id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0901.4272 | Hassane. Alla | Khalid Hachemi (GIPSA-lab), Hassane. Alla (GIPSA-lab) | Dynamic Control of a Flow-Rack Automated Storage and Retrieval System | CSCS 17 15th International Conference on Control Systems and Computer
Science, Bucarest : Roumanie (2007) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose a control scheme based on coloured Petri net (CPN)
for a flow-rack automated storage and retrieval system. The AS/RS is modelled
using Coloured Petri nets, the developed model has been used to capture and
provide the rack state. We introduce in the control system an optimization
module as a decision process which performs a real-time optimization working on
a discrete events time scale. The objective is to find bin locations for the
retrieval requests by minimizing the total number of retrieval cycles for a
batch of requests and thereby increase the system throughput. By solving the
optimization model, the proposed method gives according to customers request
and the rack state, the best bin locations for retrieval, i.e. allowing at the
same time to satisfy the customers request and carrying out the minimum of
retrieval cycles.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 15:45:47 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Hachemi",
"Khalid",
"",
"GIPSA-lab"
],
[
"Alla",
"Hassane.",
"",
"GIPSA-lab"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4275 | Hyun Sung Chang | Hyun Sung Chang, Yair Weiss, William T. Freeman | Informative Sensing | 26 pages; submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed sensing is a recent set of mathematical results showing that
sparse signals can be exactly reconstructed from a small number of linear
measurements. Interestingly, for ideal sparse signals with no measurement
noise, random measurements allow perfect reconstruction while measurements
based on principal component analysis (PCA) or independent component analysis
(ICA) do not. At the same time, for other signal and noise distributions, PCA
and ICA can significantly outperform random projections in terms of enabling
reconstruction from a small number of measurements. In this paper we ask: given
the distribution of signals we wish to measure, what are the optimal set of
linear projections for compressed sensing? We consider the problem of finding a
small number of linear projections that are maximally informative about the
signal. Formally, we use the InfoMax criterion and seek to maximize the mutual
information between the signal, x, and the (possibly noisy) projection y=Wx. We
show that in general the optimal projections are not the principal components
of the data nor random projections, but rather a seemingly novel set of
projections that capture what is still uncertain about the signal, given the
knowledge of distribution. We present analytic solutions for certain special
cases including natural images. In particular, for natural images, the
near-optimal projections are bandwise random, i.e., incoherent to the sparse
bases at a particular frequency band but with more weights on the
low-frequencies, which has a physical relation to the multi-resolution
representation of images.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 16:12:00 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Chang",
"Hyun Sung",
""
],
[
"Weiss",
"Yair",
""
],
[
"Freeman",
"William T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4322 | Francois Rodier | Gregor Leander (IML), Fran\c{c}ois Rodier (IML) | Bounds on the degree of APN polynomials The Case of $x^{-1}+g(x)$ | null | null | null | null | math.AG cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that functions $f:\f{2^m} \to \f{2^m}$ of the form
$f(x)=x^{-1}+g(x)$ where $g$ is any non-affine polynomial are APN on at most a
finite number of fields $\f{2^m}$. Furthermore we prove that when the degree of
$g$ is less then 7 such functions are APN only if $m \le 3$ where these
functions are equivalent to $x^3$.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 19:54:06 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"Leander",
"Gregor",
"",
"IML"
],
[
"Rodier",
"François",
"",
"IML"
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.4323 | Joris van der Hoeven | Joris van der Hoeven, Gr\'egoire Lecerf | On the bit-complexity of sparse polynomial multiplication | null | null | null | null | cs.DS cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present fast algorithms for the product of two multivariate
polynomials in sparse representation. The bit complexity of our algorithms are
studied in detail for various types of coefficients, and we derive new
complexity results for the power series multiplication in many variables. Our
algorithms are implemented and freely available within the Mathemagix software.
We show that their theoretical costs are well-reflected in practice.
| [
{
"version": "v1",
"created": "Mon, 26 Jan 2009 21:48:35 GMT"
}
]
| 2009-01-28T00:00:00 | [
[
"van der Hoeven",
"Joris",
""
],
[
"Lecerf",
"Grégoire",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0901.4375 | Peter Bruza | P.D. Bruza, K. Kitto, D. Nelson, C. McEvoy | Extracting Spooky-activation-at-a-distance from Considerations of
Entanglement | 13 pages, 2 figures; To appear in Proceedings of the Third Quantum
Interaction Symposium, Lecture Notes in Artificial Intelligence, vol 5494,
Springer, 2009 | null | null | null | physics.data-an cs.CL quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Following an early claim by Nelson & McEvoy \cite{Nelson:McEvoy:2007}
suggesting that word associations can display `spooky action at a distance
behaviour', a serious investigation of the potentially quantum nature of such
associations is currently underway. This paper presents a simple quantum model
of a word association system. It is shown that a quantum model of word
entanglement can recover aspects of both the Spreading Activation equation and
the Spooky-activation-at-a-distance equation, both of which are used to model
the activation level of words in human memory.
| [
{
"version": "v1",
"created": "Tue, 27 Jan 2009 23:59:59 GMT"
}
]
| 2009-01-29T00:00:00 | [
[
"Bruza",
"P. D.",
""
],
[
"Kitto",
"K.",
""
],
[
"Nelson",
"D.",
""
],
[
"McEvoy",
"C.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0901.4379 | Bobak Nazer | Bobak Nazer, Michael Gastpar, Syed A. Jafar, and Sriram Vishwanath | Ergodic Interference Alignment | 16 pages, 6 figure, To appear in IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper develops a new communication strategy, ergodic interference
alignment, for the K-user interference channel with time-varying fading. At any
particular time, each receiver will see a superposition of the transmitted
signals plus noise. The standard approach to such a scenario results in each
transmitter-receiver pair achieving a rate proportional to 1/K its
interference-free ergodic capacity. However, given two well-chosen time
indices, the channel coefficients from interfering users can be made to exactly
cancel. By adding up these two observations, each receiver can obtain its
desired signal without any interference. If the channel gains have independent,
uniform phases, this technique allows each user to achieve at least 1/2 its
interference-free ergodic capacity at any signal-to-noise ratio. Prior
interference alignment techniques were only able to attain this performance as
the signal-to-noise ratio tended to infinity. Extensions are given for the case
where each receiver wants a message from more than one transmitter as well as
the "X channel" case (with two receivers) where each transmitter has an
independent message for each receiver. Finally, it is shown how to generalize
this strategy beyond Gaussian channel models. For a class of finite field
interference channels, this approach yields the ergodic capacity region.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 00:29:28 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Aug 2011 03:34:27 GMT"
},
{
"version": "v3",
"created": "Sat, 16 Jun 2012 16:30:55 GMT"
}
]
| 2012-06-19T00:00:00 | [
[
"Nazer",
"Bobak",
""
],
[
"Gastpar",
"Michael",
""
],
[
"Jafar",
"Syed A.",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4400 | J. Maurice Rojas | Frederic Bihan, J. Maurice Rojas, Casey Stella | Faster Real Feasibility via Circuit Discriminants | 12 pages in double column ACM format. Submitted to a conference.
