id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0901.2897
Pawel Gawrychowski
Pawel Gawrychowski, Artur Jez, Lukasz Jez
Online validation of the pi and pi' failure functions
submitted
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let pi_w denote the failure function of the Morris-Pratt algorithm for a word w. In this paper we study the following problem: given an integer array A[1..n], is there a word w over arbitrary alphabet such that A[i]=pi_w[i] for all i? Moreover, what is the minimum required cardinality of the alphabet? We give a real time linear algorithm for this problem in the unit-cost RAM model with \Theta(log n) bits word size. Our algorithm returns a word w over minimal alphabet such that pi_w = A as well and uses just o(n) words of memory. Then we consider function pi' instead of pi and give an online O(n log n) algorithm for this case. This is the first polynomial algorithm for online version of this problem.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 20:12:21 GMT" }, { "version": "v2", "created": "Mon, 13 Apr 2009 20:57:00 GMT" } ]
2009-09-30T00:00:00
[ [ "Gawrychowski", "Pawel", "" ], [ "Jez", "Artur", "" ], [ "Jez", "Lukasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.2900
Ankit Sharma
Manoj Gupta (1), Ankit Sharma (1) ((1) Indian Institute of Technology Kanpur)
An O(log(n)) Fully Dynamic Algorithm for Maximum matching in a tree
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we have developed a fully-dynamic algorithm for maintaining cardinality of maximum-matching in a tree using the construction of top-trees. The time complexities are as follows: 1. Initialization Time: $O(n(log(n)))$ to build the Top-tree. 2. Update Time: $O(log(n))$ 3. Query Time: O(1) to query the cardinality of maximum-matching and $O(log(n))$ to find if a particular edge is matched.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 17:30:28 GMT" } ]
2009-01-20T00:00:00
[ [ "Gupta", "Manoj", "" ], [ "Sharma", "Ankit", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.2903
Andre Souto
Andreia Teixeira, Andre Souto, Armando Matos, Luis Antunes
Entropy Measures vs. Algorithmic Information
null
null
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algorithmic entropy and Shannon entropy are two conceptually different information measures, as the former is based on size of programs and the later in probability distributions. However, it is known that, for any recursive probability distribution, the expected value of algorithmic entropy equals its Shannon entropy, up to a constant that depends only on the distribution. We study if a similar relationship holds for R\'{e}nyi and Tsallis entropies of order $\alpha$, showing that it only holds for R\'{e}nyi and Tsallis entropies of order 1 (i.e., for Shannon entropy). Regarding a time bounded analogue relationship, we show that, for distributions such that the cumulative probability distribution is computable in time $t(n)$, the expected value of time-bounded algorithmic entropy (where the alloted time is $nt(n)\log (nt(n))$) is in the same range as the unbounded version. So, for these distributions, Shannon entropy captures the notion of computationally accessible information. We prove that, for universal time-bounded distribution $\m^t(x)$, Tsallis and R\'{e}nyi entropies converge if and only if $\alpha$ is greater than 1.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 17:45:39 GMT" }, { "version": "v2", "created": "Wed, 2 Jun 2010 15:25:33 GMT" } ]
2010-06-03T00:00:00
[ [ "Teixeira", "Andreia", "" ], [ "Souto", "Andre", "" ], [ "Matos", "Armando", "" ], [ "Antunes", "Luis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2906
Andre Souto
Armando Matos, Andreia Teixeira, Andre Souto
Measuring communication complexity using instance complexity with oracles
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish a connection between non-deterministic communication complexity and instance complexity, a measure of information based on algorithmic entropy. Let $\overline{x}$, $\overline{y}$ and $Y_1(\overline{x})$ be respectively the input known by Alice, the input known by Bob, and the set of all values of $y$ such that $f(\overline{x},y)=1$; a string is a witness of the non-deterministic communication protocol iff it is a program $p$ that "corresponds exactly" to the instance complexity $\ic^{f,t}(\overline{y}:Y_1(\overline{x}))$.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 18:00:37 GMT" } ]
2009-01-20T00:00:00
[ [ "Matos", "Armando", "" ], [ "Teixeira", "Andreia", "" ], [ "Souto", "Andre", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0901.2911
David Ford K
David K. Ford
Gibbs Free Energy Analysis of a Quantum Analog of the Classical Binary Symmetric Channel
6 pages, 2 figures
null
null
null
physics.gen-ph cond-mat.stat-mech cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Gibbs free energy properties of a quantum {\it send, receive} communications system are studied. The communications model resembles the classical Ising model of spins on a lattice in that the joint state of the quantum system is the product of sender and receiver states. However, the system differs from the classical case in that the sender and receiver spin states are quantum superposition states coupled by a Hamiltonian operator. A basic understanding of these states is directly relevant to communications theory and indirectly relevant to computation since the product states form a basis for entangled states. Highlights of the study include an exact method for decimation for quantum spins. The main result is that the minimum Gibbs free energy of the quantum system in the product state is higher (lower capacity) than a classical system with the same parameter values. The result is both surprising and not. The channel characteristics of the quantum system in the product state are markedly inferior to those of the classical Ising system. Intuitively, it would seem that capacity should suffer as a result. Yet, one would expect entangled states, built from product states, to have better correlation properties.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 18:28:46 GMT" } ]
2009-04-20T00:00:00
[ [ "Ford", "David K.", "" ] ]
[ { "class": "Physics", "code": "physics.gen-ph", "description": "Description coming soon", "span": "(General Physics)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2912
Salman Avestimehr
M. Amin Khajehnejad, Weiyu Xu, Salman Avestimehr, and Babak Hassibi
Weighted $\ell_1$ Minimization for Sparse Recovery with Prior Information
5 Pages, Submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the compressed sensing problem of recovering a sparse signal from a system of underdetermined linear equations when we have prior information about the probability of each entry of the unknown signal being nonzero. In particular, we focus on a model where the entries of the unknown vector fall into two sets, each with a different probability of being nonzero. We propose a weighted $\ell_1$ minimization recovery algorithm and analyze its performance using a Grassman angle approach. We compute explicitly the relationship between the system parameters (the weights, the number of measurements, the size of the two sets, the probabilities of being non-zero) so that an iid random Gaussian measurement matrix along with weighted $\ell_1$ minimization recovers almost all such sparse signals with overwhelming probability as the problem dimension increases. This allows us to compute the optimal weights. We also provide simulations to demonstrate the advantages of the method over conventional $\ell_1$ optimization.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 19:01:43 GMT" } ]
2009-01-20T00:00:00
[ [ "Khajehnejad", "M. Amin", "" ], [ "Xu", "Weiyu", "" ], [ "Avestimehr", "Salman", "" ], [ "Hassibi", "Babak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2913
MinJi Kim
MinJi Kim, Muriel Medard, Joao Barros, Ralf Koetter
An Algebraic Watchdog for Wireless Network Coding
5 pages, 4 figures, submitted to IEEE International Symposium on Information Theory (ISIT) 2009. This is the final version. The content has been changed to incorporate reviewer comments and recent results
null
10.1109/ISIT.2009.5206004
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a scheme, called the "algebraic watchdog" for wireless network coding, in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages, and, thus, provide a secure global "self-checking network". Unlike traditional Byzantine detection protocols which are receiver-based, this protocol gives the senders an active role in checking the node downstream. This work is inspired by Marti et. al.'s watchdog-pathrater, which attempts to detect and mitigate the effects of routing misbehavior. As the first building block of a such system, we focus on a two-hop network. We present a graphical model to understand the inference process nodes execute to police their downstream neighbors; as well as to compute, analyze, and approximate the probabilities of misdetection and false detection. In addition, we present an algebraic analysis of the performance using an hypothesis testing framework, that provides exact formulae for probabilities of false detection and misdetection.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 19:03:04 GMT" }, { "version": "v2", "created": "Mon, 25 May 2009 17:28:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Kim", "MinJi", "" ], [ "Medard", "Muriel", "" ], [ "Barros", "Joao", "" ], [ "Koetter", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.2922
Qiao Li
Qiao Li, Rohit Negi
Scheduling in Multi-hop Wireless Networks with Priorities
9 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider prioritized maximal scheduling in multi-hop wireless networks, where the scheduler chooses a maximal independent set greedily according to a sequence specified by certain priorities. We show that if the probability distributions of the priorities are properly chosen, we can achieve the optimal (maximum) stability region using an i.i.d random priority assignment process, for any set of arrival processes that satisfy Law of Large Numbers. The pre-computation of the priorities is, in general, NP-hard, but there exists polynomial time approximation scheme (PTAS) to achieve any fraction of the optimal stability region. We next focus on the simple case of static priority and specify a greedy priority assignment algorithm, which can achieve the same fraction of the optimal stability region as the state of art result for Longest Queue First (LQF) schedulers. We also show that this algorithm can be easily adapted to satisfy delay constraints in the large deviations regime, and therefore, supports Quality of Service (QoS) for each link.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 20:49:02 GMT" } ]
2009-01-20T00:00:00
[ [ "Li", "Qiao", "" ], [ "Negi", "Rohit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2924
Alvaro Corral
Alvaro Corral (1), Ramon Ferrer-i-Cancho (2), Gemma Boleda (2), Albert Diaz-Guilera (3). ((1) Centre de Recerca Matematica, (2) U Politecnica Catalunya, (3) U Barcelona)
Universal Complex Structures in Written Language
Short paper
null
null
null
physics.soc-ph cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantitative linguistics has provided us with a number of empirical laws that characterise the evolution of languages and competition amongst them. In terms of language usage, one of the most influential results is Zipf's law of word frequencies. Zipf's law appears to be universal, and may not even be unique to human language. However, there is ongoing controversy over whether Zipf's law is a good indicator of complexity. Here we present an alternative approach that puts Zipf's law in the context of critical phenomena (the cornerstone of complexity in physics) and establishes the presence of a large scale "attraction" between successive repetitions of words. Moreover, this phenomenon is scale-invariant and universal -- the pattern is independent of word frequency and is observed in texts by different authors and written in different languages. There is evidence, however, that the shape of the scaling relation changes for words that play a key role in the text, implying the existence of different "universality classes" in the repetition of words. These behaviours exhibit striking parallels with complex catastrophic phenomena.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 21:19:55 GMT" } ]
2009-01-21T00:00:00
[ [ "Corral", "Alvaro", "" ], [ "Ferrer-i-Cancho", "Ramon", "" ], [ "Boleda", "Gemma", "" ], [ "Diaz-Guilera", "Albert", "" ], [ ".", "", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0901.2934
Yong Peng
Yong Peng and Dinesh Rajan
Noisy DPC and Application to a Cognitive Channel
5 pages, 5 figures, submitted to IEEE ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we first consider a channel that is contaminated by two independent Gaussian noises $S ~ N(0,Q)$ and $Z_0 ~ N(0,N_0)$. The capacity of this channel is computed when independent noisy versions of $S$ are known to the transmitter and/or receiver. It is shown that the channel capacity is greater then the capacity when $S$ is completely unknown, but is less then the capacity when $S$ is perfectly known at the transmitter or receiver. For example, if there is one noisy version of $S$ known at the transmitter only, the capacity is $0.5log(1+P/(Q(N_1/(Q+N_1))+N_0))$, where $P$ is the input power constraint and $N_1$ is the power of the noise corrupting $S$. We then consider a Gaussian cognitive interference channel (IC) and propose a causal noisy dirty paper coding (DPC) strategy. We compute the achievable region using this noisy DPC strategy and quantify the regions when it achieves the upper bound on the rate.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 21:03:35 GMT" } ]
2009-01-21T00:00:00
[ [ "Peng", "Yong", "" ], [ "Rajan", "Dinesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.2954
Kenichi Horie
Kenichi Horie
An Upper Limit of AC Huffman Code Length in JPEG Compression
US patent application 11/947936
null
null
OIMC07P03556
cs.IT cs.CC cs.CE cs.CV math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A strategy for computing upper code-length limits of AC Huffman codes for an 8x8 block in JPEG Baseline coding is developed. The method is based on a geometric interpretation of the DCT, and the calculated limits are as close as 14% to the maximum code-lengths. The proposed strategy can be adapted to other transform coding methods, e.g., MPEG 2 and 4 video compressions, to calculate close upper code length limits for the respective processing blocks.
