexes, and the cost of updating and
storing these indexes.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 04:25:36 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Aouiche",
"Kamel",
""
],
[
"Darmont",
"Jerome",
""
],
[
"Boussaid",
"Omar",
""
],
[
"Bentayeb",
"Fadila",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0703114
|
Kamel Aouiche
|
Kamel Aouiche and Pierre-Emmanuel Jouve and Jerome Darmont
|
Clustering-Based Materialized View Selection in Data Warehouses
| null | null | null | null |
cs.DB
| null |
Materialized view selection is a non-trivial task. Hence, its complexity must
be reduced. A judicious choice of views must be cost-driven and influenced by
the workload experienced by the system. In this paper, we propose a framework
for materialized view selection that exploits a data mining technique
(clustering), in order to determine clusters of similar queries. We also
propose a view merging algorithm that builds a set of candidate views, as well
as a greedy process for selecting a set of views to materialize. This selection
is based on cost models that evaluate the cost of accessing data using views
and the cost of storing these views. To validate our strategy, we executed a
workload of decision-support queries on a test data warehouse, with and without
using our strategy. Our experimental results demonstrate its efficiency, even
when storage space is limited.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 04:31:35 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Aouiche",
"Kamel",
""
],
[
"Jouve",
"Pierre-Emmanuel",
""
],
[
"Darmont",
"Jerome",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0703115
|
Victor Kryssanov
|
Victor V. Kryssanov, Evgeny L. Kuleshov, Frank J. Rinaldo, Hitoshi
Ogawa
|
We cite as we communicate: A communication model for the citation
process
|
12 pages, 4 figures in the new version. A preprint originally
completed in March, 2007; new version with a slightly expanded discussion and
new figures added
| null | null | null |
cs.DL cs.CY physics.data-an
| null |
Building on ideas from linguistics, psychology, and social sciences about the
possible mechanisms of human decision-making, we propose a novel theoretical
framework for the citation analysis. Given the existing trend to investigate
citation statistics in the context of various forms of power and Zipfian laws,
we show that the popular models of citation have poor predictive ability and
can hardly provide for an adequate explanation of the observed behavior of the
empirical data. An alternative model is then derived, using the apparatus of
statistical mechanics. The model is applied to approximate the citation
frequencies of scientific articles from two large collections, and it
demonstrates a predictive potential much superior to the one of any of the
citation models known to the authors from the literature. Some analytical
properties of the developed model are discussed, and conclusions are drawn.
Directions for future work are also given at the paper's end.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 05:30:45 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jun 2007 10:38:06 GMT"
}
] | 2007-06-18T00:00:00 |
[
[
"Kryssanov",
"Victor V.",
""
],
[
"Kuleshov",
"Evgeny L.",
""
],
[
"Rinaldo",
"Frank J.",
""
],
[
"Ogawa",
"Hitoshi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
cs/0703116
|
Roberto Bagnara
|
Roberto Bagnara, Patricia M. Hill, Andrea Pescetti, Enea Zaffanella
|
On the Design of Generic Static Analyzers for Modern Imperative
Languages
|
72 pages
| null | null | null |
cs.PL cs.LO
| null |
The design and implementation of precise static analyzers for significant
fragments of modern imperative languages like C, C++, Java and Python is a
challenging problem. In this paper, we consider a core imperative language that
has several features found in mainstream languages such as those including
recursive functions, run-time system and user-defined exceptions, and a
realistic data and memory model. For this language we provide a concrete
semantics --characterizing both finite and infinite computations-- and a
generic abstract semantics that we prove sound with respect to the concrete
one. We say the abstract semantics is generic since it is designed to be
completely parametric on the analysis domains: in particular, it provides
support for \emph{relational} domains (i.e., abstract domains that can capture
the relationships between different data objects). We also sketch how the
proposed methodology can be extended to accommodate a larger language that
includes pointers, compound data objects and non-structured control flow
mechanisms. The approach, which is based on structured, big-step
$\mathrm{G}^\infty\mathrm{SOS}$ operational semantics and on abstract
interpretation, is modular in that the overall static analyzer is naturally
partitioned into components with clearly identified responsibilities and
interfaces, something that greatly simplifies both the proof of correctness and
the implementation.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 09:47:15 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Jun 2007 10:56:42 GMT"
}
] | 2007-06-28T00:00:00 |
[
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Pescetti",
"Andrea",
""
],
[
"Zaffanella",
"Enea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703117
|
Juan J. Merelo Pr.
|
J.L.J. Laredo, E.A. Eiben, M. Schoenauer, P.A. Castillo, A.M. Mora, F.
Fernandez, J.J. Merelo
|
Self-adaptive Gossip Policies for Distributed Population-based
Algorithms
|
Submitted to Europar 2007
| null | null | null |
cs.DC
| null |
Gossipping has demonstrate to be an efficient mechanism for spreading
information among P2P networks. Within the context of P2P computing, we propose
the so-called Evolvable Agent Model for distributed population-based algorithms
which uses gossipping as communication policy, and represents every individual
as a self-scheduled single thread. The model avoids obsolete nodes in the
population by defining a self-adaptive refresh rate which depends on the
latency and bandwidth of the network. Such a mechanism balances the migration
rate to the congestion of the links pursuing global population coherence. We
perform an experimental evaluation of this model on a real parallel system and
observe how solution quality and algorithm speed scale with the number of
processors with this seamless approach.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 11:29:10 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Laredo",
"J. L. J.",
""
],
[
"Eiben",
"E. A.",
""
],
[
"Schoenauer",
"M.",
""
],
[
"Castillo",
"P. A.",
""
],
[
"Mora",
"A. M.",
""
],
[
"Fernandez",
"F.",
""
],
[
"Merelo",
"J. J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0703118
|
Andreas de Vries
|
Andreas de Vries
|
Mathematical model of interest matchmaking in electronic social networks
|
6 pages, 3 figures
|
Applied Mathematics 5 (16) 2014, 2619-2629
|
10.4236/am.2014.516250
| null |
cs.CY cs.AI
| null |
The problem of matchmaking in electronic social networks is formulated as an
optimization problem. In particular, a function measuring the matching degree
of fields of interest of a search profile with those of an advertising profile
is proposed.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 12:42:20 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Mar 2007 09:47:49 GMT"
}
] | 2015-02-03T00:00:00 |
[
[
"de Vries",
"Andreas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0703119
|
Daniel A. Spielman
|
Samuel I. Daitch and Daniel A. Spielman
|
Support-Graph Preconditioners for 2-Dimensional Trusses
| null | null | null | null |
cs.NA
| null |
We use support theory, in particular the fretsaw extensions of Shklarski and
Toledo, to design preconditioners for the stiffness matrices of 2-dimensional
truss structures that are stiffly connected. Provided that all the lengths of
the trusses are within constant factors of each other, that the angles at the
corners of the triangles are bounded away from 0 and $\pi$, and that the
elastic moduli and cross-sectional areas of all the truss elements are within
constant factors of each other, our preconditioners allow us to solve linear
equations in the stiffness matrices to accuracy $\epsilon$ in time $O (n^{5/4}
(\log^{2}n \log \log n)^{3/4} \log (1/\epsilon))$.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 15:03:34 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 18:09:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Daitch",
"Samuel I.",
""
],
[
"Spielman",
"Daniel A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
cs/0703120
|
Hari Palaiyanur
|
Hari Palaiyanur and Anant Sahai
|
Sequential decoding for lossless streaming source coding with side
information
|
42 pages, Submitted to IT Transactions
| null | null | null |
cs.IT math.IT
| null |
The problem of lossless fixed-rate streaming coding of discrete memoryless
sources with side information at the decoder is studied. A random time-varying
tree-code is used to sequentially bin strings and a Stack Algorithm with a
variable bias uses the side information to give a delay-universal coding system
for lossless source coding with side information. The scheme is shown to give
exponentially decaying probability of error with delay, with exponent equal to
Gallager's random coding exponent for sources with side information. The mean
of the random variable of computation for the stack decoder is bounded, and
conditions on the bias are given to guarantee a finite $\rho^{th}$ moment for
$0 \leq \rho \leq 1$.
