id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0901.2897 | Pawel Gawrychowski | Pawel Gawrychowski, Artur Jez, Lukasz Jez | Online validation of the pi and pi' failure functions | submitted | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let pi_w denote the failure function of the Morris-Pratt algorithm for a word
w. In this paper we study the following problem: given an integer array
A[1..n], is there a word w over arbitrary alphabet such that A[i]=pi_w[i] for
all i? Moreover, what is the minimum required cardinality of the alphabet? We
give a real time linear algorithm for this problem in the unit-cost RAM model
with \Theta(log n) bits word size. Our algorithm returns a word w over minimal
alphabet such that pi_w = A as well and uses just o(n) words of memory. Then we
consider function pi' instead of pi and give an online O(n log n) algorithm for
this case. This is the first polynomial algorithm for online version of this
problem.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 20:12:21 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Apr 2009 20:57:00 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Gawrychowski",
"Pawel",
""
],
[
"Jez",
"Artur",
""
],
[
"Jez",
"Lukasz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.2900 | Ankit Sharma | Manoj Gupta (1), Ankit Sharma (1) ((1) Indian Institute of Technology
Kanpur) | An O(log(n)) Fully Dynamic Algorithm for Maximum matching in a tree | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we have developed a fully-dynamic algorithm for maintaining
cardinality of maximum-matching in a tree using the construction of top-trees.
The time complexities are as follows:
1. Initialization Time: $O(n(log(n)))$ to build the Top-tree. 2. Update Time:
$O(log(n))$ 3. Query Time: O(1) to query the cardinality of maximum-matching
and $O(log(n))$ to find if a particular edge is matched.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 17:30:28 GMT"
}
]
| 2009-01-20T00:00:00 | [
[
"Gupta",
"Manoj",
""
],
[
"Sharma",
"Ankit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.2903 | Andre Souto | Andreia Teixeira, Andre Souto, Armando Matos, Luis Antunes | Entropy Measures vs. Algorithmic Information | null | null | null | null | cs.IT cs.CC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algorithmic entropy and Shannon entropy are two conceptually different
information measures, as the former is based on size of programs and the later
in probability distributions. However, it is known that, for any recursive
probability distribution, the expected value of algorithmic entropy equals its
Shannon entropy, up to a constant that depends only on the distribution. We
study if a similar relationship holds for R\'{e}nyi and Tsallis entropies of
order $\alpha$, showing that it only holds for R\'{e}nyi and Tsallis entropies
of order 1 (i.e., for Shannon entropy). Regarding a time bounded analogue
relationship, we show that, for distributions such that the cumulative
probability distribution is computable in time $t(n)$, the expected value of
time-bounded algorithmic entropy (where the alloted time is $nt(n)\log
(nt(n))$) is in the same range as the unbounded version. So, for these
distributions, Shannon entropy captures the notion of computationally
accessible information. We prove that, for universal time-bounded distribution
$\m^t(x)$, Tsallis and R\'{e}nyi entropies converge if and only if $\alpha$ is
greater than 1.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 17:45:39 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Jun 2010 15:25:33 GMT"
}
]
| 2010-06-03T00:00:00 | [
[
"Teixeira",
"Andreia",
""
],
[
"Souto",
"Andre",
""
],
[
"Matos",
"Armando",
""
],
[
"Antunes",
"Luis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.2906 | Andre Souto | Armando Matos, Andreia Teixeira, Andre Souto | Measuring communication complexity using instance complexity with
oracles | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish a connection between non-deterministic communication complexity
and instance complexity, a measure of information based on algorithmic entropy.
Let $\overline{x}$, $\overline{y}$ and $Y_1(\overline{x})$ be respectively the
input known by Alice, the input known by Bob, and the set of all values of $y$
such that $f(\overline{x},y)=1$; a string is a witness of the non-deterministic
communication protocol iff it is a program $p$ that "corresponds exactly" to
the instance complexity $\ic^{f,t}(\overline{y}:Y_1(\overline{x}))$.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 18:00:37 GMT"
}
]
| 2009-01-20T00:00:00 | [
[
"Matos",
"Armando",
""
],
[
"Teixeira",
"Andreia",
""
],
[
"Souto",
"Andre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0901.2911 | David Ford K | David K. Ford | Gibbs Free Energy Analysis of a Quantum Analog of the Classical Binary
Symmetric Channel | 6 pages, 2 figures | null | null | null | physics.gen-ph cond-mat.stat-mech cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Gibbs free energy properties of a quantum {\it send, receive}
communications system are studied. The communications model resembles the
classical Ising model of spins on a lattice in that the joint state of the
quantum system is the product of sender and receiver states. However, the
system differs from the classical case in that the sender and receiver spin
states are quantum superposition states coupled by a Hamiltonian operator. A
basic understanding of these states is directly relevant to communications
theory and indirectly relevant to computation since the product states form a
basis for entangled states. Highlights of the study include an exact method for
decimation for quantum spins. The main result is that the minimum Gibbs free
energy of the quantum system in the product state is higher (lower capacity)
than a classical system with the same parameter values. The result is both
surprising and not. The channel characteristics of the quantum system in the
product state are markedly inferior to those of the classical Ising system.
Intuitively, it would seem that capacity should suffer as a result. Yet, one
would expect entangled states, built from product states, to have better
correlation properties.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 18:28:46 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Ford",
"David K.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.gen-ph",
"description": "Description coming soon",
"span": "(General Physics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.2912 | Salman Avestimehr | M. Amin Khajehnejad, Weiyu Xu, Salman Avestimehr, and Babak Hassibi | Weighted $\ell_1$ Minimization for Sparse Recovery with Prior
Information | 5 Pages, Submitted to ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the compressed sensing problem of recovering a sparse
signal from a system of underdetermined linear equations when we have prior
information about the probability of each entry of the unknown signal being
nonzero. In particular, we focus on a model where the entries of the unknown
vector fall into two sets, each with a different probability of being nonzero.
We propose a weighted $\ell_1$ minimization recovery algorithm and analyze its
performance using a Grassman angle approach. We compute explicitly the
relationship between the system parameters (the weights, the number of
measurements, the size of the two sets, the probabilities of being non-zero) so
that an iid random Gaussian measurement matrix along with weighted $\ell_1$
minimization recovers almost all such sparse signals with overwhelming
probability as the problem dimension increases. This allows us to compute the
optimal weights. We also provide simulations to demonstrate the advantages of
the method over conventional $\ell_1$ optimization.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 19:01:43 GMT"
}
]
| 2009-01-20T00:00:00 | [
[
"Khajehnejad",
"M. Amin",
""
],
[
"Xu",
"Weiyu",
""
],
[
"Avestimehr",
"Salman",
""
],
[
"Hassibi",
"Babak",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.2913 | MinJi Kim | MinJi Kim, Muriel Medard, Joao Barros, Ralf Koetter | An Algebraic Watchdog for Wireless Network Coding | 5 pages, 4 figures, submitted to IEEE International Symposium on
Information Theory (ISIT) 2009. This is the final version. The content has
been changed to incorporate reviewer comments and recent results | null | 10.1109/ISIT.2009.5206004 | null | cs.NI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a scheme, called the "algebraic watchdog" for
wireless network coding, in which nodes can detect malicious behaviors
probabilistically, police their downstream neighbors locally using overheard
messages, and, thus, provide a secure global "self-checking network". Unlike
traditional Byzantine detection protocols which are receiver-based, this
protocol gives the senders an active role in checking the node downstream. This
work is inspired by Marti et. al.'s watchdog-pathrater, which attempts to
detect and mitigate the effects of routing misbehavior.
As the first building block of a such system, we focus on a two-hop network.
We present a graphical model to understand the inference process nodes execute
to police their downstream neighbors; as well as to compute, analyze, and
approximate the probabilities of misdetection and false detection. In addition,
we present an algebraic analysis of the performance using an hypothesis testing
framework, that provides exact formulae for probabilities of false detection
and misdetection.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 19:03:04 GMT"
},
{
"version": "v2",
"created": "Mon, 25 May 2009 17:28:09 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Kim",
"MinJi",
""
],
[
"Medard",
"Muriel",
""
],
[
"Barros",
"Joao",
""
],
[
"Koetter",
"Ralf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.2922 | Qiao Li | Qiao Li, Rohit Negi | Scheduling in Multi-hop Wireless Networks with Priorities | 9 pages, 1 figure | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider prioritized maximal scheduling in multi-hop
wireless networks, where the scheduler chooses a maximal independent set
greedily according to a sequence specified by certain priorities. We show that
if the probability distributions of the priorities are properly chosen, we can
achieve the optimal (maximum) stability region using an i.i.d random priority
assignment process, for any set of arrival processes that satisfy Law of Large
Numbers. The pre-computation of the priorities is, in general, NP-hard, but
there exists polynomial time approximation scheme (PTAS) to achieve any
fraction of the optimal stability region. We next focus on the simple case of
static priority and specify a greedy priority assignment algorithm, which can
achieve the same fraction of the optimal stability region as the state of art
result for Longest Queue First (LQF) schedulers. We also show that this
algorithm can be easily adapted to satisfy delay constraints in the large
deviations regime, and therefore, supports Quality of Service (QoS) for each
link.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 20:49:02 GMT"
}
]
| 2009-01-20T00:00:00 | [
[
"Li",
"Qiao",
""
],
[
"Negi",
"Rohit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.2924 | Alvaro Corral | Alvaro Corral (1), Ramon Ferrer-i-Cancho (2), Gemma Boleda (2), Albert
Diaz-Guilera (3). ((1) Centre de Recerca Matematica, (2) U Politecnica
Catalunya, (3) U Barcelona) | Universal Complex Structures in Written Language | Short paper | null | null | null | physics.soc-ph cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantitative linguistics has provided us with a number of empirical laws that
characterise the evolution of languages and competition amongst them. In terms
of language usage, one of the most influential results is Zipf's law of word
frequencies. Zipf's law appears to be universal, and may not even be unique to
human language. However, there is ongoing controversy over whether Zipf's law
is a good indicator of complexity. Here we present an alternative approach that
puts Zipf's law in the context of critical phenomena (the cornerstone of
complexity in physics) and establishes the presence of a large scale
"attraction" between successive repetitions of words. Moreover, this phenomenon
is scale-invariant and universal -- the pattern is independent of word
frequency and is observed in texts by different authors and written in
different languages. There is evidence, however, that the shape of the scaling
relation changes for words that play a key role in the text, implying the
existence of different "universality classes" in the repetition of words. These
behaviours exhibit striking parallels with complex catastrophic phenomena.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 21:19:55 GMT"
}
]
| 2009-01-21T00:00:00 | [
[
"Corral",
"Alvaro",
""
],
[
"Ferrer-i-Cancho",
"Ramon",
""
],
[
"Boleda",
"Gemma",
""
],
[
"Diaz-Guilera",
"Albert",
""
],
[
".",
"",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0901.2934 | Yong Peng | Yong Peng and Dinesh Rajan | Noisy DPC and Application to a Cognitive Channel | 5 pages, 5 figures, submitted to IEEE ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we first consider a channel that is contaminated by two
independent Gaussian noises $S ~ N(0,Q)$ and $Z_0 ~ N(0,N_0)$. The capacity of
this channel is computed when independent noisy versions of $S$ are known to
the transmitter and/or receiver. It is shown that the channel capacity is
greater then the capacity when $S$ is completely unknown, but is less then the
capacity when $S$ is perfectly known at the transmitter or receiver. For
example, if there is one noisy version of $S$ known at the transmitter only,
the capacity is $0.5log(1+P/(Q(N_1/(Q+N_1))+N_0))$, where $P$ is the input
power constraint and $N_1$ is the power of the noise corrupting $S$. We then
consider a Gaussian cognitive interference channel (IC) and propose a causal
noisy dirty paper coding (DPC) strategy. We compute the achievable region using
this noisy DPC strategy and quantify the regions when it achieves the upper
bound on the rate.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 21:03:35 GMT"
}
]
| 2009-01-21T00:00:00 | [
[
"Peng",
"Yong",
""
],
[
"Rajan",
"Dinesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.2954 | Kenichi Horie | Kenichi Horie | An Upper Limit of AC Huffman Code Length in JPEG Compression | US patent application 11/947936 | null | null | OIMC07P03556 | cs.IT cs.CC cs.CE cs.CV math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A strategy for computing upper code-length limits of AC Huffman codes for an
8x8 block in JPEG Baseline coding is developed. The method is based on a
geometric interpretation of the DCT, and the calculated limits are as close as
14% to the maximum code-lengths. The proposed strategy can be adapted to other
transform coding methods, e.g., MPEG 2 and 4 video compressions, to calculate
close upper code length limits for the respective processing blocks.
| [
{
"version": "v1",
"created": "Mon, 19 Jan 2009 23:19:00 GMT"
}
]
| 2009-01-21T00:00:00 | [
[
"Horie",
"Kenichi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3003 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Timed tuplix calculus and the Wesseling and van den Bergh equation | 17 pages; phrasing improved, references updated; substantially
improved; remarks added | Scientific Annals of Computer Science 23(2):169--190, 2013 | 10.7561/SACS.2013.2.169 | PRG0901 | q-fin.GN cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop an algebraic framework for the description and analysis of
financial behaviours, that is, behaviours that consist of transferring certain
amounts of money at planned times. To a large extent, analysis of financial
products amounts to analysis of such behaviours. We formalize the cumulative
interest compliant conservation requirement for financial products proposed by
Wesseling and van den Bergh by an equation in the framework developed and
define a notion of financial product behaviour using this formalization. We
also present some properties of financial product behaviours. The development
of the framework has been influenced by previous work on the process algebra
ACP.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 08:54:15 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jun 2009 07:11:05 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Jun 2013 18:22:31 GMT"
},
{
"version": "v4",
"created": "Fri, 19 Jul 2013 09:32:27 GMT"
}
]
| 2013-12-17T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Quantitative Finance",
"code": "q-fin.GN",
"description": "Development of general quantitative methodologies with applications in finance",
"span": "(General Finance)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.3012 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Meadow enriched ACP process algebras | 8 pages; correction in Table 3 | null | null | PRG0902 | math.RA cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the notion of an ACP process algebra. The models of the axiom
system ACP are the origin of this notion. ACP process algebras have to do with
processes in which no data are involved. We also introduce the notion of a
meadow enriched ACP process algebra, which is a simple generalization of the
notion of an ACP process algebra to processes in which data are involved. In
meadow enriched ACP process algebras, the mathematical structure for data is a
meadow.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 09:56:54 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Feb 2009 12:48:48 GMT"
}
]
| 2009-02-04T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.3017 | Ronojoy Adhikari | Nisha Yadav, Hrishikesh Joglekar, Rajesh P. N. Rao, M. N. Vahia,
Iravatham Mahadevan and R. Adhikari | Statistical analysis of the Indus script using $n$-grams | null | null | 10.1371/journal.pone.0009506 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Indus script is one of the major undeciphered scripts of the ancient
world. The small size of the corpus, the absence of bilingual texts, and the
lack of definite knowledge of the underlying language has frustrated efforts at
decipherment since the discovery of the remains of the Indus civilisation.