[ { "version": "v1", "created": "Mon, 19 Jan 2009 23:19:00 GMT" } ]
2009-01-21T00:00:00
[ [ "Horie", "Kenichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3003
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Timed tuplix calculus and the Wesseling and van den Bergh equation
17 pages; phrasing improved, references updated; substantially improved; remarks added
Scientific Annals of Computer Science 23(2):169--190, 2013
10.7561/SACS.2013.2.169
PRG0901
q-fin.GN cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop an algebraic framework for the description and analysis of financial behaviours, that is, behaviours that consist of transferring certain amounts of money at planned times. To a large extent, analysis of financial products amounts to analysis of such behaviours. We formalize the cumulative interest compliant conservation requirement for financial products proposed by Wesseling and van den Bergh by an equation in the framework developed and define a notion of financial product behaviour using this formalization. We also present some properties of financial product behaviours. The development of the framework has been influenced by previous work on the process algebra ACP.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 08:54:15 GMT" }, { "version": "v2", "created": "Wed, 17 Jun 2009 07:11:05 GMT" }, { "version": "v3", "created": "Wed, 19 Jun 2013 18:22:31 GMT" }, { "version": "v4", "created": "Fri, 19 Jul 2013 09:32:27 GMT" } ]
2013-12-17T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.GN", "description": "Development of general quantitative methodologies with applications in finance", "span": "(General Finance)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.3012
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Meadow enriched ACP process algebras
8 pages; correction in Table 3
null
null
PRG0902
math.RA cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of an ACP process algebra. The models of the axiom system ACP are the origin of this notion. ACP process algebras have to do with processes in which no data are involved. We also introduce the notion of a meadow enriched ACP process algebra, which is a simple generalization of the notion of an ACP process algebra to processes in which data are involved. In meadow enriched ACP process algebras, the mathematical structure for data is a meadow.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 09:56:54 GMT" }, { "version": "v2", "created": "Wed, 4 Feb 2009 12:48:48 GMT" } ]
2009-02-04T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.3017
Ronojoy Adhikari
Nisha Yadav, Hrishikesh Joglekar, Rajesh P. N. Rao, M. N. Vahia, Iravatham Mahadevan and R. Adhikari
Statistical analysis of the Indus script using $n$-grams
null
null
10.1371/journal.pone.0009506
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Indus script is one of the major undeciphered scripts of the ancient world. The small size of the corpus, the absence of bilingual texts, and the lack of definite knowledge of the underlying language has frustrated efforts at decipherment since the discovery of the remains of the Indus civilisation. Recently, some researchers have questioned the premise that the Indus script encodes spoken language. Building on previous statistical approaches, we apply the tools of statistical language processing, specifically $n$-gram Markov chains, to analyse the Indus script for syntax. Our main results are that the script has well-defined signs which begin and end texts, that there is directionality and strong correlations in the sign order, and that there are groups of signs which appear to have identical syntactic function. All these require no {\it a priori} suppositions regarding the syntactic or semantic content of the signs, but follow directly from the statistical analysis. Using information theoretic measures, we find the information in the script to be intermediate between that of a completely random and a completely fixed ordering of signs. Our study reveals that the Indus script is a structured sign system showing features of a formal language, but, at present, cannot conclusively establish that it encodes {\it natural} language. Our $n$-gram Markov model is useful for predicting signs which are missing or illegible in a corpus of Indus texts. This work forms the basis for the development of a stochastic grammar which can be used to explore the syntax of the Indus script in greater detail.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 12:55:55 GMT" } ]
2015-05-13T00:00:00
[ [ "Yadav", "Nisha", "" ], [ "Joglekar", "Hrishikesh", "" ], [ "Rao", "Rajesh P. N.", "" ], [ "Vahia", "M. N.", "" ], [ "Mahadevan", "Iravatham", "" ], [ "Adhikari", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0901.3047
Oded Kafri
Oded Kafri
Entropy Principle in Direct Derivation of Benford's Law
null
null
null
null
cs.DM physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The uneven distribution of digits in numerical data, known as Benford's law, was discovered in 1881. Since then, this law has been shown to be correct in copious numerical data relating to economics, physics and even prime numbers. Although it attracts considerable attention, there is no a priori probabilistic criterion when a data set should or should not obey the law. Here a general criterion is suggested, namely that any file of digits in the Shannon limit (namely, having maximum entropy) has a Benford's law distribution of digits.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 12:50:15 GMT" }, { "version": "v2", "created": "Sun, 8 Mar 2009 07:28:50 GMT" } ]
2009-07-28T00:00:00
[ [ "Kafri", "Oded", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0901.3056
Muhammet Fatih Bayramoglu
M. F. Bayramoglu and A. \"Ozg\"ur Y{\i}lmaz
Factorization of Joint Probability Mass Functions into Parity Check Interactions
5 pages, 1 figures, appeared in the proceedings of ISIT 2009; Changed content, more recent version than as appeared in the proceedings
null
null
null
cs.IT cs.DM math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that any joint probability mass function (PMF) can be expressed as a product of parity check factors and factors of degree one with the help of some auxiliary variables, if the alphabet size is appropriate for defining a parity check equation. In other words, marginalization of a joint PMF is equivalent to a soft decoding task as long as a finite field can be constructed over the alphabet of the PMF. In factor graph terminology this claim means that a factor graph representing such a joint PMF always has an equivalent Tanner graph. We provide a systematic method based on the Hilbert space of PMFs and orthogonal projections for obtaining this factorization.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 13:37:37 GMT" }, { "version": "v2", "created": "Tue, 14 Jul 2009 11:20:39 GMT" } ]
2009-07-14T00:00:00
[ [ "Bayramoglu", "M. F.", "" ], [ "Yılmaz", "A. Özgür", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0901.3119
Josef Cibulka
Josef Cibulka
Average number of flips in pancake sorting
21 pages, new computational results for unburnt pancakes (up to n=19)
Theor. Comput. Sci. 412, pp. 822-834 (2011)
10.1016/j.tcs.2010.11.028
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are given a stack of pancakes of different sizes and the only allowed operation is to take several pancakes from top and flip them. The unburnt version requires the pancakes to be sorted by their sizes at the end, while in the burnt version they additionally need to be oriented burnt-side down. We present an algorithm with the average number of flips, needed to sort a stack of n burnt pancakes, equal to 7n/4+O(1) and a randomized algorithm for the unburnt version with at most 17n/12+O(1) flips on average. In addition, we show that in the burnt version, the average number of flips of any algorithm is at least n+\Omega(n/log n) and conjecture that some algorithm can reach n+\Theta(n/log n). We also slightly increase the lower bound on g(n), the minimum number of flips needed to sort the worst stack of n burnt pancakes. This bound, together with the upper bound found by Heydari and Sudborough in 1997, gives the exact number of flips to sort the previously conjectured worst stack -I_n for n=3 mod 4 and n>=15. Finally we present exact values of f(n) up to n=19 and of g(n) up to n=17 and disprove a conjecture of Cohen and Blum by showing that the burnt stack -I_{15} is not the worst one for n=15.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 20:08:57 GMT" }, { "version": "v2", "created": "Thu, 10 Sep 2009 16:17:16 GMT" } ]
2011-02-07T00:00:00
[ [ "Cibulka", "Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0901.3130
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy
Secure Communication in the Low-SNR Regime: A Characterization of the Energy-Secrecy Tradeoff
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secrecy capacity of a multiple-antenna wiretap channel is studied in the low signal-to-noise ratio (SNR) regime. Expressions for the first and second derivatives of the secrecy capacity with respect to SNR at SNR = 0 are derived. Transmission strategies required to achieve these derivatives are identified. In particular, it is shown that it is optimal in the low-SNR regime to transmit in the maximum-eigenvalue eigenspace of H_m* H_m - N_m/N_e H_e* H_e where H_m and H_e denote the channel matrices associated with the legitimate receiver and eavesdropper, respectively, and N_m and N_e are the noise variances at the receiver and eavesdropper, respectively. Energy efficiency is analyzed by finding the minimum bit energy required for secure and reliable communications, and the wideband slope. Increased bit energy requirements under secrecy constraints are quantified. Finally, the impact of fading is investigated.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 19:53:43 GMT" } ]
2009-01-21T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3132
Mustafa Cenk Gursoy
Junwei Zhang and Mustafa Cenk Gursoy
Low-SNR Analysis of Interference Channels under Secrecy Constraints
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the secrecy rates over weak Gaussian interference channels for different transmission schemes. We focus on the low-SNR regime and obtain the minimum bit energy E_b/N_0_min values, and the wideband slope regions for both TDMA and multiplexed transmission schemes. We show that secrecy constraints introduce a penalty in both the minimum bit energy and the slope regions. Additionally, we identify under what conditions TDMA or multiplexed transmission is optimal. Finally, we show that TDMA is more likely to be optimal in the presence of secrecy constraints.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 20:00:00 GMT" } ]
2009-09-30T00:00:00
[ [ "Zhang", "Junwei", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3134
Mustafa Cenk Gursoy
Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar
Energy Efficiency of Fixed-Rate Wireless Transmissions under Queueing Constraints and Channel Uncertainty
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency of fixed-rate transmissions is studied in the presence of queueing constraints and channel uncertainty. It is assumed that neither the transmitter nor the receiver has channel side information prior to transmission. The channel coefficients are estimated at the receiver via minimum mean-square-error (MMSE) estimation with the aid of training symbols. It is further assumed that the system operates under statistical queueing constraints in the form of limitations on buffer violation probabilities. The optimal fraction of of power allocated to training is identified. Spectral efficiency--bit energy tradeoff is analyzed in the low-power and wideband regimes by employing the effective capacity formulation. In particular, it is shown that the bit energy increases without bound in the low-power regime as the average power vanishes. On the other hand, it is proven that the bit energy diminishes to its minimum value in the wideband regime as the available bandwidth increases. For this case, expressions for the minimum bit energy and wideband slope are derived. Overall, energy costs of channel uncertainty and queueing constraints are identified.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 20:07:38 GMT" } ]
2009-01-21T00:00:00
[ [ "Qiao", "Deli", "" ], [ "Gursoy", "Mustafa Cenk", "" ], [ "Velipasalar", "Senem", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3150
Sewoong Oh
Raghunandan H. Keshavan, Andrea Montanari, and Sewoong Oh
Matrix Completion from a Few Entries
30 pages, 1 figure, journal version (v1, v2: Conference version ISIT 2009)
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let M be a random (alpha n) x n matrix of rank r<<n, and assume that a uniformly random subset E of its entries is observed. We describe an efficient algorithm that reconstructs M from |E| = O(rn) observed entries with relative root mean square error RMSE <= C(rn/|E|)^0.5 . Further, if r=O(1), M can be reconstructed exactly from |E| = O(n log(n)) entries. These results apply beyond random matrices to general low-rank incoherent matrices. This settles (in the case of bounded rank) a question left open by Candes and Recht and improves over the guarantees for their reconstruction algorithm. The complexity of our algorithm is O(|E|r log(n)), which opens the way to its use for massive data sets. In the process of proving these statements, we obtain a generalization of a celebrated result by Friedman-Kahn-Szemeredi and Feige-Ofek on the spectrum of sparse random matrices.
[ { "version": "v1", "created": "Tue, 20 Jan 2009 21:32:57 GMT" }, { "version": "v2", "created": "Wed, 18 Mar 2009 07:00:15 GMT" }, { "version": "v3", "created": "Thu, 19 Mar 2009 03:27:35 GMT" }, { "version": "v4", "created": "Thu, 17 Sep 2009 09:26:46 GMT" } ]
2009-09-17T00:00:00
[ [ "Keshavan", "Raghunandan H.", "" ], [ "Montanari", "Andrea", "" ], [ "Oh", "Sewoong", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0901.3170
Pascal Vontobel
Arya Mazumdar, Ron M. Roth, Pascal O. Vontobel
On linear balancing sets
The abstract of this paper appeared in the proc. of 2009 International Symposium on Information Theory
Advances in Mathematics of Communications (AMC), Vol. 4, Issue 3, pp. 345 - 361, August, 2010
10.3934/amc.2010.4.345
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let n be an even positive integer and F be the field \GF(2). A word in F^n is called balanced if its Hamming weight is n/2. A subset C \subseteq F^n$ is called a balancing set if for every word y \in F^n there is a word x \in C such that y + x is balanced. It is shown that most linear subspaces of F^n of dimension slightly larger than 3/2\log_2(n) are balancing sets. A generalization of this result to linear subspaces that are "almost balancing" is also presented. On the other hand, it is shown that the problem of deciding whether a given set of vectors in F^n spans a balancing set, is NP-hard. An application of linear balancing sets is presented for designing efficient error-correcting coding schemes in which the codewords are balanced.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 05:22:03 GMT" }, { "version": "v2", "created": "Thu, 29 Oct 2009 14:15:37 GMT" } ]
2010-12-17T00:00:00
[ [ "Mazumdar", "Arya", "" ], [ "Roth", "Ron M.", "" ], [ "Vontobel", "Pascal O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3188
Narad Rampersad
James Currie and Narad Rampersad
Dejean's conjecture holds for n>=27
minor revisions
null
null
null
math.CO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that Dejean's conjecture holds for n>=27. This brings the final resolution of the conjecture by the approach of Moulin Ollagnier within range of the computationally feasible.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 20:52:16 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2009 13:43:39 GMT" } ]
2009-07-09T00:00:00
[ [ "Currie", "James", "" ], [ "Rampersad", "Narad", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0901.3189
James Lathrop
Steven M. Kautz, James I. Lathrop
Self-assembly of the discrete Sierpinski carpet and related fractals
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that the discrete Sierpinski triangle can be defined as the nonzero residues modulo 2 of Pascal's triangle, and that from this definition one can easily construct a tileset with which the discrete Sierpinski triangle self-assembles in Winfree's tile assembly model. In this paper we introduce an infinite class of discrete self-similar fractals that are defined by the residues modulo a prime p of the entries in a two-dimensional matrix obtained from a simple recursive equation. We prove that every fractal in this class self-assembles using a uniformly constructed tileset. As a special case we show that the discrete Sierpinski carpet self-assembles using a set of 30 tiles.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 04:58:13 GMT" } ]
2009-01-22T00:00:00
[ [ "Kautz", "Steven M.", "" ], [ "Lathrop", "James I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0901.3192
Meixia Tao
Xiaolu Zhang, Meixia Tao, Wenhua Jiao and Chun Sum Ng
End-to-End Outage Minimization in OFDM Based Linear Relay Networks
25 pages, 8 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-hop relaying is an economically efficient architecture for coverage extension and throughput enhancement in future wireless networks. OFDM, on the other hand, is a spectrally efficient physical layer modulation technique for broadband transmission. As a natural consequence of combining OFDM with multi-hop relaying, the allocation of per-hop subcarrier power and per-hop transmission time is crucial in optimizing the network performance. This paper is concerned with the end-to-end information outage in an OFDM based linear relay network. Our goal is to find an optimal power and time adaptation policy to minimize the outage probability under a long-term total power constraint. We solve the problem in two steps. First, for any given channel realization, we derive the minimum short-term power required to meet a target transmission rate. We show that it can be obtained through two nested bisection loops. To reduce computational complexity and signalling overhead, we also propose a sub-optimal algorithm. In the second step, we determine a power threshold to control the transmission on-off so that the long-term total power constraint is satisfied. Numerical examples are provided to illustrate the performance of the proposed power and time adaptation schemes with respect to other resource adaptation schemes.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 06:37:55 GMT" } ]