Further, the problem is also studied in the case where there is a discrete
memoryless channel between encoder and decoder. The same scheme is slightly
modified to give a joint-source channel encoder and Stack Algorithm-based
sequential decoder using side information. Again, by a suitable choice of bias,
the probability of error decays exponentially with delay and the random
variable of computation has a finite mean. Simulation results for several
examples are given.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 17:58:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Palaiyanur",
"Hari",
""
],
[
"Sahai",
"Anant",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703121
|
Bruno Salvy
|
Alin Bostan (INRIA Rocquencourt), Fr\'ed\'eric Chyzak (INRIA
Rocquencourt), Bruno Salvy (INRIA Rocquencourt), Gr\'egoire Lecerf
(LM-Versailles), \'Eric Schost
|
Differential Equations for Algebraic Functions
| null |
ISSAC'07, pages 25--32, ACM Press, 2007.
|
10.1145/1277548.1277553
| null |
cs.SC math.CA
| null |
It is classical that univariate algebraic functions satisfy linear
differential equations with polynomial coefficients. Linear recurrences follow
for the coefficients of their power series expansions. We show that the linear
differential equation of minimal order has coefficients whose degree is cubic
in the degree of the function. We also show that there exists a linear
differential equation of order linear in the degree whose coefficients are only
of quadratic degree. Furthermore, we prove the existence of recurrences of
order and degree close to optimal. We study the complexity of computing these
differential equations and recurrences. We deduce a fast algorithm for the
expansion of algebraic series.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 19:20:35 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Sep 2007 13:44:07 GMT"
}
] | 2008-04-03T00:00:00 |
[
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Chyzak",
"Frédéric",
"",
"INRIA\n Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
],
[
"Lecerf",
"Grégoire",
"",
"LM-Versailles"
],
[
"Schost",
"Éric",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
] |
cs/0703122
|
Richard Kr\'alovi\v{c}
|
Rastislav Kr\'alovi\v{c}, Richard Kr\'alovi\v{c}
|
Rapid Almost-Complete Broadcasting in Faulty Networks
|
Conference: Sirocco 2007
| null | null | null |
cs.DC
| null |
This paper studies the problem of broadcasting in synchronous point-to-point
networks, where one initiator owns a piece of information that has to be
transmitted to all other vertices as fast as possible. The model of fractional
dynamic faults with threshold is considered: in every step either a fixed
number $T$, or a fraction $\alpha$, of sent messages can be lost depending on
which quantity is larger.
As the main result we show that in complete graphs and hypercubes it is
possible to inform all but a constant number of vertices, exhibiting only a
logarithmic slowdown, i.e. in time $O(D\log n)$ where $D$ is the diameter of
the network and $n$ is the number of vertices.
Moreover, for complete graphs under some additional conditions (sense of
direction, or $\alpha<0.55$) the remaining constant number of vertices can be
informed in the same time, i.e. $O(\log n)$.
|
[
{
"version": "v1",
"created": "Fri, 23 Mar 2007 22:38:06 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Královič",
"Rastislav",
""
],
[
"Královič",
"Richard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0703123
|
Mohammad H. Taghavi N.
|
Mohammad H. Taghavi and Paul H. Siegel
|
Adaptive Methods for Linear Programming Decoding
|
22 pages, 8 figures. Submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
| null |
Detectability of failures of linear programming (LP) decoding and the
potential for improvement by adding new constraints motivate the use of an
adaptive approach in selecting the constraints for the underlying LP problem.
In this paper, we make a first step in studying this method, and show that it
can significantly reduce the complexity of the problem, which was originally
exponential in the maximum check-node degree. We further show that adaptively
adding new constraints, e.g. by combining parity checks, can provide large
gains in the performance.
|
[
{
"version": "v1",
"created": "Sat, 24 Mar 2007 02:32:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Taghavi",
"Mohammad H.",
""
],
[
"Siegel",
"Paul H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703124
|
Cheng-Yuan Liou
|
Cheng-Yuan Liou, Tai-Hei Wu, Chia-Ying Lee
|
Modelling Complexity in Musical Rhythm
|
21 pages, 13 figures, 2 tables
|
Complexity 15(4) (2010) 19~30 final form at
http://www3.interscience.wiley.com/cgi-bin/fulltext/123191810/PDFSTART
| null | null |
cs.AI
| null |
This paper constructs a tree structure for the music rhythm using the
L-system. It models the structure as an automata and derives its complexity. It
also solves the complexity for the L-system. This complexity can resolve the
similarity between trees. This complexity serves as a measure of psychological
complexity for rhythms. It resolves the music complexity of various
compositions including the Mozart effect K488.
Keyword: music perception, psychological complexity, rhythm, L-system,
automata, temporal associative memory, inverse problem, rewriting rule,
bracketed string, tree similarity
|
[
{
"version": "v1",
"created": "Mon, 26 Mar 2007 07:37:11 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Liou",
"Cheng-Yuan",
""
],
[
"Wu",
"Tai-Hei",
""
],
[
"Lee",
"Chia-Ying",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0703125
|
Vladimir Pestov
|
Vladimir Pestov
|
Intrinsic dimension of a dataset: what properties does one expect?
|
6 pages, 6 figures, 1 table, latex with IEEE macros, final submission
to Proceedings of the 22nd IJCNN (Orlando, FL, August 12-17, 2007)
|
Proceedings of the 20th International Joint Conference on Neural
Networks (IJCNN'2007), Orlando, Florida (Aug. 12--17, 2007), pp. 1775--1780.
|
10.1109/IJCNN.2007.4371431
| null |
cs.LG
| null |
We propose an axiomatic approach to the concept of an intrinsic dimension of
a dataset, based on a viewpoint of geometry of high-dimensional structures. Our
first axiom postulates that high values of dimension be indicative of the
presence of the curse of dimensionality (in a certain precise mathematical
sense). The second axiom requires the dimension to depend smoothly on a
distance between datasets (so that the dimension of a dataset and that of an
approximating principal manifold would be close to each other). The third axiom
is a normalization condition: the dimension of the Euclidean $n$-sphere $\s^n$
is $\Theta(n)$. We give an example of a dimension function satisfying our
axioms, even though it is in general computationally unfeasible, and discuss a
computationally cheap function satisfying most but not all of our axioms (the
``intrinsic dimensionality'' of Ch\'avez et al.)
|
[
{
"version": "v1",
"created": "Sun, 25 Mar 2007 01:19:14 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Pestov",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0703126
|
Michele Tucci
|
Michele Tucci
|
Evolutionary Socioeconomics: Notes on the Computer Simulation according
to the de Finetti - Simon Principia
|
PDF, 29 pages, 3 graphs; minor changes
| null | null | null |
cs.CY
| null |
The present note includes explanatory comments about the synergic interaction
within the sphere of the socioeconomic analysis between the two following
theoretical frameworks. (I). The Darwinian evolutionary model. (II). The
computer simulation in accordance with the principia established by Bruno de
Finetti and Herbert Simon.