Recently, some researchers have questioned the premise that the Indus script
encodes spoken language. Building on previous statistical approaches, we apply
the tools of statistical language processing, specifically $n$-gram Markov
chains, to analyse the Indus script for syntax. Our main results are that the
script has well-defined signs which begin and end texts, that there is
directionality and strong correlations in the sign order, and that there are
groups of signs which appear to have identical syntactic function. All these
require no {\it a priori} suppositions regarding the syntactic or semantic
content of the signs, but follow directly from the statistical analysis. Using
information theoretic measures, we find the information in the script to be
intermediate between that of a completely random and a completely fixed
ordering of signs. Our study reveals that the Indus script is a structured sign
system showing features of a formal language, but, at present, cannot
conclusively establish that it encodes {\it natural} language. Our $n$-gram
Markov model is useful for predicting signs which are missing or illegible in a
corpus of Indus texts. This work forms the basis for the development of a
stochastic grammar which can be used to explore the syntax of the Indus script
in greater detail.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 12:55:55 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Yadav",
"Nisha",
""
],
[
"Joglekar",
"Hrishikesh",
""
],
[
"Rao",
"Rajesh P. N.",
""
],
[
"Vahia",
"M. N.",
""
],
[
"Mahadevan",
"Iravatham",
""
],
[
"Adhikari",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0901.3047 | Oded Kafri | Oded Kafri | Entropy Principle in Direct Derivation of Benford's Law | null | null | null | null | cs.DM physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The uneven distribution of digits in numerical data, known as Benford's law,
was discovered in 1881. Since then, this law has been shown to be correct in
copious numerical data relating to economics, physics and even prime numbers.
Although it attracts considerable attention, there is no a priori probabilistic
criterion when a data set should or should not obey the law. Here a general
criterion is suggested, namely that any file of digits in the Shannon limit
(namely, having maximum entropy) has a Benford's law distribution of digits.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 12:50:15 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Mar 2009 07:28:50 GMT"
}
]
| 2009-07-28T00:00:00 | [
[
"Kafri",
"Oded",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0901.3056 | Muhammet Fatih Bayramoglu | M. F. Bayramoglu and A. \"Ozg\"ur Y{\i}lmaz | Factorization of Joint Probability Mass Functions into Parity Check
Interactions | 5 pages, 1 figures, appeared in the proceedings of ISIT 2009; Changed
content, more recent version than as appeared in the proceedings | null | null | null | cs.IT cs.DM math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that any joint probability mass function (PMF) can be expressed as a
product of parity check factors and factors of degree one with the help of some
auxiliary variables, if the alphabet size is appropriate for defining a parity
check equation. In other words, marginalization of a joint PMF is equivalent to
a soft decoding task as long as a finite field can be constructed over the
alphabet of the PMF. In factor graph terminology this claim means that a factor
graph representing such a joint PMF always has an equivalent Tanner graph. We
provide a systematic method based on the Hilbert space of PMFs and orthogonal
projections for obtaining this factorization.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 13:37:37 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jul 2009 11:20:39 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Bayramoglu",
"M. F.",
""
],
[
"Yılmaz",
"A. Özgür",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0901.3119 | Josef Cibulka | Josef Cibulka | Average number of flips in pancake sorting | 21 pages, new computational results for unburnt pancakes (up to n=19) | Theor. Comput. Sci. 412, pp. 822-834 (2011) | 10.1016/j.tcs.2010.11.028 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are given a stack of pancakes of different sizes and the only allowed
operation is to take several pancakes from top and flip them. The unburnt
version requires the pancakes to be sorted by their sizes at the end, while in
the burnt version they additionally need to be oriented burnt-side down. We
present an algorithm with the average number of flips, needed to sort a stack
of n burnt pancakes, equal to 7n/4+O(1) and a randomized algorithm for the
unburnt version with at most 17n/12+O(1) flips on average.
In addition, we show that in the burnt version, the average number of flips
of any algorithm is at least n+\Omega(n/log n) and conjecture that some
algorithm can reach n+\Theta(n/log n).
We also slightly increase the lower bound on g(n), the minimum number of
flips needed to sort the worst stack of n burnt pancakes. This bound, together
with the upper bound found by Heydari and Sudborough in 1997, gives the exact
number of flips to sort the previously conjectured worst stack -I_n for n=3 mod
4 and n>=15. Finally we present exact values of f(n) up to n=19 and of g(n) up
to n=17 and disprove a conjecture of Cohen and Blum by showing that the burnt
stack -I_{15} is not the worst one for n=15.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 20:08:57 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Sep 2009 16:17:16 GMT"
}
]
| 2011-02-07T00:00:00 | [
[
"Cibulka",
"Josef",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0901.3130 | Mustafa Cenk Gursoy | Mustafa Cenk Gursoy | Secure Communication in the Low-SNR Regime: A Characterization of the
Energy-Secrecy Tradeoff | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Secrecy capacity of a multiple-antenna wiretap channel is studied in the low
signal-to-noise ratio (SNR) regime. Expressions for the first and second
derivatives of the secrecy capacity with respect to SNR at SNR = 0 are derived.
Transmission strategies required to achieve these derivatives are identified.
In particular, it is shown that it is optimal in the low-SNR regime to transmit
in the maximum-eigenvalue eigenspace of H_m* H_m - N_m/N_e H_e* H_e where H_m
and H_e denote the channel matrices associated with the legitimate receiver and
eavesdropper, respectively, and N_m and N_e are the noise variances at the
receiver and eavesdropper, respectively. Energy efficiency is analyzed by
finding the minimum bit energy required for secure and reliable communications,
and the wideband slope. Increased bit energy requirements under secrecy
constraints are quantified. Finally, the impact of fading is investigated.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 19:53:43 GMT"
}
]
| 2009-01-21T00:00:00 | [
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3132 | Mustafa Cenk Gursoy | Junwei Zhang and Mustafa Cenk Gursoy | Low-SNR Analysis of Interference Channels under Secrecy Constraints | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the secrecy rates over weak Gaussian interference
channels for different transmission schemes. We focus on the low-SNR regime and
obtain the minimum bit energy E_b/N_0_min values, and the wideband slope
regions for both TDMA and multiplexed transmission schemes. We show that
secrecy constraints introduce a penalty in both the minimum bit energy and the
slope regions. Additionally, we identify under what conditions TDMA or
multiplexed transmission is optimal. Finally, we show that TDMA is more likely
to be optimal in the presence of secrecy constraints.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 20:00:00 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Zhang",
"Junwei",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3134 | Mustafa Cenk Gursoy | Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar | Energy Efficiency of Fixed-Rate Wireless Transmissions under Queueing
Constraints and Channel Uncertainty | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy efficiency of fixed-rate transmissions is studied in the presence of
queueing constraints and channel uncertainty. It is assumed that neither the
transmitter nor the receiver has channel side information prior to
transmission. The channel coefficients are estimated at the receiver via
minimum mean-square-error (MMSE) estimation with the aid of training symbols.
It is further assumed that the system operates under statistical queueing
constraints in the form of limitations on buffer violation probabilities. The
optimal fraction of of power allocated to training is identified. Spectral
efficiency--bit energy tradeoff is analyzed in the low-power and wideband
regimes by employing the effective capacity formulation. In particular, it is
shown that the bit energy increases without bound in the low-power regime as
the average power vanishes. On the other hand, it is proven that the bit energy
diminishes to its minimum value in the wideband regime as the available
bandwidth increases. For this case, expressions for the minimum bit energy and
wideband slope are derived. Overall, energy costs of channel uncertainty and
queueing constraints are identified.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 20:07:38 GMT"
}
]
| 2009-01-21T00:00:00 | [
[
"Qiao",
"Deli",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
],
[
"Velipasalar",
"Senem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3150 | Sewoong Oh | Raghunandan H. Keshavan, Andrea Montanari, and Sewoong Oh | Matrix Completion from a Few Entries | 30 pages, 1 figure, journal version (v1, v2: Conference version ISIT
2009) | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let M be a random (alpha n) x n matrix of rank r<<n, and assume that a
uniformly random subset E of its entries is observed. We describe an efficient
algorithm that reconstructs M from |E| = O(rn) observed entries with relative
root mean square error RMSE <= C(rn/|E|)^0.5 . Further, if r=O(1), M can be
reconstructed exactly from |E| = O(n log(n)) entries. These results apply
beyond random matrices to general low-rank incoherent matrices.
This settles (in the case of bounded rank) a question left open by Candes and
Recht and improves over the guarantees for their reconstruction algorithm. The
complexity of our algorithm is O(|E|r log(n)), which opens the way to its use
for massive data sets. In the process of proving these statements, we obtain a
generalization of a celebrated result by Friedman-Kahn-Szemeredi and Feige-Ofek
on the spectrum of sparse random matrices.
| [
{
"version": "v1",
"created": "Tue, 20 Jan 2009 21:32:57 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Mar 2009 07:00:15 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Mar 2009 03:27:35 GMT"
},
{
"version": "v4",
"created": "Thu, 17 Sep 2009 09:26:46 GMT"
}
]
| 2009-09-17T00:00:00 | [
[
"Keshavan",
"Raghunandan H.",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Oh",
"Sewoong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0901.3170 | Pascal Vontobel | Arya Mazumdar, Ron M. Roth, Pascal O. Vontobel | On linear balancing sets | The abstract of this paper appeared in the proc. of 2009
International Symposium on Information Theory | Advances in Mathematics of Communications (AMC), Vol. 4, Issue 3,
pp. 345 - 361, August, 2010 | 10.3934/amc.2010.4.345 | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let n be an even positive integer and F be the field \GF(2). A word in F^n is
called balanced if its Hamming weight is n/2. A subset C \subseteq F^n$ is
called a balancing set if for every word y \in F^n there is a word x \in C such
that y + x is balanced. It is shown that most linear subspaces of F^n of
dimension slightly larger than 3/2\log_2(n) are balancing sets. A
generalization of this result to linear subspaces that are "almost balancing"
is also presented. On the other hand, it is shown that the problem of deciding
whether a given set of vectors in F^n spans a balancing set, is NP-hard. An
application of linear balancing sets is presented for designing efficient
error-correcting coding schemes in which the codewords are balanced.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 05:22:03 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Oct 2009 14:15:37 GMT"
}
]
| 2010-12-17T00:00:00 | [
[
"Mazumdar",
"Arya",
""
],
[
"Roth",
"Ron M.",
""
],
[
"Vontobel",
"Pascal O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3188 | Narad Rampersad | James Currie and Narad Rampersad | Dejean's conjecture holds for n>=27 | minor revisions | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that Dejean's conjecture holds for n>=27. This brings the final
resolution of the conjecture by the approach of Moulin Ollagnier within range
of the computationally feasible.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 20:52:16 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jul 2009 13:43:39 GMT"
}
]
| 2009-07-09T00:00:00 | [
[
"Currie",
"James",
""
],
[
"Rampersad",
"Narad",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0901.3189 | James Lathrop | Steven M. Kautz, James I. Lathrop | Self-assembly of the discrete Sierpinski carpet and related fractals | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that the discrete Sierpinski triangle can be defined as the
nonzero residues modulo 2 of Pascal's triangle, and that from this definition
one can easily construct a tileset with which the discrete Sierpinski triangle
self-assembles in Winfree's tile assembly model. In this paper we introduce an
infinite class of discrete self-similar fractals that are defined by the
residues modulo a prime p of the entries in a two-dimensional matrix obtained
from a simple recursive equation. We prove that every fractal in this class
self-assembles using a uniformly constructed tileset. As a special case we show
that the discrete Sierpinski carpet self-assembles using a set of 30 tiles.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 04:58:13 GMT"
}
]
| 2009-01-22T00:00:00 | [
[
"Kautz",
"Steven M.",
""
],
[
"Lathrop",
"James I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0901.3192 | Meixia Tao | Xiaolu Zhang, Meixia Tao, Wenhua Jiao and Chun Sum Ng | End-to-End Outage Minimization in OFDM Based Linear Relay Networks | 25 pages, 8 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-hop relaying is an economically efficient architecture for coverage
extension and throughput enhancement in future wireless networks. OFDM, on the
other hand, is a spectrally efficient physical layer modulation technique for
broadband transmission. As a natural consequence of combining OFDM with
multi-hop relaying, the allocation of per-hop subcarrier power and per-hop
transmission time is crucial in optimizing the network performance. This paper
is concerned with the end-to-end information outage in an OFDM based linear
relay network. Our goal is to find an optimal power and time adaptation policy
to minimize the outage probability under a long-term total power constraint. We
solve the problem in two steps. First, for any given channel realization, we
derive the minimum short-term power required to meet a target transmission
rate. We show that it can be obtained through two nested bisection loops. To
reduce computational complexity and signalling overhead, we also propose a
sub-optimal algorithm. In the second step, we determine a power threshold to
control the transmission on-off so that the long-term total power constraint is
satisfied. Numerical examples are provided to illustrate the performance of the
proposed power and time adaptation schemes with respect to other resource
adaptation schemes.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 06:37:55 GMT"
}
]
| 2009-01-22T00:00:00 | [
[
"Zhang",
"Xiaolu",
""
],
[
"Tao",
"Meixia",
""
],
[
"Jiao",
"Wenhua",
""
],
[
"Ng",
"Chun Sum",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3196 | Farzan Haddadi | Farzan Haddadi, Mohammadreza Malekmohammadi, Mohammad Mahdi Nayebi,
Mohammad Reza Aref | Statistical Performance Analysis of MDL Source Enumeration in Array
Processing | Accepted for publication in IEEE Transactions on Signal Processing,
April 2009 | null | 10.1109/TSP.2009.2028207 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this correspondence, we focus on the performance analysis of the
widely-used minimum description length (MDL) source enumeration technique in
array processing. Unfortunately, available theoretical analysis exhibit
deviation from the simulation results. We present an accurate and insightful
performance analysis for the probability of missed detection. We also show that
the statistical performance of the MDL is approximately the same under both
deterministic and stochastic signal models. Simulation results show the
superiority of the proposed analysis over available results.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 07:26:05 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Apr 2009 10:27:45 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Haddadi",
"Farzan",
""
],
[
"Malekmohammadi",
"Mohammadreza",
""
],
[
"Nayebi",
"Mohammad Mahdi",
""
],
[
"Aref",
"Mohammad Reza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3197 | Danny Bickson | Danny Bickson, Alexander T. Ihler and Danny Dolev | A Low Density Lattice Decoder via Non-Parametric Belief Propagation | Submitted for publication | null | 10.1109/ALLERTON.2009.5394798 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent work of Sommer, Feder and Shalvi presented a new family of codes
called low density lattice codes (LDLC) that can be decoded efficiently and
approach the capacity of the AWGN channel. A linear time iterative decoding
scheme which is based on a message-passing formulation on a factor graph is
given.