2009-01-22T00:00:00
[ [ "Zhang", "Xiaolu", "" ], [ "Tao", "Meixia", "" ], [ "Jiao", "Wenhua", "" ], [ "Ng", "Chun Sum", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3196
Farzan Haddadi
Farzan Haddadi, Mohammadreza Malekmohammadi, Mohammad Mahdi Nayebi, Mohammad Reza Aref
Statistical Performance Analysis of MDL Source Enumeration in Array Processing
Accepted for publication in IEEE Transactions on Signal Processing, April 2009
null
10.1109/TSP.2009.2028207
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this correspondence, we focus on the performance analysis of the widely-used minimum description length (MDL) source enumeration technique in array processing. Unfortunately, available theoretical analysis exhibit deviation from the simulation results. We present an accurate and insightful performance analysis for the probability of missed detection. We also show that the statistical performance of the MDL is approximately the same under both deterministic and stochastic signal models. Simulation results show the superiority of the proposed analysis over available results.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 07:26:05 GMT" }, { "version": "v2", "created": "Thu, 23 Apr 2009 10:27:45 GMT" } ]
2015-05-13T00:00:00
[ [ "Haddadi", "Farzan", "" ], [ "Malekmohammadi", "Mohammadreza", "" ], [ "Nayebi", "Mohammad Mahdi", "" ], [ "Aref", "Mohammad Reza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3197
Danny Bickson
Danny Bickson, Alexander T. Ihler and Danny Dolev
A Low Density Lattice Decoder via Non-Parametric Belief Propagation
Submitted for publication
null
10.1109/ALLERTON.2009.5394798
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent work of Sommer, Feder and Shalvi presented a new family of codes called low density lattice codes (LDLC) that can be decoded efficiently and approach the capacity of the AWGN channel. A linear time iterative decoding scheme which is based on a message-passing formulation on a factor graph is given. In the current work we report our theoretical findings regarding the relation between the LDLC decoder and belief propagation. We show that the LDLC decoder is an instance of non-parametric belief propagation and further connect it to the Gaussian belief propagation algorithm. Our new results enable borrowing knowledge from the non-parametric and Gaussian belief propagation domains into the LDLC domain. Specifically, we give more general convergence conditions for convergence of the LDLC decoder (under the same assumptions of the original LDLC convergence analysis). We discuss how to extend the LDLC decoder from Latin square to full rank, non-square matrices. We propose an efficient construction of sparse generator matrix and its matching decoder. We report preliminary experimental results which show our decoder has comparable symbol to error rate compared to the original LDLC decoder.%
[ { "version": "v1", "created": "Wed, 21 Jan 2009 07:47:10 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2009 13:04:38 GMT" }, { "version": "v3", "created": "Mon, 13 Jul 2009 11:27:50 GMT" }, { "version": "v4", "created": "Wed, 7 Oct 2009 17:14:11 GMT" } ]
2010-03-23T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Ihler", "Alexander T.", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3199
Sylvain Sene
Michel Morvan (LIP, Ixxi), Sylvain Sen\'e (IXXI, Timc)
A Distributed Trust Diffusion Protocol for Ad Hoc Networks
null
Second International Conference on Wireless and Mobile Communications, Bucarest : Roumanie (2006)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose and evaluate a distributed protocol to manage trust diffusion in ad hoc networks. In this protocol, each node i maintains a \trust value" about an other node j which is computed both as a result of the exchanges with node j itself and as a function of the opinion that other nodes have about j. These two aspects are respectively weighted by a trust index that measures the trust quality the node has in its own experiences and by a trust index representing the trust the node has in the opinions of the other nodes. Simulations have been realized to validate the robustness of this protocol against three kinds of attacks: simple coalitions, Trojan attacks and detonator attacks.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 08:03:20 GMT" } ]
2009-01-22T00:00:00
[ [ "Morvan", "Michel", "", "LIP, Ixxi" ], [ "Sené", "Sylvain", "", "IXXI, Timc" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0901.3202
Francis Bach
Francis Bach (INRIA Rocquencourt)
Model-Consistent Sparse Estimation through the Bootstrap
null
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the least-square linear regression problem with regularization by the $\ell^1$-norm, a problem usually referred to as the Lasso. In this paper, we first present a detailed asymptotic analysis of model consistency of the Lasso in low-dimensional settings. For various decays of the regularization parameter, we compute asymptotic equivalents of the probability of correct model selection. For a specific rate decay, we show that the Lasso selects all the variables that should enter the model with probability tending to one exponentially fast, while it selects all other variables with strictly positive probability. We show that this property implies that if we run the Lasso for several bootstrapped replications of a given sample, then intersecting the supports of the Lasso bootstrap estimates leads to consistent model selection. This novel variable selection procedure, referred to as the Bolasso, is extended to high-dimensional settings by a provably consistent two-step procedure.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 08:05:19 GMT" } ]
2009-01-22T00:00:00
[ [ "Bach", "Francis", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0901.3257
Simon Heimlicher
Simon Heimlicher, Merkouris Karaliopoulos, Hanoch Levy and Thrasyvoulos Spyropoulos
On Leveraging Partial Paths in Partially-Connected Networks
Extended version of paper appearing at IEEE INFOCOM 2009, April 20-25, Rio de Janeiro, Brazil
null
10.1109/INFCOM.2009.5061906
TR-303
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile wireless network research focuses on scenarios at the extremes of the network connectivity continuum where the probability of all nodes being connected is either close to unity, assuming connected paths between all nodes (mobile ad hoc networks), or it is close to zero, assuming no multi-hop paths exist at all (delay-tolerant networks). In this paper, we argue that a sizable fraction of networks lies between these extremes and is characterized by the existence of partial paths, i.e. multi-hop path segments that allow forwarding data closer to the destination even when no end-to-end path is available. A fundamental issue in such networks is dealing with disruptions of end-to-end paths. Under a stochastic model, we compare the performance of the established end-to-end retransmission (ignoring partial paths), against a forwarding mechanism that leverages partial paths to forward data closer to the destination even during disruption periods. Perhaps surprisingly, the alternative mechanism is not necessarily superior. However, under a stochastic monotonicity condition between current v.s. future path length, which we demonstrate to hold in typical network models, we manage to prove superiority of the alternative mechanism in stochastic dominance terms. We believe that this study could serve as a foundation to design more efficient data transfer protocols for partially-connected networks, which could potentially help reducing the gap between applications that can be supported over disconnected networks and those requiring full connectivity.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 14:47:45 GMT" }, { "version": "v2", "created": "Thu, 22 Jan 2009 01:04:26 GMT" } ]
2016-11-15T00:00:00
[ [ "Heimlicher", "Simon", "" ], [ "Karaliopoulos", "Merkouris", "" ], [ "Levy", "Hanoch", "" ], [ "Spyropoulos", "Thrasyvoulos", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0901.3291
Jaroslaw Kwapien
Stanislaw Drozdz, Jaroslaw Kwapien, Adam Orczyk
Approaching the linguistic complexity
to be published in conference proceedings
Complex Sciences, Lect. Notes ICST vol.4, 1044-1050 (Springer, 2009)
10.1007/978-3-642-02466-5_104
null
cs.CL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the rank-frequency distributions of words in selected English and Polish texts. We compare scaling properties of these distributions in both languages. We also study a few small corpora of Polish literary texts and find that for a corpus consisting of texts written by different authors the basic scaling regime is broken more strongly than in the case of comparable corpus consisting of texts written by the same author. Similarly, for a corpus consisting of texts translated into Polish from other languages the scaling regime is broken more strongly than for a comparable corpus of native Polish texts. Moreover, based on the British National Corpus, we consider the rank-frequency distributions of the grammatically basic forms of words (lemmas) tagged with their proper part of speech. We find that these distributions do not scale if each part of speech is analyzed separately. The only part of speech that independently develops a trace of scaling is verbs.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 15:24:59 GMT" } ]
2015-11-11T00:00:00
[ [ "Drozdz", "Stanislaw", "" ], [ "Kwapien", "Jaroslaw", "" ], [ "Orczyk", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0901.3299
Matthias Mnich
Leo van Iersel, Matthias Mnich
Computing Rooted and Unrooted Maximum Consistent Supertrees
This paper has been withdrawn by the authors due to an error
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A chief problem in phylogenetics and database theory is the computation of a maximum consistent tree from a set of rooted or unrooted trees. A standard input are triplets, rooted binary trees on three leaves, or quartets, unrooted binary trees on four leaves. We give exact algorithms constructing rooted and unrooted maximum consistent supertrees in time O(2^n n^5 m^2 log(m)) for a set of m triplets (quartets), each one distinctly leaf-labeled by some subset of n labels. The algorithms extend to weighted triplets (quartets). We further present fast exact algorithms for constructing rooted and unrooted maximum consistent trees in polynomial space. Finally, for a set T of m rooted or unrooted trees with maximum degree D and distinctly leaf-labeled by some subset of a set L of n labels, we compute, in O(2^{mD} n^m m^5 n^6 log(m)) time, a tree distinctly leaf-labeled by a maximum-size subset X of L that all trees in T, when restricted to X, are consistent with.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 16:04:46 GMT" }, { "version": "v2", "created": "Fri, 28 May 2010 06:18:27 GMT" } ]
2010-05-31T00:00:00
[ [ "van Iersel", "Leo", "" ], [ "Mnich", "Matthias", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.3314
Stephan Tinguely
Amos Lapidoth, Stephan Tinguely
Sending a Bi-Variate Gaussian over a Gaussian MAC
submitted to the IEEE Transactions on Information Theory
null
10.1109/ISIT.2006.261926
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the power versus distortion trade-off for the distributed transmission of a memoryless bi-variate Gaussian source over a two-to-one average-power limited Gaussian multiple-access channel. In this problem, each of two separate transmitters observes a different component of a memoryless bi-variate Gaussian source. The two transmitters then describe their source component to a common receiver via an average-power constrained Gaussian multiple-access channel. From the output of the multiple-access channel, the receiver wishes to reconstruct each source component with the least possible expected squared-error distortion. Our interest is in characterizing the distortion pairs that are simultaneously achievable on the two source components. We present sufficient conditions and necessary conditions for the achievability of a distortion pair. These conditions are expressed as a function of the channel signal-to-noise ratio (SNR) and of the source correlation. In several cases the necessary conditions and sufficient conditions are shown to agree. In particular, we show that if the channel SNR is below a certain threshold, then an uncoded transmission scheme is optimal. We also derive the precise high-SNR asymptotics of an optimal scheme.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 19:14:57 GMT" } ]
2016-11-17T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Tinguely", "Stephan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3348
Stephen Vavasis
Brendan Ames, Stephen Vavasis
Nuclear norm minimization for the planted clique and biclique problems
null
null
null
null
cs.DS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problems of finding a maximum clique in a graph and finding a maximum-edge biclique in a bipartite graph. Both problems are NP-hard. We write both problems as matrix-rank minimization and then relax them using the nuclear norm. This technique, which may be regarded as a generalization of compressive sensing, has recently been shown to be an effective way to solve rank optimization problems. In the special cases that the input graph has a planted clique or biclique (i.e., a single large clique or biclique plus diversionary edges), our algorithm successfully provides an exact solution to the original instance. For each problem, we provide two analyses of when our algorithm succeeds. In the first analysis, the diversionary edges are placed by an adversary. In the second, they are placed at random. In the case of random edges for the planted clique problem, we obtain the same bound as Alon, Krivelevich and Sudakov as well as Feige and Krauthgamer, but we use different techniques.
[ { "version": "v1", "created": "Wed, 21 Jan 2009 20:08:21 GMT" } ]
2009-01-22T00:00:00
[ [ "Ames", "Brendan", "" ], [ "Vavasis", "Stephen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0901.3384
Marko A. Rodriguez
Michael I. Ham and Marko A. Rodriguez
A Boundary Approximation Algorithm for Distributed Sensor Networks
null
International Journal of Sensor Networks, 8(1), pp. 41-46, ISSN:1748-1279, 2010
null
LA-UR-09-00111
cs.DC
http://creativecommons.org/licenses/by/3.0/
We present an algorithm for boundary approximation in locally-linked sensor networks that communicate with a remote monitoring station. Delaunay triangulations and Voronoi diagrams are used to generate a sensor communication network and define boundary segments between sensors, respectively. The proposed algorithm reduces remote station communication by approximating boundaries via a decentralized computation executed within the sensor network. Moreover, the algorithm identifies boundaries based on differences between neighboring sensor readings, and not absolute sensor values. An analysis of the bandwidth consumption of the algorithm is presented and compared to two naive approaches. The proposed algorithm reduces the amount of remote communication (compared to the naive approaches) and becomes increasingly useful in networks with more nodes.
[ { "version": "v1", "created": "Thu, 22 Jan 2009 00:59:01 GMT" } ]
2010-06-22T00:00:00
[ [ "Ham", "Michael I.", "" ], [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0901.3403
Marco Duarte
Dror Baron, Marco F. Duarte, Michael B. Wakin, Shriram Sarvotham, Richard G. Baraniuk
Distributed Compressive Sensing
42 pages, 6 figures. Submitted November 27, 2005; Revised January 21, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressive sensing is a signal acquisition framework based on the revelation that a small collection of linear projections of a sparse signal contains enough information for stable recovery. In this paper we introduce a new theory for distributed compressive sensing (DCS) that enables new distributed coding algorithms for multi-signal ensembles that exploit both intra- and inter-signal correlation structures. The DCS theory rests on a new concept that we term the joint sparsity of a signal ensemble. Our theoretical contribution is to characterize the fundamental performance limits of DCS recovery for jointly sparse signal ensembles in the noiseless measurement setting; our result connects single-signal, joint, and distributed (multi-encoder) compressive sensing. To demonstrate the efficacy of our framework and to show that additional challenges such as computational tractability can be addressed, we study in detail three example models for jointly sparse signals. For these models, we develop practical algorithms for joint recovery of multiple signals from incoherent projections. In two of our three models, the results are asymptotically best-possible, meaning that both the upper and lower bounds match the performance of our practical algorithms. Moreover, simulations indicate that the asymptotics take effect with just a moderate number of signals. DCS is immediately applicable to a range of problems in sensor arrays and networks.
[ { "version": "v1", "created": "Thu, 22 Jan 2009 04:30:29 GMT" } ]
2009-01-23T00:00:00
[ [ "Baron", "Dror", "" ], [ "Duarte", "Marco F.", "" ], [ "Wakin", "Michael B.", "" ], [ "Sarvotham", "Shriram", "" ], [ "Baraniuk", "Richard G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3408
Arash Amini
Arash Amini and Farokh Marvasti
Limits of Deterministic Compressed Sensing Considering Arbitrary Orthonormal Basis for Sparsity
4 pages, submitted to SAMPTA2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is previously shown that proper random linear samples of a finite discrete signal (vector) which has a sparse representation in an orthonormal basis make it possible (with probability 1) to recover the original signal. Moreover, the choice of the linear samples does not depend on the sparsity domain. In this paper, we will show that the replacement of random linear samples with deterministic functions of the signal (not necessarily linear) will not result in unique reconstruction of k-sparse signals except for k=1. We will show that there exist deterministic nonlinear sampling functions for unique reconstruction of 1- sparse signals while deterministic linear samples fail to do so.