Significantly improves and simplifies the algorithms and complexity lower
bounds of arXiv:math/0411107 . Also presents a new complexity lower bound for
A-discriminants. This version fixes many annoying typos | null | null | null | math.AG cs.CC math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that detecting real roots for honestly n-variate (n+2)-nomials (with
integer exponents and coefficients) can be done in time polynomial in the
sparse encoding for any fixed n. The best previous complexity bounds were
exponential in the sparse encoding, even for n fixed. We then give a
characterization of those functions k(n) such that the complexity of detecting
real roots for n-variate (n+k(n))-nomials transitions from P to NP-hardness as
n tends to infinity. Our proofs follow in large part from a new complexity
threshold for deciding the vanishing of A-discriminants of n-variate
(n+k(n))-nomials. Diophantine approximation, through linear forms in
logarithms, also arises as a key tool.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 05:15:07 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Jan 2009 03:26:58 GMT"
}
]
| 2013-09-09T00:00:00 | [
[
"Bihan",
"Frederic",
""
],
[
"Rojas",
"J. Maurice",
""
],
[
"Stella",
"Casey",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0901.4404 | John Carminati | Peter Horan and John Carminati | Performance of Buchberger's Improved Algorithm using Prime Based
Ordering | 10 pages, 2 tables, 4 refs | null | null | null | cs.SE cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Prime-based ordering which is proved to be admissible, is the encoding of
indeterminates in power-products with prime numbers and ordering them by using
the natural number order. Using Eiffel, four versions of Buchberger's improved
algorithm for obtaining Groebner Bases have been developed: two total degree
versions, representing power products as strings and the other two as integers
based on prime-based ordering. The versions are further distinguished by
implementing coefficients as 64-bit integers and as multiple-precision
integers. By using primebased power product coding, iterative or recursive
operations on power products are replaced with integer operations. It is found
that on a series of example polynomial sets, significant reductions in
computation time of 30% or more are almost always obtained.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 05:47:24 GMT"
}
]
| 2009-01-29T00:00:00 | [
[
"Horan",
"Peter",
""
],
[
"Carminati",
"John",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0901.4417 | Marcel Wild | Marcel Wild | ALLSAT compressed with wildcards: All, or all maximum independent sets | The best way to efficiently generate all maximum anticliques of a
bipartite graph, a problem left open in v3, is settled in the present version
v4 | null | null | null | cs.DS cs.DM cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An odd cycle cover is a vertex set whose removal makes a graph bipartite. We
show that if a $k$-element odd cycle cover of a graph with w vertices is known
then all $N$ maximum anticliques (= independent sets) can be generated in time
$O(2^k w^3 + N w^2))$. Generating ${\it all}\ N'$ anticliques (maximum or not)
is easier and works for arbitrary graphs in time $O(N'w^2)$. In fact the use of
wildcards allows to compactly generate the anticliques in clusters.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 09:09:36 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Feb 2010 16:08:40 GMT"
},
{
"version": "v3",
"created": "Mon, 27 May 2019 15:24:08 GMT"
},
{
"version": "v4",
"created": "Wed, 5 Jun 2019 13:15:22 GMT"
}
]
| 2019-06-06T00:00:00 | [
[
"Wild",
"Marcel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0901.4420 | Kamalesh Kumar Sharma | Kamalesh Kumar Sharma | Some Generalizations of the Capacity Theorem for AWGN Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The channel capacity theorem for additive white Gaussian noise channel
(AWGN), widely known as the Shannon-Hartley Law, expresses the information
capacity of a channel bandlimited in the conventional Fourier domain in terms
of the signal-to-noise ratio in it. In this letter generalized versions of the
Shannon-Hartley Law using the linear canonical transform (LCT) are presented.
The channel capacity for AWGN channels is found to be a function of the LCT
parameters.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 09:24:32 GMT"
}
]
| 2009-01-29T00:00:00 | [
[
"Sharma",
"Kamalesh Kumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4430 | Helle Hvid Hansen | Helle Hvid Hansen and Clemens Kupke and Eric Pacuit | Neighbourhood Structures: Bisimilarity and Basic Model Theory | uses LMCS.cls (included), 2 figures (both ps and pdf) | Logical Methods in Computer Science, Volume 5, Issue 2 (April 9,
2009) lmcs:1167 | 10.2168/LMCS-5(2:2)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neighbourhood structures are the standard semantic tool used to reason about
non-normal modal logics. The logic of all neighbourhood models is called
classical modal logic. In coalgebraic terms, a neighbourhood frame is a
coalgebra for the contravariant powerset functor composed with itself, denoted
by 2^2. We use this coalgebraic modelling to derive notions of equivalence
between neighbourhood structures. 2^2-bisimilarity and behavioural equivalence
are well known coalgebraic concepts, and they are distinct, since 2^2 does not
preserve weak pullbacks. We introduce a third, intermediate notion whose
witnessing relations we call precocongruences (based on pushouts). We give
back-and-forth style characterisations for 2^2-bisimulations and
precocongruences, we show that on a single coalgebra, precocongruences capture
behavioural equivalence, and that between neighbourhood structures,
precocongruences are a better approximation of behavioural equivalence than
2^2-bisimulations. We also introduce a notion of modal saturation for
neighbourhood models, and investigate its relationship with definability and
image-finiteness. We prove a Hennessy-Milner theorem for modally saturated and
for image-finite neighbourhood models. Our main results are an analogue of Van
Benthem's characterisation theorem and a model-theoretic proof of Craig
interpolation for classical modal logic.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 10:29:44 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Mar 2009 15:52:29 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Apr 2009 00:16:59 GMT"
},
{
"version": "v4",
"created": "Mon, 20 Apr 2009 12:09:16 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Hansen",
"Helle Hvid",
""
],
[
"Kupke",
"Clemens",
""
],
[
"Pacuit",
"Eric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.4466 | Andrew Adamatzky | Andrew Adamatzky | Physarum boats: If plasmodium sailed it would never leave a port | null | Applied Bionics and Biomechanics, Volume 7, Issue 1 March 2010 ,
pages 31 - 39 | 10.1080/11762320902863890 | null | cs.RO q-bio.CB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Plasmodium of \emph{Physarum polycephalum} is a single huge (visible by naked
eye) cell with myriad of nuclei. The plasmodium is a promising substrate for
non-classical, nature-inspired, computing devices. It is capable for
approximation of shortest path, computation of planar proximity graphs and
plane tessellations, primitive memory and decision-making. The unique
properties of the plasmodium make it an ideal candidate for a role of amorphous
biological robots with massive parallel information processing and distributed
inputs and outputs. We show that when adhered to light-weight object resting on
a water surface the plasmodium can propel the object by oscillating its
protoplasmic pseudopodia. In experimental laboratory conditions and
computational experiments we study phenomenology of the plasmodium-floater
system, and possible mechanisms of controlling motion of objects propelled by
on board plasmodium.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 14:12:32 GMT"
}
]
| 2010-11-23T00:00:00 | [
[
"Adamatzky",
"Andrew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.CB",
"description": "Cell-cell signaling and interaction; morphogenesis and development; apoptosis; bacterial conjugation; viral-host interaction; immunology",
"span": "(Cell Behavior)"
}
]
|
0901.4467 | Alfredo Braunstein | Alfredo Braunstein, Farbod Kayhan, Riccardo Zecchina | Efficient LDPC Codes over GF(q) for Lossy Data Compression | 5 pages, 3 figures | In: IEEE International Symposium on Information Theory, 2009. ISIT
2009. Seul, Korea; 2009 | 10.1109/ISIT.2009.5205707 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the lossy compression of a binary symmetric source.
We present a scheme that provides a low complexity lossy compressor with near
optimal empirical performance. The proposed scheme is based on b-reduced
ultra-sparse LDPC codes over GF(q). Encoding is performed by the Reinforced
Belief Propagation algorithm, a variant of Belief Propagation. The
computational complexity at the encoder is O(<d>.n.q.log q), where <d> is the
average degree of the check nodes. For our code ensemble, decoding can be
performed iteratively following the inverse steps of the leaf removal
algorithm. For a sparse parity-check matrix the number of needed operations is
O(n).
