id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0901.4272
Hassane. Alla
Khalid Hachemi (GIPSA-lab), Hassane. Alla (GIPSA-lab)
Dynamic Control of a Flow-Rack Automated Storage and Retrieval System
CSCS 17 15th International Conference on Control Systems and Computer Science, Bucarest : Roumanie (2007)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a control scheme based on coloured Petri net (CPN) for a flow-rack automated storage and retrieval system. The AS/RS is modelled using Coloured Petri nets, the developed model has been used to capture and provide the rack state. We introduce in the control system an optimization module as a decision process which performs a real-time optimization working on a discrete events time scale. The objective is to find bin locations for the retrieval requests by minimizing the total number of retrieval cycles for a batch of requests and thereby increase the system throughput. By solving the optimization model, the proposed method gives according to customers request and the rack state, the best bin locations for retrieval, i.e. allowing at the same time to satisfy the customers request and carrying out the minimum of retrieval cycles.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 15:45:47 GMT" } ]
2009-01-28T00:00:00
[ [ "Hachemi", "Khalid", "", "GIPSA-lab" ], [ "Alla", "Hassane.", "", "GIPSA-lab" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4275
Hyun Sung Chang
Hyun Sung Chang, Yair Weiss, William T. Freeman
Informative Sensing
26 pages; submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing is a recent set of mathematical results showing that sparse signals can be exactly reconstructed from a small number of linear measurements. Interestingly, for ideal sparse signals with no measurement noise, random measurements allow perfect reconstruction while measurements based on principal component analysis (PCA) or independent component analysis (ICA) do not. At the same time, for other signal and noise distributions, PCA and ICA can significantly outperform random projections in terms of enabling reconstruction from a small number of measurements. In this paper we ask: given the distribution of signals we wish to measure, what are the optimal set of linear projections for compressed sensing? We consider the problem of finding a small number of linear projections that are maximally informative about the signal. Formally, we use the InfoMax criterion and seek to maximize the mutual information between the signal, x, and the (possibly noisy) projection y=Wx. We show that in general the optimal projections are not the principal components of the data nor random projections, but rather a seemingly novel set of projections that capture what is still uncertain about the signal, given the knowledge of distribution. We present analytic solutions for certain special cases including natural images. In particular, for natural images, the near-optimal projections are bandwise random, i.e., incoherent to the sparse bases at a particular frequency band but with more weights on the low-frequencies, which has a physical relation to the multi-resolution representation of images.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 16:12:00 GMT" } ]
2009-01-28T00:00:00
[ [ "Chang", "Hyun Sung", "" ], [ "Weiss", "Yair", "" ], [ "Freeman", "William T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4322
Francois Rodier
Gregor Leander (IML), Fran\c{c}ois Rodier (IML)
Bounds on the degree of APN polynomials The Case of $x^{-1}+g(x)$
null
null
null
null
math.AG cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that functions $f:\f{2^m} \to \f{2^m}$ of the form $f(x)=x^{-1}+g(x)$ where $g$ is any non-affine polynomial are APN on at most a finite number of fields $\f{2^m}$. Furthermore we prove that when the degree of $g$ is less then 7 such functions are APN only if $m \le 3$ where these functions are equivalent to $x^3$.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 19:54:06 GMT" } ]
2009-01-28T00:00:00
[ [ "Leander", "Gregor", "", "IML" ], [ "Rodier", "François", "", "IML" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.4323
Joris van der Hoeven
Joris van der Hoeven, Gr\'egoire Lecerf
On the bit-complexity of sparse polynomial multiplication
null
null
null
null
cs.DS cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present fast algorithms for the product of two multivariate polynomials in sparse representation. The bit complexity of our algorithms are studied in detail for various types of coefficients, and we derive new complexity results for the power series multiplication in many variables. Our algorithms are implemented and freely available within the Mathemagix software. We show that their theoretical costs are well-reflected in practice.
[ { "version": "v1", "created": "Mon, 26 Jan 2009 21:48:35 GMT" } ]
2009-01-28T00:00:00
[ [ "van der Hoeven", "Joris", "" ], [ "Lecerf", "Grégoire", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0901.4375
Peter Bruza
P.D. Bruza, K. Kitto, D. Nelson, C. McEvoy
Extracting Spooky-activation-at-a-distance from Considerations of Entanglement
13 pages, 2 figures; To appear in Proceedings of the Third Quantum Interaction Symposium, Lecture Notes in Artificial Intelligence, vol 5494, Springer, 2009
null
null
null
physics.data-an cs.CL quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Following an early claim by Nelson & McEvoy \cite{Nelson:McEvoy:2007} suggesting that word associations can display `spooky action at a distance behaviour', a serious investigation of the potentially quantum nature of such associations is currently underway. This paper presents a simple quantum model of a word association system. It is shown that a quantum model of word entanglement can recover aspects of both the Spreading Activation equation and the Spooky-activation-at-a-distance equation, both of which are used to model the activation level of words in human memory.
[ { "version": "v1", "created": "Tue, 27 Jan 2009 23:59:59 GMT" } ]
2009-01-29T00:00:00
[ [ "Bruza", "P. D.", "" ], [ "Kitto", "K.", "" ], [ "Nelson", "D.", "" ], [ "McEvoy", "C.", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0901.4379
Bobak Nazer
Bobak Nazer, Michael Gastpar, Syed A. Jafar, and Sriram Vishwanath
Ergodic Interference Alignment
16 pages, 6 figure, To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a new communication strategy, ergodic interference alignment, for the K-user interference channel with time-varying fading. At any particular time, each receiver will see a superposition of the transmitted signals plus noise. The standard approach to such a scenario results in each transmitter-receiver pair achieving a rate proportional to 1/K its interference-free ergodic capacity. However, given two well-chosen time indices, the channel coefficients from interfering users can be made to exactly cancel. By adding up these two observations, each receiver can obtain its desired signal without any interference. If the channel gains have independent, uniform phases, this technique allows each user to achieve at least 1/2 its interference-free ergodic capacity at any signal-to-noise ratio. Prior interference alignment techniques were only able to attain this performance as the signal-to-noise ratio tended to infinity. Extensions are given for the case where each receiver wants a message from more than one transmitter as well as the "X channel" case (with two receivers) where each transmitter has an independent message for each receiver. Finally, it is shown how to generalize this strategy beyond Gaussian channel models. For a class of finite field interference channels, this approach yields the ergodic capacity region.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 00:29:28 GMT" }, { "version": "v2", "created": "Fri, 12 Aug 2011 03:34:27 GMT" }, { "version": "v3", "created": "Sat, 16 Jun 2012 16:30:55 GMT" } ]
2012-06-19T00:00:00
[ [ "Nazer", "Bobak", "" ], [ "Gastpar", "Michael", "" ], [ "Jafar", "Syed A.", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4400
J. Maurice Rojas
Frederic Bihan, J. Maurice Rojas, Casey Stella
Faster Real Feasibility via Circuit Discriminants
12 pages in double column ACM format. Submitted to a conference. Significantly improves and simplifies the algorithms and complexity lower bounds of arXiv:math/0411107 . Also presents a new complexity lower bound for A-discriminants. This version fixes many annoying typos
null
null
null
math.AG cs.CC math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that detecting real roots for honestly n-variate (n+2)-nomials (with integer exponents and coefficients) can be done in time polynomial in the sparse encoding for any fixed n. The best previous complexity bounds were exponential in the sparse encoding, even for n fixed. We then give a characterization of those functions k(n) such that the complexity of detecting real roots for n-variate (n+k(n))-nomials transitions from P to NP-hardness as n tends to infinity. Our proofs follow in large part from a new complexity threshold for deciding the vanishing of A-discriminants of n-variate (n+k(n))-nomials. Diophantine approximation, through linear forms in logarithms, also arises as a key tool.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 05:15:07 GMT" }, { "version": "v2", "created": "Thu, 29 Jan 2009 03:26:58 GMT" } ]
2013-09-09T00:00:00
[ [ "Bihan", "Frederic", "" ], [ "Rojas", "J. Maurice", "" ], [ "Stella", "Casey", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0901.4404
John Carminati
Peter Horan and John Carminati
Performance of Buchberger's Improved Algorithm using Prime Based Ordering
10 pages, 2 tables, 4 refs
null
null
null
cs.SE cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Prime-based ordering which is proved to be admissible, is the encoding of indeterminates in power-products with prime numbers and ordering them by using the natural number order. Using Eiffel, four versions of Buchberger's improved algorithm for obtaining Groebner Bases have been developed: two total degree versions, representing power products as strings and the other two as integers based on prime-based ordering. The versions are further distinguished by implementing coefficients as 64-bit integers and as multiple-precision integers. By using primebased power product coding, iterative or recursive operations on power products are replaced with integer operations. It is found that on a series of example polynomial sets, significant reductions in computation time of 30% or more are almost always obtained.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 05:47:24 GMT" } ]
2009-01-29T00:00:00
[ [ "Horan", "Peter", "" ], [ "Carminati", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0901.4417
Marcel Wild
Marcel Wild
ALLSAT compressed with wildcards: All, or all maximum independent sets
The best way to efficiently generate all maximum anticliques of a bipartite graph, a problem left open in v3, is settled in the present version v4
null
null
null
cs.DS cs.DM cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An odd cycle cover is a vertex set whose removal makes a graph bipartite. We show that if a $k$-element odd cycle cover of a graph with w vertices is known then all $N$ maximum anticliques (= independent sets) can be generated in time $O(2^k w^3 + N w^2))$. Generating ${\it all}\ N'$ anticliques (maximum or not) is easier and works for arbitrary graphs in time $O(N'w^2)$. In fact the use of wildcards allows to compactly generate the anticliques in clusters.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 09:09:36 GMT" }, { "version": "v2", "created": "Fri, 12 Feb 2010 16:08:40 GMT" }, { "version": "v3", "created": "Mon, 27 May 2019 15:24:08 GMT" }, { "version": "v4", "created": "Wed, 5 Jun 2019 13:15:22 GMT" } ]
2019-06-06T00:00:00
[ [ "Wild", "Marcel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0901.4420
Kamalesh Kumar Sharma
Kamalesh Kumar Sharma
Some Generalizations of the Capacity Theorem for AWGN Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The channel capacity theorem for additive white Gaussian noise channel (AWGN), widely known as the Shannon-Hartley Law, expresses the information capacity of a channel bandlimited in the conventional Fourier domain in terms of the signal-to-noise ratio in it. In this letter generalized versions of the Shannon-Hartley Law using the linear canonical transform (LCT) are presented. The channel capacity for AWGN channels is found to be a function of the LCT parameters.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 09:24:32 GMT" } ]
2009-01-29T00:00:00
[ [ "Sharma", "Kamalesh Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4430
Helle Hvid Hansen
Helle Hvid Hansen and Clemens Kupke and Eric Pacuit
Neighbourhood Structures: Bisimilarity and Basic Model Theory
uses LMCS.cls (included), 2 figures (both ps and pdf)
Logical Methods in Computer Science, Volume 5, Issue 2 (April 9, 2009) lmcs:1167
10.2168/LMCS-5(2:2)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neighbourhood structures are the standard semantic tool used to reason about non-normal modal logics. The logic of all neighbourhood models is called classical modal logic. In coalgebraic terms, a neighbourhood frame is a coalgebra for the contravariant powerset functor composed with itself, denoted by 2^2. We use this coalgebraic modelling to derive notions of equivalence between neighbourhood structures. 2^2-bisimilarity and behavioural equivalence are well known coalgebraic concepts, and they are distinct, since 2^2 does not preserve weak pullbacks. We introduce a third, intermediate notion whose witnessing relations we call precocongruences (based on pushouts). We give back-and-forth style characterisations for 2^2-bisimulations and precocongruences, we show that on a single coalgebra, precocongruences capture behavioural equivalence, and that between neighbourhood structures, precocongruences are a better approximation of behavioural equivalence than 2^2-bisimulations. We also introduce a notion of modal saturation for neighbourhood models, and investigate its relationship with definability and image-finiteness. We prove a Hennessy-Milner theorem for modally saturated and for image-finite neighbourhood models. Our main results are an analogue of Van Benthem's characterisation theorem and a model-theoretic proof of Craig interpolation for classical modal logic.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 10:29:44 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2009 15:52:29 GMT" }, { "version": "v3", "created": "Thu, 9 Apr 2009 00:16:59 GMT" }, { "version": "v4", "created": "Mon, 20 Apr 2009 12:09:16 GMT" } ]
2015-07-01T00:00:00
[ [ "Hansen", "Helle Hvid", "" ], [ "Kupke", "Clemens", "" ], [ "Pacuit", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.4466
Andrew Adamatzky
Andrew Adamatzky
Physarum boats: If plasmodium sailed it would never leave a port
null
Applied Bionics and Biomechanics, Volume 7, Issue 1 March 2010 , pages 31 - 39
10.1080/11762320902863890
null
cs.RO q-bio.CB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Plasmodium of \emph{Physarum polycephalum} is a single huge (visible by naked eye) cell with myriad of nuclei. The plasmodium is a promising substrate for non-classical, nature-inspired, computing devices. It is capable for approximation of shortest path, computation of planar proximity graphs and plane tessellations, primitive memory and decision-making. The unique properties of the plasmodium make it an ideal candidate for a role of amorphous biological robots with massive parallel information processing and distributed inputs and outputs. We show that when adhered to light-weight object resting on a water surface the plasmodium can propel the object by oscillating its protoplasmic pseudopodia. In experimental laboratory conditions and computational experiments we study phenomenology of the plasmodium-floater system, and possible mechanisms of controlling motion of objects propelled by on board plasmodium.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 14:12:32 GMT" } ]
2010-11-23T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Quantitative Biology", "code": "q-bio.CB", "description": "Cell-cell signaling and interaction; morphogenesis and development; apoptosis; bacterial conjugation; viral-host interaction; immunology", "span": "(Cell Behavior)" } ]
0901.4467
Alfredo Braunstein
Alfredo Braunstein, Farbod Kayhan, Riccardo Zecchina
Efficient LDPC Codes over GF(q) for Lossy Data Compression
5 pages, 3 figures
In: IEEE International Symposium on Information Theory, 2009. ISIT 2009. Seul, Korea; 2009
10.1109/ISIT.2009.5205707
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the lossy compression of a binary symmetric source. We present a scheme that provides a low complexity lossy compressor with near optimal empirical performance. The proposed scheme is based on b-reduced ultra-sparse LDPC codes over GF(q). Encoding is performed by the Reinforced Belief Propagation algorithm, a variant of Belief Propagation. The computational complexity at the encoder is O(<d>.n.q.log q), where <d> is the average degree of the check nodes. For our code ensemble, decoding can be performed iteratively following the inverse steps of the leaf removal algorithm. For a sparse parity-check matrix the number of needed operations is O(n).