[ { "version": "v1", "created": "Thu, 22 Jan 2009 05:36:43 GMT" } ]
2009-01-23T00:00:00
[ [ "Amini", "Arash", "" ], [ "Marvasti", "Farokh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3467
Alexandre Soro
Alexandre Soro, Mathieu Cunche, Jerome Lacan, Vincent Roca
Erasure Codes with a Banded Structure for Hybrid Iterative-ML Decoding
5 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents new FEC codes for the erasure channel, LDPC-Band, that have been designed so as to optimize a hybrid iterative-Maximum Likelihood (ML) decoding. Indeed, these codes feature simultaneously a sparse parity check matrix, which allows an efficient use of iterative LDPC decoding, and a generator matrix with a band structure, which allows fast ML decoding on the erasure channel. The combination of these two decoding algorithms leads to erasure codes achieving a very good trade-off between complexity and erasure correction capability.
[ { "version": "v1", "created": "Thu, 22 Jan 2009 12:25:00 GMT" } ]
2009-01-23T00:00:00
[ [ "Soro", "Alexandre", "" ], [ "Cunche", "Mathieu", "" ], [ "Lacan", "Jerome", "" ], [ "Roca", "Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3475
In Sook Park
In Sook Park
Efficient decoding algorithm using triangularity of $\mbf{R}$ matrix of QR-decomposition
This paper is submitted to IEEE transactions on Information theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An efficient decoding algorithm named `divided decoder' is proposed in this paper. Divided decoding can be combined with any decoder using QR-decomposition and offers different pairs of performance and complexity. Divided decoding provides various combinations of two or more different searching algorithms. Hence it makes flexibility in error rate and complexity for the algorithms using it. We calculate diversity orders and upper bounds of error rates for typical models when these models are solved by divided decodings with sphere decoder, and discuss about the effects of divided decoding on complexity. Simulation results of divided decodings combined with a sphere decoder according to different splitting indices correspond to the theoretical analysis.
[ { "version": "v1", "created": "Thu, 22 Jan 2009 12:57:42 GMT" } ]
2009-01-23T00:00:00
[ [ "Park", "In Sook", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3482
Aurelien Francillon
Aur\'elien Francillon, Claude Castelluccia
Code injection attacks on harvard-architecture devices
null
CCS '08: Proceedings of the 15th ACM conference on Computer and communications security (2008) 15--26
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited memory and can process only very small packets. Stack-based buffer overflow techniques that inject code into the stack and then execute it are therefore not applicable. It has been a common belief that code injection is impossible on Harvard architectures. This paper presents a remote code injection attack for Mica sensors. We show how to exploit program vulnerabilities to permanently inject any piece of code into the program memory of an Atmel AVR-based sensor. To our knowledge, this is the first result that presents a code injection technique for such devices. Previous work only succeeded in injecting data or performing transient attacks. Injecting permanent code is more powerful since the attacker can gain full control of the target sensor. We also show that this attack can be used to inject a worm that can propagate through the wireless sensor network and possibly create a sensor botnet. Our attack combines different techniques such as return oriented programming and fake stack injection. We present implementation details and suggest some counter-measures.
[ { "version": "v1", "created": "Thu, 22 Jan 2009 14:21:27 GMT" } ]
2009-01-23T00:00:00
[ [ "Francillon", "Aurélien", "" ], [ "Castelluccia", "Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.3574
Christoph Benzmueller
Christoph Benzmueller
Automating Access Control Logics in Simple Type Theory with LEO-II
ii + 20 pages
SEKI Report SR-2008-01 (ISSN 1437-4447), Saarland University, 2008
10.1007/978-3-642-01244-0_34
SEKI Report SR-2008-01
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory (which is also known as higher-order logic) and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound and complete embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in prominent access control logics.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 17:20:17 GMT" }, { "version": "v2", "created": "Wed, 4 Mar 2009 08:55:19 GMT" } ]
2015-05-13T00:00:00
[ [ "Benzmueller", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0901.3580
Changho Suh
Changho Suh, David Tse
Feedback Capacity of the Gaussian Interference Channel to Within 1.7075 Bits: the Symmetric Case
submitted to the International Symposium and Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We characterize the symmetric capacity to within 1.7075 bits/s/Hz for the two-user Gaussian interference channel with feedback. The result makes use of a deterministic model to provide insights into the Gaussian channel. We derive a new outer bound to show that a proposed achievable scheme can achieve the symmetric capacity to within 1.7075 bits for all channel parameters. From this result, we show that feedback provides unbounded gain, i.e., the gain becomes arbitrarily large for certain channel parameters. It is a surprising result because feedback has been so far known to provide only power gain (bounded gain) in the context of multiple access channels and broadcast channels.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 00:37:49 GMT" } ]
2009-01-26T00:00:00
[ [ "Suh", "Changho", "" ], [ "Tse", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3585
Christoph Benzmueller
Christoph Benzmueller, Volker Sorge
Resource Adaptive Agents in Interactive Theorem Proving
13 pages
SEKI Report (ISSN 1437-4447), Saarland University, 1999
null
SR-99-02
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a resource adaptive agent mechanism which supports the user in interactive theorem proving. The mechanism uses a two layered architecture of agent societies to suggest appropriate commands together with possible command argument instantiations. Experiments with this approach show that its effectiveness can be further improved by introducing a resource concept. In this paper we provide an abstract view on the overall mechanism, motivate the necessity of an appropriate resource concept and discuss its realization within the agent architecture.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 05:29:09 GMT" } ]
2009-01-26T00:00:00
[ [ "Benzmueller", "Christoph", "" ], [ "Sorge", "Volker", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0901.3590
Chunhua Shen
Chunhua Shen and Hanxi Li
On the Dual Formulation of Boosting Algorithms
Fixed typos. 16 pages. Published in IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI), Dec. 2010
null
10.1109/TPAMI.2010.47
null
cs.LG cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
We study boosting algorithms from a new perspective. We show that the Lagrange dual problems of AdaBoost, LogitBoost and soft-margin LPBoost with generalized hinge loss are all entropy maximization problems. By looking at the dual problems of these boosting algorithms, we show that the success of boosting algorithms can be understood in terms of maintaining a better margin distribution by maximizing margins and at the same time controlling the margin variance.We also theoretically prove that, approximately, AdaBoost maximizes the average margin, instead of the minimum margin. The duality formulation also enables us to develop column generation based optimization algorithms, which are totally corrective. We show that they exhibit almost identical classification results to that of standard stage-wise additive boosting algorithms but with much faster convergence rates. Therefore fewer weak classifiers are needed to build the ensemble using our proposed optimization technique.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 02:14:42 GMT" }, { "version": "v2", "created": "Tue, 14 Jul 2009 04:02:54 GMT" }, { "version": "v3", "created": "Tue, 15 Dec 2009 04:54:15 GMT" }, { "version": "v4", "created": "Mon, 28 Dec 2009 02:31:35 GMT" }, { "version": "v5", "created": "Fri, 22 Apr 2022 12:56:41 GMT" }, { "version": "v6", "created": "Thu, 5 May 2022 15:15:53 GMT" }, { "version": "v7", "created": "Sat, 27 May 2023 06:50:26 GMT" } ]
2023-05-30T00:00:00
[ [ "Shen", "Chunhua", "" ], [ "Li", "Hanxi", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0901.3596
Cheng Chang
Cheng Chang
Joint source-channel with side information coding error exponents
In preparation for IEEE Transactions on IT
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the upper and the lower bounds on the joint source-channel coding error exponent with decoder side-information. The results in the paper are non-trivial extensions of the Csiszar's classical paper [5]. Unlike the joint source-channel coding result in [5], it is not obvious whether the lower bound and the upper bound are equivalent even if the channel coding error exponent is known. For a class of channels, including the symmetric channels, we apply a game-theoretic result to establish the existence of a saddle point and hence prove that the lower and upper bounds are the same if the channel coding error exponent is known. More interestingly, we show that encoder side-information does not increase the error exponents in this case.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 04:06:25 GMT" } ]
2009-01-26T00:00:00
[ [ "Chang", "Cheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3608
Christoph Benzmueller
Christoph Benzmueller
A remark on higher order RUE-resolution with EXTRUE
3 pages
SEKI Report (ISSN 1437-4447), Saarland University, 1999
null
SR-02-05
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that a prominent counterexample for the completeness of first order RUE-resolution does not apply to the higher order RUE-resolution approach EXTRUE.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 06:18:30 GMT" } ]
2009-01-26T00:00:00
[ [ "Benzmueller", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.3611
Liqun Fu
Liqun Fu, Soung Chang Liew, Jianwei Huang
Safe Carrier Sensing Range in CSMA Network under Physical Interference Model
5 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the setting of carrier-sensing range in 802.11 networks under the (cumulative) physical interference model. Specifically, we identify a carrier-sensing range that will prevent collisions in 802.11 networks due to carrier-sensing failure under the physical interference model. We find that the carrier-sensing range required under the physical interference model must be larger than that required under the protocol (pairwise) interference model by a multiplicative factor. For example, if the SINR requirement is 10dB and the path-loss exponent is 4, the factor is 1.4. Furthermore, given a fixed pathloss exponent of 4, the factor increases as the SINR requirement increases. However, the limit of the factor is 1.84 as the SINR requirement goes to infinity.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 06:59:19 GMT" } ]
2009-01-26T00:00:00
[ [ "Fu", "Liqun", "" ], [ "Liew", "Soung Chang", "" ], [ "Huang", "Jianwei", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0901.3615
Xiaofei Huang
Xiaofei Huang
A Constructive Generalization of Nash Equilibrium
null
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a society of multiple individuals, if everybody is only interested in maximizing his own payoff, will there exist any equilibrium for the society? John Nash proved more than 50 years ago that an equilibrium always exists such that nobody would benefit from unilaterally changing his strategy. Nash Equilibrium is a central concept in game theory, which offers the mathematical foundation for social science and economy. However, the original definition is declarative without including a solution to find them. It has been found later that it is computationally difficult to find a Nash equilibrium. Furthermore, a Nash equilibrium may be unstable, sensitive to the smallest variation of payoff functions. Making the situation worse, a society with selfish individuals can have an enormous number of equilibria, making it extremely hard to find out the global optimal one. This paper offers a constructive generalization of Nash equilibrium to cover the case when the selfishness of individuals are reduced to lower levels in a controllable way. It shows that the society has one and only one equilibrium when the selfishness is reduced to a certain level. When every individual follows the iterative, soft-decision optimization process presented in this paper, the society converges to the unique equilibrium with an exponential rate under any initial conditions. When it is a consensus equilibrium at the same time, it must be the global optimum. The study of this paper suggests that, to build a good, stable society (including the financial market) for the benefit everyone in it, the pursuing of maximal payoff by each individual should be controlled at some level either by voluntary good citizenship or some proper regulations.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 07:40:36 GMT" } ]
2009-01-26T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0901.3619
Xavier Leroy
Sandrine Blazy (CEDRIC, INRIA Rocquencourt), Xavier Leroy (INRIA Rocquencourt)
Mechanized semantics for the Clight subset of the C language
Journal of Automated Reasoning (2009)
Journal of Automated Reasoning 43, 3 (2009) 263-288
10.1007/s10817-009-9148-3
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents the formal semantics of a large subset of the C language called Clight. Clight includes pointer arithmetic, "struct" and "union" types, C loops and structured "switch" statements. Clight is the source language of the CompCert verified compiler. The formal semantics of Clight is a big-step operational semantics that observes both terminating and diverging executions and produces traces of input/output events. The formal semantics of Clight is mechanized using the Coq proof assistant. In addition to the semantics of Clight, this article describes its integration in the CompCert verified compiler and several ways by which the semantics was validated.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 08:40:31 GMT" } ]
2009-09-18T00:00:00
[ [ "Blazy", "Sandrine", "", "CEDRIC, INRIA Rocquencourt" ], [ "Leroy", "Xavier", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0901.3620
Vincent Chapurlat
Vincent Chapurlat (LGI2P), Bernard Kamsu Foguem (LGI2P), Fran\c{c}ois Prunet (LIRMM)
Enterprise model verification and validation: an approach
null
Annual Review in Control 27, 2 (2003) 185-197
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents a Verification and Validation approach which is used here in order to complete the classical tool box the industrial user may utilize in Enterprise Modeling and Integration domain. This approach, which has been defined independently from any application domain is based on several formal concepts and tools presented in this paper. These concepts are property concepts, property reference matrix, properties graphs, enterprise modeling domain ontology, conceptual graphs and formal reasoning mechanisms.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 08:42:21 GMT" } ]
2009-01-26T00:00:00
[ [ "Chapurlat", "Vincent", "", "LGI2P" ], [ "Foguem", "Bernard Kamsu", "", "LGI2P" ], [ "Prunet", "François", "", "LIRMM" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0901.3630
Shrinivas Kudekar Mr.