|
[
{
"version": "v1",
"created": "Sun, 25 Mar 2007 12:46:19 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Apr 2007 14:36:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Tucci",
"Michele",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0703127
|
Alexander Zhdanov
|
Alexander Zhdanov
|
Isochronous Data Transmission With Rates Close to Channel Capacity
| null | null | null | null |
cs.IT math.IT
| null |
The existing ARQ schemes (including a hybrid ARQ) have a throughput depending
on packet error probability. In this paper we describe a strategy for delay
tolerant applications which provide a constant throughput until the algorithm
robustness criterion is not failed. The algorithm robustness criterion is
applied to find the optimum size of the retransmission block in the assumption
of the small changes of coding rate within the rate compatible codes family.
|
[
{
"version": "v1",
"created": "Sun, 25 Mar 2007 20:45:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zhdanov",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703128
|
Andrew Adamatzky
|
Andrew Adamatzky
|
Physarum machine: Implementation of Kolmogorov-Uspensky machine in
biological substrat
|
First presented at Los Alamos "Unconventional Computation 2007"
conference, Santa Fe, NM, 20-23 March 2007
|
Paralllel Processing Letters Vol. 17, No. 4 (December 2007) pp.
455-467
|
10.1142/S0129626407003150
| null |
cs.AR cs.CC
| null |
We implement Kolmogorov-Uspensky machine on a plasmodium of true slime mold
{\em Physarum polycephalum}. We provide experimental findings on realization of
the machine instructions, illustrate basic operations, and elements of
programming.
|
[
{
"version": "v1",
"created": "Mon, 26 Mar 2007 01:51:25 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Apr 2007 08:29:51 GMT"
}
] | 2010-11-23T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0703129
|
Joseph Geraci
|
Joseph Geraci, Frank Van Bussel
|
A theorem on the quantum evaluation of Weight Enumerators for a certain
class of Cyclic Codes with a note on Cyclotomic cosets
| null | null | null | null |
cs.IT math.IT quant-ph
| null |
This note is a stripped down version of a published paper on the Potts
partition function, where we concentrate solely on the linear coding aspect of
our approach. It is meant as a resource for people interested in coding theory
but who do not know much of the mathematics involved and how quantum
computation may provide a speed up in the computation of a very important
quantity in coding theory. We provide a theorem on the quantum computation of
the Weight Enumerator polynomial for a restricted family of cyclic codes. The
complexity of obtaining an exact evaluation is $O(k^{2s}(\log q)^{2})$, where
$s$ is a parameter which determines the class of cyclic codes in question, $q$
is the characteristic of the finite field over which the code is defined, and
$k$ is the dimension of the code. We also provide an overview of cyclotomic
cosets and discuss applications including how they can be used to speed up the
computation of the weight enumerator polynomial (which is related to the Potts
partition function). We also give an algorithm which returns the coset leaders
and the size of each coset from the list $\{0,1,2,...,N-1\}$, whose time
complexity is soft-O(N). This algorithm uses standard techniques but we include
it as a resource for students. Note that cyclotomic cosets do not improve the
asymptotic complexity of the computation of weight enumerators.
|
[
{
"version": "v1",
"created": "Mon, 26 Mar 2007 07:17:50 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Feb 2008 06:37:22 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Mar 2008 20:32:54 GMT"
},
{
"version": "v4",
"created": "Sun, 16 Mar 2008 03:38:08 GMT"
}
] | 2008-03-17T00:00:00 |
[
[
"Geraci",
"Joseph",
""
],
[
"Van Bussel",
"Frank",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
cs/0703130
|
Robert Jeansoulin
|
Omar Doukari (LSIS), Robert Jeansoulin (IGM-LabInfo)
|
Space-contained conflict revision, for geographic information
|
14 pages
|
Proc. of 10th AGILE International Conference on Geographic
Information Science, AGILE 2007. (07/05/2007) 1-14
| null | null |
cs.AI
| null |
Using qualitative reasoning with geographic information, contrarily, for
instance, with robotics, looks not only fastidious (i.e.: encoding knowledge
Propositional Logics PL), but appears to be computational complex, and not
tractable at all, most of the time. However, knowledge fusion or revision, is a
common operation performed when users merge several different data sets in a
unique decision making process, without much support. Introducing logics would
be a great improvement, and we propose in this paper, means for deciding -a
priori- if one application can benefit from a complete revision, under only the
assumption of a conjecture that we name the "containment conjecture", which
limits the size of the minimal conflicts to revise. We demonstrate that this
conjecture brings us the interesting computational property of performing a
not-provable but global, revision, made of many local revisions, at a tractable
size. We illustrate this approach on an application.
|
[
{
"version": "v1",
"created": "Mon, 26 Mar 2007 12:18:32 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Doukari",
"Omar",
"",
"LSIS"
],
[
"Jeansoulin",
"Robert",
"",
"IGM-LabInfo"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0703131
|
Stevan Harnad
|
Stevan Harnad
|
Open Access Scientometrics and the UK Research Assessment Exercise
| null | null | null | null |
cs.IR cs.DL
| null |
Scientometric predictors of research performance need to be validated by
showing that they have a high correlation with the external criterion they are
trying to predict. The UK Research Assessment Exercise (RAE), together with the
growing movement toward making the full-texts of research articles freely
available on the web -- offer a unique opportunity to test and validate a
wealth of old and new scientometric predictors, through multiple regression
analysis: Publications, journal impact factors, citations, co-citations,
citation chronometrics (age, growth, latency to peak, decay rate),
hub/authority scores, h-index, prior funding, student counts, co-authorship
scores, endogamy/exogamy, textual proximity, download/co-downloads and their
chronometrics, etc. can all be tested and validated jointly, discipline by
discipline, against their RAE panel rankings in the forthcoming parallel
panel-based and metric RAE in 2008. The weights of each predictor can be
calibrated to maximize the joint correlation with the rankings. Open Access
Scientometrics will provide powerful new means of navigating, evaluating,
predicting and analyzing the growing Open Access database, as well as powerful
incentives for making it grow faster. ~
|
[
{
"version": "v1",
"created": "Mon, 26 Mar 2007 15:40:08 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Harnad",
"Stevan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0703132
|
Leonid Peshkin
|
Leonid Peshkin
|
Structure induction by lossless graph compression
|
10 pages, 7 figures, 2 tables published in Proceedings of the Data
Compression Conference, 2007
|
In proceedings of the Data Compression Conference, 2007, pp 53-62,
published by the IEEE Computer Society Press
|
10.1109/DCC.2007.73
| null |
cs.DS cs.IT cs.LG math.IT
| null |
This work is motivated by the necessity to automate the discovery of
structure in vast and evergrowing collection of relational data commonly
represented as graphs, for example genomic networks. A novel algorithm, dubbed
Graphitour, for structure induction by lossless graph compression is presented
and illustrated by a clear and broadly known case of nested structure in a DNA
molecule. This work extends to graphs some well established approaches to
grammatical inference previously applied only to strings. The bottom-up graph
compression problem is related to the maximum cardinality (non-bipartite)
maximum cardinality matching problem. The algorithm accepts a variety of graph
types including directed graphs and graphs with labeled nodes and arcs. The
resulting structure could be used for representation and classification of
graphs.