In the current work we report our theoretical findings regarding the relation
between the LDLC decoder and belief propagation. We show that the LDLC decoder
is an instance of non-parametric belief propagation and further connect it to
the Gaussian belief propagation algorithm. Our new results enable borrowing
knowledge from the non-parametric and Gaussian belief propagation domains into
the LDLC domain. Specifically, we give more general convergence conditions for
convergence of the LDLC decoder (under the same assumptions of the original
LDLC convergence analysis). We discuss how to extend the LDLC decoder from
Latin square to full rank, non-square matrices. We propose an efficient
construction of sparse generator matrix and its matching decoder. We report
preliminary experimental results which show our decoder has comparable symbol
to error rate compared to the original LDLC decoder.%
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 07:47:10 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jul 2009 13:04:38 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Jul 2009 11:27:50 GMT"
},
{
"version": "v4",
"created": "Wed, 7 Oct 2009 17:14:11 GMT"
}
]
| 2010-03-23T00:00:00 | [
[
"Bickson",
"Danny",
""
],
[
"Ihler",
"Alexander T.",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3199 | Sylvain Sene | Michel Morvan (LIP, Ixxi), Sylvain Sen\'e (IXXI, Timc) | A Distributed Trust Diffusion Protocol for Ad Hoc Networks | null | Second International Conference on Wireless and Mobile
Communications, Bucarest : Roumanie (2006) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose and evaluate a distributed protocol to manage trust
diffusion in ad hoc networks. In this protocol, each node i maintains a \trust
value" about an other node j which is computed both as a result of the
exchanges with node j itself and as a function of the opinion that other nodes
have about j. These two aspects are respectively weighted by a trust index that
measures the trust quality the node has in its own experiences and by a trust
index representing the trust the node has in the opinions of the other nodes.
Simulations have been realized to validate the robustness of this protocol
against three kinds of attacks: simple coalitions, Trojan attacks and detonator
attacks.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 08:03:20 GMT"
}
]
| 2009-01-22T00:00:00 | [
[
"Morvan",
"Michel",
"",
"LIP, Ixxi"
],
[
"Sené",
"Sylvain",
"",
"IXXI, Timc"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.3202 | Francis Bach | Francis Bach (INRIA Rocquencourt) | Model-Consistent Sparse Estimation through the Bootstrap | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the least-square linear regression problem with regularization by
the $\ell^1$-norm, a problem usually referred to as the Lasso. In this paper,
we first present a detailed asymptotic analysis of model consistency of the
Lasso in low-dimensional settings. For various decays of the regularization
parameter, we compute asymptotic equivalents of the probability of correct
model selection. For a specific rate decay, we show that the Lasso selects all
the variables that should enter the model with probability tending to one
exponentially fast, while it selects all other variables with strictly positive
probability. We show that this property implies that if we run the Lasso for
several bootstrapped replications of a given sample, then intersecting the
supports of the Lasso bootstrap estimates leads to consistent model selection.
This novel variable selection procedure, referred to as the Bolasso, is
extended to high-dimensional settings by a provably consistent two-step
procedure.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 08:05:19 GMT"
}
]
| 2009-01-22T00:00:00 | [
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0901.3257 | Simon Heimlicher | Simon Heimlicher, Merkouris Karaliopoulos, Hanoch Levy and
Thrasyvoulos Spyropoulos | On Leveraging Partial Paths in Partially-Connected Networks | Extended version of paper appearing at IEEE INFOCOM 2009, April
20-25, Rio de Janeiro, Brazil | null | 10.1109/INFCOM.2009.5061906 | TR-303 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mobile wireless network research focuses on scenarios at the extremes of the
network connectivity continuum where the probability of all nodes being
connected is either close to unity, assuming connected paths between all nodes
(mobile ad hoc networks), or it is close to zero, assuming no multi-hop paths
exist at all (delay-tolerant networks). In this paper, we argue that a sizable
fraction of networks lies between these extremes and is characterized by the
existence of partial paths, i.e. multi-hop path segments that allow forwarding
data closer to the destination even when no end-to-end path is available. A
fundamental issue in such networks is dealing with disruptions of end-to-end
paths. Under a stochastic model, we compare the performance of the established
end-to-end retransmission (ignoring partial paths), against a forwarding
mechanism that leverages partial paths to forward data closer to the
destination even during disruption periods. Perhaps surprisingly, the
alternative mechanism is not necessarily superior. However, under a stochastic
monotonicity condition between current v.s. future path length, which we
demonstrate to hold in typical network models, we manage to prove superiority
of the alternative mechanism in stochastic dominance terms. We believe that
this study could serve as a foundation to design more efficient data transfer
protocols for partially-connected networks, which could potentially help
reducing the gap between applications that can be supported over disconnected
networks and those requiring full connectivity.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 14:47:45 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jan 2009 01:04:26 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Heimlicher",
"Simon",
""
],
[
"Karaliopoulos",
"Merkouris",
""
],
[
"Levy",
"Hanoch",
""
],
[
"Spyropoulos",
"Thrasyvoulos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.3291 | Jaroslaw Kwapien | Stanislaw Drozdz, Jaroslaw Kwapien, Adam Orczyk | Approaching the linguistic complexity | to be published in conference proceedings | Complex Sciences, Lect. Notes ICST vol.4, 1044-1050 (Springer,
2009) | 10.1007/978-3-642-02466-5_104 | null | cs.CL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the rank-frequency distributions of words in selected English and
Polish texts. We compare scaling properties of these distributions in both
languages. We also study a few small corpora of Polish literary texts and find
that for a corpus consisting of texts written by different authors the basic
scaling regime is broken more strongly than in the case of comparable corpus
consisting of texts written by the same author. Similarly, for a corpus
consisting of texts translated into Polish from other languages the scaling
regime is broken more strongly than for a comparable corpus of native Polish
texts. Moreover, based on the British National Corpus, we consider the
rank-frequency distributions of the grammatically basic forms of words (lemmas)
tagged with their proper part of speech. We find that these distributions do
not scale if each part of speech is analyzed separately. The only part of
speech that independently develops a trace of scaling is verbs.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 15:24:59 GMT"
}
]
| 2015-11-11T00:00:00 | [
[
"Drozdz",
"Stanislaw",
""
],
[
"Kwapien",
"Jaroslaw",
""
],
[
"Orczyk",
"Adam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0901.3299 | Matthias Mnich | Leo van Iersel, Matthias Mnich | Computing Rooted and Unrooted Maximum Consistent Supertrees | This paper has been withdrawn by the authors due to an error | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A chief problem in phylogenetics and database theory is the computation of a
maximum consistent tree from a set of rooted or unrooted trees. A standard
input are triplets, rooted binary trees on three leaves, or quartets, unrooted
binary trees on four leaves. We give exact algorithms constructing rooted and
unrooted maximum consistent supertrees in time O(2^n n^5 m^2 log(m)) for a set
of m triplets (quartets), each one distinctly leaf-labeled by some subset of n
labels. The algorithms extend to weighted triplets (quartets). We further
present fast exact algorithms for constructing rooted and unrooted maximum
consistent trees in polynomial space. Finally, for a set T of m rooted or
unrooted trees with maximum degree D and distinctly leaf-labeled by some subset
of a set L of n labels, we compute, in O(2^{mD} n^m m^5 n^6 log(m)) time, a
tree distinctly leaf-labeled by a maximum-size subset X of L that all trees in
T, when restricted to X, are consistent with.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 16:04:46 GMT"
},
{
"version": "v2",
"created": "Fri, 28 May 2010 06:18:27 GMT"
}
]
| 2010-05-31T00:00:00 | [
[
"van Iersel",
"Leo",
""
],
[
"Mnich",
"Matthias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.3314 | Stephan Tinguely | Amos Lapidoth, Stephan Tinguely | Sending a Bi-Variate Gaussian over a Gaussian MAC | submitted to the IEEE Transactions on Information Theory | null | 10.1109/ISIT.2006.261926 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the power versus distortion trade-off for the distributed
transmission of a memoryless bi-variate Gaussian source over a two-to-one
average-power limited Gaussian multiple-access channel. In this problem, each
of two separate transmitters observes a different component of a memoryless
bi-variate Gaussian source. The two transmitters then describe their source
component to a common receiver via an average-power constrained Gaussian
multiple-access channel. From the output of the multiple-access channel, the
receiver wishes to reconstruct each source component with the least possible
expected squared-error distortion. Our interest is in characterizing the
distortion pairs that are simultaneously achievable on the two source
components.
We present sufficient conditions and necessary conditions for the
achievability of a distortion pair. These conditions are expressed as a
function of the channel signal-to-noise ratio (SNR) and of the source
correlation. In several cases the necessary conditions and sufficient
conditions are shown to agree. In particular, we show that if the channel SNR
is below a certain threshold, then an uncoded transmission scheme is optimal.
We also derive the precise high-SNR asymptotics of an optimal scheme.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 19:14:57 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Lapidoth",
"Amos",
""
],
[
"Tinguely",
"Stephan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3348 | Stephen Vavasis | Brendan Ames, Stephen Vavasis | Nuclear norm minimization for the planted clique and biclique problems | null | null | null | null | cs.DS cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problems of finding a maximum clique in a graph and finding a
maximum-edge biclique in a bipartite graph. Both problems are NP-hard. We write
both problems as matrix-rank minimization and then relax them using the nuclear
norm. This technique, which may be regarded as a generalization of compressive
sensing, has recently been shown to be an effective way to solve rank
optimization problems. In the special cases that the input graph has a planted
clique or biclique (i.e., a single large clique or biclique plus diversionary
edges), our algorithm successfully provides an exact solution to the original
instance. For each problem, we provide two analyses of when our algorithm
succeeds. In the first analysis, the diversionary edges are placed by an
adversary. In the second, they are placed at random. In the case of random
edges for the planted clique problem, we obtain the same bound as Alon,
Krivelevich and Sudakov as well as Feige and Krauthgamer, but we use different
techniques.
| [
{
"version": "v1",
"created": "Wed, 21 Jan 2009 20:08:21 GMT"
}
]
| 2009-01-22T00:00:00 | [
[
"Ames",
"Brendan",
""
],
[
"Vavasis",
"Stephen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0901.3384 | Marko A. Rodriguez | Michael I. Ham and Marko A. Rodriguez | A Boundary Approximation Algorithm for Distributed Sensor Networks | null | International Journal of Sensor Networks, 8(1), pp. 41-46,
ISSN:1748-1279, 2010 | null | LA-UR-09-00111 | cs.DC | http://creativecommons.org/licenses/by/3.0/ | We present an algorithm for boundary approximation in locally-linked sensor
networks that communicate with a remote monitoring station. Delaunay
triangulations and Voronoi diagrams are used to generate a sensor communication
network and define boundary segments between sensors, respectively. The
proposed algorithm reduces remote station communication by approximating
boundaries via a decentralized computation executed within the sensor network.
Moreover, the algorithm identifies boundaries based on differences between
neighboring sensor readings, and not absolute sensor values. An analysis of the
bandwidth consumption of the algorithm is presented and compared to two naive
approaches. The proposed algorithm reduces the amount of remote communication
(compared to the naive approaches) and becomes increasingly useful in networks
with more nodes.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2009 00:59:01 GMT"
}
]
| 2010-06-22T00:00:00 | [
[
"Ham",
"Michael I.",
""
],
[
"Rodriguez",
"Marko A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.3403 | Marco Duarte | Dror Baron, Marco F. Duarte, Michael B. Wakin, Shriram Sarvotham,
Richard G. Baraniuk | Distributed Compressive Sensing | 42 pages, 6 figures. Submitted November 27, 2005; Revised January 21,
2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressive sensing is a signal acquisition framework based on the revelation
that a small collection of linear projections of a sparse signal contains
enough information for stable recovery. In this paper we introduce a new theory
for distributed compressive sensing (DCS) that enables new distributed coding
algorithms for multi-signal ensembles that exploit both intra- and inter-signal
correlation structures. The DCS theory rests on a new concept that we term the
joint sparsity of a signal ensemble. Our theoretical contribution is to
characterize the fundamental performance limits of DCS recovery for jointly
sparse signal ensembles in the noiseless measurement setting; our result
connects single-signal, joint, and distributed (multi-encoder) compressive
sensing. To demonstrate the efficacy of our framework and to show that
additional challenges such as computational tractability can be addressed, we
study in detail three example models for jointly sparse signals. For these
models, we develop practical algorithms for joint recovery of multiple signals
from incoherent projections. In two of our three models, the results are
asymptotically best-possible, meaning that both the upper and lower bounds
match the performance of our practical algorithms. Moreover, simulations
indicate that the asymptotics take effect with just a moderate number of
signals. DCS is immediately applicable to a range of problems in sensor arrays
and networks.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2009 04:30:29 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Baron",
"Dror",
""
],
[
"Duarte",
"Marco F.",
""
],
[
"Wakin",
"Michael B.",
""
],
[
"Sarvotham",
"Shriram",
""
],
[
"Baraniuk",
"Richard G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3408 | Arash Amini | Arash Amini and Farokh Marvasti | Limits of Deterministic Compressed Sensing Considering Arbitrary
Orthonormal Basis for Sparsity | 4 pages, submitted to SAMPTA2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is previously shown that proper random linear samples of a finite discrete
signal (vector) which has a sparse representation in an orthonormal basis make
it possible (with probability 1) to recover the original signal. Moreover, the
choice of the linear samples does not depend on the sparsity domain. In this
paper, we will show that the replacement of random linear samples with
deterministic functions of the signal (not necessarily linear) will not result
in unique reconstruction of k-sparse signals except for k=1. We will show that
there exist deterministic nonlinear sampling functions for unique
reconstruction of 1- sparse signals while deterministic linear samples fail to
do so.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2009 05:36:43 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Amini",
"Arash",
""
],
[
"Marvasti",
"Farokh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3467 | Alexandre Soro | Alexandre Soro, Mathieu Cunche, Jerome Lacan, Vincent Roca | Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding | 5 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents new FEC codes for the erasure channel, LDPC-Band, that
have been designed so as to optimize a hybrid iterative-Maximum Likelihood (ML)
decoding. Indeed, these codes feature simultaneously a sparse parity check
matrix, which allows an efficient use of iterative LDPC decoding, and a
generator matrix with a band structure, which allows fast ML decoding on the
erasure channel. The combination of these two decoding algorithms leads to
erasure codes achieving a very good trade-off between complexity and erasure
correction capability.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2009 12:25:00 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Soro",
"Alexandre",
""
],
[
"Cunche",
"Mathieu",
""
],
[
"Lacan",
"Jerome",
""
],
[
"Roca",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3475 | In Sook Park | In Sook Park | Efficient decoding algorithm using triangularity of $\mbf{R}$ matrix of
QR-decomposition | This paper is submitted to IEEE transactions on Information theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An efficient decoding algorithm named `divided decoder' is proposed in this
paper. Divided decoding can be combined with any decoder using QR-decomposition
and offers different pairs of performance and complexity. Divided decoding
provides various combinations of two or more different searching algorithms.