Shrinivas Kudekar and Nicolas Macris
Decay of Correlations in Low Density Parity Check Codes: Low Noise Regime
5 pages, submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider transmission over a binary additive white gaussian noise channel using a fixed low-density parity check code. We consider the posterior measure over the code bits and the corresponding correlation between two codebits, averaged over the noise realizations. We show that for low enough noise variance this average correlation decays exponentially fast with the graph distance between the code bits. One consequence of this result is that for low enough noise variance the GEXIT functions (further averaged over a standard code ensemble) of the belief propagation and optimal decoders are the same.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 09:18:05 GMT" } ]
2009-01-26T00:00:00
[ [ "Kudekar", "Shrinivas", "" ], [ "Macris", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3657
Joris van der Hoeven
Alin Bostan, Muhammad Chowdhury, Joris van der Hoeven, Eric Schost
Homotopy methods for multiplication modulo triangular sets
null
null
null
null
cs.SC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the cost of multiplication modulo triangular families of polynomials. Following previous work by Li, Moreno Maza and Schost, we propose an algorithm that relies on homotopy and fast evaluation-interpolation techniques. We obtain a quasi-linear time complexity for substantial families of examples, for which no such result was known before. Applications are given to notably addition of algebraic numbers in small characteristic.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 11:35:57 GMT" } ]
2009-01-26T00:00:00
[ [ "Bostan", "Alin", "" ], [ "Chowdhury", "Muhammad", "" ], [ "van der Hoeven", "Joris", "" ], [ "Schost", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.3692
Dorothea Baumeister
Dorothea Baumeister, Felix Brandt, Felix Fischer, Jan Hoffmann, Joerg Rothe
The Complexity of Computing Minimal Unidirectional Covering Sets
27 pages, 7 figures
Theory of Computing Systems 53(3), 2012
10.1007/s00224-012-9437-9
null
cs.CC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a binary dominance relation on a set of alternatives, a common thread in the social sciences is to identify subsets of alternatives that satisfy certain notions of stability. Examples can be found in areas as diverse as voting theory, game theory, and argumentation theory. Brandt and Fischer [BF08] proved that it is NP-hard to decide whether an alternative is contained in some inclusion-minimal upward or downward covering set. For both problems, we raise this lower bound to the Theta_{2}^{p} level of the polynomial hierarchy and provide a Sigma_{2}^{p} upper bound. Relatedly, we show that a variety of other natural problems regarding minimal or minimum-size covering sets are hard or complete for either of NP, coNP, and Theta_{2}^{p}. An important consequence of our results is that neither minimal upward nor minimal downward covering sets (even when guaranteed to exist) can be computed in polynomial time unless P=NP. This sharply contrasts with Brandt and Fischer's result that minimal bidirectional covering sets (i.e., sets that are both minimal upward and minimal downward covering sets) are polynomial-time computable.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 14:29:21 GMT" }, { "version": "v2", "created": "Fri, 3 Apr 2009 09:21:45 GMT" }, { "version": "v3", "created": "Wed, 15 Jul 2009 19:43:20 GMT" } ]
2015-02-06T00:00:00
[ [ "Baumeister", "Dorothea", "" ], [ "Brandt", "Felix", "" ], [ "Fischer", "Felix", "" ], [ "Hoffmann", "Jan", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0901.3699
Alan Frieze
Alan Frieze, Pall Melsted
Randomly colouring simple hypergraphs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of constructing a (near) random proper $q$-colouring of a simple k-uniform hypergraph with n vertices and maximum degree \Delta. (Proper in that no edge is mono-coloured and simple in that two edges have maximum intersection of size one). We give conditions on q,\Delta so that if these conditions are satisfied, Glauber dynamics will converge in O(n\log n) time from a random (improper) start. The interesting thing here is that for k\geq 3 we can take q=o(\D).
[ { "version": "v1", "created": "Fri, 23 Jan 2009 15:33:42 GMT" } ]
2009-01-26T00:00:00
[ [ "Frieze", "Alan", "" ], [ "Melsted", "Pall", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.3706
Elias Tsigaridas
Jerome Brachat (INRIA Sophia Antipolis), Pierre Comon (I3S), Bernard Mourrain (INRIA Sophia Antipolis), Elias Tsigaridas (INRIA Sophia Antipolis)
Symmetric tensor decomposition
null
Linear Algebra and Applications 433, 11-12 (2010) 851?1872
null
null
cs.SC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm for decomposing a symmetric tensor, of dimension n and order d as a sum of rank-1 symmetric tensors, extending the algorithm of Sylvester devised in 1886 for binary forms. We recall the correspondence between the decomposition of a homogeneous polynomial in n variables of total degree d as a sum of powers of linear forms (Waring's problem), incidence properties on secant varieties of the Veronese Variety and the representation of linear forms as a linear combination of evaluations at distinct points. Then we reformulate Sylvester's approach from the dual point of view. Exploiting this duality, we propose necessary and sufficient conditions for the existence of such a decomposition of a given rank, using the properties of Hankel (and quasi-Hankel) matrices, derived from multivariate polynomials and normal form computations. This leads to the resolution of polynomial equations of small degree in non-generic cases. We propose a new algorithm for symmetric tensor decomposition, based on this characterization and on linear algebra computations with these Hankel matrices. The impact of this contribution is two-fold. First it permits an efficient computation of the decomposition of any tensor of sub-generic rank, as opposed to widely used iterative algorithms with unproved global convergence (e.g. Alternate Least Squares or gradient descents). Second, it gives tools for understanding uniqueness conditions, and for detecting the rank.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 16:21:18 GMT" }, { "version": "v2", "created": "Sun, 25 Jan 2009 19:40:44 GMT" } ]
2010-11-29T00:00:00
[ [ "Brachat", "Jerome", "", "INRIA Sophia Antipolis" ], [ "Comon", "Pierre", "", "I3S" ], [ "Mourrain", "Bernard", "", "INRIA Sophia Antipolis" ], [ "Tsigaridas", "Elias", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0901.3751
Daniel Lemire
Daniel Lemire, Owen Kaser, Kamel Aouiche
Sorting improves word-aligned bitmap indexes
null
Data & Knowledge Engineering, Volume 69, Issue 1, 2010, Pages 3-28
10.1016/j.datak.2009.08.006
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bitmap indexes must be compressed to reduce input/output costs and minimize CPU usage. To accelerate logical operations (AND, OR, XOR) over bitmaps, we use techniques based on run-length encoding (RLE), such as Word-Aligned Hybrid (WAH) compression. These techniques are sensitive to the order of the rows: a simple lexicographical sort can divide the index size by 9 and make indexes several times faster. We investigate row-reordering heuristics. Simply permuting the columns of the table can increase the sorting efficiency by 40%. Secondary contributions include efficient algorithms to construct and aggregate bitmaps. The effect of word length is also reviewed by constructing 16-bit, 32-bit and 64-bit indexes. Using 64-bit CPUs, we find that 64-bit indexes are slightly faster than 32-bit indexes despite being nearly twice as large.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 19:01:06 GMT" }, { "version": "v2", "created": "Wed, 11 Mar 2009 00:27:46 GMT" }, { "version": "v3", "created": "Mon, 1 Jun 2009 14:19:15 GMT" }, { "version": "v4", "created": "Mon, 8 Jun 2009 20:04:04 GMT" }, { "version": "v5", "created": "Mon, 3 Feb 2014 19:03:18 GMT" }, { "version": "v6", "created": "Tue, 23 Sep 2014 00:36:49 GMT" }, { "version": "v7", "created": "Fri, 29 Jul 2016 20:24:07 GMT" } ]
2016-08-02T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Kaser", "Owen", "" ], [ "Aouiche", "Kamel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0901.3754
Vahab Mirrokni
Eyal Even-dar, Yishay Mansour, Vahab Mirrokni, S. Muthukrishnan, Uri Nadav
Bid Optimization in Broad-Match Ad auctions
World Wide Web Conference (WWW09), 10 pages, 2 figures
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ad auctions in sponsored search support ``broad match'' that allows an advertiser to target a large number of queries while bidding only on a limited number. While giving more expressiveness to advertisers, this feature makes it challenging to optimize bids to maximize their returns: choosing to bid on a query as a broad match because it provides high profit results in one bidding for related queries which may yield low or even negative profits. We abstract and study the complexity of the {\em bid optimization problem} which is to determine an advertiser's bids on a subset of keywords (possibly using broad match) so that her profit is maximized. In the query language model when the advertiser is allowed to bid on all queries as broad match, we present an linear programming (LP)-based polynomial-time algorithm that gets the optimal profit. In the model in which an advertiser can only bid on keywords, ie., a subset of keywords as an exact or broad match, we show that this problem is not approximable within any reasonable approximation factor unless P=NP. To deal with this hardness result, we present a constant-factor approximation when the optimal profit significantly exceeds the cost. This algorithm is based on rounding a natural LP formulation of the problem. Finally, we study a budgeted variant of the problem, and show that in the query language model, one can find two budget constrained ad campaigns in polynomial time that implement the optimal bidding strategy. Our results are the first to address bid optimization under the broad match feature which is common in ad auctions.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 19:09:01 GMT" } ]
2009-01-26T00:00:00
[ [ "Even-dar", "Eyal", "" ], [ "Mansour", "Yishay", "" ], [ "Mirrokni", "Vahab", "" ], [ "Muthukrishnan", "S.", "" ], [ "Nadav", "Uri", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.3761
Jeffrey Shallit
J. Brzozowski, E. Grant, J. Shallit
Closures in Formal Languages and Kuratowski's Theorem
submitted to DLT 2009
null
null
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A famous theorem of Kuratowski states that in a topological space, at most 14 distinct sets can be produced by repeatedly applying the operations of closure and complement to a given set. We re-examine this theorem in the setting of formal languages, where closure is either Kleene closure or positive closure. We classify languages according to the structure of the algebra they generate under iterations of complement and closure. We show that there are precisely 9 such algebras in the case of positive closure, and 12 in the case of Kleene closure.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 19:45:01 GMT" } ]
2009-04-15T00:00:00
[ [ "Brzozowski", "J.", "" ], [ "Grant", "E.", "" ], [ "Shallit", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0901.3762
Rubab Khan
Rubab Khan, Shourov Chatterji
Enhancing the capabilities of LIGO time-frequency plane searches through clustering
17 pages, 6 figures. Submitted to CQG on Dec 12, 2008; accepted on June 18, 2009
Class.Quant.Grav.26:155009,2009
10.1088/0264-9381/26/15/155009
null
gr-qc astro-ph.IM cs.CV physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One class of gravitational wave signals LIGO is searching for consists of short duration bursts of unknown waveforms. Potential sources include core collapse supernovae, gamma ray burst progenitors, and mergers of binary black holes or neutron stars. We present a density-based clustering algorithm to improve the performance of time-frequency searches for such gravitational-wave bursts when they are extended in time and/or frequency, and not sufficiently well known to permit matched filtering. We have implemented this algorithm as an extension to the QPipeline, a gravitational-wave data analysis pipeline for the detection of bursts, which currently determines the statistical significance of events based solely on the peak significance observed in minimum uncertainty regions of the time-frequency plane. Density based clustering improves the performance of such a search by considering the aggregate significance of arbitrarily shaped regions in the time-frequency plane and rejecting the isolated minimum uncertainty features expected from the background detector noise. In this paper, we present test results for simulated signals and demonstrate that density based clustering improves the performance of the QPipeline for signals extended in time and/or frequency.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 20:59:45 GMT" }, { "version": "v2", "created": "Fri, 23 Jan 2009 21:41:46 GMT" }, { "version": "v3", "created": "Thu, 18 Jun 2009 20:12:08 GMT" } ]
2009-07-22T00:00:00
[ [ "Khan", "Rubab", "" ], [ "Chatterji", "Shourov", "" ] ]
[ { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0901.3763
Jeffrey Shallit
J. Brzozowski, E. Grant, J. Shallit
Closures in Formal Languages: Concatenation, Separation, and Algorithms
submitted to DLT 2009
null
null
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We continue our study of open and closed languages. We investigate how the properties of being open and closed are preserved under concatenation. We investigate analogues, in formal languages, of the separation axioms in topological spaces; one of our main results is that there is a clopen partition separating two words if and only if the words commute. We show that we can decide in quadratic time if the language specified by a DFA is closed, but if the language is specified by an NFA, the problem is PSPACE-complete.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 19:51:41 GMT" } ]
2009-04-12T00:00:00
[ [ "Brzozowski", "J.", "" ], [ "Grant", "E.", "" ], [ "Shallit", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0901.3769
Sebastien Verel
William Beaudoin (I3S), S\'ebastien Verel (I3S), Philippe Collard (I3S), Cathy Escazut (I3S)
Deceptiveness and Neutrality - the ND family of fitness landscapes
Genetic And Evolutionary Computation Conference, Seatle : \'Etats-Unis d'Am\'erique (2006)
null
10.1145/1143997.1144091
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When a considerable number of mutations have no effects on fitness values, the fitness landscape is said neutral. In order to study the interplay between neutrality, which exists in many real-world applications, and performances of metaheuristics, it is useful to design landscapes which make it possible to tune precisely neutral degree distribution. Even though many neutral landscape models have already been designed, none of them are general enough to create landscapes with specific neutral degree distributions. We propose three steps to design such landscapes: first using an algorithm we construct a landscape whose distribution roughly fits the target one, then we use a simulated annealing heuristic to bring closer the two distributions and finally we affect fitness values to each neutral network. Then using this new family of fitness landscapes we are able to highlight the interplay between deceptiveness and neutrality.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 20:15:22 GMT" } ]
2009-01-26T00:00:00
[ [ "Beaudoin", "William", "", "I3S" ], [ "Verel", "Sébastien", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Escazut", "Cathy", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0901.3795
Krzysztof J. Szajowski
Krzysztof Szajowski
On a random number of disorders
in Institute of Mathematics, Polish Academy of Science, Preprint no. 702, 25 references, 34 pages
Probability and Mathematical Statistics, vol. 31, Fasc. 1 (2011), pp. 17-45
null
null
math.PR cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We register a random sequence which has the following properties: it has three segments being the homogeneous Markov processes. Each segment has his own one step transition probability law and the length of the segment is unknown and random. It means that at two random successive moments (they can be equal also and equal zero too) the source of observations is changed and the first observation in new segment is chosen according to new transition probability starting from the last state of the previous segment. In effect the number of homogeneous segments is random. The transition probabilities of each process are known and a priori distribution of the disorder moments is given. The former research on such problem has been devoted to various questions concerning the distribution changes. The random number of distributional segments creates new problems in solutions with relation to analysis of the model with deterministic number of segments. Two cases are presented in details. In the first one the objectives is to stop on or between the disorder moments while in the second one our objective is to find the strategy which immediately detects the distribution changes. Both problems are reformulated to optimal stopping of the observed sequences. The detailed analysis of the problem is presented to show the form of optimal decision function.
[ { "version": "v1", "created": "Fri, 23 Jan 2009 23:42:08 GMT" }, { "version": "v2", "created": "Tue, 7 Apr 2009 22:51:36 GMT" }, { "version": "v3", "created": "Tue, 26 Jan 2010 07:57:53 GMT" } ]
2011-11-21T00:00:00
[ [ "Szajowski", "Krzysztof", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0901.3809
Cheng Chang
Cheng Chang
Interference channel capacity region for randomized fixed-composition codes
In preparation for IEEE Transactions on IT
null
10.1109/ALLERTON.2009.5394808
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The randomized fixe-composition with optimal decoding error exponents are studied \cite{Raul_ISIT,Raul_journal} for the finite alphabet interference channel (IFC) with two transmitter-receiver pairs. In this paper we investigate the capacity region of the randomized fixed-composition coding scheme. A complete characterization of the capacity region of the said coding scheme is given. The inner bound is derived by showing the existence of a positive error exponent within the capacity region. A simple universal decoding rule is given. The tight outer bound is derived by extending a technique first developed in \cite{Dueck_RC} for single input output channels to interference channels. It is shown that even with a sophisticated time-sharing scheme among randomized fixed-composition codes, the capacity region of the randomized fixed-composition coding is not bigger than the known Han-Kobayashi \cite{Han_Kobayashi} capacity region. This suggests that the average behavior of random codes are not sufficient to get new capacity regions.