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 14:13:24 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Oct 2011 10:04:16 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Braunstein",
"Alfredo",
""
],
[
"Kayhan",
"Farbod",
""
],
[
"Zecchina",
"Riccardo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4496 | Nicolai Kuntze | Andreas Brett, Andreas Leicher | Ethemba Trusted Host EnvironmentMainly Based on Attestation | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ethemba provides a framework and demonstrator for TPM applications.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 07:58:19 GMT"
}
]
| 2009-01-29T00:00:00 | [
[
"Brett",
"Andreas",
""
],
[
"Leicher",
"Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.4551 | Terence H. Chan | Terence Chan, Ning Cai, Alex Grant | Robust Key Agreement Schemes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a key agreement problem in which two parties aim to
agree on a key by exchanging messages in the presence of adversarial tampering.
The aim of the adversary is to disrupt the key agreement process, but there are
no secrecy constraints (i.e. we do not insist that the key is kept secret from
the adversary). The main results of the paper are coding schemes and bounds on
maximum key generation rates for this problem.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 00:31:06 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Chan",
"Terence",
""
],
[
"Cai",
"Ning",
""
],
[
"Grant",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4571 | Frank McCown | Frank McCown, Michael L. Nelson, Herbert Van de Sompel | Everyone is a Curator: Human-Assisted Preservation for ORE Aggregations | 8 pages, 12 figures, accepted at DigCCurr 2009 | null | null | null | cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Open Archives Initiative (OAI) has recently created the Object Reuse and
Exchange (ORE) project that defines Resource Maps (ReMs) for describing
aggregations of web resources. These aggregations are susceptible to many of
the same preservation challenges that face other web resources. In this paper,
we investigate how the aggregations of web resources can be preserved outside
of the typical repository environment and instead rely on the thousands of
interactive users in the web community and the Web Infrastructure (the
collection of web archives, search engines, and personal archiving services) to
facilitate preservation. Inspired by Web 2.0 services such as digg,
deli.cio.us, and Yahoo! Buzz, we have developed a lightweight system called
ReMember that attempts to harness the collective abilities of the web community
for preservation purposes instead of solely placing the burden of curatorial
responsibilities on a small number of experts.
| [
{
"version": "v1",
"created": "Wed, 28 Jan 2009 22:48:08 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"McCown",
"Frank",
""
],
[
"Nelson",
"Michael L.",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0901.4591 | Salah A. Aly | Salah A. Aly, Ahmed E. Kamal | Network Coding-Based Protection Strategy Against Node Failures | 5 pages, 2 figures, accepted in ICC'09 | null | null | null | cs.IT cs.CR cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The enormous increase in the usage of communication networks has made
protection against node and link failures essential in the deployment of
reliable networks. To prevent loss of data due to node failures, a network
protection strategy is proposed that aims to withstand such failures.
Particularly, a protection strategy against any single node failure is designed
for a given network with a set of $n$ disjoint paths between senders and
receivers. Network coding and reduced capacity are deployed in this strategy
without adding extra working paths to the readily available connection paths.
This strategy is based on protection against node failures as protection
against multiple link failures. In addition, the encoding and decoding
operational aspects of the premeditated protection strategy are demonstrated.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 17:34:56 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Kamal",
"Ahmed E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4612 | Satyajit Thakor | Satyajit Thakor, Alex Grant and Terence Chan | Network Coding Capacity: A Functional Dependence Bound | 5 pages, 2 figures, submitted to the International Symposium on
Information Theory 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Explicit characterization and computation of the multi-source network coding
capacity region (or even bounds) is long standing open problem. In fact,
finding the capacity region requires determination of the set of all entropic
vectors $\Gamma^{*}$, which is known to be an extremely hard problem. On the
other hand, calculating the explicitly known linear programming bound is very
hard in practice due to an exponential growth in complexity as a function of
network size. We give a new, easily computable outer bound, based on
characterization of all functional dependencies in networks. We also show that
the proposed bound is tighter than some known bounds.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 06:47:22 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Thakor",
"Satyajit",
""
],
[
"Grant",
"Alex",
""
],
[
"Chan",
"Terence",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4642 | Jayaraj Poroor | Jayaraj Poroor, Sriram Karunagaran, Sudharsan Sundararajan, Ranjith
Pillai | Fast Dual-Radio Cross-Layer Handoffs in Multi-Hop Infrastructure-mode
802.11 Wireless Networks for In-Vehicle Multimedia Infotainment | Presented (oral) at IEEE Advanced Networking and Telecommunications,
2008 (ANTS 2008) Conference (http://www.antsconference.org) held at Indian
Institute of Technology, Mumbai. Awarded Best Paper (Honorable Mention) | null | 10.1109/ANTS.2008.4937782 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Minimizing handoff latency and achieving near-zero packet loss is critical
for delivering multimedia infotainment applications to fast-moving vehicles
that are likely to encounter frequent handoffs. In this paper, we propose a
dual-radio cross-layer handoff scheme for infrastructure-mode 802.11 Wireless
Networks that achieve this goal. We present performance results of an
implementation of our algorithm in a Linux-based On-Board-Unit prototype.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 10:47:33 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Poroor",
"Jayaraj",
""
],
[
"Karunagaran",
"Sriram",
""
],
[
"Sundararajan",
"Sudharsan",
""
],
[
"Pillai",
"Ranjith",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.4643 | Ioan Valeriu Grossu | I. V. Grossu, C. Besliu, M.V.Rusu, Al. Jipa, C. C. Bordeianu, D.
Felea, E. Stan, T. Esanu | Visual tool for estimating the fractal dimension of images | A new version was accepted to Computer Physics Communications
doi:10.1016/j.cpc.2009.12.005 | Computer Physics Communications 180 (2009) p.1999-2001; CPC,
Volume 181, Issue 4, April 2010, Pages 831-832 | 10.1016/j.cpc.2009.05.015 | null | physics.comp-ph cs.GR nlin.PS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work presents a new Visual Basic 6.0 application for estimating the
fractal dimension of images, based on an optimized version of the box-counting
algorithm. Following the attempt to separate the real information from noise,
we considered also the family of all band-pass filters with the same band-width
(specified as parameter). The fractal dimension can be thus represented as a
function of the pixel color code. The program was used for the study of
paintings cracks, as an additional tool which can help the critic to decide if
an artistic work is original or not. In its second version, the application was
extended for working also with csv files and three-dimensional images.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 14:41:45 GMT"
},
{
"version": "v2",
"created": "Mon, 25 May 2009 17:46:23 GMT"
},
{
"version": "v3",
"created": "Sun, 27 Dec 2009 08:40:14 GMT"
}
]
| 2012-11-20T00:00:00 | [
[
"Grossu",
"I. V.",
""
],
[
"Besliu",
"C.",
""
],
[
"Rusu",
"M. V.",
""
],
[
"Jipa",
"Al.",
""
],
[