|
[
{
"version": "v1",
"created": "Tue, 27 Mar 2007 05:46:31 GMT"
}
] | 2017-05-25T00:00:00 |
[
[
"Peshkin",
"Leonid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703133
|
Edith Elkind
|
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldberg
|
Computing Good Nash Equilibria in Graphical Games
|
25 pages. Short version appears in ACM EC'07
| null | null | null |
cs.GT cs.DS cs.MA
| null |
This paper addresses the problem of fair equilibrium selection in graphical
games. Our approach is based on the data structure called the {\em best
response policy}, which was proposed by Kearns et al. \cite{kls} as a way to
represent all Nash equilibria of a graphical game. In \cite{egg}, it was shown
that the best response policy has polynomial size as long as the underlying
graph is a path. In this paper, we show that if the underlying graph is a
bounded-degree tree and the best response policy has polynomial size then there
is an efficient algorithm which constructs a Nash equilibrium that guarantees
certain payoffs to all participants. Another attractive solution concept is a
Nash equilibrium that maximizes the social welfare. We show that, while exactly
computing the latter is infeasible (we prove that solving this problem may
involve algebraic numbers of an arbitrarily high degree), there exists an FPTAS
for finding such an equilibrium as long as the best response policy has
polynomial size. These two algorithms can be combined to produce Nash
equilibria that satisfy various fairness criteria.
|
[
{
"version": "v1",
"created": "Tue, 27 Mar 2007 16:15:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Elkind",
"Edith",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
cs/0703134
|
Manuel Cebri\'an
|
Manuel Cebrian, Manuel Alfonseca and Alfonso Ortega
|
Automatic Generation of Benchmarks for Plagiarism Detection Tools using
Grammatical Evolution
|
This paper has been withdrawn
| null | null | null |
cs.NE cs.IT math.IT
| null |
This paper has been withdrawn by the authors due to a major rewriting.
|
[
{
"version": "v1",
"created": "Tue, 27 Mar 2007 16:57:39 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Mar 2007 09:22:58 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Apr 2007 16:24:31 GMT"
},
{
"version": "v4",
"created": "Tue, 12 Jun 2007 12:17:29 GMT"
},
{
"version": "v5",
"created": "Mon, 7 Jan 2008 13:04:20 GMT"
}
] | 2008-01-07T00:00:00 |
[
[
"Cebrian",
"Manuel",
""
],
[
"Alfonseca",
"Manuel",
""
],
[
"Ortega",
"Alfonso",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703135
|
Leonid Peshkin
|
Virginia Savova and Leonid Peshkin
|
Dependency Parsing with Dynamic Bayesian Network
|
6 pages
|
In proceedings of American Association for Artificial Intelligence
AAAI 2005
| null | null |
cs.CL cs.AI
| null |
Exact parsing with finite state automata is deemed inappropriate because of
the unbounded non-locality languages overwhelmingly exhibit. We propose a way
to structure the parsing task in order to make it amenable to local
classification methods. This allows us to build a Dynamic Bayesian Network
which uncovers the syntactic dependency structure of English sentences.
Experiments with the Wall Street Journal demonstrate that the model
successfully learns from labeled data.
|
[
{
"version": "v1",
"created": "Tue, 27 Mar 2007 22:12:25 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Savova",
"Virginia",
""
],
[
"Peshkin",
"Leonid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0703136
|
Manuel Cebrian
|
Manuel Freire, Manuel Cebrian and Emilio del Rosal
|
Uncovering Plagiarism Networks
|
19 pages, 3 figures
| null | null | null |
cs.IT cs.SI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Plagiarism detection in educational programming assignments is still a
problematic issue in terms of resource waste, ethical controversy, legal risks,
and technical complexity. This paper presents AC, a modular plagiarism
detection system. The design is portable across platforms and assignment
formats and provides easy extraction into the internal assignment
representation. Multiple similarity measures have been incorporated, both
existing and newly-developed. Statistical analysis and several graphical
visualizations aid in the interpretation of analysis results. The system has
been evaluated with a survey that encompasses several academic semesters of use
at the authors' institution.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 14:13:45 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 15:33:12 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Jul 2007 13:34:29 GMT"
},
{
"version": "v4",
"created": "Wed, 2 Jan 2008 19:37:31 GMT"
},
{
"version": "v5",
"created": "Mon, 21 Jul 2008 08:03:02 GMT"
},
{
"version": "v6",
"created": "Thu, 1 Oct 2009 05:15:32 GMT"
},
{
"version": "v7",
"created": "Mon, 14 Feb 2011 08:56:01 GMT"
}
] | 2011-02-15T00:00:00 |
[
[
"Freire",
"Manuel",
""
],
[
"Cebrian",
"Manuel",
""
],
[
"del Rosal",
"Emilio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703137
|
Rajesh Sudarsan
|
Rajesh Sudarsan and Calvin J. Ribbens
|
ReSHAPE: A Framework for Dynamic Resizing and Scheduling of Homogeneous
Applications in a Parallel Environment
|
15 pages, 10 figures, 5 tables Submitted to International Conference
on Parallel Processing (ICPP'07)
| null | null | null |
cs.DC
| null |
Applications in science and engineering often require huge computational
resources for solving problems within a reasonable time frame. Parallel
supercomputers provide the computational infrastructure for solving such
problems. A traditional application scheduler running on a parallel cluster
only supports static scheduling where the number of processors allocated to an
application remains fixed throughout the lifetime of execution of the job. Due
to the unpredictability in job arrival times and varying resource requirements,
static scheduling can result in idle system resources thereby decreasing the
overall system throughput. In this paper we present a prototype framework
called ReSHAPE, which supports dynamic resizing of parallel MPI applications
executed on distributed memory platforms. The framework includes a scheduler
that supports resizing of applications, an API to enable applications to
interact with the scheduler, and a library that makes resizing viable.
Applications executed using the ReSHAPE scheduler framework can expand to take
advantage of additional free processors or can shrink to accommodate a high
priority application, without getting suspended. In our research, we have
mainly focused on structured applications that have two-dimensional data arrays
distributed across a two-dimensional processor grid. The resize library
includes algorithms for processor selection and processor mapping. Experimental
results show that the ReSHAPE framework can improve individual job turn-around
time and overall system throughput.
|
[
{
"version": "v1",
"created": "Tue, 27 Mar 2007 23:27:54 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Sudarsan",
"Rajesh",
""
],
[
"Ribbens",
"Calvin J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0703138
|
Leonid Peshkin
|
Leonid Peshkin and Virginia Savova
|
Reinforcement Learning for Adaptive Routing
| null |
In Proceedings of the Intnl Joint Conf on Neural Networks (IJCNN),
2002
| null | null |
cs.LG cs.AI cs.NI
| null |
Reinforcement learning means learning a policy--a mapping of observations
into actions--based on feedback from the environment. The learning can be
viewed as browsing a set of policies while evaluating them by trial through
interaction with the environment. We present an application of gradient ascent
algorithm for reinforcement learning to a complex domain of packet routing in
network communication and compare the performance of this algorithm to other
routing methods on a benchmark problem.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 04:41:54 GMT"
}
] | 2017-05-25T00:00:00 |
[
[
"Peshkin",
"Leonid",
""
],
[
"Savova",
"Virginia",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0703139
|
Emmanuel Lochin
|
Emmanuel Lochin and Pascal Anelli
|
TCP throughput guarantee in the DiffServ Assured Forwarding service:
what about the results?
| null | null | null | null |
cs.NI
| null |
Since the proposition of Quality of Service architectures by the IETF, the
interaction between TCP and the QoS services has been intensively studied. This
paper proposes to look forward to the results obtained in terms of TCP
throughput guarantee in the DiffServ Assured Forwarding (DiffServ/AF) service
and to present an overview of the different proposals to solve the problem. It
has been demonstrated that the standardized IETF DiffServ conditioners such as
the token bucket color marker and the time sliding window color maker were not
good TCP traffic descriptors. Starting with this point, several propositions
have been made and most of them presents new marking schemes in order to
replace or improve the traditional token bucket color marker. The main problem
is that TCP congestion control is not designed to work with the AF service.