Hence it makes flexibility in error rate and complexity for the algorithms
using it. We calculate diversity orders and upper bounds of error rates for
typical models when these models are solved by divided decodings with sphere
decoder, and discuss about the effects of divided decoding on complexity.
Simulation results of divided decodings combined with a sphere decoder
according to different splitting indices correspond to the theoretical
analysis.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2009 12:57:42 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Park",
"In Sook",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3482 | Aurelien Francillon | Aur\'elien Francillon, Claude Castelluccia | Code injection attacks on harvard-architecture devices | null | CCS '08: Proceedings of the 15th ACM conference on Computer and
communications security (2008) 15--26 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Harvard architecture CPU design is common in the embedded world. Examples of
Harvard-based architecture devices are the Mica family of wireless sensors.
Mica motes have limited memory and can process only very small packets.
Stack-based buffer overflow techniques that inject code into the stack and then
execute it are therefore not applicable. It has been a common belief that code
injection is impossible on Harvard architectures. This paper presents a remote
code injection attack for Mica sensors. We show how to exploit program
vulnerabilities to permanently inject any piece of code into the program memory
of an Atmel AVR-based sensor. To our knowledge, this is the first result that
presents a code injection technique for such devices. Previous work only
succeeded in injecting data or performing transient attacks. Injecting
permanent code is more powerful since the attacker can gain full control of the
target sensor. We also show that this attack can be used to inject a worm that
can propagate through the wireless sensor network and possibly create a sensor
botnet. Our attack combines different techniques such as return oriented
programming and fake stack injection. We present implementation details and
suggest some counter-measures.
| [
{
"version": "v1",
"created": "Thu, 22 Jan 2009 14:21:27 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Francillon",
"Aurélien",
""
],
[
"Castelluccia",
"Claude",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.3574 | Christoph Benzmueller | Christoph Benzmueller | Automating Access Control Logics in Simple Type Theory with LEO-II | ii + 20 pages | SEKI Report SR-2008-01 (ISSN 1437-4447), Saarland University, 2008 | 10.1007/978-3-642-01244-0_34 | SEKI Report SR-2008-01 | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Garg and Abadi recently proved that prominent access control logics can be
translated in a sound and complete way into modal logic S4. We have previously
outlined how normal multimodal logics, including monomodal logics K and S4, can
be embedded in simple type theory (which is also known as higher-order logic)
and we have demonstrated that the higher-order theorem prover LEO-II can
automate reasoning in and about them. In this paper we combine these results
and describe a sound and complete embedding of different access control logics
in simple type theory. Employing this framework we show that the off the shelf
theorem prover LEO-II can be applied to automate reasoning in prominent access
control logics.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 17:20:17 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Mar 2009 08:55:19 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Benzmueller",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.3580 | Changho Suh | Changho Suh, David Tse | Feedback Capacity of the Gaussian Interference Channel to Within 1.7075
Bits: the Symmetric Case | submitted to the International Symposium and Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We characterize the symmetric capacity to within 1.7075 bits/s/Hz for the
two-user Gaussian interference channel with feedback. The result makes use of a
deterministic model to provide insights into the Gaussian channel. We derive a
new outer bound to show that a proposed achievable scheme can achieve the
symmetric capacity to within 1.7075 bits for all channel parameters. From this
result, we show that feedback provides unbounded gain, i.e., the gain becomes
arbitrarily large for certain channel parameters. It is a surprising result
because feedback has been so far known to provide only power gain (bounded
gain) in the context of multiple access channels and broadcast channels.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 00:37:49 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Suh",
"Changho",
""
],
[
"Tse",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3585 | Christoph Benzmueller | Christoph Benzmueller, Volker Sorge | Resource Adaptive Agents in Interactive Theorem Proving | 13 pages | SEKI Report (ISSN 1437-4447), Saarland University, 1999 | null | SR-99-02 | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a resource adaptive agent mechanism which supports the user in
interactive theorem proving. The mechanism uses a two layered architecture of
agent societies to suggest appropriate commands together with possible command
argument instantiations. Experiments with this approach show that its
effectiveness can be further improved by introducing a resource concept. In
this paper we provide an abstract view on the overall mechanism, motivate the
necessity of an appropriate resource concept and discuss its realization within
the agent architecture.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 05:29:09 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Benzmueller",
"Christoph",
""
],
[
"Sorge",
"Volker",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.3590 | Chunhua Shen | Chunhua Shen and Hanxi Li | On the Dual Formulation of Boosting Algorithms | Fixed typos. 16 pages. Published in IEEE Transactions on Pattern
Analysis and Machine Intelligence (TPAMI), Dec. 2010 | null | 10.1109/TPAMI.2010.47 | null | cs.LG cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We study boosting algorithms from a new perspective. We show that the
Lagrange dual problems of AdaBoost, LogitBoost and soft-margin LPBoost with
generalized hinge loss are all entropy maximization problems. By looking at the
dual problems of these boosting algorithms, we show that the success of
boosting algorithms can be understood in terms of maintaining a better margin
distribution by maximizing margins and at the same time controlling the margin
variance.We also theoretically prove that, approximately, AdaBoost maximizes
the average margin, instead of the minimum margin. The duality formulation also
enables us to develop column generation based optimization algorithms, which
are totally corrective. We show that they exhibit almost identical
classification results to that of standard stage-wise additive boosting
algorithms but with much faster convergence rates. Therefore fewer weak
classifiers are needed to build the ensemble using our proposed optimization
technique.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 02:14:42 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jul 2009 04:02:54 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Dec 2009 04:54:15 GMT"
},
{
"version": "v4",
"created": "Mon, 28 Dec 2009 02:31:35 GMT"
},
{
"version": "v5",
"created": "Fri, 22 Apr 2022 12:56:41 GMT"
},
{
"version": "v6",
"created": "Thu, 5 May 2022 15:15:53 GMT"
},
{
"version": "v7",
"created": "Sat, 27 May 2023 06:50:26 GMT"
}
]
| 2023-05-30T00:00:00 | [
[
"Shen",
"Chunhua",
""
],
[
"Li",
"Hanxi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0901.3596 | Cheng Chang | Cheng Chang | Joint source-channel with side information coding error exponents | In preparation for IEEE Transactions on IT | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the upper and the lower bounds on the joint
source-channel coding error exponent with decoder side-information. The results
in the paper are non-trivial extensions of the Csiszar's classical paper [5].
Unlike the joint source-channel coding result in [5], it is not obvious whether
the lower bound and the upper bound are equivalent even if the channel coding
error exponent is known. For a class of channels, including the symmetric
channels, we apply a game-theoretic result to establish the existence of a
saddle point and hence prove that the lower and upper bounds are the same if
the channel coding error exponent is known. More interestingly, we show that
encoder side-information does not increase the error exponents in this case.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 04:06:25 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Chang",
"Cheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3608 | Christoph Benzmueller | Christoph Benzmueller | A remark on higher order RUE-resolution with EXTRUE | 3 pages | SEKI Report (ISSN 1437-4447), Saarland University, 1999 | null | SR-02-05 | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that a prominent counterexample for the completeness of first order
RUE-resolution does not apply to the higher order RUE-resolution approach
EXTRUE.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 06:18:30 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Benzmueller",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.3611 | Liqun Fu | Liqun Fu, Soung Chang Liew, Jianwei Huang | Safe Carrier Sensing Range in CSMA Network under Physical Interference
Model | 5 pages | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the setting of carrier-sensing range in 802.11
networks under the (cumulative) physical interference model. Specifically, we
identify a carrier-sensing range that will prevent collisions in 802.11
networks due to carrier-sensing failure under the physical interference model.
We find that the carrier-sensing range required under the physical interference
model must be larger than that required under the protocol (pairwise)
interference model by a multiplicative factor. For example, if the SINR
requirement is 10dB and the path-loss exponent is 4, the factor is 1.4.
Furthermore, given a fixed pathloss exponent of 4, the factor increases as the
SINR requirement increases. However, the limit of the factor is 1.84 as the
SINR requirement goes to infinity.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 06:59:19 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Fu",
"Liqun",
""
],
[
"Liew",
"Soung Chang",
""
],
[
"Huang",
"Jianwei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.3615 | Xiaofei Huang | Xiaofei Huang | A Constructive Generalization of Nash Equilibrium | null | null | null | null | cs.GT cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a society of multiple individuals, if everybody is only interested in
maximizing his own payoff, will there exist any equilibrium for the society?
John Nash proved more than 50 years ago that an equilibrium always exists such
that nobody would benefit from unilaterally changing his strategy. Nash
Equilibrium is a central concept in game theory, which offers the mathematical
foundation for social science and economy. However, the original definition is
declarative without including a solution to find them. It has been found later
that it is computationally difficult to find a Nash equilibrium. Furthermore, a
Nash equilibrium may be unstable, sensitive to the smallest variation of payoff
functions. Making the situation worse, a society with selfish individuals can
have an enormous number of equilibria, making it extremely hard to find out the
global optimal one. This paper offers a constructive generalization of Nash
equilibrium to cover the case when the selfishness of individuals are reduced
to lower levels in a controllable way. It shows that the society has one and
only one equilibrium when the selfishness is reduced to a certain level. When
every individual follows the iterative, soft-decision optimization process
presented in this paper, the society converges to the unique equilibrium with
an exponential rate under any initial conditions. When it is a consensus
equilibrium at the same time, it must be the global optimum. The study of this
paper suggests that, to build a good, stable society (including the financial
market) for the benefit everyone in it, the pursuing of maximal payoff by each
individual should be controlled at some level either by voluntary good
citizenship or some proper regulations.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 07:40:36 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Huang",
"Xiaofei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0901.3619 | Xavier Leroy | Sandrine Blazy (CEDRIC, INRIA Rocquencourt), Xavier Leroy (INRIA
Rocquencourt) | Mechanized semantics for the Clight subset of the C language | Journal of Automated Reasoning (2009) | Journal of Automated Reasoning 43, 3 (2009) 263-288 | 10.1007/s10817-009-9148-3 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents the formal semantics of a large subset of the C
language called Clight. Clight includes pointer arithmetic, "struct" and
"union" types, C loops and structured "switch" statements. Clight is the source
language of the CompCert verified compiler. The formal semantics of Clight is a
big-step operational semantics that observes both terminating and diverging
executions and produces traces of input/output events. The formal semantics of
Clight is mechanized using the Coq proof assistant. In addition to the
semantics of Clight, this article describes its integration in the CompCert
verified compiler and several ways by which the semantics was validated.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 08:40:31 GMT"
}
]
| 2009-09-18T00:00:00 | [
[
"Blazy",
"Sandrine",
"",
"CEDRIC, INRIA Rocquencourt"
],
[
"Leroy",
"Xavier",
"",
"INRIA\n Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0901.3620 | Vincent Chapurlat | Vincent Chapurlat (LGI2P), Bernard Kamsu Foguem (LGI2P), Fran\c{c}ois
Prunet (LIRMM) | Enterprise model verification and validation: an approach | null | Annual Review in Control 27, 2 (2003) 185-197 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents a Verification and Validation approach which is used
here in order to complete the classical tool box the industrial user may
utilize in Enterprise Modeling and Integration domain. This approach, which has
been defined independently from any application domain is based on several
formal concepts and tools presented in this paper. These concepts are property
concepts, property reference matrix, properties graphs, enterprise modeling
domain ontology, conceptual graphs and formal reasoning mechanisms.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 08:42:21 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Chapurlat",
"Vincent",
"",
"LGI2P"
],
[
"Foguem",
"Bernard Kamsu",
"",
"LGI2P"
],
[
"Prunet",
"François",
"",
"LIRMM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0901.3630 | Shrinivas Kudekar Mr. | Shrinivas Kudekar and Nicolas Macris | Decay of Correlations in Low Density Parity Check Codes: Low Noise
Regime | 5 pages, submitted to ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider transmission over a binary additive white gaussian noise channel
using a fixed low-density parity check code. We consider the posterior measure
over the code bits and the corresponding correlation between two codebits,
averaged over the noise realizations. We show that for low enough noise
variance this average correlation decays exponentially fast with the graph
distance between the code bits. One consequence of this result is that for low
enough noise variance the GEXIT functions (further averaged over a standard
code ensemble) of the belief propagation and optimal decoders are the same.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 09:18:05 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Kudekar",
"Shrinivas",
""
],
[
"Macris",
"Nicolas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3657 | Joris van der Hoeven | Alin Bostan, Muhammad Chowdhury, Joris van der Hoeven, Eric Schost | Homotopy methods for multiplication modulo triangular sets | null | null | null | null | cs.SC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the cost of multiplication modulo triangular families of
polynomials. Following previous work by Li, Moreno Maza and Schost, we propose
an algorithm that relies on homotopy and fast evaluation-interpolation
techniques. We obtain a quasi-linear time complexity for substantial families
of examples, for which no such result was known before. Applications are given
to notably addition of algebraic numbers in small characteristic.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 11:35:57 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Bostan",
"Alin",
""
],
[
"Chowdhury",
"Muhammad",
""
],
[
"van der Hoeven",
"Joris",
""
],
[
"Schost",
"Eric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.3692 | Dorothea Baumeister | Dorothea Baumeister, Felix Brandt, Felix Fischer, Jan Hoffmann, Joerg
Rothe | The Complexity of Computing Minimal Unidirectional Covering Sets | 27 pages, 7 figures | Theory of Computing Systems 53(3), 2012 | 10.1007/s00224-012-9437-9 | null | cs.CC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a binary dominance relation on a set of alternatives, a common thread
in the social sciences is to identify subsets of alternatives that satisfy
certain notions of stability. Examples can be found in areas as diverse as
voting theory, game theory, and argumentation theory. Brandt and Fischer [BF08]
proved that it is NP-hard to decide whether an alternative is contained in some
inclusion-minimal upward or downward covering set. For both problems, we raise
this lower bound to the Theta_{2}^{p} level of the polynomial hierarchy and
provide a Sigma_{2}^{p} upper bound. Relatedly, we show that a variety of other
natural problems regarding minimal or minimum-size covering sets are hard or
complete for either of NP, coNP, and Theta_{2}^{p}. An important consequence of
our results is that neither minimal upward nor minimal downward covering sets
(even when guaranteed to exist) can be computed in polynomial time unless P=NP.