"Bordeianu",
"C. C.",
""
],
[
"Felea",
"D.",
""
],
[
"Stan",
"E.",
""
],
[
"Esanu",
"T.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Physics",
"code": "nlin.PS",
"description": "Pattern formation, coherent structures, solitons",
"span": "(Pattern Formation and Solitons)"
}
]
|
0901.4646 | Muhammad Mubashir Khan | Muhammad Mubashir Khan, Salahuddin Hyder, Mahmood K Pathan, Kashif H
Sheikh | A Quantum Key Distribution Network Through Single Mode Optical Fiber | This paper has been submitted to the 2006 International Symposium on
Collaborative Technologies and Systems (CTS 2006)May 14-17, 2006, Las Vegas,
Nevada, USA | Khan, M.M., et al., A Quantum Key Distribution Network through
Single Mode Optical Fiber. Proceedings of the International Symposium on
Collaborative Technologies and Systems, 2006: p. 386-391 | 10.1109/CTS.2006.10 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum key distribution (QKD) has been developed within the last decade that
is provably secure against arbitrary computing power, and even against quantum
computer attacks. Now there is a strong need of research to exploit this
technology in the existing communication networks. In this paper we have
presented various experimental results pertaining to QKD like Raw key rate and
Quantum bit error rate (QBER). We found these results over 25 km single mode
optical fiber. The experimental setup implemented the enhanced version of BB84
QKD protocol. Based upon the results obtained, we have presented a network
design which can be implemented for the realization of large scale QKD
networks. Furthermore, several new ideas are presented and discussed to
integrate the QKD technique in the classical communication networks.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 10:48:28 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Khan",
"Muhammad Mubashir",
""
],
[
"Hyder",
"Salahuddin",
""
],
[
"Pathan",
"Mahmood K",
""
],
[
"Sheikh",
"Kashif H",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.4648 | Farzan Haddadi | Farzan Haddadi, Mohammad Mahdi Nayebi, Mohammad Reza Aref | On The Positive Definiteness of Polarity Coincidence Correlation
Coefficient Matrix | IEEE Signal Processing Letters, Volume 15, pp. 73-76, 2008 | null | 10.1109/LSP.2007.911193 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Polarity coincidence correlator (PCC), when used to estimate the covariance
matrix on an element-by-element basis, may not yield a positive semi-definite
(PSD) estimate. Devlin et al. [1], claimed that element-wise PCC is not
guaranteed to be PSD in dimensions p>3 for real signals. However, no
justification or proof was available on this issue. In this letter, it is
proved that for real signals with p<=3 and for complex signals with p<=2, a PSD
estimate is guaranteed. Counterexamples are presented for higher dimensions
which yield invalid covariance estimates.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 11:11:57 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Haddadi",
"Farzan",
""
],
[
"Nayebi",
"Mohammad Mahdi",
""
],
[
"Aref",
"Mohammad Reza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4664 | Inge Bethke | Jan A. Bergstra and I. Bethke | Square root meadows | 9 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let Q_0 denote the rational numbers expanded to a meadow by totalizing
inversion such that 0^{-1}=0. Q_0 can be expanded by a total sign function s
that extracts the sign of a rational number. In this paper we discuss an
extension Q_0(s ,\sqrt) of the signed rationals in which every number has a
unique square root.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 12:42:46 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Bethke",
"I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.4694 | Yeow Meng Chee | Yeow Meng Chee and Alan C. H. Ling | Limit on the Addressability of Fault-Tolerant Nanowire Decoders | 9 pages, 4 figures | IEEE Transactions on Computers, vol. 58, no. 1, pp. 60-68, 2009 | 10.1109/TC.2008.130 | null | cs.AR cs.DM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although prone to fabrication error, the nanowire crossbar is a promising
candidate component for next generation nanometer-scale circuits. In the
nanowire crossbar architecture, nanowires are addressed by controlling voltages
on the mesowires. For area efficiency, we are interested in the maximum number
of nanowires $N(m,e)$ that can be addressed by $m$ mesowires, in the face of up
to $e$ fabrication errors. Asymptotically tight bounds on $N(m,e)$ are
established in this paper. In particular, it is shown that $N(m,e) = \Theta(2^m
/ m^{e+1/2})$. Interesting observations are made on the equivalence between
this problem and the problem of constructing optimal EC/AUED codes,
superimposed distance codes, pooling designs, and diffbounded set systems.
Results in this paper also improve upon those in the EC/AUEC codes literature.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 14:46:48 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Chee",
"Yeow Meng",
""
],
[
"Ling",
"Alan C. H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4723 | Yves Goussard | Paul-Andr\'e Barri\`ere, J\'er\^ome Idier, Yves Goussard, and
Jean-Jacques Laurin | On Algorithms Based on Joint Estimation of Currents and Contrast in
Microwave Tomography | 12 pages, 12 figures, 5 tables | null | null | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with improvements to the contrast source inversion method
which is widely used in microwave tomography. First, the method is reviewed and
weaknesses of both the criterion form and the optimization strategy are
underlined. Then, two new algorithms are proposed. Both of them are based on
the same criterion, similar but more robust than the one used in contrast
source inversion. The first technique keeps the main characteristics of the
contrast source inversion optimization scheme but is based on a better
exploitation of the conjugate gradient algorithm. The second technique is based
on a preconditioned conjugate gradient algorithm and performs simultaneous
updates of sets of unknowns that are normally processed sequentially. Both
techniques are shown to be more efficient than original contrast source
inversion.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 17:03:35 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Barrière",
"Paul-André",
""
],
[
"Idier",
"Jérôme",
""
],
[
"Goussard",
"Yves",
""
],
[
"Laurin",
"Jean-Jacques",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4727 | Elchanan Mossel | Elchanan Mossel | Arrow's Impossibility Theorem Without Unanimity | Most of the new results in the Arxiv sumbission now appear in a
follow up paper on quantitative Arrow's theorem | null | null | null | cs.GT cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Arrow's Impossibility Theorem states that any constitution which satisfies
Transitivity, Independence of Irrelevant Alternatives (IIA) and Unanimity is a
dictatorship. Wilson derived properties of constitutions satisfying
Transitivity and IIA for unrestricted domains where ties are allowed. In this
paper we consider the case where only strict preferences are allowed. In this
case we derive a new short proof of Arrow theorem and further obtain a new and
complete characterization of all functions satisfying Transitivity and IIA.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 17:32:26 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Feb 2009 11:02:45 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Feb 2009 09:11:25 GMT"
},
{
"version": "v4",
"created": "Fri, 19 Jun 2009 20:23:14 GMT"
},
{
"version": "v5",
"created": "Mon, 5 Oct 2009 15:09:28 GMT"
}
]
| 2009-10-05T00:00:00 | [
[
"Mossel",
"Elchanan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0901.4728 | Krishnendu Chatterjee | Dietmar Berwanger and Krishnendu Chatterjee and Martin De Wulf and
Laurent Doyen and Thomas A. Henzinger | Alpaga: A Tool for Solving Parity Games with Imperfect Information | 11 pages, a shorter version to appear in TACAS 2009 | null | null | null | cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Alpaga is a solver for two-player parity games with imperfect information.