Indeed, both mechanisms are antagonists. TCP has the property to share in a
fair manner the bottleneck bandwidth between flows while DiffServ network
provides a level of service controllable and predictable. In this paper, we
build a classification of all the propositions made during these last years and
compare them. As a result, we will see that these conditioning schemes can be
separated in three sets of action level and that the conditioning at the
network edge level is the most accepted one. We conclude that the problem is
still unsolved and that TCP, conditioned or not conditioned, remains
inappropriate to the DiffServ/AF service.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 06:01:38 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Nov 2007 16:54:28 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Dec 2007 15:36:25 GMT"
}
] | 2007-12-13T00:00:00 |
[
[
"Lochin",
"Emmanuel",
""
],
[
"Anelli",
"Pascal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0703140
|
Daniele Beauquier
|
Dani\`ele Beauquier (LACL), Fr\'ed\'eric Gauche (LACL)
|
How to Guarantee Secrecy for Cryptographic Protocols
|
19 pages
|
Rapport interne (03/2007)
| null | null |
cs.CR
| null |
In this paper we propose a general definition of secrecy for cryptographic
protocols in the Dolev-Yao model. We give a sufficient condition ensuring
secrecy for protocols where rules have encryption depth at most two, that is
satisfied by almost all practical protocols. The only allowed primitives in the
class of protocols we consider are pairing and encryption with atomic keys.
Moreover, we describe an algorithm of practical interest which transforms a
cryptographic protocol into a secure one from the point of view of secrecy,
without changing its original goal with respect to secrecy of nonces and keys,
provided the protocol satisfies some conditions. These conditions are not very
restrictive and are satisfied for most practical protocols.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 08:03:03 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Beauquier",
"Danièle",
"",
"LACL"
],
[
"Gauche",
"Frédéric",
"",
"LACL"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0703141
|
Mitsuru Hamada
|
Mitsuru Hamada
|
Constructive Conjugate Codes for Quantum Error Correction and
Cryptography
|
10 pages, 1 figure. Ver.2: statement in Theorem 7.1 was revised to a
more general one, which the proof (unchanged except a couple of lines after
Eq.(11)) had really implied. A corollary to this theorem was added.
Annotative parts on achievable rates (mainly after the proof of Theorem 7.1)
were revised
| null | null | null |
cs.IT math.IT
| null |
A conjugate code pair is defined as a pair of linear codes either of which
contains the dual of the other. A conjugate code pair represents the essential
structure of the corresponding Calderbank-Shor-Steane (CSS) quantum
error-correcting code. It is known that conjugate code pairs are applicable to
quantum cryptography. In this work, a polynomial construction of conjugate code
pairs is presented. The constructed pairs achieve the highest known achievable
rate on additive channels, and are decodable with algorithms of polynomial
complexity.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 12:24:31 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Mar 2007 14:42:59 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hamada",
"Mitsuru",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703142
|
Andrea Conti
|
Marco Chiani, Andrea Conti, Velio Tralli
|
Pragmatic Space-Time Trellis Codes for Block Fading Channels
| null | null | null | null |
cs.IT math.IT
| null |
A pragmatic approach for the construction of space-time codes over block
fading channels is investigated. The approach consists in using common
convolutional encoders and Viterbi decoders with suitable generators and rates,
thus greatly simplifying the implementation of space-time codes. For the design
of pragmatic space-time codes a methodology is proposed and applied, based on
the extension of the concept of generalized transfer function for convolutional
codes over block fading channels. Our search algorithm produces the
convolutional encoder generators of pragmatic space-time codes for various
number of states, number of antennas and fading rate. Finally it is shown that,
for the investigated cases, the performance of pragmatic space-time codes is
better than that of previously known space-time codes, confirming that they are
a valuable choice in terms of both implementation complexity and performance.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 13:50:00 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chiani",
"Marco",
""
],
[
"Conti",
"Andrea",
""
],
[
"Tralli",
"Velio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703143
|
Alireza Bayesteh
|
Alireza Bayesteh and Amir K. Khandani
|
How much feedback is required in MIMO Broadcast Channels?
|
Submitted to IEEE Trans. on Inform. Theory
| null | null | null |
cs.IT math.IT
| null |
In this paper, a downlink communication system, in which a Base Station (BS)
equipped with M antennas communicates with N users each equipped with K receive
antennas ($K \leq M$), is considered. It is assumed that the receivers have
perfect Channel State Information (CSI), while the BS only knows the partial
CSI, provided by the receivers via feedback. The minimum amount of feedback
required at the BS, to achieve the maximum sum-rate capacity in the asymptotic
case of $N \to \infty$ and different ranges of SNR is studied. In the fixed and
low SNR regimes, it is demonstrated that to achieve the maximum sum-rate, an
infinite amount of feedback is required. Moreover, in order to reduce the gap
to the optimum sum-rate to zero, in the fixed SNR regime, the minimum amount of
feedback scales as $\theta(\ln \ln \ln N)$, which is achievable by the Random
Beam-Forming scheme proposed in [14]. In the high SNR regime, two cases are
considered; in the case of $K < M$, it is proved that the minimum amount of
feedback bits to reduce the gap between the achievable sum-rate and the maximum
sum-rate to zero grows logaritmically with SNR, which is achievable by the
"Generalized Random Beam-Forming" scheme, proposed in [18]. In the case of $K =
M$, it is shown that by using the Random Beam-Forming scheme and the total
amount of feedback not growing with SNR, the maximum sum-rate capacity is
achieved.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 16:16:39 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703144
|
Mehdi Ansari Sadrabadi Mr.
|
Mehdi Ansari Sadrabadi, Mohammad Ali Maddah-Ali and Amir K. Khandani
|
On The Capacity Of Time-Varying Channels With Periodic Feedback
|
9 pages, 1 figure, Journal
| null | null | null |
cs.IT math.IT
| null |
The capacity of time-varying channels with periodic feedback at the
transmitter is evaluated. It is assumed that the channel state information is
perfectly known at the receiver and is fed back to the transmitter at the
regular time-intervals. The system capacity is investigated in two cases: i)
finite state Markov channel, and ii) additive white Gaussian noise channel with
time-correlated fading. In the first case, it is shown that the capacity is
achievable by multiplexing multiple codebooks across the channel. In the second
case, the channel capacity and the optimal adaptive coding is obtained. It is
shown that the optimal adaptation can be achieved by a single Gaussian
codebook, while adaptively allocating the total power based on the side
information at the transmitter.
|
[
{
"version": "v1",
"created": "Wed, 28 Mar 2007 18:46:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sadrabadi",
"Mehdi Ansari",
""
],
[
"Maddah-Ali",
"Mohammad Ali",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703145
|
Sandeep Murthy
|
Sandeep Murthy
|
The Simultaneous Triple Product Property and Group-theoretic Results for
the Exponent of Matrix Multiplication
|
14 pages
| null | null | null |
cs.DS cs.CC math.GR
| null |
We describe certain special consequences of certain elementary methods from
group theory for studying the algebraic complexity of matrix multiplication, as
developed by H. Cohn, C. Umans et. al. in 2003 and 2005. The measure of
complexity here is the exponent of matrix multiplication, a real parameter
between 2 and 3, which has been conjectured to be 2. More specifically, a
finite group may simultaneously "realize" several independent matrix
multiplications via its regular algebra if it has a family of triples of
"index" subsets which satisfy the so-called simultaneous triple product
property (STPP), in which case the complexity of these several multiplications
does not exceed the rank (complexity) of the algebra. This leads to bounds for
the exponent in terms of the size of the group and the sizes of its STPP
triples, as well as the dimensions of its distinct irreducible representations.