[ { "version": "v1", "created": "Sat, 24 Jan 2009 01:36:31 GMT" } ]
2016-11-15T00:00:00
[ [ "Chang", "Cheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3820
Cheng Chang
Cheng Chang
On the rate distortion function of Bernoulli Gaussian sequences
In preparation for IEEE Transactions on IT
null
10.1109/ISIT.2010.5513289
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the rate distortion function of the i.i.d sequence of multiplications of a Bernoulli $p$ random variable and a gaussian random variable $\sim N(0,1)$. We use a new technique in the derivation of the lower bound in which we establish the duality between channel coding and lossy source coding in the strong sense. We improve the lower bound on the rate distortion function over the best known lower bound by $p\log_2\frac{1}{p}$ if distortion $D$ is small. This has some interesting implications on sparse signals where $p$ is small since the known gap between the lower and upper bound is $H(p)$. This improvement in the lower bound shows that the lower and upper bounds are almost identical for sparse signals with small distortion because $\lim\limits_{p\to 0}\frac{p\log_2\frac{1}{p}}{H(p)}=1$.
[ { "version": "v1", "created": "Sat, 24 Jan 2009 10:23:44 GMT" } ]
2016-11-15T00:00:00
[ [ "Chang", "Cheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3828
Olivier Finkel
Olivier Finkel (ELM)
On Recognizable Languages of Infinite Pictures
An erratum is added at the end of the paper: The supremum of the set of Borel ranks of B\"uchi recognizable languages of infinite pictures is not the first non recursive ordinal $\omega_1^{CK}$ but an ordinal $\gamma^1_2$ which is strictly greater than the ordinal $\omega_1^{CK}$. This follows from a result proved by Kechris, Marker and Sami (JSL 1989)
International Journal of Foundations of Computer Science 15, 6 (2004) 823-840
null
null
cs.LO cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent paper, Altenbernd, Thomas and W\"ohrle have considered acceptance of languages of infinite two-dimensional words (infinite pictures) by finite tiling systems, with the usual acceptance conditions, such as the B\"uchi and Muller ones, firstly used for infinite words. The authors asked for comparing the tiling system acceptance with an acceptance of pictures row by row using an automaton model over ordinal words of length $\omega^2$. We give in this paper a solution to this problem, showing that all languages of infinite pictures which are accepted row by row by B\"uchi or Choueka automata reading words of length $\omega^2$ are B\"uchi recognized by a finite tiling system, but the converse is not true. We give also the answer to two other questions which were raised by Altenbernd, Thomas and W\"ohrle, showing that it is undecidable whether a B\"uchi recognizable language of infinite pictures is E-recognizable (respectively, A-recognizable).
[ { "version": "v1", "created": "Sat, 24 Jan 2009 12:09:35 GMT" } ]
2009-01-27T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0901.3839
Bruno Goncalves
Bruno Goncalves, Mark R. Meiss, Jose J. Ramasco, Alessandro Flammini, Filippo Menczer
Remembering what we like: Toward an agent-based model of Web traffic
4 pages, 4 figures. Accepted in WSDM 2009 Late Breaking Results
WSDM 2009 Late Breaking Results
null
null
cs.HC cs.CY cs.IR cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analysis of aggregate Web traffic has shown that PageRank is a poor model of how people actually navigate the Web. Using the empirical traffic patterns generated by a thousand users over the course of two months, we characterize the properties of Web traffic that cannot be reproduced by Markovian models, in which destinations are independent of past decisions. In particular, we show that the diversity of sites visited by individual users is smaller and more broadly distributed than predicted by the PageRank model; that link traffic is more broadly distributed than predicted; and that the time between consecutive visits to the same site by a user is less broadly distributed than predicted. To account for these discrepancies, we introduce a more realistic navigation model in which agents maintain individual lists of bookmarks that are used as teleportation targets. The model can also account for branching, a traffic property caused by browser features such as tabs and the back button. The model reproduces aggregate traffic patterns such as site popularity, while also generating more accurate predictions of diversity, link traffic, and return time distributions. This model for the first time allows us to capture the extreme heterogeneity of aggregate traffic measurements while explaining the more narrowly focused browsing patterns of individual users.
[ { "version": "v1", "created": "Sat, 24 Jan 2009 15:53:43 GMT" } ]
2010-04-27T00:00:00
[ [ "Goncalves", "Bruno", "" ], [ "Meiss", "Mark R.", "" ], [ "Ramasco", "Jose J.", "" ], [ "Flammini", "Alessandro", "" ], [ "Menczer", "Filippo", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0901.3843
Alin Bostan
Alin Bostan (INRIA Rocquencourt), \'Eric Schost
Fast algorithms for differential equations in positive characteristic
null
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address complexity issues for linear differential equations in characteristic $p>0$: resolution and computation of the $p$-curvature. For these tasks, our main focus is on algorithms whose complexity behaves well with respect to $p$. We prove bounds linear in $p$ on the degree of polynomial solutions and propose algorithms for testing the existence of polynomial solutions in sublinear time $\tilde{O}(p^{1/2})$, and for determining a whole basis of the solution space in quasi-linear time $\tilde{O}(p)$; the $\tilde{O}$ notation indicates that we hide logarithmic factors. We show that for equations of arbitrary order, the $p$-curvature can be computed in subquadratic time $\tilde{O}(p^{1.79})$, and that this can be improved to $O(\log(p))$ for first order equations and to $\tilde{O}(p)$ for classes of second order equations.
[ { "version": "v1", "created": "Sat, 24 Jan 2009 16:23:34 GMT" } ]
2009-01-27T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Schost", "Éric", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0901.3880
Sang-Woon Jeon
Sang-Woon Jeon, Sae-Young Chung
Capacity Scaling of Single-source Wireless Networks: Effect of Multiple Antennas
Submitted to the IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 58, no. 11, pp. 6870-6878, Nov. 2012
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a wireless network in which a single source node located at the center of a unit area having $m$ antennas transmits messages to $n$ randomly located destination nodes in the same area having a single antenna each. To achieve the sum-rate proportional to $m$ by transmit beamforming, channel state information (CSI) is essentially required at the transmitter (CSIT), which is hard to obtain in practice because of the time-varying nature of the channels and feedback overhead. We show that, even without CSIT, the achievable sum-rate scales as $\Theta(m\log m)$ if a cooperation between receivers is allowed. By deriving the cut-set upper bound, we also show that $\Theta(m\log m)$ scaling is optimal. Specifically, for $n=\omega(m^2)$, the simple TDMA-based quantize-and-forward is enough to achieve the capacity scaling. For $n=\omega(m)$ and $n=\operatorname{O}(m^2)$, on the other hand, we apply the hierarchical cooperation to achieve the capacity scaling.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 07:22:42 GMT" } ]
2013-10-29T00:00:00
[ [ "Jeon", "Sang-Woon", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3882
Oleg Shcherbina
Oleg Shcherbina
Graph-based local elimination algorithms in discrete optimization
32 pages, 8 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to provide a review of structural decomposition methods in discrete optimization and to give a unified framework in the form of local elimination algorithms (LEA). This paper is organized as follows. Local elimination algorithms for discrete optimization (DO) problems (DOPs) with constraints are considered; a classification of dynamic programming computational procedures is given. We introduce Elimination Game and Elimination tree. Application of bucket elimination algorithm from constraint satisfaction (CS) to solving DOPs is done. We consider different local elimination schemes and related notions. Clustering that merges several variables into single meta-variable defines a promising approach to solve DOPs. This allows to create a quotient (condensed) graph and apply a local block elimination algorithm. In order to describe a block elimination process, we introduce Block Elimination Game. We discuss the connection of aforementioned local elimination algorithmic schemes and a way of transforming the directed acyclic graph (DAG) of computational LEA procedure to the tree decomposition.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 08:31:07 GMT" } ]
2009-01-27T00:00:00
[ [ "Shcherbina", "Oleg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0901.3902
Sylvain Marchand
Fabien Gallot, Owen Lagadec, Myriam Desainte-Catherine (LaBRI), Sylvain Marchand (LaBRI)
iKlax: a New Musical Audio Format for Active Listening
null
International Computer Music Conference (ICMC), Belfast : Irlande (2008)
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we are presenting a new model for interactive music. Unlike most interactive systems, our model is based on file organization, but does not require digital audio treatments. This model includes a definition of a constraints system and its solver. The products of this project are intended for the general public, inexperienced users, as well as professional musicians, and will be distributed commercially. We are here presenting three products of this project. The difficulty of this project is to design a technology and software products for interactive music which must be easy to use by the general public and by professional composers.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 14:57:55 GMT" } ]
2009-01-27T00:00:00
[ [ "Gallot", "Fabien", "", "LaBRI" ], [ "Lagadec", "Owen", "", "LaBRI" ], [ "Desainte-Catherine", "Myriam", "", "LaBRI" ], [ "Marchand", "Sylvain", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0901.3906
Manuel Carro
Pablo Chico de Guzman, Manuel Carro, Manuel V. Hermenegildo
A Program Transformation for Continuation Call-Based Tabled Execution
Part of the proceedings of CICLOPS 2008
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advantages of tabled evaluation regarding program termination and reduction of complexity are well known --as are the significant implementation, portability, and maintenance efforts that some proposals (especially those based on suspension) require. This implementation effort is reduced by program transformation-based continuation call techniques, at some efficiency cost. However, the traditional formulation of this proposal by Ramesh and Cheng limits the interleaving of tabled and non-tabled predicates and thus cannot be used as-is for arbitrary programs. In this paper we present a complete translation for the continuation call technique which, using the runtime support needed for the traditional proposal, solves these problems and makes it possible to execute arbitrary tabled programs. We present performance results which show that CCall offers a useful tradeoff that can be competitive with state-of-the-art implementations.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 15:40:48 GMT" } ]
2009-01-27T00:00:00
[ [ "de Guzman", "Pablo Chico", "" ], [ "Carro", "Manuel", "" ], [ "Hermenegildo", "Manuel V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0901.3910
Charles Lales
Charles Lales (LaBRI), N. Parisey, Jean-Pierre Mazat, Marie Beurton-Aimar (LaBRI)
Simulation of mitochondrial metabolism using multi-agents system
null
AAMAS'05 (MAS*BIOMED'05), Utrecht : Pays-Bas (2005)
null
null
q-bio.SC cs.MA q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metabolic pathways describe chains of enzymatic reactions. Their modelling is a key point to understand living systems. An enzymatic reaction is an interaction between one or several metabolites (substrates) and an enzyme (simple protein or enzymatic complex build of several subunits). In our Mitochondria in Silico Project, MitoScop, we study the metabolism of the mitochondria, an intra-cellular organelle. Many ordinary differential equation models are available in the literature. They well fit experimental results on flux values inside the metabolic pathways, but many parameters are di$\pm$cult to transcribe with such models: localization of enzymes, rules about the reactions scheduler, etc Moreover, a model of a significant part of mitochondrial metabolism could become very complex and contain more than 50 equations. In this context, the multi-agents systems appear as an alternative to model the metabolic pathways. Firstly, we have looked after membrane design. The mitochondria is a particular case because the inner mitochondrial space, ie matricial space, is delimited by two membranes: the inner and the outer one. In addition to matricial enzymes, other enzymes are located inside the membranes or in the inter-membrane space. Analysis of mitochondrial metabolism must take into account this kind of architecture.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 16:40:58 GMT" } ]
2009-01-27T00:00:00
[ [ "Lales", "Charles", "", "LaBRI" ], [ "Parisey", "N.", "", "LaBRI" ], [ "Mazat", "Jean-Pierre", "", "LaBRI" ], [ "Beurton-Aimar", "Marie", "", "LaBRI" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.SC", "description": "Assembly and control of subcellular structures (channels, organelles, cytoskeletons, capsules, etc.); molecular motors, transport, subcellular localization; mitosis and meiosis", "span": "(Subcellular Processes)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0901.3923
Jayant Gupchup A
Jayant Gupchup, Andreas Terzis, Randal Burns and Alex Szalay
Model-Based Event Detection in Wireless Sensor Networks
null
Workshop for Data Sharing and Interoperability on the World Wide Web (DSI 2007). April 2007, In Proceedings
null
null
cs.NI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an application of techniques from statistical signal processing to the problem of event detection in wireless sensor networks used for environmental monitoring. The proposed approach uses the well-established Principal Component Analysis (PCA) technique to build a compact model of the observed phenomena that is able to capture daily and seasonal trends in the collected measurements. We then use the divergence between actual measurements and model predictions to detect the existence of discrete events within the collected data streams. Our preliminary results show that this event detection mechanism is sensitive enough to detect the onset of rain events using the temperature modality of a wireless sensor network.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 21:36:27 GMT" } ]
2009-01-27T00:00:00
[ [ "Gupchup", "Jayant", "" ], [ "Terzis", "Andreas", "" ], [ "Burns", "Randal", "" ], [ "Szalay", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0901.3924
David Eppstein
David Eppstein, Elena Mumford, Bettina Speckmann, and Kevin Verbeek
Area-Universal Rectangular Layouts
19 pages, 16 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A rectangular layout is a partition of a rectangle into a finite set of interior-disjoint rectangles. Rectangular layouts appear in various applications: as rectangular cartograms in cartography, as floorplans in building architecture and VLSI design, and as graph drawings. Often areas are associated with the rectangles of a rectangular layout and it might hence be desirable if one rectangular layout can represent several area assignments. A layout is area-universal if any assignment of areas to rectangles can be realized by a combinatorially equivalent rectangular layout. We identify a simple necessary and sufficient condition for a rectangular layout to be area-universal: a rectangular layout is area-universal if and only if it is one-sided. More generally, given any rectangular layout L and any assignment of areas to its regions, we show that there can be at most one layout (up to horizontal and vertical scaling) which is combinatorially equivalent to L and achieves a given area assignment. We also investigate similar questions for perimeter assignments. The adjacency requirements for the rectangles of a rectangular layout can be specified in various ways, most commonly via the dual graph of the layout. We show how to find an area-universal layout for a given set of adjacency requirements whenever such a layout exists.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 22:07:47 GMT" } ]
2009-01-27T00:00:00
[ [ "Eppstein", "David", "" ], [ "Mumford", "Elena", "" ], [ "Speckmann", "Bettina", "" ], [ "Verbeek", "Kevin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0901.3929
Marko A. Rodriguez
Marko A. Rodriguez and Jennifer H. Watkins
Revisiting the Age of Enlightenment from a Collective Decision Making Systems Perspective
null
First Monday, volume 14, number 8, ISSN:1396-0466, LA-UR-09-00324, University of Illinois at Chicago Library, August 2009
null
LA-UR-09-00324
cs.CY cs.DL
http://creativecommons.org/licenses/by/3.0/
The ideals of the eighteenth century's Age of Enlightenment are the foundation of modern democracies. The era was characterized by thinkers who promoted progressive social reforms that opposed the long-established aristocracies and monarchies of the time. Prominent examples of such reforms include the establishment of inalienable human rights, self-governing republics, and market capitalism. Twenty-first century democratic nations can benefit from revisiting the systems developed during the Enlightenment and reframing them within the techno-social context of the Information Age. This article explores the application of social algorithms that make use of Thomas Paine's (English: 1737--1809) representatives, Adam Smith's (Scottish: 1723--1790) self-interested actors, and Marquis de Condorcet's (French: 1743--1794) optimal decision making groups. It is posited that technology-enabled social algorithms can better realize the ideals articulated during the Enlightenment.