Given the description of a game, it determines whether the first player can
ensure to win and, if so, it constructs a winning strategy. The tool provides a
symbolic implementation of a recent algorithm based on antichains.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 17:34:36 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Berwanger",
"Dietmar",
""
],
[
"Chatterjee",
"Krishnendu",
""
],
[
"De Wulf",
"Martin",
""
],
[
"Doyen",
"Laurent",
""
],
[
"Henzinger",
"Thomas A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.4747 | Jean-Guillaume Dumas | Jean-Guillaume Dumas (LJK), Cl\'ement Pernet (INRIA Rh\^one-Alpes /
LIG Laboratoire d'Informatique de Grenoble), B. David Saunders (CIS) | On finding multiplicities of characteristic polynomial factors of
black-box matrices | null | (International Symposium on Symbolic and Algebraic Computation
2009), S\'eoul : Cor\'ee, R\'epublique de (2009) | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present algorithms and heuristics to compute the characteristic polynomial
of a matrix given its minimal polynomial. The matrix is represented as a
black-box, i.e., by a function to compute its matrix-vector product. The
methods apply to matrices either over the integers or over a large enough
finite field. Experiments show that these methods perform efficiently in
practice. Combined in an adaptive strategy, these algorithms reach significant
speedups in practice for some integer matrices arising in an application from
graph theory.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 18:51:24 GMT"
},
{
"version": "v2",
"created": "Mon, 18 May 2009 15:06:48 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Pernet",
"Clément",
"",
"INRIA Rhône-Alpes /\n LIG Laboratoire d'Informatique de Grenoble"
],
[
"Saunders",
"B. David",
"",
"CIS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0901.4754 | Robert Frank Carslaw Walters | L. de Francesco Albasini, N. Sabadini, R.F.C. Walters | An algebra of automata which includes both classical and quantum
entities | null | null | null | null | cs.LO math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe an algebra for composing automata which includes both classical
and quantum entities and their communications. We illustrate by describing in
detail a quantum protocol.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 19:28:13 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Albasini",
"L. de Francesco",
""
],
[
"Sabadini",
"N.",
""
],
[
"Walters",
"R. F. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
]
|
0901.4761 | Philippe Fournier-Viger | P. Fournier-Viger, R. Nkambou and E. Mephu Nguifo | A Knowledge Discovery Framework for Learning Task Models from User
Interactions in Intelligent Tutoring Systems | Proceedings of the 7th Mexican International Conference on Artificial
Intelligence (MICAI 2008), Springer, pp. 765-778 | null | 10.1007/978-3-540-88636-5 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Domain experts should provide relevant domain knowledge to an Intelligent
Tutoring System (ITS) so that it can guide a learner during problemsolving
learning activities. However, for many ill-defined domains, the domain
knowledge is hard to define explicitly. In previous works, we showed how
sequential pattern mining can be used to extract a partial problem space from
logged user interactions, and how it can support tutoring services during
problem-solving exercises. This article describes an extension of this approach
to extract a problem space that is richer and more adapted for supporting
tutoring services. We combined sequential pattern mining with (1) dimensional
pattern mining (2) time intervals, (3) the automatic clustering of valued
actions and (4) closed sequences mining. Some tutoring services have been
implemented and an experiment has been conducted in a tutoring system.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 19:58:09 GMT"
}
]
| 2009-01-30T00:00:00 | [
[
"Fournier-Viger",
"P.",
""
],
[
"Nkambou",
"R.",
""
],
[
"Nguifo",
"E. Mephu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.4762 | Adam Barker | Adam Barker | Optimizing Service Orchestrations | 12 pages, 13 figures | null | null | null | cs.DC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the number of services and the size of data involved in workflows
increases, centralised orchestration techniques are reaching the limits of
scalability. In the classic orchestration model, all data passes through a
centralised engine, which results in unnecessary data transfer, wasted
bandwidth and the engine to become a bottleneck to the execution of a workflow.
This paper presents and evaluates the Circulate architecture which maintains
the robustness and simplicity of centralised orchestration, but facilitates
choreography by allowing services to exchange data directly with one another.
Circulate could be realised within any existing workflow framework, in this
paper, we focus on WS-Circulate, a Web services based implementation.
Taking inspiration from the Montage workflow, a number of common workflow
patterns (sequence, fan-in and fan-out), input to output data size
relationships and network configurations are identified and evaluated. The
performance analysis concludes that a substantial reduction in communication
overhead results in a 2-4 fold performance benefit across all patterns. An
end-to-end pattern through the Montage workflow results in an 8 fold
performance benefit and demonstrates how the advantage of using the Circulate
architecture increases as the complexity of a workflow grows.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 20:30:35 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Barker",
"Adam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0901.4784 | Fabio G. Guerrero Moreno | Fabio G. Guerrero | On the Entropy of Written Spanish | Submitted to the IEEE Transactions on Information Theory | Revista Colombiana de Estadistica (RCE), Vol. 35, No. 3, Dec.
2012, pp 423-440 | null | null | cs.CL cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper reports on results on the entropy of the Spanish language. They
are based on an analysis of natural language for n-word symbols (n = 1 to 18),
trigrams, digrams, and characters. The results obtained in this work are based
on the analysis of twelve different literary works in Spanish, as well as a
279917 word news file provided by the Spanish press agency EFE. Entropy values
are calculated by a direct method using computer processing and the probability
law of large numbers. Three samples of artificial Spanish language produced by
a first-order model software source are also analyzed and compared with natural
Spanish language.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 03:46:01 GMT"
}
]
| 2013-01-15T00:00:00 | [
[
"Guerrero",
"Fabio G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4798 | Abhishek Parakh | Abhishek Parakh and Subhash Kak | Space Efficient Secret Sharing | 5 pages; with corrections | 4th Annual Computer Science Research Conference at the University
of Oklahoma, April 18, 2009 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This note proposes a method of space efficient secret sharing in which k
secrets are mapped into n shares (n>=k) of the same size. Since, n can be
chosen to be equal to k, the method is space efficient. This method may be
compared with conventional secret sharing schemes that divide a single secret
into n shares.
| [
{
"version": "v1",
"created": "Thu, 29 Jan 2009 22:38:54 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Feb 2009 16:19:45 GMT"
}
]
| 2010-01-11T00:00:00 | [
[
"Parakh",
"Abhishek",
""
],
[
"Kak",
"Subhash",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.4814 | Abhishek Parakh | Abhishek Parakh and Subhash Kak | Space Efficient Secret Sharing: A Recursive Approach | 8 pages | null | null | Cryptology ePrint Archive: Report 2009/365 | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a recursive secret sharing technique that distributes k-1
secrets of length b each into n shares such that each share is effectively of
length (n/(k-1))*b and any k pieces suffice for reconstructing all the k-1
secrets. Since n/(k-1) is near the optimal factor of n/k, and can be chosen to
be close to 1, the proposed technique is space efficient. Furthermore, each
share is information theoretically secure, i.e. it does not depend on any
unproven assumption of computational intractability. Such a recursive technique
has potential applications in secure and reliable storage of information on the
Web and in sensor networks.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 02:08:03 GMT"
}
]
| 2010-01-11T00:00:00 | [
[
"Parakh",
"Abhishek",
""
],
[
"Kak",
"Subhash",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.4830 | Lan Zhang | Lan Zhang, Rui Zhang, Ying-Chang Liang, Yan Xin, Shuguang Cui | On the Relationship Between the Multi-antenna Secrecy Communications and
Cognitive Radio Communications | 26 pages, 6 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the capacity of the multi-antenna or multiple-input
multiple-output (MIMO) secrecy channels with multiple eavesdroppers having
single/multiple antennas. It is known that the MIMO secrecy capacity is
achievable with the optimal transmit covariance matrix that maximizes the
minimum difference between the channel mutual information of the secrecy user
and those of the eavesdroppers. The MIMO secrecy capacity computation can thus
be formulated as a non-convex max-min problem, which cannot be solved
efficiently by standard convex optimization techniques. To handle this
difficulty, we explore a relationship between the MIMO secrecy channel and the
recently developed MIMO cognitive radio (CR) channel, in which the
multi-antenna secondary user transmits over the same spectrum simultaneously
with multiple primary users, subject to the received interference power
constraints at the primary users, or the so-called ``interference temperature
(IT)'' constraints. By constructing an auxiliary CR MIMO channel that has the
same channel responses as the MIMO secrecy channel, we prove that the optimal
transmit covariance matrix to achieve the secrecy capacity is the same as that
to achieve the CR spectrum sharing capacity with properly selected IT