Wreath products of Abelian with symmetric groups appear especially important,
in this regard, and we give an example of such a group which shows that the
exponent is less than 2.84, and could be possibly be as small as 2.02 depending
on the number of simultaneous matrix multiplications it realizes.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2007 02:55:17 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Mar 2007 02:17:28 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Apr 2007 13:39:15 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Apr 2007 16:52:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Murthy",
"Sandeep",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
cs/0703146
|
Sergey Gubin
|
Sergey Gubin
|
A Polynomial Time Algorithm for SAT
|
Update, 30 pages
| null | null |
MCCCC 23,24,25
|
cs.CC cs.DM cs.DS cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Article presents the compatibility matrix method and illustrates it with the
application to P vs NP problem. The method is a generalization of descriptive
geometry: in the method, we draft problems and solve them utilizing the image
creation technique. The method reveals: P = NP = PSPACE
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2007 07:36:30 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Mar 2007 17:51:21 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Feb 2009 06:23:54 GMT"
},
{
"version": "v4",
"created": "Mon, 7 May 2012 08:29:28 GMT"
}
] | 2012-05-08T00:00:00 |
[
[
"Gubin",
"Sergey",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703147
|
Maurice Margenstern
|
Maurice Margenstern
|
The finite tiling problem is undecidable in the hyperbolic plane
| null |
The Finite Tiling Problem Is Undecidable in the Hyperbolic Plane,
International Journal of Foundations of Computer Science, 19(4), (2008),
971-982
|
10.1142/S0129054108006078
| null |
cs.CG cs.DM
| null |
In this paper, we consider the finite tiling problem which was proved
undecidable in the Euclidean plane by Jarkko Kari in 1994. Here, we prove that
the same problem for the hyperbolic plane is also undecidable.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2007 14:23:59 GMT"
}
] | 2009-07-07T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0703148
|
Joseph Y. Halpern
|
Joseph Y. Halpern
|
Computer Science and Game Theory: A Brief Survey
|
To appear; Palgrave Dictionary of Economics
| null | null | null |
cs.GT econ.TH
| null |
There has been a remarkable increase in work at the interface of computer
science and game theory in the past decade. In this article I survey some of
the main themes of work in the area, with a focus on the work in computer
science. Given the length constraints, I make no attempt at being
comprehensive, especially since other surveys are also available, and a
comprehensive survey book will appear shortly.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2007 18:43:58 GMT"
}
] | 2021-09-07T00:00:00 |
[
[
"Halpern",
"Joseph Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Economics",
"code": "econ.TH",
"description": "Includes theoretical contributions to Contract Theory, Decision Theory, Game Theory, General Equilibrium, Growth, Learning and Evolution, Macroeconomics, Market and Mechanism Design, and Social Choice.",
"span": "(Theoretical Economics)"
}
] |
cs/0703149
|
Christof Teuscher
|
Christof Teuscher
|
Exploring Logic Artificial Chemistries: An Illogical Attempt?
| null |
The First IEEE Symposium on Artificial Life, April 1-5, 2007,
Hawaii, USA
|
10.1109/ALIFE.2007.367659
| null |
cs.NE nlin.AO
| null |
Robustness to a wide variety of negative factors and the ability to
self-repair is an inherent and natural characteristic of all life forms on
earth. As opposed to nature, man-made systems are in most cases not inherently
robust and a significant effort has to be made in order to make them resistant
against failures. This can be done in a wide variety of ways and on various
system levels. In the field of digital systems, for example, techniques such as
triple modular redundancy (TMR) are frequently used, which results in a
considerable hardware overhead. Biologically-inspired computing by means of
bio-chemical metaphors offers alternative paradigms, which need to be explored
and evaluated.
Here, we are interested to evaluate the potential of nature-inspired
artificial chemistries and membrane systems as an alternative information
representing and processing paradigm in order to obtain robust and spatially
extended Boolean computing systems in a distributed environment. We investigate
conceptual approaches inspired by artificial chemistries and membrane systems
and compare proof-of-concepts. First, we show, that elementary logical
functions can be implemented. Second, we illustrate how they can be made more
robust and how they can be assembled to larger-scale systems. Finally, we
discuss the implications for and paths to possible genuine implementations.
Compared to the main body of work in artificial chemistries, we take a very
pragmatic and implementation-oriented approach and are interested in realizing
Boolean computations only. The results emphasize that artificial chemistries
can be used to implement Boolean logic in a spatially extended and distributed
environment and can also be made highly robust, but at a significant price.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2007 20:57:00 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Teuscher",
"Christof",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
cs/0703150
|
Steven G. Johnson
|
Xuancheng Shao and Steven G. Johnson
|
Type-II/III DCT/DST algorithms with reduced number of arithmetic
operations
|
9 pages
|
Signal Processing vol. 88, issue 6, p. 1553-1564 (2008)
|
10.1016/j.sigpro.2008.01.004
| null |
cs.NA cs.DS cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present algorithms for the discrete cosine transform (DCT) and discrete
sine transform (DST), of types II and III, that achieve a lower count of real
multiplications and additions than previously published algorithms, without
sacrificing numerical accuracy. Asymptotically, the operation count is reduced
from ~ 2N log_2 N to ~ (17/9) N log_2 N for a power-of-two transform size N.
Furthermore, we show that a further N multiplications may be saved by a certain
rescaling of the inputs or outputs, generalizing a well-known technique for N=8
by Arai et al. These results are derived by considering the DCT to be a special
case of a DFT of length 4N, with certain symmetries, and then pruning redundant
operations from a recent improved fast Fourier transform algorithm (based on a
recursive rescaling of the conjugate-pair split radix algorithm). The improved
algorithms for DCT-III, DST-II, and DST-III follow immediately from the
improved count for the DCT-II.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 00:53:48 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jan 2009 19:05:59 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Shao",
"Xuancheng",
""
],
[
"Johnson",
"Steven G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
cs/0703151
|
Shahab Oveis Gharan
|
Shahab Oveis Gharan, Alireza Bayesteh, and Amir K. Khandani
|
Asymptotic Analysis of Amplify and Forward Relaying in a Parallel MIMO
Relay Network
| null | null | null | null |
cs.IT math.IT
| null |
This paper considers the setup of a parallel MIMO relay network in which $K$
relays, each equipped with $N$ antennas, assist the transmitter and the
receiver, each equipped with $M$ antennas, in the half-duplex mode, under the
assumption that $N\geq{M}$. This setup has been studied in the literature like
in \cite{nabar}, \cite{nabar2}, and \cite{qr}. In this paper, a simple scheme,
the so-called Incremental Cooperative Beamforming, is introduced and shown to
achieve the capacity of the network in the asymptotic case of $K\to{\infty}$
with a gap no more than $O(\frac{1}{\log(K)})$. This result is shown to hold,
as long as the power of the relays scales as $\omega(\frac{\log^9(K)}{K})$.
Finally, the asymptotic SNR behavior is studied and it is proved that the
proposed scheme achieves the full multiplexing gain, regardless of the number
of relays.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 06:47:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gharan",
"Shahab Oveis",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703152
|
Ugo Dal Lago
|
Ugo Dal Lago, Andrea Masini, Margherita Zorzi
|
Quantum Lambda Calculi with Classical Control: Syntax and Expressive
Power
|
25 pages
| null | null | null |
cs.LO
| null |
We study an untyped lambda calculus with quantum data and classical control.