[ { "version": "v1", "created": "Wed, 28 Jan 2009 14:13:24 GMT" }, { "version": "v2", "created": "Fri, 7 Oct 2011 10:04:16 GMT" } ]
2016-11-18T00:00:00
[ [ "Braunstein", "Alfredo", "" ], [ "Kayhan", "Farbod", "" ], [ "Zecchina", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4496
Nicolai Kuntze
Andreas Brett, Andreas Leicher
Ethemba Trusted Host EnvironmentMainly Based on Attestation
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ethemba provides a framework and demonstrator for TPM applications.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 07:58:19 GMT" } ]
2009-01-29T00:00:00
[ [ "Brett", "Andreas", "" ], [ "Leicher", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.4551
Terence H. Chan
Terence Chan, Ning Cai, Alex Grant
Robust Key Agreement Schemes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a key agreement problem in which two parties aim to agree on a key by exchanging messages in the presence of adversarial tampering. The aim of the adversary is to disrupt the key agreement process, but there are no secrecy constraints (i.e. we do not insist that the key is kept secret from the adversary). The main results of the paper are coding schemes and bounds on maximum key generation rates for this problem.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 00:31:06 GMT" } ]
2009-01-30T00:00:00
[ [ "Chan", "Terence", "" ], [ "Cai", "Ning", "" ], [ "Grant", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4571
Frank McCown
Frank McCown, Michael L. Nelson, Herbert Van de Sompel
Everyone is a Curator: Human-Assisted Preservation for ORE Aggregations
8 pages, 12 figures, accepted at DigCCurr 2009
null
null
null
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Open Archives Initiative (OAI) has recently created the Object Reuse and Exchange (ORE) project that defines Resource Maps (ReMs) for describing aggregations of web resources. These aggregations are susceptible to many of the same preservation challenges that face other web resources. In this paper, we investigate how the aggregations of web resources can be preserved outside of the typical repository environment and instead rely on the thousands of interactive users in the web community and the Web Infrastructure (the collection of web archives, search engines, and personal archiving services) to facilitate preservation. Inspired by Web 2.0 services such as digg, deli.cio.us, and Yahoo! Buzz, we have developed a lightweight system called ReMember that attempts to harness the collective abilities of the web community for preservation purposes instead of solely placing the burden of curatorial responsibilities on a small number of experts.
[ { "version": "v1", "created": "Wed, 28 Jan 2009 22:48:08 GMT" } ]
2009-01-30T00:00:00
[ [ "McCown", "Frank", "" ], [ "Nelson", "Michael L.", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0901.4591
Salah A. Aly
Salah A. Aly, Ahmed E. Kamal
Network Coding-Based Protection Strategy Against Node Failures
5 pages, 2 figures, accepted in ICC'09
null
null
null
cs.IT cs.CR cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The enormous increase in the usage of communication networks has made protection against node and link failures essential in the deployment of reliable networks. To prevent loss of data due to node failures, a network protection strategy is proposed that aims to withstand such failures. Particularly, a protection strategy against any single node failure is designed for a given network with a set of $n$ disjoint paths between senders and receivers. Network coding and reduced capacity are deployed in this strategy without adding extra working paths to the readily available connection paths. This strategy is based on protection against node failures as protection against multiple link failures. In addition, the encoding and decoding operational aspects of the premeditated protection strategy are demonstrated.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 17:34:56 GMT" } ]
2009-06-30T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Kamal", "Ahmed E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4612
Satyajit Thakor
Satyajit Thakor, Alex Grant and Terence Chan
Network Coding Capacity: A Functional Dependence Bound
5 pages, 2 figures, submitted to the International Symposium on Information Theory 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Explicit characterization and computation of the multi-source network coding capacity region (or even bounds) is long standing open problem. In fact, finding the capacity region requires determination of the set of all entropic vectors $\Gamma^{*}$, which is known to be an extremely hard problem. On the other hand, calculating the explicitly known linear programming bound is very hard in practice due to an exponential growth in complexity as a function of network size. We give a new, easily computable outer bound, based on characterization of all functional dependencies in networks. We also show that the proposed bound is tighter than some known bounds.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 06:47:22 GMT" } ]
2009-01-30T00:00:00
[ [ "Thakor", "Satyajit", "" ], [ "Grant", "Alex", "" ], [ "Chan", "Terence", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4642
Jayaraj Poroor
Jayaraj Poroor, Sriram Karunagaran, Sudharsan Sundararajan, Ranjith Pillai
Fast Dual-Radio Cross-Layer Handoffs in Multi-Hop Infrastructure-mode 802.11 Wireless Networks for In-Vehicle Multimedia Infotainment
Presented (oral) at IEEE Advanced Networking and Telecommunications, 2008 (ANTS 2008) Conference (http://www.antsconference.org) held at Indian Institute of Technology, Mumbai. Awarded Best Paper (Honorable Mention)
null
10.1109/ANTS.2008.4937782
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minimizing handoff latency and achieving near-zero packet loss is critical for delivering multimedia infotainment applications to fast-moving vehicles that are likely to encounter frequent handoffs. In this paper, we propose a dual-radio cross-layer handoff scheme for infrastructure-mode 802.11 Wireless Networks that achieve this goal. We present performance results of an implementation of our algorithm in a Linux-based On-Board-Unit prototype.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 10:47:33 GMT" } ]
2016-11-18T00:00:00
[ [ "Poroor", "Jayaraj", "" ], [ "Karunagaran", "Sriram", "" ], [ "Sundararajan", "Sudharsan", "" ], [ "Pillai", "Ranjith", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0901.4643
Ioan Valeriu Grossu
I. V. Grossu, C. Besliu, M.V.Rusu, Al. Jipa, C. C. Bordeianu, D. Felea, E. Stan, T. Esanu
Visual tool for estimating the fractal dimension of images
A new version was accepted to Computer Physics Communications doi:10.1016/j.cpc.2009.12.005
Computer Physics Communications 180 (2009) p.1999-2001; CPC, Volume 181, Issue 4, April 2010, Pages 831-832
10.1016/j.cpc.2009.05.015
null
physics.comp-ph cs.GR nlin.PS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents a new Visual Basic 6.0 application for estimating the fractal dimension of images, based on an optimized version of the box-counting algorithm. Following the attempt to separate the real information from noise, we considered also the family of all band-pass filters with the same band-width (specified as parameter). The fractal dimension can be thus represented as a function of the pixel color code. The program was used for the study of paintings cracks, as an additional tool which can help the critic to decide if an artistic work is original or not. In its second version, the application was extended for working also with csv files and three-dimensional images.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 14:41:45 GMT" }, { "version": "v2", "created": "Mon, 25 May 2009 17:46:23 GMT" }, { "version": "v3", "created": "Sun, 27 Dec 2009 08:40:14 GMT" } ]
2012-11-20T00:00:00
[ [ "Grossu", "I. V.", "" ], [ "Besliu", "C.", "" ], [ "Rusu", "M. V.", "" ], [ "Jipa", "Al.", "" ], [ "Bordeianu", "C. C.", "" ], [ "Felea", "D.", "" ], [ "Stan", "E.", "" ], [ "Esanu", "T.", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Physics", "code": "nlin.PS", "description": "Pattern formation, coherent structures, solitons", "span": "(Pattern Formation and Solitons)" } ]
0901.4646
Muhammad Mubashir Khan
Muhammad Mubashir Khan, Salahuddin Hyder, Mahmood K Pathan, Kashif H Sheikh
A Quantum Key Distribution Network Through Single Mode Optical Fiber
This paper has been submitted to the 2006 International Symposium on Collaborative Technologies and Systems (CTS 2006)May 14-17, 2006, Las Vegas, Nevada, USA
Khan, M.M., et al., A Quantum Key Distribution Network through Single Mode Optical Fiber. Proceedings of the International Symposium on Collaborative Technologies and Systems, 2006: p. 386-391
10.1109/CTS.2006.10
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum key distribution (QKD) has been developed within the last decade that is provably secure against arbitrary computing power, and even against quantum computer attacks. Now there is a strong need of research to exploit this technology in the existing communication networks. In this paper we have presented various experimental results pertaining to QKD like Raw key rate and Quantum bit error rate (QBER). We found these results over 25 km single mode optical fiber. The experimental setup implemented the enhanced version of BB84 QKD protocol. Based upon the results obtained, we have presented a network design which can be implemented for the realization of large scale QKD networks. Furthermore, several new ideas are presented and discussed to integrate the QKD technique in the classical communication networks.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 10:48:28 GMT" } ]
2009-01-30T00:00:00
[ [ "Khan", "Muhammad Mubashir", "" ], [ "Hyder", "Salahuddin", "" ], [ "Pathan", "Mahmood K", "" ], [ "Sheikh", "Kashif H", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.4648
Farzan Haddadi
Farzan Haddadi, Mohammad Mahdi Nayebi, Mohammad Reza Aref
On The Positive Definiteness of Polarity Coincidence Correlation Coefficient Matrix
IEEE Signal Processing Letters, Volume 15, pp. 73-76, 2008
null
10.1109/LSP.2007.911193
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polarity coincidence correlator (PCC), when used to estimate the covariance matrix on an element-by-element basis, may not yield a positive semi-definite (PSD) estimate. Devlin et al. [1], claimed that element-wise PCC is not guaranteed to be PSD in dimensions p>3 for real signals. However, no justification or proof was available on this issue. In this letter, it is proved that for real signals with p<=3 and for complex signals with p<=2, a PSD estimate is guaranteed. Counterexamples are presented for higher dimensions which yield invalid covariance estimates.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 11:11:57 GMT" } ]
2009-11-13T00:00:00
[ [ "Haddadi", "Farzan", "" ], [ "Nayebi", "Mohammad Mahdi", "" ], [ "Aref", "Mohammad Reza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4664
Inge Bethke
Jan A. Bergstra and I. Bethke
Square root meadows
9 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let Q_0 denote the rational numbers expanded to a meadow by totalizing inversion such that 0^{-1}=0. Q_0 can be expanded by a total sign function s that extracts the sign of a rational number. In this paper we discuss an extension Q_0(s ,\sqrt) of the signed rationals in which every number has a unique square root.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 12:42:46 GMT" } ]
2009-01-30T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Bethke", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.4694
Yeow Meng Chee
Yeow Meng Chee and Alan C. H. Ling
Limit on the Addressability of Fault-Tolerant Nanowire Decoders
9 pages, 4 figures
IEEE Transactions on Computers, vol. 58, no. 1, pp. 60-68, 2009
10.1109/TC.2008.130
null
cs.AR cs.DM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although prone to fabrication error, the nanowire crossbar is a promising candidate component for next generation nanometer-scale circuits. In the nanowire crossbar architecture, nanowires are addressed by controlling voltages on the mesowires. For area efficiency, we are interested in the maximum number of nanowires $N(m,e)$ that can be addressed by $m$ mesowires, in the face of up to $e$ fabrication errors. Asymptotically tight bounds on $N(m,e)$ are established in this paper. In particular, it is shown that $N(m,e) = \Theta(2^m / m^{e+1/2})$. Interesting observations are made on the equivalence between this problem and the problem of constructing optimal EC/AUED codes, superimposed distance codes, pooling designs, and diffbounded set systems. Results in this paper also improve upon those in the EC/AUEC codes literature.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 14:46:48 GMT" } ]
2009-01-30T00:00:00
[ [ "Chee", "Yeow Meng", "" ], [ "Ling", "Alan C. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4723
Yves Goussard
Paul-Andr\'e Barri\`ere, J\'er\^ome Idier, Yves Goussard, and Jean-Jacques Laurin
On Algorithms Based on Joint Estimation of Currents and Contrast in Microwave Tomography
12 pages, 12 figures, 5 tables
null
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with improvements to the contrast source inversion method which is widely used in microwave tomography. First, the method is reviewed and weaknesses of both the criterion form and the optimization strategy are underlined. Then, two new algorithms are proposed. Both of them are based on the same criterion, similar but more robust than the one used in contrast source inversion. The first technique keeps the main characteristics of the contrast source inversion optimization scheme but is based on a better exploitation of the conjugate gradient algorithm. The second technique is based on a preconditioned conjugate gradient algorithm and performs simultaneous updates of sets of unknowns that are normally processed sequentially. Both techniques are shown to be more efficient than original contrast source inversion.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 17:03:35 GMT" } ]
2009-01-30T00:00:00
[ [ "Barrière", "Paul-André", "" ], [ "Idier", "Jérôme", "" ], [ "Goussard", "Yves", "" ], [ "Laurin", "Jean-Jacques", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4727
Elchanan Mossel
Elchanan Mossel
Arrow's Impossibility Theorem Without Unanimity
Most of the new results in the Arxiv sumbission now appear in a follow up paper on quantitative Arrow's theorem
null
null
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arrow's Impossibility Theorem states that any constitution which satisfies Transitivity, Independence of Irrelevant Alternatives (IIA) and Unanimity is a dictatorship. Wilson derived properties of constitutions satisfying Transitivity and IIA for unrestricted domains where ties are allowed. In this paper we consider the case where only strict preferences are allowed. In this case we derive a new short proof of Arrow theorem and further obtain a new and complete characterization of all functions satisfying Transitivity and IIA.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 17:32:26 GMT" }, { "version": "v2", "created": "Fri, 6 Feb 2009 11:02:45 GMT" }, { "version": "v3", "created": "Mon, 9 Feb 2009 09:11:25 GMT" }, { "version": "v4", "created": "Fri, 19 Jun 2009 20:23:14 GMT" }, { "version": "v5", "created": "Mon, 5 Oct 2009 15:09:28 GMT" } ]
2009-10-05T00:00:00
[ [ "Mossel", "Elchanan", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0901.4728
Krishnendu Chatterjee
Dietmar Berwanger and Krishnendu Chatterjee and Martin De Wulf and Laurent Doyen and Thomas A. Henzinger
Alpaga: A Tool for Solving Parity Games with Imperfect Information
11 pages, a shorter version to appear in TACAS 2009
null
null
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alpaga is a solver for two-player parity games with imperfect information. Given the description of a game, it determines whether the first player can ensure to win and, if so, it constructs a winning strategy. The tool provides a symbolic implementation of a recent algorithm based on antichains.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 17:34:36 GMT" } ]
2009-01-30T00:00:00
[ [ "Berwanger", "Dietmar", "" ], [ "Chatterjee", "Krishnendu", "" ], [ "De Wulf", "Martin", "" ], [ "Doyen", "Laurent", "" ], [ "Henzinger", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.4747
Jean-Guillaume Dumas
Jean-Guillaume Dumas (LJK), Cl\'ement Pernet (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble), B. David Saunders (CIS)
On finding multiplicities of characteristic polynomial factors of black-box matrices
null
(International Symposium on Symbolic and Algebraic Computation 2009), S\'eoul : Cor\'ee, R\'epublique de (2009)