constraints. Based on this relationship, several algorithms are proposed to
solve the non-convex secrecy capacity computation problem by transforming it
into a sequence of CR spectrum sharing capacity computation problems that are
convex. For the case with single-antenna eavesdroppers, the proposed algorithms
obtain the exact capacity of the MIMO secrecy channel, while for the case with
multi-antenna eavesdroppers, the proposed algorithms obtain both upper and
lower bounds on the MIMO secrecy capacity.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 06:56:00 GMT"
}
]
| 2009-02-02T00:00:00 | [
[
"Zhang",
"Lan",
""
],
[
"Zhang",
"Rui",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Xin",
"Yan",
""
],
[
"Cui",
"Shuguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4835 | Yoo Chung | Yoo Chung, Dongman Lee | A Mathematical Basis for the Chaining of Lossy Interface Adapters | 22 pages, 6 figures | IET Software, 4(1):54-54, February 2010 | 10.1049/iet-sen.2009.0019 | null | cs.DM cs.DC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite providing similar functionality, multiple network services may
require the use of different interfaces to access the functionality, and this
problem will only get worse with the widespread deployment of ubiquitous
computing environments. One way around this problem is to use interface
adapters that adapt one interface into another. Chaining these adapters allows
flexible interface adaptation with fewer adapters, but the loss incurred due to
imperfect interface adaptation must be considered. This paper outlines a
mathematical basis for analyzing the chaining of lossy interface adapters. We
also show that the problem of finding an optimal interface adapter chain is
NP-complete.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 08:17:43 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Feb 2009 14:46:00 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jul 2009 03:23:34 GMT"
},
{
"version": "v4",
"created": "Wed, 10 Feb 2010 01:24:15 GMT"
}
]
| 2010-02-10T00:00:00 | [
[
"Chung",
"Yoo",
""
],
[
"Lee",
"Dongman",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0901.4846 | Philippe Robert | Youssef Azzana (EI), Yousra Chabchoub (INRIA), Christine Fricker,
Fabrice Guillemin (FT R&D), Philippe Robert | Adaptive algorithms for identifying large flows in IP traffic | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose in this paper an on-line algorithm based on Bloom filters for
identifying large flows in IP traffic (a.k.a. elephants). Because of the large
number of small flows, hash tables of these algorithms have to be regularly
refreshed. Recognizing that the periodic erasure scheme usually used in the
technical literature turns out to be quite inefficient when using real traffic
traces over a long period of time, we introduce a simple adaptive scheme that
closely follows the variations of traffic. When tested against real traffic
traces, the proposed on-line algorithm performs well in the sense that the
detection ratio of long flows by the algorithm over a long time period is quite
high. Beyond the identification of elephants, this same class of algorithms is
applied to the closely related problem of detection of anomalies in IP traffic,
e.g., SYN flood due for instance to attacks. An algorithm for detecting SYN and
volume flood anomalies in Internet traffic is designed. Experiments show that
an anomaly is detected in less than one minute and the targeted destinations
are identified at the same time.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 09:41:09 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Jun 2009 15:26:38 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Azzana",
"Youssef",
"",
"EI"
],
[
"Chabchoub",
"Yousra",
"",
"INRIA"
],
[
"Fricker",
"Christine",
"",
"FT R&D"
],
[
"Guillemin",
"Fabrice",
"",
"FT R&D"
],
[
"Robert",
"Philippe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.4876 | Robert Brijder | Hendrik Blockeel, Robert Brijder | Non-Confluent NLC Graph Grammar Inference by Compressing Disjoint
Subgraphs | 12 pages, 1 figure | null | null | null | cs.LG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Grammar inference deals with determining (preferable simple) models/grammars
consistent with a set of observations. There is a large body of research on
grammar inference within the theory of formal languages. However, there is
surprisingly little known on grammar inference for graph grammars. In this
paper we take a further step in this direction and work within the framework of
node label controlled (NLC) graph grammars. Specifically, we characterize,
given a set of disjoint and isomorphic subgraphs of a graph $G$, whether or not
there is a NLC graph grammar rule which can generate these subgraphs to obtain
$G$. This generalizes previous results by assuming that the set of isomorphic
subgraphs is disjoint instead of non-touching. This leads naturally to consider
the more involved ``non-confluent'' graph grammar rules.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 12:44:29 GMT"
}
]
| 2009-02-02T00:00:00 | [
[
"Blockeel",
"Hendrik",
""
],
[
"Brijder",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0901.4898 | Rui Costa | Joao Barros, Rui A. Costa, Daniele Munaretto, Joerg Widmer | Effective Delay Control in Online Network Coding | 9 pages, IEEE Infocom 2009 | null | 10.1109/INFCOM.2009.5061923 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by streaming applications with stringent delay constraints, we
consider the design of online network coding algorithms with timely delivery
guarantees. Assuming that the sender is providing the same data to multiple
receivers over independent packet erasure channels, we focus on the case of
perfect feedback and heterogeneous erasure probabilities. Based on a general
analytical framework for evaluating the decoding delay, we show that existing
ARQ schemes fail to ensure that receivers with weak channels are able to
recover from packet losses within reasonable time. To overcome this problem, we
re-define the encoding rules in order to break the chains of linear
combinations that cannot be decoded after one of the packets is lost. Our
results show that sending uncoded packets at key times ensures that all the
receivers are able to meet specific delay requirements with very high
probability.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 15:00:36 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Barros",
"Joao",
""
],
[
"Costa",
"Rui A.",
""
],
[
"Munaretto",
"Daniele",
""
],
[
"Widmer",
"Joerg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.4904 | Arnab Kumar Ray | Rajiv Nair, G. Nagarjuna, Arnab K. Ray | Finite-size effects in the dependency networks of free and open-source
software | ReVTeX, 9 pages, 7 figures. Major revisions in Sections III and IV of
this version. The bibliography has been updated | Complex Systems, 23, 71, 2014 | null | null | cs.OH physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a continuum model for the degree distribution of directed networks
in free and open-source software. The degree distributions of links in both the
in-directed and out-directed dependency networks follow Zipf's law for the
intermediate nodes, but the heavily linked nodes and the poorly linked nodes
deviate from this trend and exhibit finite-size effects. The finite-size
parameters make a quantitative distinction between the in-directed and
out-directed networks. For the out-degree distribution, the initial condition
for a dynamic evolution corresponds to the limiting count of the most heavily
liked nodes that the out-directed network can finally have. The number of nodes
contributing out-directed links grows with every generation of software
release, but this growth ultimately saturates towards a terminal value due to
the finiteness of semantic possibilities in the network.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 15:17:20 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Jul 2009 20:03:42 GMT"
},
{
"version": "v3",
"created": "Sat, 3 Jul 2010 05:08:25 GMT"
},
{
"version": "v4",
"created": "Sun, 13 Apr 2014 06:21:32 GMT"
}
]
| 2014-04-15T00:00:00 | [
[
"Nair",
"Rajiv",
""
],
[
"Nagarjuna",
"G.",
""
],
[
"Ray",
"Arnab K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0901.4934 | Carl Hewitt | Carl Hewitt | A historical perspective on developing foundations iInfo(TM) information
systems: iConsult(TM) and iEntertain(TM) apps using iDescribers(TM)
information integration for iOrgs(TM) information systems | updated title and abstract | null | null | null | cs.DC cs.DB cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Technology now at hand can integrate all kinds of digital information for
individuals, groups, and organizations so their information usefully links
together. iInfo(TM) information integration works by making connections
including examples like the following:
- A statistical connection between "being in a traffic jam" and "driving in
downtown Trenton between 5PM and 6PM on a weekday."
- A terminological connection between "MSR" and "Microsoft Research."
- A causal connection between "joining a group" and "being a member of the
group."
- A syntactic connection between "a pin dropped" and "a dropped pin."
- A biological connection between "a dolphin" and "a mammal".
- A demographic connection between "undocumented residents of California" and
"7% of the population of California."
- A geographical connection between "Leeds" and "England."
- A temporal connection between "turning on a computer" and "joining an
on-line discussion."
By making these connections, iInfo offers tremendous value for individuals,
families, groups, and organizations in making more effective use of information
technology.
In practice, integrated information is invariably pervasively inconsistent.
Therefore iInfo must be able to make connections even in the face of
inconsistency. The business of iInfo is not to make difficult decisions like
deciding the ultimate truth or probability of propositions. Instead it provides
means for processing information and carefully recording its provenance
including arguments (including arguments about arguments) for and against
propositions that is used by iConsult(TM) and iEntertain(TM) apps in iOrgs(TM)
Information Systems.