This work stems from previous proposals by Selinger and Valiron and by Van
Tonder. We focus on syntax and expressiveness, rather than (denotational)
semantics. We prove subject reduction, confluence and a standardization
theorem. Moreover, we prove the computational equivalence of the proposed
calculus with a suitable class of quantum circuit families.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 08:59:43 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lago",
"Ugo Dal",
""
],
[
"Masini",
"Andrea",
""
],
[
"Zorzi",
"Margherita",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0703153
|
Maurice Margenstern
|
Maurice Margenstern
|
The periodic domino problem is undecidable in the hyperbolic plane
| null | null | null | null |
cs.CG cs.DM
| null |
In this paper, we consider the periodic tiling problem which was proved
undecidable in the Euclidean plane by Yu. Gurevich and I. Koriakov in 1972.
Here, we prove that the same problem for the hyperbolic plane is also
undecidable.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 09:31:40 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0703154
|
Tobias Koch
|
Tobias Koch, Amos Lapidoth, and Paul P. Sotiriadis
|
A Hot Channel
|
to be presented at 2007 IEEE Information Theory Workshop (ITW),
replaced with version that will appear in the proceedings
| null |
10.1109/ITW.2007.4313127
| null |
cs.IT math.IT
| null |
This paper studies on-chip communication with non-ideal heat sinks. A channel
model is proposed where the variance of the additive noise depends on the
weighted sum of the past channel input powers. It is shown that, depending on
the weights, the capacity can be either bounded or unbounded in the input
power. A necessary condition and a sufficient condition for the capacity to be
bounded are presented.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 14:09:38 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Apr 2007 13:07:59 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Jul 2007 09:34:14 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Koch",
"Tobias",
""
],
[
"Lapidoth",
"Amos",
""
],
[
"Sotiriadis",
"Paul P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0703155
|
Amey Karkare
|
Amey Karkare, Uday Khedker, Amitabha Sanyal
|
Liveness of Heap Data for Functional Programs
|
Accepted at Heap Analysis and Verification workshop (HAV 2007), a
satellite workshop of ETAPS 2007 (No formal proceedings for workshop); 15
pages
| null | null | null |
cs.PL
| null |
Functional programming languages use garbage collection for heap memory
management. Ideally, garbage collectors should reclaim all objects that are
dead at the time of garbage collection. An object is dead at an execution
instant if it is not used in future. Garbage collectors collect only those dead
objects that are not reachable from any program variable. This is because they
are not able to distinguish between reachable objects that are dead and
reachable objects that are live.
In this paper, we describe a static analysis to discover reachable dead
objects in programs written in first-order, eager functional programming
languages. The results of this technique can be used to make reachable dead
objects unreachable, thereby allowing garbage collectors to reclaim more dead
objects.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 16:06:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Karkare",
"Amey",
""
],
[
"Khedker",
"Uday",
""
],
[
"Sanyal",
"Amitabha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0703156
|
Fadi Badra
|
Mathieu D'Aquin (KMI), Fadi Badra (INRIA Lorraine - LORIA), Sandrine
Lafrogne (INRIA Lorraine - LORIA), Jean Lieber (INRIA Lorraine - LORIA),
Amedeo Napoli (INRIA Lorraine - LORIA), Laszlo Szathmary (INRIA Lorraine -
LORIA)
|
Case Base Mining for Adaptation Knowledge Acquisition
| null |
Dans Twentieth International Joint Conference on Artificial
Intelligence - IJCAI'07 (2007) 750--755
| null | null |
cs.AI
| null |
In case-based reasoning, the adaptation of a source case in order to solve
the target problem is at the same time crucial and difficult to implement. The
reason for this difficulty is that, in general, adaptation strongly depends on
domain-dependent knowledge. This fact motivates research on adaptation
knowledge acquisition (AKA). This paper presents an approach to AKA based on
the principles and techniques of knowledge discovery from databases and
data-mining. It is implemented in CABAMAKA, a system that explores the
variations within the case base to elicit adaptation knowledge. This system has
been successfully tested in an application of case-based reasoning to decision
support in the domain of breast cancer treatment.
|
[
{
"version": "v1",
"created": "Fri, 30 Mar 2007 16:16:11 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"D'Aquin",
"Mathieu",
"",
"KMI"
],
[
"Badra",
"Fadi",
"",
"INRIA Lorraine - LORIA"
],
[
"Lafrogne",
"Sandrine",
"",
"INRIA Lorraine - LORIA"
],
[
"Lieber",
"Jean",
"",
"INRIA Lorraine - LORIA"
],
[
"Napoli",
"Amedeo",
"",
"INRIA Lorraine - LORIA"
],
[
"Szathmary",
"Laszlo",
"",
"INRIA Lorraine -\n LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/9301101
| null |
Lawrence C. Paulson
|
Verifying the Unification Algorithm in LCF
| null |
Science of Computer Programming 5 (1985), 143-170
| null | null |
cs.LO
| null |
Manna and Waldinger's theory of substitutions and unification has been
verified using the Cambridge LCF theorem prover. A proof of the monotonicity of
substitution is presented in detail, as an example of interaction with LCF.
Translating the theory into LCF's domain-theoretic logic is largely
straightforward. Well-founded induction on a complex ordering is translated
into nested structural inductions. Correctness of unification is expressed
using predicates for such properties as idempotence and most-generality. The
verification is presented as a series of lemmas. The LCF proofs are compared
with the original ones, and with other approaches. It appears difficult to find
a logic that is both simple and flexible, especially for proving termination.
|
[
{
"version": "v1",
"created": "Fri, 29 Sep 2000 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301102
| null |
Lawrence C. Paulson
|
Constructing Recursion Operators in Intuitionistic Type Theory
| null |
Journal of Symbolic Computation 2 (1986), 325-355
| null | null |
cs.LO
| null |
Martin-L\"of's Intuitionistic Theory of Types is becoming popular for formal
reasoning about computer programs. To handle recursion schemes other than
primitive recursion, a theory of well-founded relations is presented. Using
primitive recursion over higher types, induction and recursion are formally
derived for a large class of well-founded relations. Included are < on natural
numbers, and relations formed by inverse images, addition, multiplication, and
exponentiation of other relations. The constructions are given in full detail
to allow their use in theorem provers for Type Theory, such as Nuprl. The
theory is compared with work in the field of ordinal recursion over higher
types.
|
[
{
"version": "v1",
"created": "Tue, 31 Oct 2000 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301103
| null |
Lawrence C. Paulson
|
Proving Termination of Normalization Functions for Conditional
Expressions
| null |
Journal of Automated Reasoning 2 (1986), 63-74
| null | null |
cs.LO
| null |
Boyer and Moore have discussed a recursive function that puts conditional
expressions into normal form [1]. It is difficult to prove that this function
terminates on all inputs. Three termination proofs are compared: (1) using a
measure function, (2) in domain theory using LCF, (3) showing that its
recursion relation, defined by the pattern of recursive calls, is well-founded.
The last two proofs are essentially the same though conducted in markedly
different logical frameworks. An obviously total variant of the normalize
function is presented as the `computational meaning' of those two proofs. A
related function makes nested recursive calls. The three termination proofs
become more complex: termination and correctness must be proved simultaneously.