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present algorithms and heuristics to compute the characteristic polynomial of a matrix given its minimal polynomial. The matrix is represented as a black-box, i.e., by a function to compute its matrix-vector product. The methods apply to matrices either over the integers or over a large enough finite field. Experiments show that these methods perform efficiently in practice. Combined in an adaptive strategy, these algorithms reach significant speedups in practice for some integer matrices arising in an application from graph theory.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 18:51:24 GMT" }, { "version": "v2", "created": "Mon, 18 May 2009 15:06:48 GMT" } ]
2009-05-18T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Pernet", "Clément", "", "INRIA Rhône-Alpes /\n LIG Laboratoire d'Informatique de Grenoble" ], [ "Saunders", "B. David", "", "CIS" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0901.4754
Robert Frank Carslaw Walters
L. de Francesco Albasini, N. Sabadini, R.F.C. Walters
An algebra of automata which includes both classical and quantum entities
null
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algebra for composing automata which includes both classical and quantum entities and their communications. We illustrate by describing in detail a quantum protocol.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 19:28:13 GMT" } ]
2009-01-30T00:00:00
[ [ "Albasini", "L. de Francesco", "" ], [ "Sabadini", "N.", "" ], [ "Walters", "R. F. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0901.4761
Philippe Fournier-Viger
P. Fournier-Viger, R. Nkambou and E. Mephu Nguifo
A Knowledge Discovery Framework for Learning Task Models from User Interactions in Intelligent Tutoring Systems
Proceedings of the 7th Mexican International Conference on Artificial Intelligence (MICAI 2008), Springer, pp. 765-778
null
10.1007/978-3-540-88636-5
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Domain experts should provide relevant domain knowledge to an Intelligent Tutoring System (ITS) so that it can guide a learner during problemsolving learning activities. However, for many ill-defined domains, the domain knowledge is hard to define explicitly. In previous works, we showed how sequential pattern mining can be used to extract a partial problem space from logged user interactions, and how it can support tutoring services during problem-solving exercises. This article describes an extension of this approach to extract a problem space that is richer and more adapted for supporting tutoring services. We combined sequential pattern mining with (1) dimensional pattern mining (2) time intervals, (3) the automatic clustering of valued actions and (4) closed sequences mining. Some tutoring services have been implemented and an experiment has been conducted in a tutoring system.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 19:58:09 GMT" } ]
2009-01-30T00:00:00
[ [ "Fournier-Viger", "P.", "" ], [ "Nkambou", "R.", "" ], [ "Nguifo", "E. Mephu", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0901.4762
Adam Barker
Adam Barker
Optimizing Service Orchestrations
12 pages, 13 figures
null
null
null
cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the number of services and the size of data involved in workflows increases, centralised orchestration techniques are reaching the limits of scalability. In the classic orchestration model, all data passes through a centralised engine, which results in unnecessary data transfer, wasted bandwidth and the engine to become a bottleneck to the execution of a workflow. This paper presents and evaluates the Circulate architecture which maintains the robustness and simplicity of centralised orchestration, but facilitates choreography by allowing services to exchange data directly with one another. Circulate could be realised within any existing workflow framework, in this paper, we focus on WS-Circulate, a Web services based implementation. Taking inspiration from the Montage workflow, a number of common workflow patterns (sequence, fan-in and fan-out), input to output data size relationships and network configurations are identified and evaluated. The performance analysis concludes that a substantial reduction in communication overhead results in a 2-4 fold performance benefit across all patterns. An end-to-end pattern through the Montage workflow results in an 8 fold performance benefit and demonstrates how the advantage of using the Circulate architecture increases as the complexity of a workflow grows.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 20:30:35 GMT" } ]
2009-09-30T00:00:00
[ [ "Barker", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0901.4784
Fabio G. Guerrero Moreno
Fabio G. Guerrero
On the Entropy of Written Spanish
Submitted to the IEEE Transactions on Information Theory
Revista Colombiana de Estadistica (RCE), Vol. 35, No. 3, Dec. 2012, pp 423-440
null
null
cs.CL cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reports on results on the entropy of the Spanish language. They are based on an analysis of natural language for n-word symbols (n = 1 to 18), trigrams, digrams, and characters. The results obtained in this work are based on the analysis of twelve different literary works in Spanish, as well as a 279917 word news file provided by the Spanish press agency EFE. Entropy values are calculated by a direct method using computer processing and the probability law of large numbers. Three samples of artificial Spanish language produced by a first-order model software source are also analyzed and compared with natural Spanish language.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 03:46:01 GMT" } ]
2013-01-15T00:00:00
[ [ "Guerrero", "Fabio G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4798
Abhishek Parakh
Abhishek Parakh and Subhash Kak
Space Efficient Secret Sharing
5 pages; with corrections
4th Annual Computer Science Research Conference at the University of Oklahoma, April 18, 2009
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This note proposes a method of space efficient secret sharing in which k secrets are mapped into n shares (n>=k) of the same size. Since, n can be chosen to be equal to k, the method is space efficient. This method may be compared with conventional secret sharing schemes that divide a single secret into n shares.
[ { "version": "v1", "created": "Thu, 29 Jan 2009 22:38:54 GMT" }, { "version": "v2", "created": "Wed, 18 Feb 2009 16:19:45 GMT" } ]
2010-01-11T00:00:00
[ [ "Parakh", "Abhishek", "" ], [ "Kak", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.4814
Abhishek Parakh
Abhishek Parakh and Subhash Kak
Space Efficient Secret Sharing: A Recursive Approach
8 pages
null
null
Cryptology ePrint Archive: Report 2009/365
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a recursive secret sharing technique that distributes k-1 secrets of length b each into n shares such that each share is effectively of length (n/(k-1))*b and any k pieces suffice for reconstructing all the k-1 secrets. Since n/(k-1) is near the optimal factor of n/k, and can be chosen to be close to 1, the proposed technique is space efficient. Furthermore, each share is information theoretically secure, i.e. it does not depend on any unproven assumption of computational intractability. Such a recursive technique has potential applications in secure and reliable storage of information on the Web and in sensor networks.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 02:08:03 GMT" } ]
2010-01-11T00:00:00
[ [ "Parakh", "Abhishek", "" ], [ "Kak", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0901.4830
Lan Zhang
Lan Zhang, Rui Zhang, Ying-Chang Liang, Yan Xin, Shuguang Cui
On the Relationship Between the Multi-antenna Secrecy Communications and Cognitive Radio Communications
26 pages, 6 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the capacity of the multi-antenna or multiple-input multiple-output (MIMO) secrecy channels with multiple eavesdroppers having single/multiple antennas. It is known that the MIMO secrecy capacity is achievable with the optimal transmit covariance matrix that maximizes the minimum difference between the channel mutual information of the secrecy user and those of the eavesdroppers. The MIMO secrecy capacity computation can thus be formulated as a non-convex max-min problem, which cannot be solved efficiently by standard convex optimization techniques. To handle this difficulty, we explore a relationship between the MIMO secrecy channel and the recently developed MIMO cognitive radio (CR) channel, in which the multi-antenna secondary user transmits over the same spectrum simultaneously with multiple primary users, subject to the received interference power constraints at the primary users, or the so-called ``interference temperature (IT)'' constraints. By constructing an auxiliary CR MIMO channel that has the same channel responses as the MIMO secrecy channel, we prove that the optimal transmit covariance matrix to achieve the secrecy capacity is the same as that to achieve the CR spectrum sharing capacity with properly selected IT constraints. Based on this relationship, several algorithms are proposed to solve the non-convex secrecy capacity computation problem by transforming it into a sequence of CR spectrum sharing capacity computation problems that are convex. For the case with single-antenna eavesdroppers, the proposed algorithms obtain the exact capacity of the MIMO secrecy channel, while for the case with multi-antenna eavesdroppers, the proposed algorithms obtain both upper and lower bounds on the MIMO secrecy capacity.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 06:56:00 GMT" } ]
2009-02-02T00:00:00
[ [ "Zhang", "Lan", "" ], [ "Zhang", "Rui", "" ], [ "Liang", "Ying-Chang", "" ], [ "Xin", "Yan", "" ], [ "Cui", "Shuguang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4835
Yoo Chung
Yoo Chung, Dongman Lee
A Mathematical Basis for the Chaining of Lossy Interface Adapters
22 pages, 6 figures
IET Software, 4(1):54-54, February 2010
10.1049/iet-sen.2009.0019
null
cs.DM cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite providing similar functionality, multiple network services may require the use of different interfaces to access the functionality, and this problem will only get worse with the widespread deployment of ubiquitous computing environments. One way around this problem is to use interface adapters that adapt one interface into another. Chaining these adapters allows flexible interface adaptation with fewer adapters, but the loss incurred due to imperfect interface adaptation must be considered. This paper outlines a mathematical basis for analyzing the chaining of lossy interface adapters. We also show that the problem of finding an optimal interface adapter chain is NP-complete.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 08:17:43 GMT" }, { "version": "v2", "created": "Thu, 5 Feb 2009 14:46:00 GMT" }, { "version": "v3", "created": "Tue, 21 Jul 2009 03:23:34 GMT" }, { "version": "v4", "created": "Wed, 10 Feb 2010 01:24:15 GMT" } ]
2010-02-10T00:00:00
[ [ "Chung", "Yoo", "" ], [ "Lee", "Dongman", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0901.4846
Philippe Robert
Youssef Azzana (EI), Yousra Chabchoub (INRIA), Christine Fricker, Fabrice Guillemin (FT R&D), Philippe Robert
Adaptive algorithms for identifying large flows in IP traffic
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose in this paper an on-line algorithm based on Bloom filters for identifying large flows in IP traffic (a.k.a. elephants). Because of the large number of small flows, hash tables of these algorithms have to be regularly refreshed. Recognizing that the periodic erasure scheme usually used in the technical literature turns out to be quite inefficient when using real traffic traces over a long period of time, we introduce a simple adaptive scheme that closely follows the variations of traffic. When tested against real traffic traces, the proposed on-line algorithm performs well in the sense that the detection ratio of long flows by the algorithm over a long time period is quite high. Beyond the identification of elephants, this same class of algorithms is applied to the closely related problem of detection of anomalies in IP traffic, e.g., SYN flood due for instance to attacks. An algorithm for detecting SYN and volume flood anomalies in Internet traffic is designed. Experiments show that an anomaly is detected in less than one minute and the targeted destinations are identified at the same time.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 09:41:09 GMT" }, { "version": "v2", "created": "Sat, 20 Jun 2009 15:26:38 GMT" } ]
2009-06-22T00:00:00
[ [ "Azzana", "Youssef", "", "EI" ], [ "Chabchoub", "Yousra", "", "INRIA" ], [ "Fricker", "Christine", "", "FT R&D" ], [ "Guillemin", "Fabrice", "", "FT R&D" ], [ "Robert", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0901.4876
Robert Brijder
Hendrik Blockeel, Robert Brijder
Non-Confluent NLC Graph Grammar Inference by Compressing Disjoint Subgraphs
12 pages, 1 figure
null
null
null
cs.LG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grammar inference deals with determining (preferable simple) models/grammars consistent with a set of observations. There is a large body of research on grammar inference within the theory of formal languages. However, there is surprisingly little known on grammar inference for graph grammars. In this paper we take a further step in this direction and work within the framework of node label controlled (NLC) graph grammars. Specifically, we characterize, given a set of disjoint and isomorphic subgraphs of a graph $G$, whether or not there is a NLC graph grammar rule which can generate these subgraphs to obtain $G$. This generalizes previous results by assuming that the set of isomorphic subgraphs is disjoint instead of non-touching. This leads naturally to consider the more involved ``non-confluent'' graph grammar rules.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 12:44:29 GMT" } ]
2009-02-02T00:00:00
[ [ "Blockeel", "Hendrik", "" ], [ "Brijder", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0901.4898
Rui Costa
Joao Barros, Rui A. Costa, Daniele Munaretto, Joerg Widmer
Effective Delay Control in Online Network Coding
9 pages, IEEE Infocom 2009
null
10.1109/INFCOM.2009.5061923
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by streaming applications with stringent delay constraints, we consider the design of online network coding algorithms with timely delivery guarantees. Assuming that the sender is providing the same data to multiple receivers over independent packet erasure channels, we focus on the case of perfect feedback and heterogeneous erasure probabilities. Based on a general analytical framework for evaluating the decoding delay, we show that existing ARQ schemes fail to ensure that receivers with weak channels are able to recover from packet losses within reasonable time. To overcome this problem, we re-define the encoding rules in order to break the chains of linear combinations that cannot be decoded after one of the packets is lost. Our results show that sending uncoded packets at key times ensures that all the receivers are able to meet specific delay requirements with very high probability.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 15:00:36 GMT" } ]
2016-11-15T00:00:00
[ [ "Barros", "Joao", "" ], [ "Costa", "Rui A.", "" ], [ "Munaretto", "Daniele", "" ], [ "Widmer", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0901.4904
Arnab Kumar Ray
Rajiv Nair, G. Nagarjuna, Arnab K. Ray
Finite-size effects in the dependency networks of free and open-source software
ReVTeX, 9 pages, 7 figures. Major revisions in Sections III and IV of this version. The bibliography has been updated
Complex Systems, 23, 71, 2014
null
null
cs.OH physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a continuum model for the degree distribution of directed networks in free and open-source software. The degree distributions of links in both the in-directed and out-directed dependency networks follow Zipf's law for the intermediate nodes, but the heavily linked nodes and the poorly linked nodes deviate from this trend and exhibit finite-size effects. The finite-size parameters make a quantitative distinction between the in-directed and out-directed networks. For the out-degree distribution, the initial condition for a dynamic evolution corresponds to the limiting count of the most heavily liked nodes that the out-directed network can finally have. The number of nodes contributing out-directed links grows with every generation of software release, but this growth ultimately saturates towards a terminal value due to the finiteness of semantic possibilities in the network.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 15:17:20 GMT" }, { "version": "v2", "created": "Mon, 6 Jul 2009 20:03:42 GMT" }, { "version": "v3", "created": "Sat, 3 Jul 2010 05:08:25 GMT" }, { "version": "v4", "created": "Sun, 13 Apr 2014 06:21:32 GMT" } ]