[ { "version": "v1", "created": "Sun, 25 Jan 2009 22:50:41 GMT" }, { "version": "v2", "created": "Fri, 31 Jul 2009 23:25:20 GMT" } ]
2009-08-01T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Watkins", "Jennifer H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0901.3939
Qingzhao Tan
Qingzhao Tan, Prasenjit Mitra, C. Lee Giles
Effectively Searching Maps in Web Documents
12 pages, published in ECIR 2009
ECIR2009
null
null
cs.DL cs.IR
http://creativecommons.org/licenses/by/3.0/
Maps are an important source of information in archaeology and other sciences. Users want to search for historical maps to determine recorded history of the political geography of regions at different eras, to find out where exactly archaeological artifacts were discovered, etc. Currently, they have to use a generic search engine and add the term map along with other keywords to search for maps. This crude method will generate a significant number of false positives that the user will need to cull through to get the desired results. To reduce their manual effort, we propose an automatic map identification, indexing, and retrieval system that enables users to search and retrieve maps appearing in a large corpus of digital documents using simple keyword queries. We identify features that can help in distinguishing maps from other figures in digital documents and show how a Support-Vector-Machine-based classifier can be used to identify maps. We propose map-level-metadata e.g., captions, references to the maps in text, etc. and document-level metadata, e.g., title, abstract, citations, how recent the publication is, etc. and show how they can be automatically extracted and indexed. Our novel ranking algorithm weights different metadata fields differently and also uses the document-level metadata to help rank retrieved maps. Empirical evaluations show which features should be selected and which metadata fields should be weighted more. We also demonstrate improved retrieval results in comparison to adaptations of existing methods for map retrieval. Our map search engine has been deployed in an online map-search system that is part of the Blind-Review digital library system.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 02:14:29 GMT" } ]
2009-01-27T00:00:00
[ [ "Tan", "Qingzhao", "" ], [ "Mitra", "Prasenjit", "" ], [ "Giles", "C. Lee", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0901.3948
Mahdi Soltanlokotabi
Mahdi Soltanolkotabi, Arash Amini and Farokh Marvasti
OFDM Channel Estimation Based on Adaptive Thresholding for Sparse Signal Detection
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless OFDM channels can be approximated by a time varying filter with sparse time domain taps. Recent achievements in sparse signal processing such as compressed sensing have facilitated the use of sparsity in estimation, which improves the performance significantly. The problem of these sparse-based methods is the need for a stable transformation matrix which is not fulfilled in the current transmission setups. To assist the analog filtering at the receiver, the transmitter leaves some of the subcarriers at both edges of the bandwidth unused which results in an ill-conditioned DFT submatrix. To overcome this difficulty we propose Adaptive Thresholding for Sparse Signal Detection (ATSSD). Simulation results confirm that the proposed method works well in time-invariant and specially time-varying channels where other methods may not work as well.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 06:10:44 GMT" } ]
2009-01-27T00:00:00
[ [ "Soltanolkotabi", "Mahdi", "" ], [ "Amini", "Arash", "" ], [ "Marvasti", "Farokh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3950
Moshe Mishali
Moshe Mishali, Yonina C. Eldar and Joel A. Tropp
Efficient Sampling of Sparse Wideband Analog Signals
13 pages, 5 figs, conference paper (see ref. below)
Proc. of IEEEI, 25th convention, pp. 290-294, Dec. 2008
null
CCIT Report #705, Oct. 2008, EE Dept., Technion Israel
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Periodic nonuniform sampling is a known method to sample spectrally sparse signals below the Nyquist rate. This strategy relies on the implicit assumption that the individual samplers are exposed to the entire frequency range. This assumption becomes impractical for wideband sparse signals. The current paper proposes an alternative sampling stage that does not require a full-band front end. Instead, signals are captured with an analog front end that consists of a bank of multipliers and lowpass filters whose cutoff is much lower than the Nyquist rate. The problem of recovering the original signal from the low-rate samples can be studied within the framework of compressive sampling. An appropriate parameter selection ensures that the samples uniquely determine the analog input. Moreover, the analog input can be stably reconstructed with digital algorithms. Numerical experiments support the theoretical analysis.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 07:00:52 GMT" } ]
2009-01-27T00:00:00
[ [ "Mishali", "Moshe", "" ], [ "Eldar", "Yonina C.", "" ], [ "Tropp", "Joel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3984
Michael Schmidt
Michael Meier and Michael Schmidt and Georg Lausen
Stop the Chase
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The chase procedure, an algorithm proposed 25+ years ago to fix constraint violations in database instances, has been successfully applied in a variety of contexts, such as query optimization, data exchange, and data integration. Its practicability, however, is limited by the fact that - for an arbitrary set of constraints - it might not terminate; even worse, chase termination is an undecidable problem in general. In response, the database community has proposed sufficient restrictions on top of the constraints that guarantee chase termination on any database instance. In this paper, we propose a novel sufficient termination condition, called inductive restriction, which strictly generalizes previous conditions, but can be checked as efficiently. Furthermore, we motivate and study the problem of data-dependent chase termination and, as a key result, present sufficient termination conditions w.r.t. fixed instances. They are strictly more general than inductive restriction and might guarantee termination although the chase does not terminate in the general case.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 12:09:38 GMT" }, { "version": "v2", "created": "Wed, 6 May 2009 13:28:13 GMT" } ]
2009-05-06T00:00:00
[ [ "Meier", "Michael", "" ], [ "Schmidt", "Michael", "" ], [ "Lausen", "Georg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0901.3987
Mohammad Ravanbakhsh
Mohammad Ravanbakhsh, Angela I. Barbero Diez, and Oyvind Ytrehus
Improved Delay Estimates for a Queueing Model for Random Linear Coding for Unicast
5 pages, 3 figures, accepted at the 2009 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2009.5205892
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a lossy communication channel for unicast with zero-delay feedback. For this communication scenario, a simple retransmission scheme is optimum with respect to delay. An alternative approach is to use random linear coding in automatic repeat-request (ARQ) mode. We extend the work of Shrader and Ephremides, by deriving an expression for the delay of random linear coding over field of infinite size. Simulation results for various field sizes are also provided.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 13:32:16 GMT" }, { "version": "v2", "created": "Tue, 26 May 2009 11:04:19 GMT" } ]
2016-11-18T00:00:00
[ [ "Ravanbakhsh", "Mohammad", "" ], [ "Diez", "Angela I. Barbero", "" ], [ "Ytrehus", "Oyvind", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.3990
Bernard Jacquemin
Bernard Jacquemin (LIMSI), Sabine Ploux (L2C2)
Du corpus au dictionnaire
null
Cahiers de Linguistique. Revue de sociolinguistique et de sociologie de la langue fran\c{c}aise 33, 1 (2008) 63-84
null
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we propose an automatic process to build multi-lingual lexico-semantic resources. The goal of these resources is to browse semantically textual information contained in texts of different languages. This method uses a mathematical model called Atlas s\'emantiques in order to represent the different senses of each word. It uses the linguistic relations between words to create graphs that are projected into a semantic space. These projections constitute semantic maps that denote the sense trends of each given word. This model is fed with syntactic relations between words extracted from a corpus. Therefore, the lexico-semantic resource produced describes all the words and all their meanings observed in the corpus. The sense trends are expressed by syntactic contexts, typical for a given meaning. The link between each sense trend and the utterances used to build the sense trend are also stored in an index. Thus all the instances of a word in a particular sense are linked and can be browsed easily. And by using several corpora of different languages, several resources are built that correspond with each other through languages. It makes it possible to browse information through languages thanks to syntactic contexts translations (even if some of them are partial).
[ { "version": "v1", "created": "Mon, 26 Jan 2009 15:52:21 GMT" } ]
2009-01-27T00:00:00
[ [ "Jacquemin", "Bernard", "", "LIMSI" ], [ "Ploux", "Sabine", "", "L2C2" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0901.4002
Giorgio Lucarelli
Giorgio Lucarelli, Ioannis Milis, Vangelis Th. Paschos
Max Edge Coloring of Trees
5 pages, 2 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the weighted generalization of the edge coloring problem where the weight of each color class (matching) equals to the weight of its heaviest edge and the goal is to minimize the sum of the colors' weights. We present a 3/2-approximation algorithm for trees.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 13:27:34 GMT" } ]
2009-01-27T00:00:00
[ [ "Lucarelli", "Giorgio", "" ], [ "Milis", "Ioannis", "" ], [ "Paschos", "Vangelis Th.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.4004
Yannick Toussaint
Alexander Estacio-Moreno, Yannick Toussaint, C\'edric Bousquet
Mining for adverse drug events with formal concept analysis
null
Studies in health technology and informatics 136 (2008) 803-8
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pharmacovigilance databases consist of several case reports involving drugs and adverse events (AEs). Some methods are applied consistently to highlight all signals, i.e. all statistically significant associations between a drug and an AE. These methods are appropriate for verification of more complex relationships involving one or several drug(s) and AE(s) (e.g; syndromes or interactions) but do not address the identification of them. We propose a method for the extraction of these relationships based on Formal Concept Analysis (FCA) associated with disproportionality measures. This method identifies all sets of drugs and AEs which are potential signals, syndromes or interactions. Compared to a previous experience of disproportionality analysis without FCA, the addition of FCA was more efficient for identifying false positives related to concomitant drugs.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 13:29:40 GMT" } ]
2009-01-27T00:00:00
[ [ "Estacio-Moreno", "Alexander", "" ], [ "Toussaint", "Yannick", "" ], [ "Bousquet", "Cédric", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0901.4012
Jos\'e Fontanari
Jos\'e F. Fontanari and Angelo Cangelosi
Cross-situational and supervised learning in the emergence of communication
null
Interaction Studies: Social Behaviour and Communication in Biological and Artificial Systems, 12, 119-133 (2011)
10.1075/is.12.1.05fon
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scenarios for the emergence or bootstrap of a lexicon involve the repeated interaction between at least two agents who must reach a consensus on how to name N objects using H words. Here we consider minimal models of two types of learning algorithms: cross-situational learning, in which the individuals determine the meaning of a word by looking for something in common across all observed uses of that word, and supervised operant conditioning learning, in which there is strong feedback between individuals about the intended meaning of the words. Despite the stark differences between these learning schemes, we show that they yield the same communication accuracy in the realistic limits of large N and H, which coincides with the result of the classical occupancy problem of randomly assigning N objects to H words.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 15:12:13 GMT" }, { "version": "v2", "created": "Mon, 29 Jun 2009 22:54:17 GMT" }, { "version": "v3", "created": "Sat, 28 Nov 2009 20:11:11 GMT" } ]
2011-04-14T00:00:00
[ [ "Fontanari", "José F.", "" ], [ "Cangelosi", "Angelo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0901.4016
Daniel Shawcross Wilkerson
Daniel Shawcross Wilkerson
A Proposal for Proquints: Identifiers that are Readable, Spellable, and Pronounceable
Added a suggestion that "0q-" be used as the optional magic number prefix for proquint strings. Better to pick one standard than let people make up different solutions to this problem
null
null
null
cs.SE cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifiers (IDs) are pervasive throughout our modern life. We suggest that these IDs would be easier to manage and remember if they were easily readable, spellable, and pronounceable. As a solution to this problem we propose using PRO-nouncable QUINT-uplets of alternating unambiguous consonants and vowels: _proquints_.