The recursion relation approach seems flexible enough to handle subtle
termination proofs where previously domain theory seemed essential.
|
[
{
"version": "v1",
"created": "Mon, 2 Oct 2000 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301104
| null |
Lawrence C. Paulson
|
Natural Deduction as Higher-Order Resolution
| null |
Journal of Logic Programming 3 (1986), 237-258
| null | null |
cs.LO
| null |
An interactive theorem prover, Isabelle, is under development. In LCF, each
inference rule is represented by one function for forwards proof and another (a
tactic) for backwards proof. In Isabelle, each inference rule is represented by
a Horn clause. Resolution gives both forwards and backwards proof, supporting a
large class of logics. Isabelle has been used to prove theorems in
Martin-L\"of's Constructive Type Theory. Quantifiers pose several difficulties:
substitution, bound variables, Skolemization. Isabelle's representation of
logical syntax is the typed lambda-calculus, requiring higher- order
unification. It may have potential for logic programming. Depth-first
subgoaling along inference rules constitutes a higher-order Prolog.
|
[
{
"version": "v1",
"created": "Tue, 31 Oct 2000 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301105
| null |
Lawrence C. Paulson
|
The Foundation of a Generic Theorem Prover
| null |
Journal of Automated Reasoning 5 (1989), 363-397
| null | null |
cs.LO
| null |
Isabelle is an interactive theorem prover that supports a variety of logics.
It represents rules as propositions (not as functions) and builds proofs by
combining rules. These operations constitute a meta-logic (or `logical
framework') in which the object-logics are formalized. Isabelle is now based on
higher-order logic -- a precise and well-understood foundation. Examples
illustrate use of this meta-logic to formalize logics and proofs. Axioms for
first-order logic are shown sound and complete. Backwards proof is formalized
by meta-reasoning about object-level entailment. Higher-order logic has several
practical advantages over other meta-logics. Many proof techniques are known,
such as Huet's higher-order unification procedure.
|
[
{
"version": "v1",
"created": "Tue, 31 Oct 2000 00:00:00 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301106
| null |
Lawrence C. Paulson
|
Isabelle: The Next 700 Theorem Provers
| null |
published in P. Odifreddi (editor), Logic and Computer Science
(Academic Press, 1990), 361-386
| null | null |
cs.LO
| null |
Isabelle is a generic theorem prover, designed for interactive reasoning in a
variety of formal theories. At present it provides useful proof procedures for
Constructive Type Theory, various first-order logics, Zermelo-Fraenkel set
theory, and higher-order logic. This survey of Isabelle serves as an
introduction to the literature. It explains why generic theorem proving is
beneficial. It gives a thorough history of Isabelle, beginning with its origins
in the LCF system. It presents an account of how logics are represented,
illustrated using classical logic. The approach is compared with the Edinburgh
Logical Framework. Several of the Isabelle object-logics are presented.
|
[
{
"version": "v1",
"created": "Tue, 31 Oct 2000 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301107
| null |
Lawrence C. Paulson
|
A Formulation of the Simple Theory of Types (for Isabelle)
| null |
published in P. Martin-L\"of & G. Mints (editors), COLOG-88:
International Conf. in Computer Logic (Springer LNCS 417, 1990), 246-274
| null | null |
cs.LO
| null |
Simple type theory is formulated for use with the generic theorem prover
Isabelle. This requires explicit type inference rules. There are function,
product, and subset types, which may be empty. Descriptions (the eta-operator)
introduce the Axiom of Choice. Higher-order logic is obtained through
reflection between formulae and terms of type bool. Recursive types and
functions can be formally constructed. Isabelle proof procedures are described.
The logic appears suitable for general mathematics as well as computational
problems.
|
[
{
"version": "v1",
"created": "Tue, 31 Oct 2000 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301108
| null |
Lawrence C. Paulson
|
A Higher-Order Implementation of Rewriting
| null |
Science of Computer Programming 3 (1983), 119-149
| null | null |
cs.LO
| null |
Many automatic theorem-provers rely on rewriting. Using theorems as rewrite
rules helps to simplify the subgoals that arise during a proof.
LCF is an interactive theorem-prover intended for reasoning about
computation. Its implementation of rewriting is presented in detail. LCF
provides a family of rewriting functions, and operators to combine them. A
succession of functions is described, from pattern matching primitives to the
rewriting tool that performs most inferences in LCF proofs.
The design is highly modular. Each function performs a basic, specific task,
such as recognizing a certain form of tautology. Each operator implements one
method of building a rewriting function from simpler ones. These pieces can be
put together in numerous ways, yielding a variety of rewrit- ing strategies.
The approach involves programming with higher-order functions. Rewriting
functions are data values, produced by computation on other rewriting
functions. The code is in daily use at Cambridge, demonstrating the practical
use of functional programming.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2001 00:00:00 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301109
| null |
Lawrence C. Paulson and Andrew W. Smith
|
Logic Programming, Functional Programming, and Inductive Definitions
| null |
published in P. Schroeder-Heister (editor), Extensions of Logic
Programming (Springer, 1991), 283-310
| null | null |
cs.LO
| null |
An attempt at unifying logic and functional programming is reported. As a
starting point, we take the view that "logic programs" are not about logic but
constitute inductive definitions of sets and relations. A skeletal language
design based on these considerations is sketched and a prototype implementation
discussed.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2001 00:00:00 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
],
[
"Smith",
"Andrew W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301110
| null |
Lawrence C. Paulson
|
Designing a Theorem Prover
| null |
published in S. Abramsky, D. M. Gabbay, T. S. E. Maibaum
(editors), Handbook of Logic in Computer Science, Vol II (Oxford, 1992),
415-475
| null | null |
cs.LO
| null |
A step-by-step presentation of the code for a small theorem prover introduces
theorem-proving techniques. The programming language used is Standard ML. The
prover operates on a sequent calculus formulation of first-order logic, which
is briefly explained. The implementation of unification and logical inference
is shown. The prover is demonstrated on several small examples, including one
that shows its limitations. The final part of the paper is a survey of
contemporary research on interactive theorem proving.
|
[
{
"version": "v1",
"created": "Thu, 29 Mar 2001 00:00:00 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Paulson",
"Lawrence C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/9301111
|
Maggie McLoughlin
|
Donald E. Knuth
|
Nested satisfiability
| null |
Acta Inform. 28 (1990), no. 1, 1--6
| null |
Knuth migration 11/2004
|
cs.CC
| null |
A special case of the satisfiability problem, in which the clauses have a
hierarchical structure, is shown to be solvable in linear time, assuming that
the clauses have been represented in a convenient way.
|
[
{
"version": "v1",
"created": "Mon, 1 Jan 1990 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Knuth",
"Donald E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/9301112
|
Maggie McLoughlin
|
Donald E. Knuth
|
A note on digitized angles
| null |
Electronic Publishing 3 (1990), no. 2, 99--104
| null |
Knuth migration 11/2004
|
cs.GR
| null |
We study the configurations of pixels that occur when two digitized straight
lines meet each other.
|
[
{
"version": "v1",
"created": "Sun, 1 Apr 1990 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Knuth",
"Donald E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/9301113
|
Maggie McLoughlin
|
Donald E. Knuth
|
Textbook examples of recursion
| null |
Artificial intelligence and mathematical theory of computation
| null |
Knuth migration 11/2004 207-229, Academic Press, Boston, MA, 1991
|
cs.CC
| null |
We discuss properties of recursive schemas related to McCarthy's ``91
function'' and to Takeuchi's triple recursion. Several theorems are proposed as
interesting candidates for machine verification, and some intriguing open
questions are raised.
|
[
{
"version": "v1",
"created": "Thu, 1 Aug 1991 00:00:00 GMT"
}
] | 2008-02-03T00:00:00 |
[
[
"Knuth",
"Donald E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.