2014-04-15T00:00:00
[ [ "Nair", "Rajiv", "" ], [ "Nagarjuna", "G.", "" ], [ "Ray", "Arnab K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0901.4934
Carl Hewitt
Carl Hewitt
A historical perspective on developing foundations iInfo(TM) information systems: iConsult(TM) and iEntertain(TM) apps using iDescribers(TM) information integration for iOrgs(TM) information systems
updated title and abstract
null
null
null
cs.DC cs.DB cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Technology now at hand can integrate all kinds of digital information for individuals, groups, and organizations so their information usefully links together. iInfo(TM) information integration works by making connections including examples like the following: - A statistical connection between "being in a traffic jam" and "driving in downtown Trenton between 5PM and 6PM on a weekday." - A terminological connection between "MSR" and "Microsoft Research." - A causal connection between "joining a group" and "being a member of the group." - A syntactic connection between "a pin dropped" and "a dropped pin." - A biological connection between "a dolphin" and "a mammal". - A demographic connection between "undocumented residents of California" and "7% of the population of California." - A geographical connection between "Leeds" and "England." - A temporal connection between "turning on a computer" and "joining an on-line discussion." By making these connections, iInfo offers tremendous value for individuals, families, groups, and organizations in making more effective use of information technology. In practice, integrated information is invariably pervasively inconsistent. Therefore iInfo must be able to make connections even in the face of inconsistency. The business of iInfo is not to make difficult decisions like deciding the ultimate truth or probability of propositions. Instead it provides means for processing information and carefully recording its provenance including arguments (including arguments about arguments) for and against propositions that is used by iConsult(TM) and iEntertain(TM) apps in iOrgs(TM) Information Systems. A historical perspective on the above questions is highly pertinent to the current quest to develop foundations for privacy-friendly client-cloud computing.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 17:33:14 GMT" }, { "version": "v10", "created": "Tue, 17 Nov 2009 12:54:00 GMT" }, { "version": "v11", "created": "Tue, 24 Nov 2009 15:36:18 GMT" }, { "version": "v12", "created": "Tue, 29 Dec 2009 22:54:57 GMT" }, { "version": "v13", "created": "Thu, 7 Jan 2010 20:11:54 GMT" }, { "version": "v14", "created": "Tue, 12 Jan 2010 19:19:22 GMT" }, { "version": "v15", "created": "Thu, 21 Jan 2010 21:50:00 GMT" }, { "version": "v16", "created": "Thu, 8 Apr 2010 21:48:15 GMT" }, { "version": "v17", "created": "Mon, 19 Apr 2010 04:13:36 GMT" }, { "version": "v18", "created": "Tue, 20 Apr 2010 12:27:24 GMT" }, { "version": "v19", "created": "Mon, 26 Apr 2010 15:18:50 GMT" }, { "version": "v2", "created": "Tue, 24 Feb 2009 01:37:44 GMT" }, { "version": "v20", "created": "Mon, 4 Oct 2010 21:16:49 GMT" }, { "version": "v3", "created": "Tue, 14 Apr 2009 11:54:47 GMT" }, { "version": "v4", "created": "Mon, 1 Jun 2009 23:05:51 GMT" }, { "version": "v5", "created": "Mon, 20 Jul 2009 00:53:03 GMT" }, { "version": "v6", "created": "Sun, 2 Aug 2009 21:06:55 GMT" }, { "version": "v7", "created": "Tue, 29 Sep 2009 18:19:02 GMT" }, { "version": "v8", "created": "Fri, 2 Oct 2009 14:42:21 GMT" }, { "version": "v9", "created": "Thu, 29 Oct 2009 21:14:14 GMT" } ]
2010-10-06T00:00:00
[ [ "Hewitt", "Carl", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0901.4953
Marcelo Hashimoto
Marcelo Hashimoto and Roberto M. Cesar Jr
A Keygraph Classification Framework for Real-Time Object Detection
9 pages, 23 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new approach for keypoint-based object detection. Traditional keypoint-based methods consist in classifying individual points and using pose estimation to discard misclassifications. Since a single point carries no relational features, such methods inherently restrict the usage of structural information to the pose estimation phase. Therefore, the classifier considers purely appearance-based feature vectors, thus requiring computationally expensive feature extraction or complex probabilistic modelling to achieve satisfactory robustness. In contrast, our approach consists in classifying graphs of keypoints, which incorporates structural information during the classification phase and allows the extraction of simpler feature vectors that are naturally robust. In the present work, 3-vertices graphs have been considered, though the methodology is general and larger order graphs may be adopted. Successful experimental results obtained for real-time object detection in video sequences are reported.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 19:38:44 GMT" } ]
2009-02-02T00:00:00
[ [ "Hashimoto", "Marcelo", "" ], [ "Cesar", "Roberto M.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0901.4963
Usef Faghihi
Usef Faghihi, Philippe Fournier-Viger, Roger Nkambou, Pierre Poirier, Andre Mayers
How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose the CTS (Concious Tutoring System) technology, a biologically plausible cognitive agent based on human brain functions.This agent is capable of learning and remembering events and any related information such as corresponding procedures, stimuli and their emotional valences. Our proposed episodic memory and episodic learning mechanism are closer to the current multiple-trace theory in neuroscience, because they are inspired by it [5] contrary to other mechanisms that are incorporated in cognitive agents. This is because in our model emotions play a role in the encoding and remembering of events. This allows the agent to improve its behavior by remembering previously selected behaviors which are influenced by its emotional mechanism. Moreover, the architecture incorporates a realistic memory consolidation process based on a data mining algorithm.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 19:36:18 GMT" } ]
2009-02-02T00:00:00
[ [ "Faghihi", "Usef", "" ], [ "Fournier-Viger", "Philippe", "" ], [ "Nkambou", "Roger", "" ], [ "Poirier", "Pierre", "" ], [ "Mayers", "Andre", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0902.0019
Dirk Beyer
Dirk Beyer, M. Erkan Keremoglu
CPAchecker: A Tool for Configurable Software Verification
8 pages (6 without cover), 2 figures, 2 tables, tool paper, Web page: http://www.cs.sfu.ca/~dbeyer/CPAchecker
null
null
SFU-CS-2009-02
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Configurable software verification is a recent concept for expressing different program analysis and model checking approaches in one single formalism. This paper presents CPAchecker, a tool and framework that aims at easy integration of new verification components. Every abstract domain, together with the corresponding operations, is required to implement the interface of configurable program analysis (CPA). The main algorithm is configurable to perform a reachability analysis on arbitrary combinations of existing CPAs. The major design goal during the development was to provide a framework for developers that is flexible and easy to extend. We hope that researchers find it convenient and productive to implement new verification ideas and algorithms using this platform and that it advances the field by making it easier to perform practical experiments. The tool is implemented in Java and runs as command-line tool or as Eclipse plug-in. We evaluate the efficiency of our tool on benchmarks from the software model checker BLAST. The first released version of CPAchecker implements CPAs for predicate abstraction, octagon, and explicit-value domains. Binaries and the source code of CPAchecker are publicly available as free software.
[ { "version": "v1", "created": "Fri, 30 Jan 2009 22:19:52 GMT" } ]
2009-02-03T00:00:00
[ [ "Beyer", "Dirk", "" ], [ "Keremoglu", "M. Erkan", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0902.0026
Marco Duarte
Joel A. Tropp, Jason N. Laska, Marco F. Duarte, Justin K. Romberg, Richard G. Baraniuk
Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals
24 pages, 8 figures
IEEE Trans. Inform. Theory, Vol.56, num. 1, pp. 520-544, Jan. 2010
10.1109/TIT.2009.2034811
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wideband analog signals push contemporary analog-to-digital conversion systems to their performance limits. In many applications, however, sampling at the Nyquist rate is inefficient because the signals of interest contain only a small number of significant frequencies relative to the bandlimit, although the locations of the frequencies may not be known a priori. For this type of sparse signal, other sampling strategies are possible. This paper describes a new type of data acquisition system, called a random demodulator, that is constructed from robust, readily available components. Let K denote the total number of frequencies in the signal, and let W denote its bandlimit in Hz. Simulations suggest that the random demodulator requires just O(K log(W/K)) samples per second to stably reconstruct the signal. This sampling rate is exponentially lower than the Nyquist rate of W Hz. In contrast with Nyquist sampling, one must use nonlinear methods, such as convex programming, to recover the signal from the samples taken by the random demodulator. This paper provides a detailed theoretical analysis of the system's performance that supports the empirical observations.
[ { "version": "v1", "created": "Sat, 31 Jan 2009 05:00:26 GMT" }, { "version": "v2", "created": "Tue, 22 Sep 2009 00:52:55 GMT" } ]
2016-11-15T00:00:00
[ [ "Tropp", "Joel A.", "" ], [ "Laska", "Jason N.", "" ], [ "Duarte", "Marco F.", "" ], [ "Romberg", "Justin K.", "" ], [ "Baraniuk", "Richard G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0043
Christoph Benzmueller
Christoph Benzmueller, Chad E. Brown, Michael Kohlhase
Cut-Simulation and Impredicativity
21 pages
Logical Methods in Computer Science, Volume 5, Issue 1 (March 3, 2009) lmcs:1144
10.2168/LMCS-5(1:6)2009
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate cut-elimination and cut-simulation in impredicative (higher-order) logics. We illustrate that adding simple axioms such as Leibniz equations to a calculus for an impredicative logic -- in our case a sequent calculus for classical type theory -- is like adding cut. The phenomenon equally applies to prominent axioms like Boolean- and functional extensionality, induction, choice, and description. This calls for the development of calculi where these principles are built-in instead of being treated axiomatically.
[ { "version": "v1", "created": "Sat, 31 Jan 2009 03:24:08 GMT" }, { "version": "v2", "created": "Mon, 2 Mar 2009 23:37:34 GMT" } ]
2019-03-14T00:00:00
[ [ "Benzmueller", "Christoph", "" ], [ "Brown", "Chad E.", "" ], [ "Kohlhase", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0902.0047
Kazuyuki Amano
Kazuyuki Amano
Bounds on the Size of Small Depth Circuits for Approximating Majority
12 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we show that for every constant $0 < \epsilon < 1/2$ and for every constant $d \geq 2$, the minimum size of a depth $d$ Boolean circuit that $\epsilon$-approximates Majority function on $n$ variables is exp$(\Theta(n^{1/(2d-2)}))$. The lower bound for every $d \geq 2$ and the upper bound for $d=2$ have been previously shown by O'Donnell and Wimmer [ICALP'07], and the contribution of this paper is to give a matching upper bound for $d \geq 3$.
[ { "version": "v1", "created": "Sat, 31 Jan 2009 04:22:52 GMT" } ]
2009-02-03T00:00:00
[ [ "Amano", "Kazuyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0902.0056
Babatunde Okunoye
O. Babatunde Okunoye
An Alternative Cracking of The Genetic Code
31 pages, 23 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We Propose 22 unique Solutions to the Genetic Code. An Alternative Cracking, from the Perspective of a Mathematician.
[ { "version": "v1", "created": "Sat, 31 Jan 2009 10:40:06 GMT" } ]
2009-02-03T00:00:00
[ [ "Okunoye", "O. Babatunde", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0902.0058
Robert Rolland
Robert Rolland
The second weight of generalized Reed-Muller codes in most cases
This version corrects minor misprints and gives a more detailed proof of a combinatorial lemma
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The second weight of the Generalized Reed-Muller code of order $d$ over the finite field with $q$ elements is now known for $d <q$ and $d>(n-1)(q-1)$. In this paper, we determine the second weight for the other values of $d$ which are not multiple of $q-1$ plus 1. For the special case $d=a(q-1)+1$ we give an estimate.
[ { "version": "v1", "created": "Sun, 1 Feb 2009 23:22:23 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 04:18:17 GMT" } ]
2009-06-30T00:00:00
[ [ "Rolland", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0084
Miled Abdelwaheb
Abdelwaheb Miled
On a problem of Frobenius in three numbers
5 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For three positive integers ai, aj, ak pairwise coprime, we present an algorithm that find the least multiple of ai that is a positive linear combination of aj, ak. The average running time of this algorithm is O(1). Using this algorithm and the chinese remainder theorem leads to a direct computation of the Frobenius number f(a1, a2, a3).
[ { "version": "v1", "created": "Mon, 2 Feb 2009 14:13:52 GMT" }, { "version": "v2", "created": "Mon, 25 May 2009 17:37:11 GMT" } ]
2009-05-25T00:00:00
[ [ "Miled", "Abdelwaheb", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0902.0101
Michael Ummels
Michael Ummels and Dominik Wojtczak
The Complexity of Nash Equilibria in Simple Stochastic Multiplayer Games
23 pages; revised version
null
10.1007/978-3-642-02930-1_25
EDI-INF-RR-1323
cs.GT cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyse the computational complexity of finding Nash equilibria in simple stochastic multiplayer games. We show that restricting the search space to equilibria whose payoffs fall into a certain interval may lead to undecidability. In particular, we prove that the following problem is undecidable: Given a game G, does there exist a pure-strategy Nash equilibrium of G where player 0 wins with probability 1. Moreover, this problem remains undecidable if it is restricted to strategies with (unbounded) finite memory. However, if mixed strategies are allowed, decidability remains an open problem. One way to obtain a provably decidable variant of the problem is restricting the strategies to be positional or stationary. For the complexity of these two problems, we obtain a common lower bound of NP and upper bounds of NP and PSPACE respectively.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 16:09:28 GMT" }, { "version": "v2", "created": "Fri, 10 Apr 2009 19:54:43 GMT" }, { "version": "v3", "created": "Fri, 10 Apr 2009 20:12:06 GMT" } ]
2010-06-24T00:00:00
[ [ "Ummels", "Michael", "" ], [ "Wojtczak", "Dominik", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0902.0133
Travis Gagie
Travis Gagie
New Algorithms and Lower Bounds for Sequential-Access Data Compression
draft of PhD thesis
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This thesis concerns sequential-access data compression, i.e., by algorithms that read the input one or more times from beginning to end. In one chapter we consider adaptive prefix coding, for which we must read the input character by character, outputting each character's self-delimiting codeword before reading the next one. We show how to encode and decode each character in constant worst-case time while producing an encoding whose length is worst-case optimal. In another chapter we consider one-pass compression with memory bounded in terms of the alphabet size and context length, and prove a nearly tight tradeoff between the amount of memory we can use and the quality of the compression we can achieve. In a third chapter we consider compression in the read/write streams model, which allows us passes and memory both polylogarithmic in the size of the input. We first show how to achieve universal compression using only one pass over one stream. We then show that one stream is not sufficient for achieving good grammar-based compression. Finally, we show that two streams are necessary and sufficient for achieving entropy-only bounds.