This sharply contrasts with Brandt and Fischer's result that minimal
bidirectional covering sets (i.e., sets that are both minimal upward and
minimal downward covering sets) are polynomial-time computable.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 14:29:21 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Apr 2009 09:21:45 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Jul 2009 19:43:20 GMT"
}
]
| 2015-02-06T00:00:00 | [
[
"Baumeister",
"Dorothea",
""
],
[
"Brandt",
"Felix",
""
],
[
"Fischer",
"Felix",
""
],
[
"Hoffmann",
"Jan",
""
],
[
"Rothe",
"Joerg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0901.3699 | Alan Frieze | Alan Frieze, Pall Melsted | Randomly colouring simple hypergraphs | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of constructing a (near) random proper $q$-colouring of
a simple k-uniform hypergraph with n vertices and maximum degree \Delta.
(Proper in that no edge is mono-coloured and simple in that two edges have
maximum intersection of size one). We give conditions on q,\Delta so that if
these conditions are satisfied, Glauber dynamics will converge in O(n\log n)
time from a random (improper) start. The interesting thing here is that for
k\geq 3 we can take q=o(\D).
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 15:33:42 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Frieze",
"Alan",
""
],
[
"Melsted",
"Pall",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.3706 | Elias Tsigaridas | Jerome Brachat (INRIA Sophia Antipolis), Pierre Comon (I3S), Bernard
Mourrain (INRIA Sophia Antipolis), Elias Tsigaridas (INRIA Sophia Antipolis) | Symmetric tensor decomposition | null | Linear Algebra and Applications 433, 11-12 (2010) 851?1872 | null | null | cs.SC math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithm for decomposing a symmetric tensor, of dimension n
and order d as a sum of rank-1 symmetric tensors, extending the algorithm of
Sylvester devised in 1886 for binary forms. We recall the correspondence
between the decomposition of a homogeneous polynomial in n variables of total
degree d as a sum of powers of linear forms (Waring's problem), incidence
properties on secant varieties of the Veronese Variety and the representation
of linear forms as a linear combination of evaluations at distinct points. Then
we reformulate Sylvester's approach from the dual point of view. Exploiting
this duality, we propose necessary and sufficient conditions for the existence
of such a decomposition of a given rank, using the properties of Hankel (and
quasi-Hankel) matrices, derived from multivariate polynomials and normal form
computations. This leads to the resolution of polynomial equations of small
degree in non-generic cases. We propose a new algorithm for symmetric tensor
decomposition, based on this characterization and on linear algebra
computations with these Hankel matrices. The impact of this contribution is
two-fold. First it permits an efficient computation of the decomposition of any
tensor of sub-generic rank, as opposed to widely used iterative algorithms with
unproved global convergence (e.g. Alternate Least Squares or gradient
descents). Second, it gives tools for understanding uniqueness conditions, and
for detecting the rank.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 16:21:18 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Jan 2009 19:40:44 GMT"
}
]
| 2010-11-29T00:00:00 | [
[
"Brachat",
"Jerome",
"",
"INRIA Sophia Antipolis"
],
[
"Comon",
"Pierre",
"",
"I3S"
],
[
"Mourrain",
"Bernard",
"",
"INRIA Sophia Antipolis"
],
[
"Tsigaridas",
"Elias",
"",
"INRIA Sophia Antipolis"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
]
|
0901.3751 | Daniel Lemire | Daniel Lemire, Owen Kaser, Kamel Aouiche | Sorting improves word-aligned bitmap indexes | null | Data & Knowledge Engineering, Volume 69, Issue 1, 2010, Pages 3-28 | 10.1016/j.datak.2009.08.006 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Bitmap indexes must be compressed to reduce input/output costs and minimize
CPU usage. To accelerate logical operations (AND, OR, XOR) over bitmaps, we use
techniques based on run-length encoding (RLE), such as Word-Aligned Hybrid
(WAH) compression. These techniques are sensitive to the order of the rows: a
simple lexicographical sort can divide the index size by 9 and make indexes
several times faster. We investigate row-reordering heuristics. Simply
permuting the columns of the table can increase the sorting efficiency by 40%.
Secondary contributions include efficient algorithms to construct and aggregate
bitmaps. The effect of word length is also reviewed by constructing 16-bit,
32-bit and 64-bit indexes. Using 64-bit CPUs, we find that 64-bit indexes are
slightly faster than 32-bit indexes despite being nearly twice as large.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 19:01:06 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Mar 2009 00:27:46 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Jun 2009 14:19:15 GMT"
},
{
"version": "v4",
"created": "Mon, 8 Jun 2009 20:04:04 GMT"
},
{
"version": "v5",
"created": "Mon, 3 Feb 2014 19:03:18 GMT"
},
{
"version": "v6",
"created": "Tue, 23 Sep 2014 00:36:49 GMT"
},
{
"version": "v7",
"created": "Fri, 29 Jul 2016 20:24:07 GMT"
}
]
| 2016-08-02T00:00:00 | [
[
"Lemire",
"Daniel",
""
],
[
"Kaser",
"Owen",
""
],
[
"Aouiche",
"Kamel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0901.3754 | Vahab Mirrokni | Eyal Even-dar, Yishay Mansour, Vahab Mirrokni, S. Muthukrishnan, Uri
Nadav | Bid Optimization in Broad-Match Ad auctions | World Wide Web Conference (WWW09), 10 pages, 2 figures | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ad auctions in sponsored search support ``broad match'' that allows an
advertiser to target a large number of queries while bidding only on a limited
number. While giving more expressiveness to advertisers, this feature makes it
challenging to optimize bids to maximize their returns: choosing to bid on a
query as a broad match because it provides high profit results in one bidding
for related queries which may yield low or even negative profits.
We abstract and study the complexity of the {\em bid optimization problem}
which is to determine an advertiser's bids on a subset of keywords (possibly
using broad match) so that her profit is maximized. In the query language model
when the advertiser is allowed to bid on all queries as broad match, we present
an linear programming (LP)-based polynomial-time algorithm that gets the
optimal profit. In the model in which an advertiser can only bid on keywords,
ie., a subset of keywords as an exact or broad match, we show that this problem
is not approximable within any reasonable approximation factor unless P=NP. To
deal with this hardness result, we present a constant-factor approximation when
the optimal profit significantly exceeds the cost. This algorithm is based on
rounding a natural LP formulation of the problem. Finally, we study a budgeted
variant of the problem, and show that in the query language model, one can find
two budget constrained ad campaigns in polynomial time that implement the
optimal bidding strategy. Our results are the first to address bid optimization
under the broad match feature which is common in ad auctions.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 19:09:01 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Even-dar",
"Eyal",
""
],
[
"Mansour",
"Yishay",
""
],
[
"Mirrokni",
"Vahab",
""
],
[
"Muthukrishnan",
"S.",
""
],
[
"Nadav",
"Uri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.3761 | Jeffrey Shallit | J. Brzozowski, E. Grant, J. Shallit | Closures in Formal Languages and Kuratowski's Theorem | submitted to DLT 2009 | null | null | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A famous theorem of Kuratowski states that in a topological space, at most 14
distinct sets can be produced by repeatedly applying the operations of closure
and complement to a given set. We re-examine this theorem in the setting of
formal languages, where closure is either Kleene closure or positive closure.
We classify languages according to the structure of the algebra they generate
under iterations of complement and closure. We show that there are precisely 9
such algebras in the case of positive closure, and 12 in the case of Kleene
closure.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 19:45:01 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Brzozowski",
"J.",
""
],
[
"Grant",
"E.",
""
],
[
"Shallit",
"J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0901.3762 | Rubab Khan | Rubab Khan, Shourov Chatterji | Enhancing the capabilities of LIGO time-frequency plane searches through
clustering | 17 pages, 6 figures. Submitted to CQG on Dec 12, 2008; accepted on
June 18, 2009 | Class.Quant.Grav.26:155009,2009 | 10.1088/0264-9381/26/15/155009 | null | gr-qc astro-ph.IM cs.CV physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One class of gravitational wave signals LIGO is searching for consists of
short duration bursts of unknown waveforms. Potential sources include core
collapse supernovae, gamma ray burst progenitors, and mergers of binary black
holes or neutron stars. We present a density-based clustering algorithm to
improve the performance of time-frequency searches for such gravitational-wave
bursts when they are extended in time and/or frequency, and not sufficiently
well known to permit matched filtering. We have implemented this algorithm as
an extension to the QPipeline, a gravitational-wave data analysis pipeline for
the detection of bursts, which currently determines the statistical
significance of events based solely on the peak significance observed in
minimum uncertainty regions of the time-frequency plane. Density based
clustering improves the performance of such a search by considering the
aggregate significance of arbitrarily shaped regions in the time-frequency
plane and rejecting the isolated minimum uncertainty features expected from the
background detector noise. In this paper, we present test results for simulated
signals and demonstrate that density based clustering improves the performance
of the QPipeline for signals extended in time and/or frequency.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 20:59:45 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jan 2009 21:41:46 GMT"
},
{
"version": "v3",
"created": "Thu, 18 Jun 2009 20:12:08 GMT"
}
]
| 2009-07-22T00:00:00 | [
[
"Khan",
"Rubab",
""
],
[
"Chatterji",
"Shourov",
""
]
]
| [
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0901.3763 | Jeffrey Shallit | J. Brzozowski, E. Grant, J. Shallit | Closures in Formal Languages: Concatenation, Separation, and Algorithms | submitted to DLT 2009 | null | null | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We continue our study of open and closed languages. We investigate how the
properties of being open and closed are preserved under concatenation. We
investigate analogues, in formal languages, of the separation axioms in
topological spaces; one of our main results is that there is a clopen partition
separating two words if and only if the words commute. We show that we can
decide in quadratic time if the language specified by a DFA is closed, but if
the language is specified by an NFA, the problem is PSPACE-complete.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 19:51:41 GMT"
}
]
| 2009-04-12T00:00:00 | [
[
"Brzozowski",
"J.",
""
],
[
"Grant",
"E.",
""
],
[
"Shallit",
"J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0901.3769 | Sebastien Verel | William Beaudoin (I3S), S\'ebastien Verel (I3S), Philippe Collard
(I3S), Cathy Escazut (I3S) | Deceptiveness and Neutrality - the ND family of fitness landscapes | Genetic And Evolutionary Computation Conference, Seatle :
\'Etats-Unis d'Am\'erique (2006) | null | 10.1145/1143997.1144091 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When a considerable number of mutations have no effects on fitness values,
the fitness landscape is said neutral. In order to study the interplay between
neutrality, which exists in many real-world applications, and performances of
metaheuristics, it is useful to design landscapes which make it possible to
tune precisely neutral degree distribution. Even though many neutral landscape
models have already been designed, none of them are general enough to create
landscapes with specific neutral degree distributions. We propose three steps
to design such landscapes: first using an algorithm we construct a landscape
whose distribution roughly fits the target one, then we use a simulated
annealing heuristic to bring closer the two distributions and finally we affect
fitness values to each neutral network. Then using this new family of fitness
landscapes we are able to highlight the interplay between deceptiveness and
neutrality.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 20:15:22 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Beaudoin",
"William",
"",
"I3S"
],
[
"Verel",
"Sébastien",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Escazut",
"Cathy",
"",
"I3S"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.3795 | Krzysztof J. Szajowski | Krzysztof Szajowski | On a random number of disorders | in Institute of Mathematics, Polish Academy of Science, Preprint no.
702, 25 references, 34 pages | Probability and Mathematical Statistics, vol. 31, Fasc. 1 (2011),
pp. 17-45 | null | null | math.PR cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We register a random sequence which has the following properties: it has
three segments being the homogeneous Markov processes. Each segment has his own
one step transition probability law and the length of the segment is unknown
and random. It means that at two random successive moments (they can be equal
also and equal zero too) the source of observations is changed and the first
observation in new segment is chosen according to new transition probability
starting from the last state of the previous segment. In effect the number of
homogeneous segments is random. The transition probabilities of each process
are known and a priori distribution of the disorder moments is given. The
former research on such problem has been devoted to various questions
concerning the distribution changes. The random number of distributional
segments creates new problems in solutions with relation to analysis of the
model with deterministic number of segments. Two cases are presented in
details. In the first one the objectives is to stop on or between the disorder
moments while in the second one our objective is to find the strategy which
immediately detects the distribution changes. Both problems are reformulated to
optimal stopping of the observed sequences. The detailed analysis of the
problem is presented to show the form of optimal decision function.
| [
{
"version": "v1",
"created": "Fri, 23 Jan 2009 23:42:08 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Apr 2009 22:51:36 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Jan 2010 07:57:53 GMT"
}
]
| 2011-11-21T00:00:00 | [
[
"Szajowski",
"Krzysztof",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0901.3809 | Cheng Chang | Cheng Chang | Interference channel capacity region for randomized fixed-composition
codes | In preparation for IEEE Transactions on IT | null | 10.1109/ALLERTON.2009.5394808 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The randomized fixe-composition with optimal decoding error exponents are
studied \cite{Raul_ISIT,Raul_journal} for the finite alphabet interference
channel (IFC) with two transmitter-receiver pairs. In this paper we investigate
the capacity region of the randomized fixed-composition coding scheme. A
complete characterization of the capacity region of the said coding scheme is
given. The inner bound is derived by showing the existence of a positive error
exponent within the capacity region. A simple universal decoding rule is given.