A historical perspective on the above questions is highly pertinent to the
current quest to develop foundations for privacy-friendly client-cloud
computing.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 17:33:14 GMT"
},
{
"version": "v10",
"created": "Tue, 17 Nov 2009 12:54:00 GMT"
},
{
"version": "v11",
"created": "Tue, 24 Nov 2009 15:36:18 GMT"
},
{
"version": "v12",
"created": "Tue, 29 Dec 2009 22:54:57 GMT"
},
{
"version": "v13",
"created": "Thu, 7 Jan 2010 20:11:54 GMT"
},
{
"version": "v14",
"created": "Tue, 12 Jan 2010 19:19:22 GMT"
},
{
"version": "v15",
"created": "Thu, 21 Jan 2010 21:50:00 GMT"
},
{
"version": "v16",
"created": "Thu, 8 Apr 2010 21:48:15 GMT"
},
{
"version": "v17",
"created": "Mon, 19 Apr 2010 04:13:36 GMT"
},
{
"version": "v18",
"created": "Tue, 20 Apr 2010 12:27:24 GMT"
},
{
"version": "v19",
"created": "Mon, 26 Apr 2010 15:18:50 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Feb 2009 01:37:44 GMT"
},
{
"version": "v20",
"created": "Mon, 4 Oct 2010 21:16:49 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Apr 2009 11:54:47 GMT"
},
{
"version": "v4",
"created": "Mon, 1 Jun 2009 23:05:51 GMT"
},
{
"version": "v5",
"created": "Mon, 20 Jul 2009 00:53:03 GMT"
},
{
"version": "v6",
"created": "Sun, 2 Aug 2009 21:06:55 GMT"
},
{
"version": "v7",
"created": "Tue, 29 Sep 2009 18:19:02 GMT"
},
{
"version": "v8",
"created": "Fri, 2 Oct 2009 14:42:21 GMT"
},
{
"version": "v9",
"created": "Thu, 29 Oct 2009 21:14:14 GMT"
}
]
| 2010-10-06T00:00:00 | [
[
"Hewitt",
"Carl",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0901.4953 | Marcelo Hashimoto | Marcelo Hashimoto and Roberto M. Cesar Jr | A Keygraph Classification Framework for Real-Time Object Detection | 9 pages, 23 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a new approach for keypoint-based object detection.
Traditional keypoint-based methods consist in classifying individual points and
using pose estimation to discard misclassifications. Since a single point
carries no relational features, such methods inherently restrict the usage of
structural information to the pose estimation phase. Therefore, the classifier
considers purely appearance-based feature vectors, thus requiring
computationally expensive feature extraction or complex probabilistic modelling
to achieve satisfactory robustness. In contrast, our approach consists in
classifying graphs of keypoints, which incorporates structural information
during the classification phase and allows the extraction of simpler feature
vectors that are naturally robust. In the present work, 3-vertices graphs have
been considered, though the methodology is general and larger order graphs may
be adopted. Successful experimental results obtained for real-time object
detection in video sequences are reported.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 19:38:44 GMT"
}
]
| 2009-02-02T00:00:00 | [
[
"Hashimoto",
"Marcelo",
""
],
[
"Cesar",
"Roberto M.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0901.4963 | Usef Faghihi | Usef Faghihi, Philippe Fournier-Viger, Roger Nkambou, Pierre Poirier,
Andre Mayers | How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose the CTS (Concious Tutoring System) technology, a
biologically plausible cognitive agent based on human brain functions.This
agent is capable of learning and remembering events and any related information
such as corresponding procedures, stimuli and their emotional valences. Our
proposed episodic memory and episodic learning mechanism are closer to the
current multiple-trace theory in neuroscience, because they are inspired by it
[5] contrary to other mechanisms that are incorporated in cognitive agents.
This is because in our model emotions play a role in the encoding and
remembering of events. This allows the agent to improve its behavior by
remembering previously selected behaviors which are influenced by its emotional
mechanism. Moreover, the architecture incorporates a realistic memory
consolidation process based on a data mining algorithm.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 19:36:18 GMT"
}
]
| 2009-02-02T00:00:00 | [
[
"Faghihi",
"Usef",
""
],
[
"Fournier-Viger",
"Philippe",
""
],
[
"Nkambou",
"Roger",
""
],
[
"Poirier",
"Pierre",
""
],
[
"Mayers",
"Andre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.0019 | Dirk Beyer | Dirk Beyer, M. Erkan Keremoglu | CPAchecker: A Tool for Configurable Software Verification | 8 pages (6 without cover), 2 figures, 2 tables, tool paper, Web page:
http://www.cs.sfu.ca/~dbeyer/CPAchecker | null | null | SFU-CS-2009-02 | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Configurable software verification is a recent concept for expressing
different program analysis and model checking approaches in one single
formalism. This paper presents CPAchecker, a tool and framework that aims at
easy integration of new verification components. Every abstract domain,
together with the corresponding operations, is required to implement the
interface of configurable program analysis (CPA). The main algorithm is
configurable to perform a reachability analysis on arbitrary combinations of
existing CPAs. The major design goal during the development was to provide a
framework for developers that is flexible and easy to extend. We hope that
researchers find it convenient and productive to implement new verification
ideas and algorithms using this platform and that it advances the field by
making it easier to perform practical experiments. The tool is implemented in
Java and runs as command-line tool or as Eclipse plug-in. We evaluate the
efficiency of our tool on benchmarks from the software model checker BLAST. The
first released version of CPAchecker implements CPAs for predicate abstraction,
octagon, and explicit-value domains. Binaries and the source code of CPAchecker
are publicly available as free software.
| [
{
"version": "v1",
"created": "Fri, 30 Jan 2009 22:19:52 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Beyer",
"Dirk",
""
],
[
"Keremoglu",
"M. Erkan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0902.0026 | Marco Duarte | Joel A. Tropp, Jason N. Laska, Marco F. Duarte, Justin K. Romberg,
Richard G. Baraniuk | Beyond Nyquist: Efficient Sampling of Sparse Bandlimited Signals | 24 pages, 8 figures | IEEE Trans. Inform. Theory, Vol.56, num. 1, pp. 520-544, Jan. 2010 | 10.1109/TIT.2009.2034811 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wideband analog signals push contemporary analog-to-digital conversion
systems to their performance limits. In many applications, however, sampling at
the Nyquist rate is inefficient because the signals of interest contain only a
small number of significant frequencies relative to the bandlimit, although the
locations of the frequencies may not be known a priori. For this type of sparse
signal, other sampling strategies are possible. This paper describes a new type
of data acquisition system, called a random demodulator, that is constructed
from robust, readily available components. Let K denote the total number of
frequencies in the signal, and let W denote its bandlimit in Hz. Simulations
suggest that the random demodulator requires just O(K log(W/K)) samples per
second to stably reconstruct the signal. This sampling rate is exponentially
lower than the Nyquist rate of W Hz. In contrast with Nyquist sampling, one
must use nonlinear methods, such as convex programming, to recover the signal
from the samples taken by the random demodulator. This paper provides a
detailed theoretical analysis of the system's performance that supports the
empirical observations.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2009 05:00:26 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Sep 2009 00:52:55 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Tropp",
"Joel A.",
""
],
[
"Laska",
"Jason N.",
""
],
[
"Duarte",
"Marco F.",
""
],
[
"Romberg",
"Justin K.",
""
],
[
"Baraniuk",
"Richard G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0043 | Christoph Benzmueller | Christoph Benzmueller, Chad E. Brown, Michael Kohlhase | Cut-Simulation and Impredicativity | 21 pages | Logical Methods in Computer Science, Volume 5, Issue 1 (March 3,
2009) lmcs:1144 | 10.2168/LMCS-5(1:6)2009 | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate cut-elimination and cut-simulation in impredicative
(higher-order) logics. We illustrate that adding simple axioms such as Leibniz
equations to a calculus for an impredicative logic -- in our case a sequent
calculus for classical type theory -- is like adding cut. The phenomenon
equally applies to prominent axioms like Boolean- and functional
extensionality, induction, choice, and description. This calls for the
development of calculi where these principles are built-in instead of being
treated axiomatically.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2009 03:24:08 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Mar 2009 23:37:34 GMT"
}
]
| 2019-03-14T00:00:00 | [
[
"Benzmueller",
"Christoph",
""
],
[
"Brown",
"Chad E.",
""
],
[
"Kohlhase",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.0047 | Kazuyuki Amano | Kazuyuki Amano | Bounds on the Size of Small Depth Circuits for Approximating Majority | 12 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we show that for every constant $0 < \epsilon < 1/2$ and for
every constant $d \geq 2$, the minimum size of a depth $d$ Boolean circuit that
$\epsilon$-approximates Majority function on $n$ variables is
exp$(\Theta(n^{1/(2d-2)}))$. The lower bound for every $d \geq 2$ and the upper
bound for $d=2$ have been previously shown by O'Donnell and Wimmer [ICALP'07],
and the contribution of this paper is to give a matching upper bound for $d
\geq 3$.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2009 04:22:52 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Amano",
"Kazuyuki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.0056 | Babatunde Okunoye | O. Babatunde Okunoye | An Alternative Cracking of The Genetic Code | 31 pages, 23 figures | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We Propose 22 unique Solutions to the Genetic Code. An Alternative Cracking,
from the Perspective of a Mathematician.