[ { "version": "v1", "created": "Sun, 1 Feb 2009 16:03:08 GMT" } ]
2009-02-03T00:00:00
[ [ "Gagie", "Travis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0140
Kook Jin Ahn
Kook Jin Ahn, Sudipto Guha
Graph Sparsification in the Semi-streaming Model
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analyzing massive data sets has been one of the key motivations for studying streaming algorithms. In recent years, there has been significant progress in analysing distributions in a streaming setting, but the progress on graph problems has been limited. A main reason for this has been the existence of linear space lower bounds for even simple problems such as determining the connectedness of a graph. However, in many new scenarios that arise from social and other interaction networks, the number of vertices is significantly less than the number of edges. This has led to the formulation of the semi-streaming model where we assume that the space is (near) linear in the number of vertices (but not necessarily the edges), and the edges appear in an arbitrary (and possibly adversarial) order. In this paper we focus on graph sparsification, which is one of the major building blocks in a variety of graph algorithms. There has been a long history of (non-streaming) sampling algorithms that provide sparse graph approximations and it a natural question to ask if the sparsification can be achieved using a small space, and in addition using a single pass over the data? The question is interesting from the standpoint of both theory and practice and we answer the question in the affirmative, by providing a one pass $\tilde{O}(n/\epsilon^{2})$ space algorithm that produces a sparsification that approximates each cut to a $(1+\epsilon)$ factor. We also show that $\Omega(n \log \frac1\epsilon)$ space is necessary for a one pass streaming algorithm to approximate the min-cut, improving upon the $\Omega(n)$ lower bound that arises from lower bounds for testing connectivity.
[ { "version": "v1", "created": "Sun, 1 Feb 2009 16:50:53 GMT" }, { "version": "v2", "created": "Tue, 5 May 2009 20:44:32 GMT" } ]
2009-05-05T00:00:00
[ [ "Ahn", "Kook Jin", "" ], [ "Guha", "Sudipto", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0902.0189
Zouheir Rezki Dr.
Zouheir Rezki, Francois Gagnon, Vijay Bhargava
The Ergodic Capacity of The MIMO Wire-Tap Channel
24 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn to provide a more rigorous proof of the converse of Theorem 1 and Lemma 1 as well.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 03:23:16 GMT" }, { "version": "v2", "created": "Tue, 21 Jul 2009 00:38:20 GMT" } ]
2009-09-30T00:00:00
[ [ "Rezki", "Zouheir", "" ], [ "Gagnon", "Francois", "" ], [ "Bhargava", "Vijay", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0221
Alireza Avanaki
Alireza Avanaki
Over-enhancement Reduction in Local Histogram Equalization using its Degrees of Freedom
null
null
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A well-known issue of local (adaptive) histogram equalization (LHE) is over-enhancement (i.e., generation of spurious details) in homogenous areas of the image. In this paper, we show that the LHE problem has many solutions due to the ambiguity in ranking pixels with the same intensity. The LHE solution space can be searched for the images having the maximum PSNR or structural similarity (SSIM) with the input image. As compared to the results of the prior art, these solutions are more similar to the input image while offering the same local contrast. Index Terms: histogram modification or specification, contrast enhancement
[ { "version": "v1", "created": "Mon, 2 Feb 2009 10:41:53 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2009 10:14:32 GMT" } ]
2009-09-14T00:00:00
[ [ "Avanaki", "Alireza", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0902.0239
Andrzej Woszczyna
Wojciech Czaja, Zdzislaw A. Golda, Andrzej Woszczyna
The acoustic wave equation in the expanding universe. Sachs-Wolfe theorem
5 pages LaTeX, Some minor changes introduced
null
null
null
cs.SC gr-qc physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the acoustic field propagating in the early hot ($p=\epsilon/$) universe of arbitrary space curvature ($K=0, \pm 1$) is considered. The field equations are reduced to the d'Alembert equation in an auxiliary static Roberson-Walker space-time. Symbolic computation in {\em Mathematica} is applied.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 10:36:47 GMT" }, { "version": "v2", "created": "Fri, 3 Apr 2009 11:32:15 GMT" }, { "version": "v3", "created": "Tue, 14 Apr 2009 10:11:20 GMT" } ]
2009-04-14T00:00:00
[ [ "Czaja", "Wojciech", "" ], [ "Golda", "Zdzislaw A.", "" ], [ "Woszczyna", "Andrzej", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" } ]
0902.0241
Baris Baykant Alagoz
B. Baykant Alagoz
Hierarchical Triple-Modular Redundancy (H-TMR) Network For Digital Systems
Proposition section was added
OncuBilim Algorithm And Systems Labs. Vol.08, Art.No:05,(2008)
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hierarchical application of Triple-Modular Redundancy (TMR) increases fault tolerance of digital Integrated Circuit (IC). In this paper, a simple probabilistic model was proposed for analysis of fault masking performance of hierarchical TMR networks. Performance improvements obtained by second order TMR network were theoretically compared with first order TMR network.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 10:38:54 GMT" }, { "version": "v2", "created": "Tue, 3 Feb 2009 11:19:04 GMT" } ]
2009-02-03T00:00:00
[ [ "Alagoz", "B. Baykant", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0902.0261
Tomoyuki Yamakami
Tomoyuki Yamakami
Immunity and Pseudorandomness of Context-Free Languages
A4, 23 pages, 10 pt. A complete revision of the initial version that was posted in February 2009
Theoretical Computer Science, vol. 412, pp.6432-6450, 2011
10.1016/j.tcs.2011.07.013
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the computational complexity of context-free languages, concentrating on two well-known structural properties---immunity and pseudorandomness. An infinite language is REG-immune (resp., CFL-immune) if it contains no infinite subset that is a regular (resp., context-free) language. We prove that (i) there is a context-free REG-immune language outside REG/n and (ii) there is a REG-bi-immune language that can be computed deterministically using logarithmic space. We also show that (iii) there is a CFL-simple set, where a CFL-simple language is an infinite context-free language whose complement is CFL-immune. Similar to the REG-immunity, a REG-primeimmune language has no polynomially dense subsets that are also regular. We further prove that (iv) there is a context-free language that is REG/n-bi-primeimmune. Concerning pseudorandomness of context-free languages, we show that (v) CFL contains REG/n-pseudorandom languages. Finally, we prove that (vi) against REG/n, there exists an almost 1-1 pseudorandom generator computable in nondeterministic pushdown automata equipped with a write-only output tape and (vii) against REG, there is no almost 1-1 weakly pseudorandom generator computable deterministically in linear time by a single-tape Turing machine.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 12:21:23 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2011 13:18:33 GMT" } ]
2011-09-20T00:00:00
[ [ "Yamakami", "Tomoyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0902.0271
Jarek Duda
Jarek Duda
Asymmetric numeral systems
47 pages, 6 figures
null
null
null
cs.IT cs.CR math.GM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper will be presented new approach to entropy coding: family of generalizations of standard numeral systems which are optimal for encoding sequence of equiprobable symbols, into asymmetric numeral systems - optimal for freely chosen probability distributions of symbols. It has some similarities to Range Coding but instead of encoding symbol in choosing a range, we spread these ranges uniformly over the whole interval. This leads to simpler encoder - instead of using two states to define range, we need only one. This approach is very universal - we can obtain from extremely precise encoding (ABS) to extremely fast with possibility to additionally encrypt the data (ANS). This encryption uses the key to initialize random number generator, which is used to calculate the coding tables. Such preinitialized encryption has additional advantage: is resistant to brute force attack - to check a key we have to make whole initialization. There will be also presented application for new approach to error correction: after an error in each step we have chosen probability to observe that something was wrong. There will be also presented application for new approach to error correction: after an error in each step we have chosen probability to observe that something was wrong. We can get near Shannon's limit for any noise level this way with expected linear time of correction.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 16:07:06 GMT" }, { "version": "v2", "created": "Wed, 25 Feb 2009 18:18:17 GMT" }, { "version": "v3", "created": "Wed, 11 Mar 2009 14:09:40 GMT" }, { "version": "v4", "created": "Fri, 3 Apr 2009 19:59:53 GMT" }, { "version": "v5", "created": "Thu, 21 May 2009 20:18:13 GMT" } ]
2009-05-21T00:00:00
[ [ "Duda", "Jarek", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0320
Michael Chertkov
Vladimir Y. Chernyak (Wayne State) and Michael Chertkov (LANL)
Planar Graphical Models which are Easy
27 pages, 11 figures; misprints corrected
null
10.1088/1742-5468/2010/11/P11007
LA-UR 09-00533
cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.IT math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a rich family of binary variables statistical mechanics models on a given planar graph which are equivalent to Gaussian Grassmann Graphical models (free fermions) defined on the same graph. Calculation of the partition function (weighted counting) for such a model is easy (of polynomial complexity) as reducible to evaluation of a Pfaffian of a matrix of size equal to twice the number of edges in the graph. In particular, this approach touches upon Holographic Algorithms of Valiant and utilizes the Gauge Transformations discussed in our previous works.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 17:23:26 GMT" }, { "version": "v2", "created": "Tue, 29 Dec 2009 23:41:30 GMT" }, { "version": "v3", "created": "Fri, 12 Feb 2010 03:26:46 GMT" }, { "version": "v4", "created": "Fri, 2 Jul 2010 17:08:59 GMT" }, { "version": "v5", "created": "Wed, 29 Sep 2010 16:17:45 GMT" } ]
2015-05-13T00:00:00
[ [ "Chernyak", "Vladimir Y.", "", "Wayne State" ], [ "Chertkov", "Michael", "", "LANL" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0902.0322
Gregoire Jacob M.
Gregoire Jacob, Herve Debar and Eric Filiol
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most behavioral detectors of malware remain specific to a given language and platform, mostly PE executables for Windows. The objective of this paper is to define a generic approach for behavioral detection based on two layers respectively responsible for abstraction and detection. The first abstraction layer remains specific to a platform and a language. This first layer interprets the collected instructions, API calls and arguments and classifies these operations as well as the involved objects according to their purpose in the malware lifecycle. The second detection layer remains generic and is totally interoperable between the different abstraction components. This layer relies on parallel automata parsing attribute-grammars where semantic rules are used for object typing (object classification) and object binding (data-flow). To feed detection and to experiment with our approach we have developed two different abstraction components: one processing system call traces from native code and one processing the VBScript interpreted language. The different experimentations have provided promising detection rates, in particular for script files (89%), with almost none false positives. In the case of process traces, the detection rate remains significant (51%) but could be increased by more sophisticated collection tools.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 17:36:48 GMT" } ]
2009-02-03T00:00:00
[ [ "Jacob", "Gregoire", "" ], [ "Debar", "Herve", "" ], [ "Filiol", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0902.0337
Kaibin Huang
Kaibin Huang and Vincent K. N. Lau
Stability and Delay of Zero-Forcing SDMA with Limited Feedback
26 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the stability and queueing delay of Space Division Multiple Access (SDMA) systems with bursty traffic, where zero-forcing beamforming enables simultaneous transmission to multiple mobiles. Computing beamforming vectors relies on quantized channel state information (CSI) feedback (limited feedback) from mobiles. Define the stability region for SDMA as the set of multiuser packet-arrival rates for which the steady-state queue lengths are finite. Given perfect CSI feedback and equal power allocation over scheduled queues, the stability region is proved to be a convex polytope having the derived vertices. For any set of arrival rates in the stability region, multiuser queues are shown to be stabilized by a joint queue-and-beamforming control policy that maximizes the departure-rate-weighted sum of queue lengths. The stability region for limited feedback is found to be the perfect-CSI region multiplied by one minus a small factor. The required number of feedback bits per mobile is proved to scale logarithmically with the inverse of the above factor as well as linearly with the number of transmit antennas minus one. The effects of limited feedback on queueing delay are also quantified. For Poisson arrival processes, CSI quantization errors are shown to multiply average queueing delay by a factor larger than one. This factor can be controlled by adjusting the number of feedback bits per mobile following the derived relationship. For general arrival processes, CSI errors are found to increase Kingman's bound on the tail probability of the instantaneous delay by one plus a small factor. The required number of feedback bits per mobile is shown to scale logarithmically with this factor.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 19:05:59 GMT" } ]
2009-02-03T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Lau", "Vincent K. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0353
Vahab Mirrokni
Jon Lee, Vahab Mirrokni, Viswanath Nagarjan, Maxim Sviridenko
Non-monotone submodular maximization under matroid and knapsack constraints
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Submodular function maximization is a central problem in combinatorial optimization, generalizing many important problems including Max Cut in directed/undirected graphs and in hypergraphs, certain constraint satisfaction problems, maximum entropy sampling, and maximum facility location problems. Unlike submodular minimization, submodular maximization is NP-hard. For the problem of maximizing a non-monotone submodular function, Feige, Mirrokni, and Vondr\'ak recently developed a $2\over 5$-approximation algorithm \cite{FMV07}, however, their algorithms do not handle side constraints.} In this paper, we give the first constant-factor approximation algorithm for maximizing any non-negative submodular function subject to multiple matroid or knapsack constraints. We emphasize that our results are for {\em non-monotone} submodular functions. In particular, for any constant $k$, we present a $({1\over k+2+{1\over k}+\epsilon})$-approximation for the submodular maximization problem under $k$ matroid constraints, and a $({1\over 5}-\epsilon)$-approximation algorithm for this problem subject to $k$ knapsack constraints ($\epsilon>0$ is any constant). We improve the approximation guarantee of our algorithm to ${1\over k+1+{1\over k-1}+\epsilon}$ for $k\ge 2$ partition matroid constraints. This idea also gives a $({1\over k+\epsilon})$-approximation for maximizing a {\em monotone} submodular function subject to $k\ge 2$ partition matroids, which improves over the previously best known guarantee of $\frac{1}{k+1}$.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 20:36:59 GMT" } ]
2009-02-03T00:00:00
[ [ "Lee", "Jon", "" ], [ "Mirrokni", "Vahab", "" ], [ "Nagarjan", "Viswanath", "" ], [ "Sviridenko", "Maxim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0902.0354
Sergey Loyka
Victoria Kostina, Sergey Loyka
Optimum Power and Rate Allocation for Coded V-BLAST
accepted by ICC-09
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An analytical framework for minimizing the outage probability of a coded spatial multiplexing system while keeping the rate close to the capacity is developed. Based on this framework, specific strategies of optimum power and rate allocation for the coded V-BLAST architecture are obtained and its performance is analyzed. A fractional waterfilling algorithm, which is shown to optimize both the capacity and the outage probability of the coded V-BLAST, is proposed. Compact, closed-form expressions for the optimum allocation of the average power are given. The uniform allocation of average power is shown to be near optimum at moderate to high SNR for the coded V-BLAST with the average rate allocation (when per-stream rates are set to match the per-stream capacity). The results reported also apply to multiuser detection and channel equalization relying on successive interference cancelation.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 20:49:25 GMT" } ]
2009-02-03T00:00:00
[ [ "Kostina", "Victoria", "" ], [ "Loyka", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0382
Vahab Mirrokni
Vahab Mirrokni and Alexander Skopalik
On the complexity of Nash dynamics and Sink Equilibria
null
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Studying Nash dynamics is an important approach for analyzing the outcome of games with repeated selfish behavior of self-interested agents. Sink equilibria has been introduced by Goemans, Mirrokni, and Vetta for studying social cost on Nash dynamics over pure strategies in games. However, they do not address the complexity of sink equilibria in these games. Recently, Fabrikant and Papadimitriou initiated the study of the complexity of Nash dynamics in two classes of games. In order to completely understand the complexity of Nash dynamics in a variety of games, we study the following three questions for various games: (i) given a state in game, can we verify if this state is in a sink equilibrium or not? (ii) given an instance of a game, can we verify if there exists any sink equilibrium other than pure Nash equilibria? and (iii) given an instance of a game, can we verify if there exists a pure Nash equilibrium (i.e, a sink equilibrium with one state)? In this paper, we almost answer all of the above questions for a variety of classes of games with succinct representation, including anonymous games, player-specific and weighted congestion games, valid-utility games, and two-sided market games. In particular, for most of these problems, we show that (i) it is PSPACE-complete to verify if a given state is in a sink equilibrium, (ii) it is NP-hard to verify if there exists a pure Nash equilibrium in the game or not, (iii) it is PSPACE-complete to verify if there exists any sink equilibrium other than pure Nash equilibria. To solve these problems, we illustrate general techniques that could be used to answer similar questions in other classes of games.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 21:37:22 GMT" } ]
2009-02-04T00:00:00
[ [ "Mirrokni", "Vahab", "" ], [ "Skopalik", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0902.0392
Christos Dimitrakakis
Christos Dimitrakakis
Tree Exploration for Bayesian RL Exploration
13 pages, 1 figure. Slightly extended and corrected version (notation errors and lower bound calculation) of homonymous paper presented at the conference of Computational Intelligence for Modelling, Control and Automation 2008 (CIMCA'08)
null
null
IAS-08-04
stat.ML cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research in reinforcement learning has produced algorithms for optimal decision making under uncertainty that fall within two main types. The first employs a Bayesian framework, where optimality improves with increased computational time. This is because the resulting planning task takes the form of a dynamic programming problem on a belief tree with an infinite number of states. The second type employs relatively simple algorithm which are shown to suffer small regret within a distribution-free framework. This paper presents a lower bound and a high probability upper bound on the optimal value function for the nodes in the Bayesian belief tree, which are analogous to similar bounds in POMDPs. The bounds are then used to create more efficient strategies for exploring the tree. The resulting algorithms are compared with the distribution-free algorithm UCB1, as well as a simpler baseline algorithm on multi-armed bandit problems.