The tight outer bound is derived by extending a technique first developed in
\cite{Dueck_RC} for single input output channels to interference channels. It
is shown that even with a sophisticated time-sharing scheme among randomized
fixed-composition codes, the capacity region of the randomized
fixed-composition coding is not bigger than the known Han-Kobayashi
\cite{Han_Kobayashi} capacity region. This suggests that the average behavior
of random codes are not sufficient to get new capacity regions.
| [
{
"version": "v1",
"created": "Sat, 24 Jan 2009 01:36:31 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Chang",
"Cheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3820 | Cheng Chang | Cheng Chang | On the rate distortion function of Bernoulli Gaussian sequences | In preparation for IEEE Transactions on IT | null | 10.1109/ISIT.2010.5513289 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the rate distortion function of the i.i.d sequence of
multiplications of a Bernoulli $p$ random variable and a gaussian random
variable $\sim N(0,1)$. We use a new technique in the derivation of the lower
bound in which we establish the duality between channel coding and lossy source
coding in the strong sense. We improve the lower bound on the rate distortion
function over the best known lower bound by $p\log_2\frac{1}{p}$ if distortion
$D$ is small. This has some interesting implications on sparse signals where
$p$ is small since the known gap between the lower and upper bound is $H(p)$.
This improvement in the lower bound shows that the lower and upper bounds are
almost identical for sparse signals with small distortion because
$\lim\limits_{p\to 0}\frac{p\log_2\frac{1}{p}}{H(p)}=1$.
| [
{
"version": "v1",
"created": "Sat, 24 Jan 2009 10:23:44 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Chang",
"Cheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3828 | Olivier Finkel | Olivier Finkel (ELM) | On Recognizable Languages of Infinite Pictures | An erratum is added at the end of the paper: The supremum of the set
of Borel ranks of B\"uchi recognizable languages of infinite pictures is not
the first non recursive ordinal $\omega_1^{CK}$ but an ordinal $\gamma^1_2$
which is strictly greater than the ordinal $\omega_1^{CK}$. This follows from
a result proved by Kechris, Marker and Sami (JSL 1989) | International Journal of Foundations of Computer Science 15, 6
(2004) 823-840 | null | null | cs.LO cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a recent paper, Altenbernd, Thomas and W\"ohrle have considered acceptance
of languages of infinite two-dimensional words (infinite pictures) by finite
tiling systems, with the usual acceptance conditions, such as the B\"uchi and
Muller ones, firstly used for infinite words. The authors asked for comparing
the tiling system acceptance with an acceptance of pictures row by row using an
automaton model over ordinal words of length $\omega^2$. We give in this paper
a solution to this problem, showing that all languages of infinite pictures
which are accepted row by row by B\"uchi or Choueka automata reading words of
length $\omega^2$ are B\"uchi recognized by a finite tiling system, but the
converse is not true. We give also the answer to two other questions which were
raised by Altenbernd, Thomas and W\"ohrle, showing that it is undecidable
whether a B\"uchi recognizable language of infinite pictures is E-recognizable
(respectively, A-recognizable).
| [
{
"version": "v1",
"created": "Sat, 24 Jan 2009 12:09:35 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0901.3839 | Bruno Goncalves | Bruno Goncalves, Mark R. Meiss, Jose J. Ramasco, Alessandro Flammini,
Filippo Menczer | Remembering what we like: Toward an agent-based model of Web traffic | 4 pages, 4 figures. Accepted in WSDM 2009 Late Breaking Results | WSDM 2009 Late Breaking Results | null | null | cs.HC cs.CY cs.IR cs.MA physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analysis of aggregate Web traffic has shown that PageRank is a poor model of
how people actually navigate the Web. Using the empirical traffic patterns
generated by a thousand users over the course of two months, we characterize
the properties of Web traffic that cannot be reproduced by Markovian models, in
which destinations are independent of past decisions. In particular, we show
that the diversity of sites visited by individual users is smaller and more
broadly distributed than predicted by the PageRank model; that link traffic is
more broadly distributed than predicted; and that the time between consecutive
visits to the same site by a user is less broadly distributed than predicted.
To account for these discrepancies, we introduce a more realistic navigation
model in which agents maintain individual lists of bookmarks that are used as
teleportation targets. The model can also account for branching, a traffic
property caused by browser features such as tabs and the back button. The model
reproduces aggregate traffic patterns such as site popularity, while also
generating more accurate predictions of diversity, link traffic, and return
time distributions. This model for the first time allows us to capture the
extreme heterogeneity of aggregate traffic measurements while explaining the
more narrowly focused browsing patterns of individual users.
| [
{
"version": "v1",
"created": "Sat, 24 Jan 2009 15:53:43 GMT"
}
]
| 2010-04-27T00:00:00 | [
[
"Goncalves",
"Bruno",
""
],
[
"Meiss",
"Mark R.",
""
],
[
"Ramasco",
"Jose J.",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0901.3843 | Alin Bostan | Alin Bostan (INRIA Rocquencourt), \'Eric Schost | Fast algorithms for differential equations in positive characteristic | null | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address complexity issues for linear differential equations in
characteristic $p>0$: resolution and computation of the $p$-curvature. For
these tasks, our main focus is on algorithms whose complexity behaves well with
respect to $p$. We prove bounds linear in $p$ on the degree of polynomial
solutions and propose algorithms for testing the existence of polynomial
solutions in sublinear time $\tilde{O}(p^{1/2})$, and for determining a whole
basis of the solution space in quasi-linear time $\tilde{O}(p)$; the
$\tilde{O}$ notation indicates that we hide logarithmic factors. We show that
for equations of arbitrary order, the $p$-curvature can be computed in
subquadratic time $\tilde{O}(p^{1.79})$, and that this can be improved to
$O(\log(p))$ for first order equations and to $\tilde{O}(p)$ for classes of
second order equations.
| [
{
"version": "v1",
"created": "Sat, 24 Jan 2009 16:23:34 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Schost",
"Éric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0901.3880 | Sang-Woon Jeon | Sang-Woon Jeon, Sae-Young Chung | Capacity Scaling of Single-source Wireless Networks: Effect of Multiple
Antennas | Submitted to the IEEE Transactions on Information Theory | IEEE Transactions on Information Theory, vol. 58, no. 11, pp.
6870-6878, Nov. 2012 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a wireless network in which a single source node located at the
center of a unit area having $m$ antennas transmits messages to $n$ randomly
located destination nodes in the same area having a single antenna each. To
achieve the sum-rate proportional to $m$ by transmit beamforming, channel state
information (CSI) is essentially required at the transmitter (CSIT), which is
hard to obtain in practice because of the time-varying nature of the channels
and feedback overhead. We show that, even without CSIT, the achievable sum-rate
scales as $\Theta(m\log m)$ if a cooperation between receivers is allowed. By
deriving the cut-set upper bound, we also show that $\Theta(m\log m)$ scaling
is optimal. Specifically, for $n=\omega(m^2)$, the simple TDMA-based
quantize-and-forward is enough to achieve the capacity scaling. For
$n=\omega(m)$ and $n=\operatorname{O}(m^2)$, on the other hand, we apply the
hierarchical cooperation to achieve the capacity scaling.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 07:22:42 GMT"
}
]
| 2013-10-29T00:00:00 | [
[
"Jeon",
"Sang-Woon",
""
],
[
"Chung",
"Sae-Young",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3882 | Oleg Shcherbina | Oleg Shcherbina | Graph-based local elimination algorithms in discrete optimization | 32 pages, 8 figures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to provide a review of structural decomposition
methods in discrete optimization and to give a unified framework in the form of
local elimination algorithms (LEA). This paper is organized as follows. Local
elimination algorithms for discrete optimization (DO) problems (DOPs) with
constraints are considered; a classification of dynamic programming
computational procedures is given. We introduce Elimination Game and
Elimination tree. Application of bucket elimination algorithm from constraint
satisfaction (CS) to solving DOPs is done. We consider different local
elimination schemes and related notions. Clustering that merges several
variables into single meta-variable defines a promising approach to solve DOPs.
This allows to create a quotient (condensed) graph and apply a local block
elimination algorithm. In order to describe a block elimination process, we
introduce Block Elimination Game. We discuss the connection of aforementioned
local elimination algorithmic schemes and a way of transforming the directed
acyclic graph (DAG) of computational LEA procedure to the tree decomposition.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 08:31:07 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Shcherbina",
"Oleg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0901.3902 | Sylvain Marchand | Fabien Gallot, Owen Lagadec, Myriam Desainte-Catherine (LaBRI),
Sylvain Marchand (LaBRI) | iKlax: a New Musical Audio Format for Active Listening | null | International Computer Music Conference (ICMC), Belfast : Irlande
(2008) | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we are presenting a new model for interactive music. Unlike
most interactive systems, our model is based on file organization, but does not
require digital audio treatments. This model includes a definition of a
constraints system and its solver. The products of this project are intended
for the general public, inexperienced users, as well as professional musicians,
and will be distributed commercially. We are here presenting three products of
this project. The difficulty of this project is to design a technology and
software products for interactive music which must be easy to use by the
general public and by professional composers.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 14:57:55 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Gallot",
"Fabien",
"",
"LaBRI"
],
[
"Lagadec",
"Owen",
"",
"LaBRI"
],
[
"Desainte-Catherine",
"Myriam",
"",
"LaBRI"
],
[
"Marchand",
"Sylvain",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
]
|
0901.3906 | Manuel Carro | Pablo Chico de Guzman, Manuel Carro, Manuel V. Hermenegildo | A Program Transformation for Continuation Call-Based Tabled Execution | Part of the proceedings of CICLOPS 2008 | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The advantages of tabled evaluation regarding program termination and
reduction of complexity are well known --as are the significant implementation,
portability, and maintenance efforts that some proposals (especially those
based on suspension) require. This implementation effort is reduced by program
transformation-based continuation call techniques, at some efficiency cost.
However, the traditional formulation of this proposal by Ramesh and Cheng
limits the interleaving of tabled and non-tabled predicates and thus cannot be
used as-is for arbitrary programs. In this paper we present a complete
translation for the continuation call technique which, using the runtime
support needed for the traditional proposal, solves these problems and makes it
possible to execute arbitrary tabled programs. We present performance results
which show that CCall offers a useful tradeoff that can be competitive with
state-of-the-art implementations.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 15:40:48 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"de Guzman",
"Pablo Chico",
""
],
[
"Carro",
"Manuel",
""
],
[
"Hermenegildo",
"Manuel V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0901.3910 | Charles Lales | Charles Lales (LaBRI), N. Parisey, Jean-Pierre Mazat, Marie
Beurton-Aimar (LaBRI) | Simulation of mitochondrial metabolism using multi-agents system | null | AAMAS'05 (MAS*BIOMED'05), Utrecht : Pays-Bas (2005) | null | null | q-bio.SC cs.MA q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metabolic pathways describe chains of enzymatic reactions. Their modelling is
a key point to understand living systems. An enzymatic reaction is an
interaction between one or several metabolites (substrates) and an enzyme
(simple protein or enzymatic complex build of several subunits). In our
Mitochondria in Silico Project, MitoScop, we study the metabolism of the
mitochondria, an intra-cellular organelle. Many ordinary differential equation
models are available in the literature. They well fit experimental results on
flux values inside the metabolic pathways, but many parameters are di$\pm$cult
to transcribe with such models: localization of enzymes, rules about the
reactions scheduler, etc Moreover, a model of a significant part of
mitochondrial metabolism could become very complex and contain more than 50
equations. In this context, the multi-agents systems appear as an alternative
to model the metabolic pathways. Firstly, we have looked after membrane design.
The mitochondria is a particular case because the inner mitochondrial space, ie
matricial space, is delimited by two membranes: the inner and the outer one. In
addition to matricial enzymes, other enzymes are located inside the membranes
or in the inter-membrane space. Analysis of mitochondrial metabolism must take
into account this kind of architecture.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 16:40:58 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Lales",
"Charles",
"",
"LaBRI"
],
[
"Parisey",
"N.",
"",
"LaBRI"
],
[
"Mazat",
"Jean-Pierre",
"",
"LaBRI"
],
[
"Beurton-Aimar",
"Marie",
"",
"LaBRI"
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.SC",
"description": "Assembly and control of subcellular structures (channels, organelles, cytoskeletons, capsules, etc.); molecular motors, transport, subcellular localization; mitosis and meiosis",
"span": "(Subcellular Processes)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0901.3923 | Jayant Gupchup A | Jayant Gupchup, Andreas Terzis, Randal Burns and Alex Szalay | Model-Based Event Detection in Wireless Sensor Networks | null | Workshop for Data Sharing and Interoperability on the World Wide
Web (DSI 2007). April 2007, In Proceedings | null | null | cs.NI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an application of techniques from statistical signal
processing to the problem of event detection in wireless sensor networks used
for environmental monitoring. The proposed approach uses the well-established
Principal Component Analysis (PCA) technique to build a compact model of the
observed phenomena that is able to capture daily and seasonal trends in the
collected measurements. We then use the divergence between actual measurements
and model predictions to detect the existence of discrete events within the
collected data streams. Our preliminary results show that this event detection
mechanism is sensitive enough to detect the onset of rain events using the
temperature modality of a wireless sensor network.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 21:36:27 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Gupchup",
"Jayant",
""
],
[
"Terzis",
"Andreas",
""
],
[
"Burns",
"Randal",
""
],
[
"Szalay",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0901.3924 | David Eppstein | David Eppstein, Elena Mumford, Bettina Speckmann, and Kevin Verbeek | Area-Universal Rectangular Layouts | 19 pages, 16 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A rectangular layout is a partition of a rectangle into a finite set of
interior-disjoint rectangles. Rectangular layouts appear in various
applications: as rectangular cartograms in cartography, as floorplans in
building architecture and VLSI design, and as graph drawings. Often areas are
associated with the rectangles of a rectangular layout and it might hence be
desirable if one rectangular layout can represent several area assignments. A
layout is area-universal if any assignment of areas to rectangles can be
realized by a combinatorially equivalent rectangular layout. We identify a
simple necessary and sufficient condition for a rectangular layout to be
area-universal: a rectangular layout is area-universal if and only if it is
one-sided. More generally, given any rectangular layout L and any assignment of
areas to its regions, we show that there can be at most one layout (up to
horizontal and vertical scaling) which is combinatorially equivalent to L and
achieves a given area assignment. We also investigate similar questions for
perimeter assignments. The adjacency requirements for the rectangles of a
rectangular layout can be specified in various ways, most commonly via the dual
graph of the layout. We show how to find an area-universal layout for a given
set of adjacency requirements whenever such a layout exists.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 22:07:47 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Mumford",
"Elena",
""
],
[
"Speckmann",
"Bettina",
""
],
[
"Verbeek",
"Kevin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0901.3929 | Marko A. Rodriguez | Marko A. Rodriguez and Jennifer H. Watkins | Revisiting the Age of Enlightenment from a Collective Decision Making
Systems Perspective | null | First Monday, volume 14, number 8, ISSN:1396-0466, LA-UR-09-00324,
University of Illinois at Chicago Library, August 2009 | null | LA-UR-09-00324 | cs.CY cs.DL | http://creativecommons.org/licenses/by/3.0/ | The ideals of the eighteenth century's Age of Enlightenment are the
foundation of modern democracies. The era was characterized by thinkers who
promoted progressive social reforms that opposed the long-established
aristocracies and monarchies of the time. Prominent examples of such reforms
include the establishment of inalienable human rights, self-governing
republics, and market capitalism. Twenty-first century democratic nations can
benefit from revisiting the systems developed during the Enlightenment and
reframing them within the techno-social context of the Information Age. This
article explores the application of social algorithms that make use of Thomas
Paine's (English: 1737--1809) representatives, Adam Smith's (Scottish:
1723--1790) self-interested actors, and Marquis de Condorcet's (French:
1743--1794) optimal decision making groups. It is posited that
technology-enabled social algorithms can better realize the ideals articulated
during the Enlightenment.