[ { "version": "v1", "created": "Sat, 24 Jan 2009 21:13:38 GMT" }, { "version": "v2", "created": "Mon, 26 Jan 2009 23:51:04 GMT" } ]
2009-10-12T00:00:00
[ [ "Wilkerson", "Daniel Shawcross", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0901.4023
Boris Ryabko
Boris Ryabko, Daniil Ryabko
Using Kolmogorov Complexity for Understanding Some Limitations on Steganography
null
null
null
null
cs.CC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently perfectly secure steganographic systems have been described for a wide class of sources of covertexts. The speed of transmission of secret information for these stegosystems is proportional to the length of the covertext. In this work we show that there are sources of covertexts for which such stegosystems do not exist. The key observation is that if the set of possible covertexts has a maximal Kolmogorov complexity, then a high-speed perfect stegosystem has to have complexity of the same order.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 15:28:02 GMT" } ]
2009-01-27T00:00:00
[ [ "Ryabko", "Boris", "" ], [ "Ryabko", "Daniil", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.4032
Jerome Jaffre
Siddhartha Mishra (University of Oslo), J\'er\^ome Jaffr\'e (INRIA Rocquencourt)
On the upstream mobility scheme for two-phase flow in porous media
A preprint to be published in Computational Geosciences
Computational Geosciences 14 (2010) 105-124
10.1007/s10596-009-9135-0
RR-6789
cs.NA math.AP math.NA physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When neglecting capillarity, two-phase incompressible flow in porous media is modelled as a scalar nonlinear hyperbolic conservation law. A change in the rock type results in a change of the flux function. Discretizing in one-dimensional with a finite volume method, we investigate two numerical fluxes, an extension of the Godunov flux and the upstream mobility flux, the latter being widely used in hydrogeology and petroleum engineering. Then, in the case of a changing rock type, one can give examples when the upstream mobility flux does not give the right answer.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 15:55:22 GMT" } ]
2014-02-12T00:00:00
[ [ "Mishra", "Siddhartha", "", "University of Oslo" ], [ "Jaffré", "Jérôme", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.AP", "description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics", "span": "(Analysis of PDEs)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0901.4068
Bernd Bandemer
Bernd Bandemer, Gonzalo Vazquez-Vilar, Abbas El Gamal
On the Sum Capacity of A Class of Cyclically Symmetric Deterministic Interference Channels
5 pages; submitted to IEEE International Symposium on Information Theory (ISIT 2009)
null
10.1109/ISIT.2009.5205951
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Certain deterministic interference channels have been shown to accurately model Gaussian interference channels in the asymptotic low-noise regime. Motivated by this correspondence, we investigate a K user-pair, cyclically symmetric, deterministic interference channel in which each receiver experiences interference only from its neighboring transmitters (Wyner model). We establish the sum capacity for a large set of channel parameters, thus generalizing previous results for the 2-pair case.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 19:36:56 GMT" } ]
2016-11-17T00:00:00
[ [ "Bandemer", "Bernd", "" ], [ "Vazquez-Vilar", "Gonzalo", "" ], [ "Gamal", "Abbas El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4080
Axel Legay
Ahmed Bouajjani, Axel Legay, Pierre Wolper
A Framework to Handle Linear Temporal Properties in (\omega-)Regular Model Checking
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the topic emerged several years ago, work on regular model checking has mostly been devoted to the verification of state reachability and safety properties. Though it was known that linear temporal properties could also be checked within this framework, little has been done about working out the corresponding details. This paper addresses this issue in the context of regular model checking based on the encoding of states by finite or infinite words. It works out the exact constructions to be used in both cases, and proposes a partial solution to the problem resulting from the fact that infinite computations of unbounded configurations might never contain the same configuration twice, thus making cycle detection problematic.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 19:49:43 GMT" } ]
2009-01-27T00:00:00
[ [ "Bouajjani", "Ahmed", "" ], [ "Legay", "Axel", "" ], [ "Wolper", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.4081
Linlin Zhang
Linlin Zhang (LAHC), Anne Claire Legrand (LAHC), Virginie Fresse (LAHC), Viktor Fischer (LAHC)
Adaptive FPGA NoC-based Architecture for Multispectral Image Correlation
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An adaptive FPGA architecture based on the NoC (Network-on-Chip) approach is used for the multispectral image correlation. This architecture must contain several distance algorithms depending on the characteristics of spectral images and the precision of the authentication. The analysis of distance algorithms is required which bases on the algorithmic complexity, result precision, execution time and the adaptability of the implementation. This paper presents the comparison of these distance computation algorithms on one spectral database. The result of a RGB algorithm implementation was discussed.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 19:54:27 GMT" } ]
2009-01-27T00:00:00
[ [ "Zhang", "Linlin", "", "LAHC" ], [ "Legrand", "Anne Claire", "", "LAHC" ], [ "Fresse", "Virginie", "", "LAHC" ], [ "Fischer", "Viktor", "", "LAHC" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0901.4129
Pascal Vontobel
Roxana Smarandache, Pascal O. Vontobel
Quasi-Cyclic LDPC Codes: Influence of Proto- and Tanner-Graph Structure on Minimum Hamming Distance Upper Bounds
To appear in IEEE Transactions on Information Theory. Changes compared to v1: some convolutional code results have been added; some incompleteness issues with some of the proofs have been corrected; a typo in one of the parity-check matrices has been corrected (i.e., an entry of H"(x) in Example 28 of v1 needs to be changed so that d_min=56 as written there, cf. \hat H(x) in Example 29 of v2)
null
10.1109/TIT.2011.2173244
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quasi-cyclic (QC) low-density parity-check (LDPC) codes are an important instance of proto-graph-based LDPC codes. In this paper we present upper bounds on the minimum Hamming distance of QC LDPC codes and study how these upper bounds depend on graph structure parameters (like variable degrees, check node degrees, girth) of the Tanner graph and of the underlying proto-graph. Moreover, for several classes of proto-graphs we present explicit QC LDPC code constructions that achieve (or come close to) the respective minimum Hamming distance upper bounds. Because of the tight algebraic connection between QC codes and convolutional codes, we can state similar results for the free Hamming distance of convolutional codes. In fact, some QC code statements are established by first proving the corresponding convolutional code statements and then using a result by Tanner that says that the minimum Hamming distance of a QC code is upper bounded by the free Hamming distance of the convolutional code that is obtained by "unwrapping" the QC code.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 22:22:49 GMT" }, { "version": "v2", "created": "Sat, 20 Aug 2011 12:36:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Smarandache", "Roxana", "" ], [ "Vontobel", "Pascal O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4134
Han-I Su
Han-I Su, Abbas El Gamal
Distributed Lossy Averaging
25 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An information theoretic formulation of the distributed averaging problem previously studied in computer science and control is presented. We assume a network with m nodes each observing a WGN source. The nodes communicate and perform local processing with the goal of computing the average of the sources to within a prescribed mean squared error distortion. The network rate distortion function R^*(D) for a 2-node network with correlated Gaussian sources is established. A general cutset lower bound on R^*(D) is established and shown to be achievable to within a factor of 2 via a centralized protocol over a star network. A lower bound on the network rate distortion function for distributed weighted-sum protocols, which is larger in order than the cutset bound by a factor of log m is established. An upper bound on the network rate distortion function for gossip-base weighted-sum protocols, which is only log log m larger in order than the lower bound for a complete graph network, is established. The results suggest that using distributed protocols results in a factor of log m increase in order relative to centralized protocols.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 22:47:17 GMT" }, { "version": "v2", "created": "Wed, 3 Mar 2010 00:09:02 GMT" } ]
2010-03-03T00:00:00
[ [ "Su", "Han-I", "" ], [ "Gamal", "Abbas El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4137
Marcus Hutter
Marcus Hutter
Practical Robust Estimators for the Imprecise Dirichlet Model
22 pages, 2 figures
International Journal of Approximate Reasoning, 50:2 (2009) pages 231-242
null
null
math.ST cs.LG stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Walley's Imprecise Dirichlet Model (IDM) for categorical i.i.d. data extends the classical Dirichlet model to a set of priors. It overcomes several fundamental problems which other approaches to uncertainty suffer from. Yet, to be useful in practice, one needs efficient ways for computing the imprecise=robust sets or intervals. The main objective of this work is to derive exact, conservative, and approximate, robust and credible interval estimates under the IDM for a large class of statistical estimators, including the entropy and mutual information.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 23:05:06 GMT" } ]
2009-12-30T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0901.4147
Hassane. Alla
Abbas Dideban (GIPSA-lab), Hassane. Alla (GIPSA-lab)
Determination of Minimal Sets of Control Places for Safe Petri Nets
ACC07 American Control Conference, New-York : \'Etats-Unis d'Am\'erique (2007)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our objective is to design a controlled system with a simple method for discrete event systems based on Petri nets. It is possible to construct the Petri net model of a system and the specification separately. By synchronous composition of both models, the desired functioning closed loop model is deduced. Often uncontrollable transitions lead to forbidden states. The problem of forbidden states is solved using linear constraints. A set of linear constraints allows forbidding the reachability of these states. Generally, the number of these so-called forbidden states and consequently the number of constraints are large and lead to a great number of control places. A systematic method to reduce the size and the number of constraints for safe Petri Nets is given. By using a method based on the Petri nets invariants, maximal permissive controllers are determined. The size of the controller is close to the size of the specified model, and it can be implemented on a PLC in a structural way.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 15:44:47 GMT" } ]
2009-01-28T00:00:00
[ [ "Dideban", "Abbas", "", "GIPSA-lab" ], [ "Alla", "Hassane.", "", "GIPSA-lab" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4180
Bj{\o}rn Kjos-Hanssen
Bj{\o}rn Kjos-Hanssen and Alberto J. Evangelista
Google distance between words
Presented at Frontiers in Undergraduate Research, University of Connecticut, 2006
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cilibrasi and Vitanyi have demonstrated that it is possible to extract the meaning of words from the world-wide web. To achieve this, they rely on the number of webpages that are found through a Google search containing a given word and they associate the page count to the probability that the word appears on a webpage. Thus, conditional probabilities allow them to correlate one word with another word's meaning. Furthermore, they have developed a similarity distance function that gauges how closely related a pair of words is. We present a specific counterexample to the triangle inequality for this similarity distance function.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 06:29:10 GMT" }, { "version": "v2", "created": "Wed, 28 Jan 2015 20:10:34 GMT" } ]
2015-01-29T00:00:00
[ [ "Kjos-Hanssen", "Bjørn", "" ], [ "Evangelista", "Alberto J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0901.4192
Danny Bickson
Jason K. Johnson, Danny Bickson and Danny Dolev
Fixing Convergence of Gaussian Belief Propagation
In the IEEE International Symposium on Information Theory (ISIT) 2009, Seoul, South Korea, July 2009
null
10.1109/ISIT.2009.5205777
null
cs.IT cs.LG math.IT stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gaussian belief propagation (GaBP) is an iterative message-passing algorithm for inference in Gaussian graphical models. It is known that when GaBP converges it converges to the correct MAP estimate of the Gaussian random vector and simple sufficient conditions for its convergence have been established. In this paper we develop a double-loop algorithm for forcing convergence of GaBP. Our method computes the correct MAP estimate even in cases where standard GaBP would not have converged. We further extend this construction to compute least-squares solutions of over-constrained linear systems. We believe that our construction has numerous applications, since the GaBP algorithm is linked to solution of linear systems of equations, which is a fundamental problem in computer science and engineering. As a case study, we discuss the linear detection problem. We show that using our new construction, we are able to force convergence of Montanari's linear detection algorithm, in cases where it would originally fail. As a consequence, we are able to increase significantly the number of users that can transmit concurrently.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 08:24:57 GMT" }, { "version": "v2", "created": "Sat, 9 May 2009 07:23:49 GMT" }, { "version": "v3", "created": "Sat, 4 Jul 2009 03:25:13 GMT" } ]
2010-03-23T00:00:00
[ [ "Johnson", "Jason K.", "" ], [ "Bickson", "Danny", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" } ]
0901.4201
Stephane Martin
Denis Lugiez (LIF), St\'ephane Martin (LIF)
Peer to Peer Optimistic Collaborative Editing on XML-like trees
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative editing consists in editing a common document shared by several independent sites. This may give rise to conficts when two different users perform simultaneous uncompatible operations. Centralized systems solve this problem by using locks that prevent some modifications to occur and leave the resolution of confict to users. On the contrary, peer to peer (P2P) editing doesn't allow locks and the optimistic approach uses a Integration Transformation IT that reconciliates the conficting operations and ensures convergence (all copies are identical on each site). Two properties TP1 and TP2, relating the set of allowed operations Op and the transformation IT, have been shown to ensure the correctness of the process. The choice of the set Op is crucial to define an integration operation that satisfies TP1 and TP2. Many existing algorithms don't satisfy these properties and are indeed incorrect i.e. convergence is not guaranteed. No algorithm enjoying both properties is known for strings and little work has been done for XML trees in a pure P2P framework (that doesn't use time-stamps for instance). We focus on editing unranked unordered labeled trees, so-called XML-like trees that are considered for instance in the Harmony pro ject. We show that no transformation satisfying TP1 and TP2 can exist for a first set of operations but we show that TP1 and TP2 hold for a richer set of operations. We show how to combine our approach with any convergent editing process on strings (not necessarily based on integration transformation) to get a convergent process.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 09:09:52 GMT" } ]
2009-01-28T00:00:00
[ [ "Lugiez", "Denis", "", "LIF" ], [ "Martin", "Stéphane", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0901.4205
Francois Rodier
Fr\'ed\'eric Edoukou (IML), Anja Hallez, Fran\c{c}ois Rodier (IML), Leo Storme
On the small weight codewords of the functional codes C_2(Q), Q a non-singular quadric
null
null
null
null
math.AG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the small weight codewords of the functional code C_2(Q), with Q a non-singular quadric of PG(N,q). We prove that the small weight codewords correspond to the intersections of Q with the singular quadrics of PG(N,q) consisting of two hyperplanes. We also calculate the number of codewords having these small weights.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 19:56:42 GMT" } ]
2009-01-28T00:00:00
[ [ "Edoukou", "Frédéric", "", "IML" ], [ "Hallez", "Anja", "", "IML" ], [ "Rodier", "François", "", "IML" ], [ "Storme", "Leo", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4224
Pasquale Di Donato
Pasquale Di Donato
Geospatial semantics: beyond ontologies, towards an enactive approach
24 pages, 1 table
null
null
null
cs.AI cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current approaches to semantics in the geospatial domain are mainly based on ontologies, but ontologies, since continue to build entirely on the symbolic methodology, suffers from the classical problems, e.g. the symbol grounding problem, affecting representational theories. We claim for an enactive approach to semantics, where meaning is considered to be an emergent feature arising context-dependently in action. Since representational theories are unable to deal with context, a new formalism is required toward a contextual theory of concepts. SCOP is considered a promising formalism in this sense and is briefly described.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 11:26:57 GMT" } ]
2009-01-28T00:00:00
[ [ "Di Donato", "Pasquale", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0901.4267
Joakim Jalden
Joakim Jalden and Petros Elia
LR-aided MMSE lattice decoding is DMT optimal for all approximately universal codes
5 pages, submitted to ISIT 09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Currently for the nt x nr MIMO channel, any explicitly constructed space-time (ST) designs that achieve optimality with respect to the diversity multiplexing tradeoff (DMT) are known to do so only when decoded using maximum likelihood (ML) decoding, which may incur prohibitive decoding complexity. In this paper we prove that MMSE regularized lattice decoding, as well as the computationally efficient lattice reduction (LR) aided MMSE decoder, allows for efficient and DMT optimal decoding of any approximately universal lattice-based code. The result identifies for the first time an explicitly constructed encoder and a computationally efficient decoder that achieve DMT optimality for all multiplexing gains and all channel dimensions. The results hold irrespective of the fading statistics.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 15:21:37 GMT" } ]
2009-01-28T00:00:00
[ [ "Jalden", "Joakim", "" ], [ "Elia", "Petros", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]