[ { "version": "v1", "created": "Mon, 2 Feb 2009 22:37:23 GMT" }, { "version": "v2", "created": "Wed, 21 Sep 2011 08:13:36 GMT" } ]
2011-09-22T00:00:00
[ [ "Dimitrakakis", "Christos", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0902.0417
Daniel Salmond
Daniel Salmond, Alex Grant, Terence Chan and Ian Grivell
Decoding Network Codes by Message Passing
5 pages, submitted to ISIT 2009. Added an additional reference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we show how to construct a factor graph from a network code. This provides a systematic framework for decoding using message passing algorithms. The proposed message passing decoder exploits knowledge of the underlying communications network topology to simplify decoding. For uniquely decodeable linear network codes on networks with error-free links, only the message supports (rather than the message values themselves) are required to be passed. This proposed simplified support message algorithm is an instance of the sum-product algorithm. Our message-passing framework provides a basis for the design of network codes and control of network topology with a view toward quantifiable complexity reduction in the sink terminals.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 01:38:36 GMT" }, { "version": "v2", "created": "Tue, 21 Apr 2009 01:55:28 GMT" } ]
2009-04-21T00:00:00
[ [ "Salmond", "Daniel", "" ], [ "Grant", "Alex", "" ], [ "Chan", "Terence", "" ], [ "Grivell", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0458
Keith Martin
Keith M. Martin
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
null
null
null
null
cs.CR cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The constraints of lightweight distributed computing environments such as wireless sensor networks lend themselves to the use of symmetric cryptography to provide security services. The lack of central infrastructure after deployment of such networks requires the necessary symmetric keys to be predistributed to participating nodes. The rich mathematical structure of combinatorial designs has resulted in the proposal of several key predistribution schemes for wireless sensor networks based on designs. We review and examine the appropriateness of combinatorial designs as a tool for building key predistribution schemes suitable for such environments.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 09:54:41 GMT" } ]
2009-02-04T00:00:00
[ [ "Martin", "Keith M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0902.0465
Bin Jiang
Bin Jiang and Xintao Liu
AxialGen: A Research Prototype for Automatically Generating the Axial Map
9 pages, 4 figures
Proceedings of CUPUM 2009, the 11th International Conference on Computers in Urban Planning and Urban Management, Hong Kong, 16-18 June 2009
null
null
cs.RO cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
AxialGen is a research prototype for automatically generating the axial map, which consists of the least number of the longest visibility lines (or axial lines) for representing individual linearly stretched parts of open space of an urban environment. Open space is the space between closed spaces such as buildings and street blocks. This paper aims to provide an accessible guide to software AxialGen, and the underlying concepts and ideas. We concentrate on the explanation and illustration of the key concept of bucket: its definition, formation and how it is used in generating the axial map. Keywords: Bucket, visibility, medial axes, axial lines, isovists, axial map
[ { "version": "v1", "created": "Tue, 3 Feb 2009 10:08:03 GMT" }, { "version": "v2", "created": "Thu, 18 Jun 2009 23:11:24 GMT" }, { "version": "v3", "created": "Thu, 7 Apr 2011 16:20:08 GMT" } ]
2011-04-08T00:00:00
[ [ "Jiang", "Bin", "" ], [ "Liu", "Xintao", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0902.0469
Gregoire Jacob M.
Gregoire Jacob, Eric Filiol and Herve Debar
Formalization of malware through process calculi
Corrected version from CSF reviews Shorter version submitted to ESORICS
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the seminal work from F. Cohen in the eighties, abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. But considering recent malware such as rootkits or k-ary codes, these viral models only partially cover these evolved threats. The problem is that Turing-equivalent models do not support interactive computations. New models have thus appeared, offering support for these evolved malware, but loosing the unified approach in the way. This article provides a basis for a unified malware model founded on process algebras and in particular the Join-Calculus. In terms of expressiveness, the new model supports the fundamental definitions based on self-replication and adds support for interactions, concurrency and non-termination allows the definition of more complex behaviors. Evolved malware such as rootkits can now be thoroughly modeled. In terms of detection and prevention, the fundamental results of undecidability and isolation still hold. However the process-based model has permitted to establish new results: identification of fragments from the Join-Calculus where malware detection becomes decidable, formal definition of the non-infection property, approximate solutions to restrict malware propagation.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 10:40:36 GMT" }, { "version": "v2", "created": "Mon, 20 Apr 2009 09:08:26 GMT" } ]
2009-04-20T00:00:00
[ [ "Jacob", "Gregoire", "" ], [ "Filiol", "Eric", "" ], [ "Debar", "Herve", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0902.0514
Ross Duncan
Lucas Dixon and Ross Duncan
Graphical Reasoning in Compact Closed Categories for Quantum Computation
21 pages, 9 figures. This is the journal version of the paper published at AISC
null
null
null
cs.SC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compact closed categories provide a foundational formalism for a variety of important domains, including quantum computation. These categories have a natural visualisation as a form of graphs. We present a formalism for equational reasoning about such graphs and develop this into a generic proof system with a fixed logical kernel for equational reasoning about compact closed categories. Automating this reasoning process is motivated by the slow and error prone nature of manual graph manipulation. A salient feature of our system is that it provides a formal and declarative account of derived results that can include `ellipses'-style notation. We illustrate the framework by instantiating it for a graphical language of quantum computation and show how this can be used to perform symbolic computation.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 14:21:01 GMT" } ]
2009-02-04T00:00:00
[ [ "Dixon", "Lucas", "" ], [ "Duncan", "Ross", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0902.0524
Sujit Gujar Mr
Sujit Gujar and Y Narahari
An Optimal Multi-Unit Combinatorial Procurement Auction with Single Minded Bidders
8 Pages, Managing Complexity in Distributed World, MCDES 2008: IISc Centenary Conference of Division of Electrical Sciences Added 2 references in newer version
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current art in optimal combinatorial auctions is limited to handling the case of single units of multiple items, with each bidder bidding on exactly one bundle (single minded bidders). This paper extends the current art by proposing an optimal auction for procuring multiple units of multiple items when the bidders are single minded. The auction minimizes the cost of procurement while satisfying Bayesian incentive compatibility and interim individual rationality. Under appropriate regularity conditions, this optimal auction also satisfies dominant strategy incentive compatibility.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 15:05:26 GMT" }, { "version": "v2", "created": "Sun, 8 Feb 2009 17:04:10 GMT" }, { "version": "v3", "created": "Sat, 24 Apr 2010 04:52:31 GMT" } ]
2010-04-27T00:00:00
[ [ "Gujar", "Sujit", "" ], [ "Narahari", "Y", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0902.0558
Marc Portoles Comeras
Marc Portoles-Comeras, Albert Cabellos-Aparicio, Josep Mangues-Bafalluy, Jordi Domingo-Pascual
Analysis of bandwidth measurement methodologies over WLAN systems
14 pages, 17 figures,
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WLAN devices have become a fundamental component of nowadays network deployments. However, even though traditional networking applications run mostly unchanged over wireless links, the actual interaction between these applications and the dynamics of wireless transmissions is not yet fully understood. An important example of such applications are bandwidth estimation tools. This area has become a mature research topic with well-developed results. Unfortunately recent studies have shown that the application of these results to WLAN links is not straightforward. The main reasons for this is that the assumptions taken to develop bandwidth measurements tools do not hold any longer in the presence of wireless links (e.g. non-FIFO scheduling). This paper builds from these observations and its main goal is to analyze the interaction between probe packets and WLAN transmissions in bandwidth estimation processes. The paper proposes an analytical model that better accounts for the particularities of WLAN links. The model is validated through extensive experimentation and simulation and reveals that (1) the distribution of the delay to transmit probing packets is not the same for the whole probing sequence, this biases the measurements process and (2) existing tools and techniques point at the achievable throughput rather than the available bandwidth or the capacity, as previously assumed.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 17:23:55 GMT" } ]
2009-02-04T00:00:00
[ [ "Portoles-Comeras", "Marc", "" ], [ "Cabellos-Aparicio", "Albert", "" ], [ "Mangues-Bafalluy", "Josep", "" ], [ "Domingo-Pascual", "Jordi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0902.0562
Lorenzo Cappellari
Lorenzo Cappellari and Andrea De Giusti
A Unified Perspective on Parity- and Syndrome-Based Binary Data Compression Using Off-the-Shelf Turbo Codecs
10 pages, 10 figures (11 graphic files organized with subfigures), 1 table; completely reviewed with a focus on non-uniform sources; submitted to IEEE Trans. Commun
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of compressing memoryless binary data with or without side information at the decoder. We review the parity- and the syndrome-based approaches and discuss their theoretical limits, assuming that there exists a virtual binary symmetric channel between the source and the side information, and that the source is not necessarily uniformly distributed. We take a factor-graph-based approach in order to devise how to take full advantage of the ready-available iterative decoding procedures when turbo codes are employed, in both a parity- or a syndrome-based fashion. We end up obtaining a unified decoder formulation that holds both for error-free and for error-prone encoder-to-decoder transmission over generic channels. To support the theoretical results, the different compression systems analyzed in the paper are also experimentally tested. They are compared against several different approaches proposed in literature and shown to be competitive in a variety of cases.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 17:34:29 GMT" }, { "version": "v2", "created": "Mon, 30 Nov 2009 12:21:55 GMT" }, { "version": "v3", "created": "Mon, 2 Aug 2010 05:28:48 GMT" } ]
2010-08-03T00:00:00
[ [ "Cappellari", "Lorenzo", "" ], [ "De Giusti", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0606
M. Angeles Serrano
M. Angeles Serrano, Alessandro Flammini, and Filippo Menczer
Beyond Zipf's law: Modeling the structure of human language
9 pages, 4 figures
null
null
null
cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human language, the most powerful communication system in history, is closely associated with cognition. Written text is one of the fundamental manifestations of language, and the study of its universal regularities can give clues about how our brains process information and how we, as a society, organize and share it. Still, only classical patterns such as Zipf's law have been explored in depth. In contrast, other basic properties like the existence of bursts of rare words in specific documents, the topical organization of collections, or the sublinear growth of vocabulary size with the length of a document, have only been studied one by one and mainly applying heuristic methodologies rather than basic principles and general mechanisms. As a consequence, there is a lack of understanding of linguistic processes as complex emergent phenomena. Beyond Zipf's law for word frequencies, here we focus on Heaps' law, burstiness, and the topicality of document collections, which encode correlations within and across documents absent in random null models. We introduce and validate a generative model that explains the simultaneous emergence of all these patterns from simple rules. As a result, we find a connection between the bursty nature of rare words and the topical organization of texts and identify dynamic word ranking and memory across documents as key mechanisms explaining the non trivial organization of written text. Our research can have broad implications and practical applications in computer science, cognitive science, and linguistics.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 21:04:33 GMT" } ]
2009-02-05T00:00:00
[ [ "Serrano", "M. Angeles", "" ], [ "Flammini", "Alessandro", "" ], [ "Menczer", "Filippo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0902.0620
Joerg Rothe
Claudia Lindner and Joerg Rothe
Degrees of Guaranteed Envy-Freeness in Finite Bounded Cake-Cutting Protocols
37 pages, 4 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cake-cutting protocols aim at dividing a ``cake'' (i.e., a divisible resource) and assigning the resulting portions to several players in a way that each of the players feels to have received a ``fair'' amount of the cake. An important notion of fairness is envy-freeness: No player wishes to switch the portion of the cake received with another player's portion. Despite intense efforts in the past, it is still an open question whether there is a \emph{finite bounded} envy-free cake-cutting protocol for an arbitrary number of players, and even for four players. We introduce the notion of degree of guaranteed envy-freeness (DGEF) as a measure of how good a cake-cutting protocol can approximate the ideal of envy-freeness while keeping the protocol finite bounded (trading being disregarded). We propose a new finite bounded proportional protocol for any number n \geq 3 of players, and show that this protocol has a DGEF of 1 + \lceil (n^2)/2 \rceil. This is the currently best DGEF among known finite bounded cake-cutting protocols for an arbitrary number of players. We will make the case that improving the DGEF even further is a tough challenge, and determine, for comparison, the DGEF of selected known finite bounded cake-cutting protocols.