| [
{
"version": "v1",
"created": "Sun, 25 Jan 2009 22:50:41 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Jul 2009 23:25:20 GMT"
}
]
| 2009-08-01T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Watkins",
"Jennifer H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0901.3939 | Qingzhao Tan | Qingzhao Tan, Prasenjit Mitra, C. Lee Giles | Effectively Searching Maps in Web Documents | 12 pages, published in ECIR 2009 | ECIR2009 | null | null | cs.DL cs.IR | http://creativecommons.org/licenses/by/3.0/ | Maps are an important source of information in archaeology and other
sciences. Users want to search for historical maps to determine recorded
history of the political geography of regions at different eras, to find out
where exactly archaeological artifacts were discovered, etc. Currently, they
have to use a generic search engine and add the term map along with other
keywords to search for maps. This crude method will generate a significant
number of false positives that the user will need to cull through to get the
desired results. To reduce their manual effort, we propose an automatic map
identification, indexing, and retrieval system that enables users to search and
retrieve maps appearing in a large corpus of digital documents using simple
keyword queries. We identify features that can help in distinguishing maps from
other figures in digital documents and show how a Support-Vector-Machine-based
classifier can be used to identify maps. We propose map-level-metadata e.g.,
captions, references to the maps in text, etc. and document-level metadata,
e.g., title, abstract, citations, how recent the publication is, etc. and show
how they can be automatically extracted and indexed. Our novel ranking
algorithm weights different metadata fields differently and also uses the
document-level metadata to help rank retrieved maps. Empirical evaluations show
which features should be selected and which metadata fields should be weighted
more. We also demonstrate improved retrieval results in comparison to
adaptations of existing methods for map retrieval. Our map search engine has
been deployed in an online map-search system that is part of the Blind-Review
digital library system.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 02:14:29 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Tan",
"Qingzhao",
""
],
[
"Mitra",
"Prasenjit",
""
],
[
"Giles",
"C. Lee",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0901.3948 | Mahdi Soltanlokotabi | Mahdi Soltanolkotabi, Arash Amini and Farokh Marvasti | OFDM Channel Estimation Based on Adaptive Thresholding for Sparse Signal
Detection | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless OFDM channels can be approximated by a time varying filter with
sparse time domain taps. Recent achievements in sparse signal processing such
as compressed sensing have facilitated the use of sparsity in estimation, which
improves the performance significantly. The problem of these sparse-based
methods is the need for a stable transformation matrix which is not fulfilled
in the current transmission setups. To assist the analog filtering at the
receiver, the transmitter leaves some of the subcarriers at both edges of the
bandwidth unused which results in an ill-conditioned DFT submatrix. To overcome
this difficulty we propose Adaptive Thresholding for Sparse Signal Detection
(ATSSD). Simulation results confirm that the proposed method works well in
time-invariant and specially time-varying channels where other methods may not
work as well.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 06:10:44 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Soltanolkotabi",
"Mahdi",
""
],
[
"Amini",
"Arash",
""
],
[
"Marvasti",
"Farokh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3950 | Moshe Mishali | Moshe Mishali, Yonina C. Eldar and Joel A. Tropp | Efficient Sampling of Sparse Wideband Analog Signals | 13 pages, 5 figs, conference paper (see ref. below) | Proc. of IEEEI, 25th convention, pp. 290-294, Dec. 2008 | null | CCIT Report #705, Oct. 2008, EE Dept., Technion Israel | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Periodic nonuniform sampling is a known method to sample spectrally sparse
signals below the Nyquist rate. This strategy relies on the implicit assumption
that the individual samplers are exposed to the entire frequency range. This
assumption becomes impractical for wideband sparse signals. The current paper
proposes an alternative sampling stage that does not require a full-band front
end. Instead, signals are captured with an analog front end that consists of a
bank of multipliers and lowpass filters whose cutoff is much lower than the
Nyquist rate. The problem of recovering the original signal from the low-rate
samples can be studied within the framework of compressive sampling. An
appropriate parameter selection ensures that the samples uniquely determine the
analog input. Moreover, the analog input can be stably reconstructed with
digital algorithms. Numerical experiments support the theoretical analysis.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 07:00:52 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Mishali",
"Moshe",
""
],
[
"Eldar",
"Yonina C.",
""
],
[
"Tropp",
"Joel A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3984 | Michael Schmidt | Michael Meier and Michael Schmidt and Georg Lausen | Stop the Chase | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The chase procedure, an algorithm proposed 25+ years ago to fix constraint
violations in database instances, has been successfully applied in a variety of
contexts, such as query optimization, data exchange, and data integration. Its
practicability, however, is limited by the fact that - for an arbitrary set of
constraints - it might not terminate; even worse, chase termination is an
undecidable problem in general. In response, the database community has
proposed sufficient restrictions on top of the constraints that guarantee chase
termination on any database instance. In this paper, we propose a novel
sufficient termination condition, called inductive restriction, which strictly
generalizes previous conditions, but can be checked as efficiently.
Furthermore, we motivate and study the problem of data-dependent chase
termination and, as a key result, present sufficient termination conditions
w.r.t. fixed instances. They are strictly more general than inductive
restriction and might guarantee termination although the chase does not
terminate in the general case.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 12:09:38 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2009 13:28:13 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Meier",
"Michael",
""
],
[
"Schmidt",
"Michael",
""
],
[
"Lausen",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0901.3987 | Mohammad Ravanbakhsh | Mohammad Ravanbakhsh, Angela I. Barbero Diez, and Oyvind Ytrehus | Improved Delay Estimates for a Queueing Model for Random Linear Coding
for Unicast | 5 pages, 3 figures, accepted at the 2009 IEEE International Symposium
on Information Theory | null | 10.1109/ISIT.2009.5205892 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a lossy communication channel for unicast with zero-delay feedback.
For this communication scenario, a simple retransmission scheme is optimum with
respect to delay. An alternative approach is to use random linear coding in
automatic repeat-request (ARQ) mode. We extend the work of Shrader and
Ephremides, by deriving an expression for the delay of random linear coding
over field of infinite size. Simulation results for various field sizes are
also provided.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 13:32:16 GMT"
},
{
"version": "v2",
"created": "Tue, 26 May 2009 11:04:19 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Ravanbakhsh",
"Mohammad",
""
],
[
"Diez",
"Angela I. Barbero",
""
],
[
"Ytrehus",
"Oyvind",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.3990 | Bernard Jacquemin | Bernard Jacquemin (LIMSI), Sabine Ploux (L2C2) | Du corpus au dictionnaire | null | Cahiers de Linguistique. Revue de sociolinguistique et de
sociologie de la langue fran\c{c}aise 33, 1 (2008) 63-84 | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, we propose an automatic process to build multi-lingual
lexico-semantic resources. The goal of these resources is to browse
semantically textual information contained in texts of different languages.
This method uses a mathematical model called Atlas s\'emantiques in order to
represent the different senses of each word. It uses the linguistic relations
between words to create graphs that are projected into a semantic space. These
projections constitute semantic maps that denote the sense trends of each given
word. This model is fed with syntactic relations between words extracted from a
corpus. Therefore, the lexico-semantic resource produced describes all the
words and all their meanings observed in the corpus. The sense trends are
expressed by syntactic contexts, typical for a given meaning. The link between
each sense trend and the utterances used to build the sense trend are also
stored in an index. Thus all the instances of a word in a particular sense are
linked and can be browsed easily. And by using several corpora of different
languages, several resources are built that correspond with each other through
languages. It makes it possible to browse information through languages thanks
to syntactic contexts translations (even if some of them are partial).
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 15:52:21 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Jacquemin",
"Bernard",
"",
"LIMSI"
],
[
"Ploux",
"Sabine",
"",
"L2C2"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0901.4002 | Giorgio Lucarelli | Giorgio Lucarelli, Ioannis Milis, Vangelis Th. Paschos | Max Edge Coloring of Trees | 5 pages, 2 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the weighted generalization of the edge coloring problem where the
weight of each color class (matching) equals to the weight of its heaviest edge
and the goal is to minimize the sum of the colors' weights. We present a
3/2-approximation algorithm for trees.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 13:27:34 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Lucarelli",
"Giorgio",
""
],
[
"Milis",
"Ioannis",
""
],
[
"Paschos",
"Vangelis Th.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.4004 | Yannick Toussaint | Alexander Estacio-Moreno, Yannick Toussaint, C\'edric Bousquet | Mining for adverse drug events with formal concept analysis | null | Studies in health technology and informatics 136 (2008) 803-8 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The pharmacovigilance databases consist of several case reports involving
drugs and adverse events (AEs). Some methods are applied consistently to
highlight all signals, i.e. all statistically significant associations between
a drug and an AE. These methods are appropriate for verification of more
complex relationships involving one or several drug(s) and AE(s) (e.g;
syndromes or interactions) but do not address the identification of them. We
propose a method for the extraction of these relationships based on Formal
Concept Analysis (FCA) associated with disproportionality measures. This method
identifies all sets of drugs and AEs which are potential signals, syndromes or
interactions. Compared to a previous experience of disproportionality analysis
without FCA, the addition of FCA was more efficient for identifying false
positives related to concomitant drugs.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 13:29:40 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Estacio-Moreno",
"Alexander",
""
],
[
"Toussaint",
"Yannick",
""
],
[
"Bousquet",
"Cédric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.4012 | Jos\'e Fontanari | Jos\'e F. Fontanari and Angelo Cangelosi | Cross-situational and supervised learning in the emergence of
communication | null | Interaction Studies: Social Behaviour and Communication in
Biological and Artificial Systems, 12, 119-133 (2011) | 10.1075/is.12.1.05fon | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scenarios for the emergence or bootstrap of a lexicon involve the repeated
interaction between at least two agents who must reach a consensus on how to
name N objects using H words. Here we consider minimal models of two types of
learning algorithms: cross-situational learning, in which the individuals
determine the meaning of a word by looking for something in common across all
observed uses of that word, and supervised operant conditioning learning, in
which there is strong feedback between individuals about the intended meaning
of the words. Despite the stark differences between these learning schemes, we
show that they yield the same communication accuracy in the realistic limits of
large N and H, which coincides with the result of the classical occupancy
problem of randomly assigning N objects to H words.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 15:12:13 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Jun 2009 22:54:17 GMT"
},
{
"version": "v3",
"created": "Sat, 28 Nov 2009 20:11:11 GMT"
}
]
| 2011-04-14T00:00:00 | [
[
"Fontanari",
"José F.",
""
],
[
"Cangelosi",
"Angelo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0901.4016 | Daniel Shawcross Wilkerson | Daniel Shawcross Wilkerson | A Proposal for Proquints: Identifiers that are Readable, Spellable, and
Pronounceable | Added a suggestion that "0q-" be used as the optional magic number
prefix for proquint strings. Better to pick one standard than let people make
up different solutions to this problem | null | null | null | cs.SE cs.CY cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Identifiers (IDs) are pervasive throughout our modern life. We suggest that
these IDs would be easier to manage and remember if they were easily readable,
spellable, and pronounceable. As a solution to this problem we propose using
PRO-nouncable QUINT-uplets of alternating unambiguous consonants and vowels:
_proquints_.
| [
{
"version": "v1",
"created": "Sat, 24 Jan 2009 21:13:38 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jan 2009 23:51:04 GMT"
}
]
| 2009-10-12T00:00:00 | [
[
"Wilkerson",
"Daniel Shawcross",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0901.4023 | Boris Ryabko | Boris Ryabko, Daniil Ryabko | Using Kolmogorov Complexity for Understanding Some Limitations on
Steganography | null | null | null | null | cs.CC cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently perfectly secure steganographic systems have been described for a
wide class of sources of covertexts. The speed of transmission of secret
information for these stegosystems is proportional to the length of the
covertext. In this work we show that there are sources of covertexts for which
such stegosystems do not exist. The key observation is that if the set of
possible covertexts has a maximal Kolmogorov complexity, then a high-speed
perfect stegosystem has to have complexity of the same order.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 15:28:02 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Ryabko",
"Boris",
""
],
[
"Ryabko",
"Daniil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.4032 | Jerome Jaffre | Siddhartha Mishra (University of Oslo), J\'er\^ome Jaffr\'e (INRIA
Rocquencourt) | On the upstream mobility scheme for two-phase flow in porous media | A preprint to be published in Computational Geosciences | Computational Geosciences 14 (2010) 105-124 | 10.1007/s10596-009-9135-0 | RR-6789 | cs.NA math.AP math.NA physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When neglecting capillarity, two-phase incompressible flow in porous media is
modelled as a scalar nonlinear hyperbolic conservation law. A change in the
rock type results in a change of the flux function. Discretizing in
one-dimensional with a finite volume method, we investigate two numerical
fluxes, an extension of the Godunov flux and the upstream mobility flux, the
latter being widely used in hydrogeology and petroleum engineering. Then, in
the case of a changing rock type, one can give examples when the upstream
mobility flux does not give the right answer.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 15:55:22 GMT"
}
]
| 2014-02-12T00:00:00 | [
[
"Mishra",
"Siddhartha",
"",
"University of Oslo"
],
[
"Jaffré",
"Jérôme",
"",
"INRIA\n Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
]
|
0901.4068 | Bernd Bandemer | Bernd Bandemer, Gonzalo Vazquez-Vilar, Abbas El Gamal | On the Sum Capacity of A Class of Cyclically Symmetric Deterministic
Interference Channels | 5 pages; submitted to IEEE International Symposium on Information
Theory (ISIT 2009) | null | 10.1109/ISIT.2009.5205951 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Certain deterministic interference channels have been shown to accurately
model Gaussian interference channels in the asymptotic low-noise regime.