[ { "version": "v1", "created": "Tue, 3 Feb 2009 21:21:23 GMT" }, { "version": "v2", "created": "Mon, 11 May 2009 15:15:22 GMT" }, { "version": "v3", "created": "Thu, 25 Jun 2009 08:52:58 GMT" }, { "version": "v4", "created": "Wed, 23 Sep 2009 14:14:33 GMT" }, { "version": "v5", "created": "Mon, 19 Oct 2009 09:23:44 GMT" } ]
2009-10-19T00:00:00
[ [ "Lindner", "Claudia", "" ], [ "Rothe", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0902.0657
Mohammad H. Taghavi
Mohammad H. Taghavi, Amin Shokrollahi, Paul H. Siegel
Efficient implementation of linear programming decoding
44 pages, submitted to IEEE Transactions on Information Theory, Dec. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While linear programming (LP) decoding provides more flexibility for finite-length performance analysis than iterative message-passing (IMP) decoding, it is computationally more complex to implement in its original form, due to both the large size of the relaxed LP problem, and the inefficiency of using general-purpose LP solvers. This paper explores ideas for fast LP decoding of low-density parity-check (LDPC) codes. We first prove, by modifying the previously reported Adaptive LP decoding scheme to allow removal of unnecessary constraints, that LP decoding can be performed by solving a number of LP problems that contain at most one linear constraint derived from each of the parity-check constraints. By exploiting this property, we study a sparse interior-point implementation for solving this sequence of linear programs. Since the most complex part of each iteration of the interior-point algorithm is the solution of a (usually ill-conditioned) system of linear equations for finding the step direction, we propose a preconditioning algorithm to facilitate iterative solution of such systems. The proposed preconditioning algorithm is similar to the encoding procedure of LDPC codes, and we demonstrate its effectiveness via both analytical methods and computer simulation results.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 04:29:27 GMT" } ]
2009-02-05T00:00:00
[ [ "Taghavi", "Mohammad H.", "" ], [ "Shokrollahi", "Amin", "" ], [ "Siegel", "Paul H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0668
Shamgar Gurevich
SHamgar Gurevich (UC Berkeley) and Ronny Hadani (U of Chicago)
Application of the Weil representation: diagonalization of the discrete Fourier transform
To appear in the Proceedings of the Sixth Workshop on Lie Theory and Geometry, Cordoba, November 13 - 17, 2007 (Editors: C. S. Gordon, F. Grunewald, C. Olmos, J. A. Tirao, J. A. Wolf). Key word: Discrete Fourier transform; Weil representation; Canonical eigenvectors; Oscillator transform; Fast oscillator transform
null
null
null
cs.IT cs.DM math.IT math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey a new application of the Weil representation to construct a canonical basis of eigenvectors for the discrete Fourier transform (DFT). The transition matrix from the standard basis to the canonical basis defines a novel transform which we call the discrete oscillator transform (DOT for short). In addition, we describe a fast algorithm for computing the DOT in certain cases.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 08:12:20 GMT" } ]
2009-02-05T00:00:00
[ [ "Gurevich", "SHamgar", "", "UC Berkeley" ], [ "Hadani", "Ronny", "", "U of Chicago" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
0902.0673
Gianluca Argentini
Gianluca Argentini
Optimal profiles in variable speed flows
5 pages, 3 figures
null
null
null
math.HO cs.CE math.OC physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Where a 2D problem of optimal profile in variable speed flow is resolved in a class of convex Bezier curves, using symbolic and numerical computations.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 09:07:16 GMT" } ]
2009-02-05T00:00:00
[ [ "Argentini", "Gianluca", "" ] ]
[ { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Physics", "code": "physics.flu-dyn", "description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.", "span": "(Fluid Dynamics)" } ]
0902.0744
Joe Futrelle
James D. Myers, Joe Futrelle, Jeff Gaynor, Joel Plutchak, Peter Bajcsy, Jason Kastner, Kailash Kotwani, Jong Sung Lee, Luigi Marini, Rob Kooper, Robert E. McGrath, Terry McLaren, Alejandro Rodriguez, Yong Liu (National Center for Supercomputing Applications, University of Illinois at Urbana-Champaign)
Embedding Data within Knowledge Spaces
10 pages with 1 figure. Corrected incorrect transliteration in abstract
null
null
null
cs.AI cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The promise of e-Science will only be realized when data is discoverable, accessible, and comprehensible within distributed teams, across disciplines, and over the long-term--without reliance on out-of-band (non-digital) means. We have developed the open-source Tupelo semantic content management framework and are employing it to manage a wide range of e-Science entities (including data, documents, workflows, people, and projects) and a broad range of metadata (including provenance, social networks, geospatial relationships, temporal relations, and domain descriptions). Tupelo couples the use of global identifiers and resource description framework (RDF) statements with an aggregatable content repository model to provide a unified space for securely managing distributed heterogeneous content and relationships.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 16:52:41 GMT" } ]
2009-02-05T00:00:00
[ [ "Myers", "James D.", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Futrelle", "Joe", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Gaynor", "Jeff", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Plutchak", "Joel", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Bajcsy", "Peter", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Kastner", "Jason", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Kotwani", "Kailash", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Lee", "Jong Sung", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Marini", "Luigi", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Kooper", "Rob", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "McGrath", "Robert E.", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "McLaren", "Terry", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Rodriguez", "Alejandro", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ], [ "Liu", "Yong", "", "National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0902.0746
Katia Jaffr?s-Runser
Katia Jaffr\`es-Runser, Cristina Comaniciu, Jean-Marie Gorce
Interference and Congestion Aware Gradient Broadcasting Routing for Wireless Sensor Networks
submitted to Eurasip Journal on Wireless Communications and Networking, special issue on Interference Management in Wireless Communication Systems: Theory and Applications in November 2009
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of reliable transmission of data through a sensor network. We focus on networks rapidly deployed in harsh environments. For these networks, important design requirements are fast data transmission and rapid network setup, as well as minimized energy consumption for increased network lifetime. We propose a novel broadcasting solution that accounts for the interference impact and the congestion level of the channel, in order to improve robustness, energy consumption and delay performance, compared to a benchmark routing protocol, the GRAB algorithm. Three solutions are proposed: P-GRAB, a probabilistic routing algorithm for interference mitigation, U-GRAB, a utility-based algorithm that adjusts to real-time congestion and UP-GRAB, a combination of P-GRAB and U-GRAB. It is shown that P-GRAB provides the best performance for geometry-aware networks while the U-GRAB approach is the best option for unreliable and unstable networks.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 17:06:04 GMT" }, { "version": "v2", "created": "Wed, 6 Jan 2010 11:39:26 GMT" } ]
2010-01-06T00:00:00
[ [ "Jaffrès-Runser", "Katia", "" ], [ "Comaniciu", "Cristina", "" ], [ "Gorce", "Jean-Marie", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0902.0755
Pere Constans
Pere Constans
A Simple Extraction Procedure for Bibliographical Author Field
null
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A procedure for bibliographic author metadata extraction from scholarly texts is presented. The author segments are identified based on capitalization and line break patterns. Two main author layout templates, which can retrieve from a varied set of title pages, are provided. Additionally, several disambiguating rules are described.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 17:36:41 GMT" } ]
2009-02-05T00:00:00
[ [ "Constans", "Pere", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0902.0763
Sourabh Saha
Sourabh Saha
Genetic algorithm based optimization and post optimality analysis of multi-pass face milling
null
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an optimization technique for the multi-pass face milling process. Genetic algorithm (GA) is used to obtain the optimum cutting parameters by minimizing the unit production cost for a given amount of material removal. Cutting speed, feed and depth of cut for the finish and rough passes are the cutting parameters. An equal depth of cut for roughing passes has been considered. A lookup table containing the feasible combinations of depth of cut in finish and rough passes is generated so as to reduce the number of variables by one. The resulting mixed integer nonlinear optimization problem is solved in a single step using GA. The entire technique is demonstrated in a case study. Post optimality analysis of the example problem is done to develop a strategy for optimizing without running GA again for different values of total depth of cut.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 18:29:21 GMT" } ]
2009-02-05T00:00:00
[ [ "Saha", "Sourabh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0902.0782
Katia Jaffres-Runser
Katia Jaffr\`es-Runser, Cristina Comaniciu, Jean-Marie Gorce
A Multiobjective Optimization Framework for Routing in Wireless Ad Hoc Networks
null
IEEE International Symposium on Conference Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) 2010
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless ad hoc networks are seldom characterized by one single performance metric, yet the current literature lacks a flexible framework to assist in characterizing the design tradeoffs in such networks. In this work, we address this problem by proposing a new modeling framework for routing in ad hoc networks, which used in conjunction with metaheuristic multiobjective search algorithms, will result in a better understanding of network behavior and performance when multiple criteria are relevant. Our approach is to take a holistic view of the network that captures the cross-interactions among interference management techniques implemented at various layers of the protocol stack. The resulting framework is a complex multiobjective optimization problem that can be efficiently solved through existing multiobjective search techniques. In this contribution, we present the Pareto optimal sets for an example sensor network when delay, robustness and energy are considered. The aim of this paper is to present the framework and hence for conciseness purposes, the multiobjective optimization search is not developed herein.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 19:48:42 GMT" }, { "version": "v2", "created": "Wed, 6 Jan 2010 11:15:29 GMT" } ]
2010-08-17T00:00:00
[ [ "Jaffrès-Runser", "Katia", "" ], [ "Comaniciu", "Cristina", "" ], [ "Gorce", "Jean-Marie", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0902.0789
Richard J. Mathar
Richard J. Mathar
The series limit of sum_k 1/[k log k (log log k)^2]
Appendix B concering series of log(k)/(k^2-a^2) added in in Version 3
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The slowly converging series sum_{k=3}^infinity 1/[k * log k * (log log k)^a] is evaluated to 38.4067680928 at a=2. After some initial terms, the infinite tail of the sum is replaced by the integral of the associated interpolating function, which is available in simple analytic form. Biases that originate from the difference between the smooth area under the function and the corresponding Riemann sum are corrected by standard means. The cases a=3 and a=4 are computed in the same manner.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 20:49:12 GMT" }, { "version": "v2", "created": "Sat, 14 Feb 2009 18:27:33 GMT" }, { "version": "v3", "created": "Wed, 23 Jun 2021 19:54:57 GMT" } ]
2021-06-25T00:00:00
[ [ "Mathar", "Richard J.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0902.0798
Ernesto Diaz-Aviles
Ernesto Diaz-Aviles
Alleviating Media Bias Through Intelligent Agent Blogging
null
null
null
null
cs.AI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Consumers of mass media must have a comprehensive, balanced and plural selection of news to get an unbiased perspective; but achieving this goal can be very challenging, laborious and time consuming. News stories development over time, its (in)consistency, and different level of coverage across the media outlets are challenges that a conscientious reader has to overcome in order to alleviate bias. In this paper we present an intelligent agent framework currently facilitating analysis of the main sources of on-line news in El Salvador. We show how prior tools of text analysis and Web 2.0 technologies can be combined with minimal manual intervention to help individuals on their rational decision process, while holding media outlets accountable for their work.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 21:25:59 GMT" } ]
2009-02-06T00:00:00
[ [ "Diaz-Aviles", "Ernesto", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0902.0822
Ye Wang
Ye Wang and Prakash Ishwar
Bootstrapped Oblivious Transfer and Secure Two-Party Function Computation
5 pages, 2 figures. Submitted to 2009 IEEE International Symposium on Information Theory, Seoul, South Korea
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an information theoretic framework for the secure two-party function computation (SFC) problem and introduce the notion of SFC capacity. We study and extend string oblivious transfer (OT) to sample-wise OT. We propose an efficient, perfectly private OT protocol utilizing the binary erasure channel or source. We also propose the bootstrap string OT protocol which provides disjoint (weakened) privacy while achieving a multiplicative increase in rate, thus trading off security for rate. Finally, leveraging our OT protocol, we construct a protocol for SFC and establish a general lower bound on SFC capacity of the binary erasure channel and source.
[ { "version": "v1", "created": "Wed, 4 Feb 2009 23:47:37 GMT" } ]
2009-02-06T00:00:00
[ [ "Wang", "Ye", "" ], [ "Ishwar", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0828
Qin Xiaolin
Xiaolin Qin, Yong Feng, Jingwei Chen, Jingzhong Zhang
Finding Exact Minimal Polynomial by Approximations
null
null
null
null
cs.CC cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new algorithm for reconstructing an exact algebraic number from its approximate value using an improved parameterized integer relation construction method. Our result is consistent with the existence of error controlling on obtaining an exact rational number from its approximation. The algorithm is applicable for finding exact minimal polynomial by its approximate root. This also enables us to provide an efficient method of converting the rational approximation representation to the minimal polynomial representation, and devise a simple algorithm to factor multivariate polynomials with rational coefficients. Compared with other methods, this method has the numerical computation advantage of high efficiency. The experimental results show that the method is more efficient than \emph{identify} in \emph{Maple} 11 for obtaining an exact algebraic number from its approximation. In this paper, we completely implement how to obtain exact results by numerical approximate computations.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 00:49:13 GMT" } ]
2009-02-06T00:00:00
[ [ "Qin", "Xiaolin", "" ], [ "Feng", "Yong", "" ], [ "Chen", "Jingwei", "" ], [ "Zhang", "Jingzhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0902.0838
Syed Jafar
Syed A. Jafar
The Ergodic Capacity of Phase-Fading Interference Networks
19 pages
IEEE Transactions on Information Theory, Vol. 57, No. 12, Pages: 7685-7694, December 2011
10.1109/TIT.2011.2169110
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We identify the role of equal strength interference links as bottlenecks on the ergodic sum capacity of a $K$ user phase-fading interference network, i.e., an interference network where the fading process is restricted primarily to independent and uniform phase variations while the channel magnitudes are held fixed across time. It is shown that even though there are $K(K-1)$ cross-links, only about $K/2$ disjoint and equal strength interference links suffice to determine the capacity of the network regardless of the strengths of the rest of the cross channels. This scenario is called a \emph{minimal bottleneck state}. It is shown that ergodic interference alignment is capacity optimal for a network in a minimal bottleneck state. The results are applied to large networks. It is shown that large networks are close to bottleneck states with a high probability, so that ergodic interference alignment is close to optimal for large networks. Limitations of the notion of bottleneck states are also highlighted for channels where both the phase and the magnitudes vary with time. It is shown through an example that for these channels, joint coding across different bottleneck states makes it possible to circumvent the capacity bottlenecks.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 03:17:44 GMT" }, { "version": "v2", "created": "Sat, 10 Mar 2012 13:02:29 GMT" } ]
2016-11-17T00:00:00
[ [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0850
Pedro Pablo P\'erez Velasco
Pedro Pablo Perez Velasco, Juan de Lara
Matrix Graph Grammars and Monotone Complex Logics
30 pages, 12 figures
null
null
null
cs.DM
http://creativecommons.org/licenses/by-nc-sa/3.0/
Graph transformation is concerned with the manipulation of graphs by means of rules. Graph grammars have been traditionally studied using techniques from category theory. In previous works, we introduced Matrix Graph Grammars (MGGs) as a purely algebraic approach for the study of graph grammars and graph dynamics, based on the representation of graphs by means of their adjacency matrices. MGGs have been succesfully applied to problems such as applicability of rule sequences, sequentialization and reachability, providing new analysis techniques and generalizing and improving previous results. Our next objective is to generalize MGGs in order to approach computational complexity theory and "static" properties of graphs out of the "dynamics" of certain grammars. In the present work, we start building bridges between MGGs and complexity by introducing what we call "Monotone Complex Logic", which allows establishing a (bijective) link between MGGs and complex analysis. We use this logic to recast the formulation and basic building blocks of MGGs as more proper geometric and analytic concepts (scalar products, norms, distances). MGG rules can also be interpreted - via operators - as complex numbers. Interestingly, the subset they define can be characterized as the Sierpinski gasket.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 06:13:13 GMT" } ]
2009-02-06T00:00:00
[ [ "Velasco", "Pedro Pablo Perez", "" ], [ "de Lara", "Juan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0902.0892
Mark Flanagan
Mark F. Flanagan
A Unified Framework for Linear-Programming Based Communication Receivers
13 pages, 6 figures. To appear in the IEEE Transactions on Communications
null
10.1109/TCOMM.2011.100411.100417
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that a large class of communication systems which admit a sum-product algorithm (SPA) based receiver also admit a corresponding linear-programming (LP) based receiver. The two receivers have a relationship defined by the local structure of the underlying graphical model, and are inhibited by the same phenomenon, which we call 'pseudoconfigurations'. This concept is a generalization of the concept of 'pseudocodewords' for linear codes. It is proved that the LP receiver has the 'maximum likelihood certificate' property, and that the receiver output is the lowest cost pseudoconfiguration. Equivalence of graph-cover pseudoconfigurations and linear-programming pseudoconfigurations is also proved. A concept of 'system pseudodistance' is defined which generalizes the existing concept of pseudodistance for binary and nonbinary linear codes. It is demonstrated how the LP design technique may be applied to the problem of joint equalization and decoding of coded transmissions over a frequency selective channel, and a simulation-based analysis of the error events of the resulting LP receiver is also provided. For this particular application, the proposed LP receiver is shown to be competitive with other receivers, and to be capable of outperforming turbo equalization in bit and frame error rate performance.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 12:01:29 GMT" }, { "version": "v2", "created": "Thu, 15 Jul 2010 15:54:37 GMT" }, { "version": "v3", "created": "Tue, 16 Aug 2011 15:50:34 GMT" } ]
2016-11-15T00:00:00
[ [ "Flanagan", "Mark F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0899
Camilla Schwind
R\'egis Alenda (LSIS), Nicola Olivetti (LSIS), Camilla Schwind (LIF)
Comparative concept similarity over Minspaces: Axiomatisation and Tableaux Calculus
25 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the logic of comparative concept similarity $\CSL$ introduced by Sheremet, Tishkovsky, Wolter and Zakharyaschev to capture a form of qualitative similarity comparison. In this logic we can formulate assertions of the form " objects A are more similar to B than to C". The semantics of this logic is defined by structures equipped by distance functions evaluating the similarity degree of objects. We consider here the particular case of the semantics induced by \emph{minspaces}, the latter being distance spaces where the minimum of a set of distances always exists. It turns out that the semantics over arbitrary minspaces can be equivalently specified in terms of preferential structures, typical of conditional logics. We first give a direct axiomatisation of this logic over Minspaces. We next define a decision procedure in the form of a tableaux calculus. Both the calculus and the axiomatisation take advantage of the reformulation of the semantics in terms of preferential structures.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 12:55:42 GMT" } ]
2009-02-06T00:00:00
[ [ "Alenda", "Régis", "", "LSIS" ], [ "Olivetti", "Nicola", "", "LSIS" ], [ "Schwind", "Camilla", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0902.0901
Lisa Brouwers
Lisa Brouwers, Martin Camitz, Baki Cakici, Kalle M\"akil\"a, Paul Saretok
MicroSim: Modeling the Swedish Population
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents a unique, large-scale and spatially explicit microsimulation model that uses official anonymized register data collected from all individuals living in Sweden. Individuals are connected to households and workplaces and represent crucial links in the Swedish social contact network. This enables significant policy experiments in the domain of epidemic outbreaks. Development of the model started in 2004 at the Swedish Institute for Infectious Disease Control (SMI) in Solna, Sweden with the goal of creating a tool for testing the effects of intervention policies. These interventions include mass vaccination, targeted vaccination, isolation and social distancing. The model was initially designed for simulating smallpox outbreaks. In 2006, it was modified to support simulations of pandemic influenza. All nine millions members of the Swedish population are represented in the model. This article is a technical description of the simulation model; the input data, the simulation engine and the basic object types.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 13:37:51 GMT" } ]
2009-02-06T00:00:00
[ [ "Brouwers", "Lisa", "" ], [ "Camitz", "Martin", "" ], [ "Cakici", "Baki", "" ], [ "Mäkilä", "Kalle", "" ], [ "Saretok", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0902.0919
Yassine Ariba
Yassine Ariba (LAAS), Fr\'ed\'eric Gouaisbaut (LAAS), Yann Labit (LAAS)
Multiple time-delays system modeling and control for router management
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the overload problem of a single congested router in TCP (Transmission Control Protocol) networks. To cope with the congestion phenomenon, we design a feedback control based on a multiple time-delays model of the set TCP/AQM (Active Queue Management). Indeed, using robust control tools, especially in the quadratic separation framework, the TCP/AQM model is rewritten as an intercon- nected system and a structured state feedback is constructed to stabilize the network variables. Finally, we illustrate the proposed methodology with a numerical example and simulations using NS-2 simulator.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 15:17:31 GMT" } ]
2009-02-06T00:00:00
[ [ "Ariba", "Yassine", "", "LAAS" ], [ "Gouaisbaut", "Frédéric", "", "LAAS" ], [ "Labit", "Yann", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0902.0920
Yassine Ariba
Yassine Ariba (LAAS), Yann Labit (LAAS), Fr\'ed\'eric Gouaisbaut (LAAS)
Design and performance evaluation of a state-space based AQM
null
International Conference on Communication Theory, Reliability, and Quality of Service, Bucharest : Roumanie (2008)
10.1109/CTRQ.2008.15
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent research has shown the link between congestion control in communication networks and feedback control system. In this paper, the design of an active queue management (AQM) which can be viewed as a controller, is considered. Based on a state space representation of a linearized fluid flow model of TCP, the AQM design is converted to a state feedback synthesis problem for time delay systems. Finally, an example extracted from the literature and simulations via a network simulator NS (under cross traffic conditions) support our study.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 15:24:36 GMT" } ]
2009-02-06T00:00:00
[ [ "Ariba", "Yassine", "", "LAAS" ], [ "Labit", "Yann", "", "LAAS" ], [ "Gouaisbaut", "Frédéric", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0902.0922
Yassine Ariba
Yann Labit (LAAS), Yassine Ariba (LAAS), Fr\'ed\'eric Gouaisbaut (LAAS)
On Designing Lyapunov-Krasovskii Based AQM for Routers Supporting TCP Flows
null
46th IEEE Conference on Decision and Control, New Orleans : \'Etats-Unis d'Am\'erique (2007)
10.1109/CDC.2007.4434673
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the last few years, we assist to a growing interest of designing AQM (Active Queue Management) using control theory. In this paper, we focus on the synthesis of an AQM based on the Lyapunov theory for time delay systems. With the help of a recently developed Lyapunov-Krasovskii functional and using a state space representation of a linearized fluid model of TCP, two robust AQMs stabilizing the TCP model are constructed. Notice that our results are constructive and the synthesis problem is reduced to a convex optimization scheme expressed in terms of linear matrix inequalities (LMIs). Finally, an example extracted from the literature and simulations via {\it NS simulator} support our study.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 15:24:57 GMT" } ]
2009-02-06T00:00:00
[ [ "Labit", "Yann", "", "LAAS" ], [ "Ariba", "Yassine", "", "LAAS" ], [ "Gouaisbaut", "Frédéric", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0902.0924
Ivan Jureta
Ivan Jureta, John Mylopoulos, Stephane Faulkner
Towards a Theory of Requirements Elicitation: Acceptability Condition for the Relative Validity of Requirements
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A requirements engineering artifact is valid relative to the stakeholders of the system-to-be if they agree on the content of that artifact. Checking relative validity involves a discussion between the stakeholders and the requirements engineer. This paper proposes (i) a language for the representation of information exchanged in a discussion about the relative validity of an artifact; (ii) the acceptability condition, which, when it verifies in a discussion captured in the proposed language, signals that the relative validity holds for the discussed artifact and for the participants in the discussion; and (iii) reasoning procedures to automatically check the acceptability condition in a discussions captured by the proposed language.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 15:26:41 GMT" } ]
2009-02-06T00:00:00
[ [ "Jureta", "Ivan", "" ], [ "Mylopoulos", "John", "" ], [ "Faulkner", "Stephane", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0902.0926
Yassine Ariba
Yassine Ariba (LAAS), Fr\'ed\'eric Gouaisbaut (LAAS), Sandy Rahme (LAAS), Yann Labit (LAAS)
Robust control tools for traffic monitoring in TCP/AQM networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several studies have considered control theory tools for traffic control in communication networks, as for example the congestion control issue in IP (Internet Protocol) routers. In this paper, we propose to design a linear observer for time-delay systems to address the traffic monitoring issue in TCP/AQM (Transmission Control Protocol/Active Queue Management) networks. Due to several propagation delays and the queueing delay, the set TCP/AQM is modeled as a multiple delayed system of a particular form. Hence, appropriate robust control tools as quadratic separation are adopted to construct a delay dependent observer for TCP flows estimation. Note that, the developed mechanism enables also the anomaly detection issue for a class of DoS (Denial of Service) attacks. At last, simulations via the network simulator NS-2 and an emulation experiment validate the proposed methodology.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 15:33:02 GMT" } ]
2009-09-30T00:00:00
[ [ "Ariba", "Yassine", "", "LAAS" ], [ "Gouaisbaut", "Frédéric", "", "LAAS" ], [ "Rahme", "Sandy", "", "LAAS" ], [ "Labit", "Yann", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0902.0947
Michele Wigger
Amos Lapidoth and Michele A. Wigger
On the Gaussian MAC with Imperfect Feedback
To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New achievable rate regions are derived for the two-user additive white Gaussian multiple-access channel with noisy feedback. The regions exhibit the following two properties. Irrespective of the (finite) Gaussian feedback-noise variances, the regions include rate points that lie outside the no-feedback capacity region, and when the feedback-noise variances tend to 0 the regions converge to the perfect-feedback capacity region. The new achievable regions also apply to the partial-feedback setting where one of the transmitters has a noisy feedback link and the other transmitter has no feedback at all. Again, irrespective of the (finite) noise variance on the feedback link, the regions include rate points that lie outside the no-feedback capacity region. Moreover, in the case of perfect partial feedback, i.e., where the only feedback link is noise-free, for certain channel parameters the new regions include rate points that lie outside the Cover-Leung region. This answers in the negative the question posed by van der Meulen as to whether the Cover-Leung region equals the capacity region of the Gaussian multiple-access channel with perfect partial feedback. Finally, we propose new achievable regions also for a setting where the receiver is cognizant of the realizations of the noise sequences on the feedback links.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 17:36:11 GMT" }, { "version": "v2", "created": "Mon, 12 Apr 2010 16:42:39 GMT" } ]
2010-04-13T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Wigger", "Michele A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0902.0966
Dongwoon Bai
Dongwoon Bai, Saeed S. Ghassemzadeh, Robert R. Miller, and Vahid Tarokh
Beam Selection Gain Versus Antenna Selection Gain
22 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider beam selection using a fixed beamforming network (FBN) at a base station with $M$ array antennas. In our setting, a Butler matrix is deployed at the RF stage to form $M$ beams, and then the best beam is selected for transmission. We provide the proofs of the key properties of the noncentral chi-square distribution and the following properties of the beam selection gain verifying that beam selection is superior to antenna selection in Rician channels with any $K$-factors. Furthermore, we find asymptotically tight stochastic bounds of the beam selection gain, which yield approximate closed form expressions of the expected selection gain and the ergodic capacity. Beam selection has the order of growth of the ergodic capacity $\mathnormal{\Theta}(\log(M))$ regardless of user location in contrast to $\mathnormal{\Theta}(\log(\log(M)))$ for antenna selection.
[ { "version": "v1", "created": "Thu, 5 Feb 2009 19:54:36 GMT" }, { "version": "v2", "created": "Fri, 6 Feb 2009 21:41:55 GMT" } ]
2009-02-06T00:00:00
[ [ "Bai", "Dongwoon", "" ], [ "Ghassemzadeh", "Saeed S.", "" ], [ "Miller", "Robert R.", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]