Motivated by this correspondence, we investigate a K user-pair, cyclically
symmetric, deterministic interference channel in which each receiver
experiences interference only from its neighboring transmitters (Wyner model).
We establish the sum capacity for a large set of channel parameters, thus
generalizing previous results for the 2-pair case.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 19:36:56 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Bandemer",
"Bernd",
""
],
[
"Vazquez-Vilar",
"Gonzalo",
""
],
[
"Gamal",
"Abbas El",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4080 | Axel Legay | Ahmed Bouajjani, Axel Legay, Pierre Wolper | A Framework to Handle Linear Temporal Properties in (\omega-)Regular
Model Checking | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since the topic emerged several years ago, work on regular model checking has
mostly been devoted to the verification of state reachability and safety
properties. Though it was known that linear temporal properties could also be
checked within this framework, little has been done about working out the
corresponding details. This paper addresses this issue in the context of
regular model checking based on the encoding of states by finite or infinite
words. It works out the exact constructions to be used in both cases, and
proposes a partial solution to the problem resulting from the fact that
infinite computations of unbounded configurations might never contain the same
configuration twice, thus making cycle detection problematic.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 19:49:43 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Bouajjani",
"Ahmed",
""
],
[
"Legay",
"Axel",
""
],
[
"Wolper",
"Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.4081 | Linlin Zhang | Linlin Zhang (LAHC), Anne Claire Legrand (LAHC), Virginie Fresse
(LAHC), Viktor Fischer (LAHC) | Adaptive FPGA NoC-based Architecture for Multispectral Image Correlation | null | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An adaptive FPGA architecture based on the NoC (Network-on-Chip) approach is
used for the multispectral image correlation. This architecture must contain
several distance algorithms depending on the characteristics of spectral images
and the precision of the authentication. The analysis of distance algorithms is
required which bases on the algorithmic complexity, result precision, execution
time and the adaptability of the implementation. This paper presents the
comparison of these distance computation algorithms on one spectral database.
The result of a RGB algorithm implementation was discussed.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 19:54:27 GMT"
}
]
| 2009-01-27T00:00:00 | [
[
"Zhang",
"Linlin",
"",
"LAHC"
],
[
"Legrand",
"Anne Claire",
"",
"LAHC"
],
[
"Fresse",
"Virginie",
"",
"LAHC"
],
[
"Fischer",
"Viktor",
"",
"LAHC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0901.4129 | Pascal Vontobel | Roxana Smarandache, Pascal O. Vontobel | Quasi-Cyclic LDPC Codes: Influence of Proto- and Tanner-Graph Structure
on Minimum Hamming Distance Upper Bounds | To appear in IEEE Transactions on Information Theory. Changes
compared to v1: some convolutional code results have been added; some
incompleteness issues with some of the proofs have been corrected; a typo in
one of the parity-check matrices has been corrected (i.e., an entry of H"(x)
in Example 28 of v1 needs to be changed so that d_min=56 as written there,
cf. \hat H(x) in Example 29 of v2) | null | 10.1109/TIT.2011.2173244 | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quasi-cyclic (QC) low-density parity-check (LDPC) codes are an important
instance of proto-graph-based LDPC codes. In this paper we present upper bounds
on the minimum Hamming distance of QC LDPC codes and study how these upper
bounds depend on graph structure parameters (like variable degrees, check node
degrees, girth) of the Tanner graph and of the underlying proto-graph.
Moreover, for several classes of proto-graphs we present explicit QC LDPC code
constructions that achieve (or come close to) the respective minimum Hamming
distance upper bounds. Because of the tight algebraic connection between QC
codes and convolutional codes, we can state similar results for the free
Hamming distance of convolutional codes. In fact, some QC code statements are
established by first proving the corresponding convolutional code statements
and then using a result by Tanner that says that the minimum Hamming distance
of a QC code is upper bounded by the free Hamming distance of the convolutional
code that is obtained by "unwrapping" the QC code.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 22:22:49 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Aug 2011 12:36:55 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Smarandache",
"Roxana",
""
],
[
"Vontobel",
"Pascal O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4134 | Han-I Su | Han-I Su, Abbas El Gamal | Distributed Lossy Averaging | 25 pages, 1 figure | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An information theoretic formulation of the distributed averaging problem
previously studied in computer science and control is presented. We assume a
network with m nodes each observing a WGN source. The nodes communicate and
perform local processing with the goal of computing the average of the sources
to within a prescribed mean squared error distortion. The network rate
distortion function R^*(D) for a 2-node network with correlated Gaussian
sources is established. A general cutset lower bound on R^*(D) is established
and shown to be achievable to within a factor of 2 via a centralized protocol
over a star network. A lower bound on the network rate distortion function for
distributed weighted-sum protocols, which is larger in order than the cutset
bound by a factor of log m is established. An upper bound on the network rate
distortion function for gossip-base weighted-sum protocols, which is only log
log m larger in order than the lower bound for a complete graph network, is
established. The results suggest that using distributed protocols results in a
factor of log m increase in order relative to centralized protocols.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 22:47:17 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Mar 2010 00:09:02 GMT"
}
]
| 2010-03-03T00:00:00 | [
[
"Su",
"Han-I",
""
],
[
"Gamal",
"Abbas El",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4137 | Marcus Hutter | Marcus Hutter | Practical Robust Estimators for the Imprecise Dirichlet Model | 22 pages, 2 figures | International Journal of Approximate Reasoning, 50:2 (2009) pages
231-242 | null | null | math.ST cs.LG stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Walley's Imprecise Dirichlet Model (IDM) for categorical i.i.d. data extends
the classical Dirichlet model to a set of priors. It overcomes several
fundamental problems which other approaches to uncertainty suffer from. Yet, to
be useful in practice, one needs efficient ways for computing the
imprecise=robust sets or intervals. The main objective of this work is to
derive exact, conservative, and approximate, robust and credible interval
estimates under the IDM for a large class of statistical estimators, including
the entropy and mutual information.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 23:05:06 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0901.4147 | Hassane. Alla | Abbas Dideban (GIPSA-lab), Hassane. Alla (GIPSA-lab) | Determination of Minimal Sets of Control Places for Safe Petri Nets | ACC07 American Control Conference, New-York : \'Etats-Unis
d'Am\'erique (2007) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our objective is to design a controlled system with a simple method for
discrete event systems based on Petri nets. It is possible to construct the
Petri net model of a system and the specification separately. By synchronous
composition of both models, the desired functioning closed loop model is
deduced. Often uncontrollable transitions lead to forbidden states. The problem
of forbidden states is solved using linear constraints. A set of linear
constraints allows forbidding the reachability of these states. Generally, the
number of these so-called forbidden states and consequently the number of
constraints are large and lead to a great number of control places. A
systematic method to reduce the size and the number of constraints for safe
Petri Nets is given. By using a method based on the Petri nets invariants,
maximal permissive controllers are determined. The size of the controller is
close to the size of the specified model, and it can be implemented on a PLC in
a structural way.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 15:44:47 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Dideban",
"Abbas",
"",
"GIPSA-lab"
],
[
"Alla",
"Hassane.",
"",
"GIPSA-lab"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4180 | Bj{\o}rn Kjos-Hanssen | Bj{\o}rn Kjos-Hanssen and Alberto J. Evangelista | Google distance between words | Presented at Frontiers in Undergraduate Research, University of
Connecticut, 2006 | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cilibrasi and Vitanyi have demonstrated that it is possible to extract the
meaning of words from the world-wide web. To achieve this, they rely on the
number of webpages that are found through a Google search containing a given
word and they associate the page count to the probability that the word appears
on a webpage. Thus, conditional probabilities allow them to correlate one word
with another word's meaning. Furthermore, they have developed a similarity
distance function that gauges how closely related a pair of words is. We
present a specific counterexample to the triangle inequality for this
similarity distance function.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 06:29:10 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jan 2015 20:10:34 GMT"
}
]
| 2015-01-29T00:00:00 | [
[
"Kjos-Hanssen",
"Bjørn",
""
],
[
"Evangelista",
"Alberto J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0901.4192 | Danny Bickson | Jason K. Johnson, Danny Bickson and Danny Dolev | Fixing Convergence of Gaussian Belief Propagation | In the IEEE International Symposium on Information Theory (ISIT)
2009, Seoul, South Korea, July 2009 | null | 10.1109/ISIT.2009.5205777 | null | cs.IT cs.LG math.IT stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Gaussian belief propagation (GaBP) is an iterative message-passing algorithm
for inference in Gaussian graphical models. It is known that when GaBP
converges it converges to the correct MAP estimate of the Gaussian random
vector and simple sufficient conditions for its convergence have been
established. In this paper we develop a double-loop algorithm for forcing
convergence of GaBP. Our method computes the correct MAP estimate even in cases
where standard GaBP would not have converged. We further extend this
construction to compute least-squares solutions of over-constrained linear
systems. We believe that our construction has numerous applications, since the
GaBP algorithm is linked to solution of linear systems of equations, which is a
fundamental problem in computer science and engineering. As a case study, we
discuss the linear detection problem. We show that using our new construction,
we are able to force convergence of Montanari's linear detection algorithm, in
cases where it would originally fail. As a consequence, we are able to increase
significantly the number of users that can transmit concurrently.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 08:24:57 GMT"
},
{
"version": "v2",
"created": "Sat, 9 May 2009 07:23:49 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Jul 2009 03:25:13 GMT"
}
]
| 2010-03-23T00:00:00 | [
[
"Johnson",
"Jason K.",
""
],
[
"Bickson",
"Danny",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
}
]
|
0901.4201 | Stephane Martin | Denis Lugiez (LIF), St\'ephane Martin (LIF) | Peer to Peer Optimistic Collaborative Editing on XML-like trees | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaborative editing consists in editing a common document shared by several
independent sites. This may give rise to conficts when two different users
perform simultaneous uncompatible operations. Centralized systems solve this
problem by using locks that prevent some modifications to occur and leave the
resolution of confict to users. On the contrary, peer to peer (P2P) editing
doesn't allow locks and the optimistic approach uses a Integration
Transformation IT that reconciliates the conficting operations and ensures
convergence (all copies are identical on each site). Two properties TP1 and
TP2, relating the set of allowed operations Op and the transformation IT, have
been shown to ensure the correctness of the process. The choice of the set Op
is crucial to define an integration operation that satisfies TP1 and TP2. Many
existing algorithms don't satisfy these properties and are indeed incorrect
i.e. convergence is not guaranteed. No algorithm enjoying both properties is
known for strings and little work has been done for XML trees in a pure P2P
framework (that doesn't use time-stamps for instance). We focus on editing
unranked unordered labeled trees, so-called XML-like trees that are considered
for instance in the Harmony pro ject. We show that no transformation satisfying
TP1 and TP2 can exist for a first set of operations but we show that TP1 and
TP2 hold for a richer set of operations. We show how to combine our approach
with any convergent editing process on strings (not necessarily based on
integration transformation) to get a convergent process.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 09:09:52 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Lugiez",
"Denis",
"",
"LIF"
],
[
"Martin",
"Stéphane",
"",
"LIF"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.4205 | Francois Rodier | Fr\'ed\'eric Edoukou (IML), Anja Hallez, Fran\c{c}ois Rodier (IML),
Leo Storme | On the small weight codewords of the functional codes C_2(Q), Q a
non-singular quadric | null | null | null | null | math.AG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the small weight codewords of the functional code C_2(Q), with Q a
non-singular quadric of PG(N,q). We prove that the small weight codewords
correspond to the intersections of Q with the singular quadrics of PG(N,q)
consisting of two hyperplanes. We also calculate the number of codewords having
these small weights.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 19:56:42 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Edoukou",
"Frédéric",
"",
"IML"
],
[
"Hallez",
"Anja",
"",
"IML"
],
[
"Rodier",
"François",
"",
"IML"
],
[
"Storme",
"Leo",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4224 | Pasquale Di Donato | Pasquale Di Donato | Geospatial semantics: beyond ontologies, towards an enactive approach | 24 pages, 1 table | null | null | null | cs.AI cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current approaches to semantics in the geospatial domain are mainly based on
ontologies, but ontologies, since continue to build entirely on the symbolic
methodology, suffers from the classical problems, e.g. the symbol grounding
problem, affecting representational theories. We claim for an enactive approach
to semantics, where meaning is considered to be an emergent feature arising
context-dependently in action. Since representational theories are unable to
deal with context, a new formalism is required toward a contextual theory of
concepts. SCOP is considered a promising formalism in this sense and is briefly
described.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 11:26:57 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Di Donato",
"Pasquale",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0901.4267 | Joakim Jalden | Joakim Jalden and Petros Elia | LR-aided MMSE lattice decoding is DMT optimal for all approximately
universal codes | 5 pages, submitted to ISIT 09 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Currently for the nt x nr MIMO channel, any explicitly constructed space-time
(ST) designs that achieve optimality with respect to the diversity multiplexing
tradeoff (DMT) are known to do so only when decoded using maximum likelihood
(ML) decoding, which may incur prohibitive decoding complexity. In this paper
we prove that MMSE regularized lattice decoding, as well as the computationally
efficient lattice reduction (LR) aided MMSE decoder, allows for efficient and
DMT optimal decoding of any approximately universal lattice-based code. The
result identifies for the first time an explicitly constructed encoder and a
computationally efficient decoder that achieve DMT optimality for all
multiplexing gains and all channel dimensions. The results hold irrespective of
the fading statistics.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 15:21:37 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Jalden",
"Joakim",
""
],
[
"Elia",
"Petros",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.