| [
{
"version": "v1",
"created": "Sat, 31 Jan 2009 10:40:06 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Okunoye",
"O. Babatunde",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0902.0058 | Robert Rolland | Robert Rolland | The second weight of generalized Reed-Muller codes in most cases | This version corrects minor misprints and gives a more detailed proof
of a combinatorial lemma | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The second weight of the Generalized Reed-Muller code of order $d$ over the
finite field with $q$ elements is now known for $d <q$ and $d>(n-1)(q-1)$. In
this paper, we determine the second weight for the other values of $d$ which
are not multiple of $q-1$ plus 1. For the special case $d=a(q-1)+1$ we give an
estimate.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2009 23:22:23 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 04:18:17 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Rolland",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0084 | Miled Abdelwaheb | Abdelwaheb Miled | On a problem of Frobenius in three numbers | 5 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For three positive integers ai, aj, ak pairwise coprime, we present an
algorithm that find the least multiple of ai that is a positive linear
combination of aj, ak. The average running time of this algorithm is O(1).
Using this algorithm and the chinese remainder theorem leads to a direct
computation of the Frobenius number f(a1, a2, a3).
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 14:13:52 GMT"
},
{
"version": "v2",
"created": "Mon, 25 May 2009 17:37:11 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Miled",
"Abdelwaheb",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.0101 | Michael Ummels | Michael Ummels and Dominik Wojtczak | The Complexity of Nash Equilibria in Simple Stochastic Multiplayer Games | 23 pages; revised version | null | 10.1007/978-3-642-02930-1_25 | EDI-INF-RR-1323 | cs.GT cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyse the computational complexity of finding Nash equilibria in simple
stochastic multiplayer games. We show that restricting the search space to
equilibria whose payoffs fall into a certain interval may lead to
undecidability. In particular, we prove that the following problem is
undecidable: Given a game G, does there exist a pure-strategy Nash equilibrium
of G where player 0 wins with probability 1. Moreover, this problem remains
undecidable if it is restricted to strategies with (unbounded) finite memory.
However, if mixed strategies are allowed, decidability remains an open problem.
One way to obtain a provably decidable variant of the problem is restricting
the strategies to be positional or stationary. For the complexity of these two
problems, we obtain a common lower bound of NP and upper bounds of NP and
PSPACE respectively.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 16:09:28 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Apr 2009 19:54:43 GMT"
},
{
"version": "v3",
"created": "Fri, 10 Apr 2009 20:12:06 GMT"
}
]
| 2010-06-24T00:00:00 | [
[
"Ummels",
"Michael",
""
],
[
"Wojtczak",
"Dominik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.0133 | Travis Gagie | Travis Gagie | New Algorithms and Lower Bounds for Sequential-Access Data Compression | draft of PhD thesis | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This thesis concerns sequential-access data compression, i.e., by algorithms
that read the input one or more times from beginning to end. In one chapter we
consider adaptive prefix coding, for which we must read the input character by
character, outputting each character's self-delimiting codeword before reading
the next one. We show how to encode and decode each character in constant
worst-case time while producing an encoding whose length is worst-case optimal.
In another chapter we consider one-pass compression with memory bounded in
terms of the alphabet size and context length, and prove a nearly tight
tradeoff between the amount of memory we can use and the quality of the
compression we can achieve. In a third chapter we consider compression in the
read/write streams model, which allows us passes and memory both
polylogarithmic in the size of the input. We first show how to achieve
universal compression using only one pass over one stream. We then show that
one stream is not sufficient for achieving good grammar-based compression.
Finally, we show that two streams are necessary and sufficient for achieving
entropy-only bounds.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2009 16:03:08 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Gagie",
"Travis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0140 | Kook Jin Ahn | Kook Jin Ahn, Sudipto Guha | Graph Sparsification in the Semi-streaming Model | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analyzing massive data sets has been one of the key motivations for studying
streaming algorithms. In recent years, there has been significant progress in
analysing distributions in a streaming setting, but the progress on graph
problems has been limited. A main reason for this has been the existence of
linear space lower bounds for even simple problems such as determining the
connectedness of a graph. However, in many new scenarios that arise from social
and other interaction networks, the number of vertices is significantly less
than the number of edges. This has led to the formulation of the semi-streaming
model where we assume that the space is (near) linear in the number of vertices
(but not necessarily the edges), and the edges appear in an arbitrary (and
possibly adversarial) order.
In this paper we focus on graph sparsification, which is one of the major
building blocks in a variety of graph algorithms. There has been a long history
of (non-streaming) sampling algorithms that provide sparse graph approximations
and it a natural question to ask if the sparsification can be achieved using a
small space, and in addition using a single pass over the data? The question is
interesting from the standpoint of both theory and practice and we answer the
question in the affirmative, by providing a one pass
$\tilde{O}(n/\epsilon^{2})$ space algorithm that produces a sparsification that
approximates each cut to a $(1+\epsilon)$ factor. We also show that $\Omega(n
\log \frac1\epsilon)$ space is necessary for a one pass streaming algorithm to
approximate the min-cut, improving upon the $\Omega(n)$ lower bound that arises
from lower bounds for testing connectivity.
| [
{
"version": "v1",
"created": "Sun, 1 Feb 2009 16:50:53 GMT"
},
{
"version": "v2",
"created": "Tue, 5 May 2009 20:44:32 GMT"
}
]
| 2009-05-05T00:00:00 | [
[
"Ahn",
"Kook Jin",
""
],
[
"Guha",
"Sudipto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.0189 | Zouheir Rezki Dr. | Zouheir Rezki, Francois Gagnon, Vijay Bhargava | The Ergodic Capacity of The MIMO Wire-Tap Channel | 24 pages, 3 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn to provide a more rigorous proof of the
converse of Theorem 1 and Lemma 1 as well.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 03:23:16 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jul 2009 00:38:20 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Rezki",
"Zouheir",
""
],
[
"Gagnon",
"Francois",
""
],
[
"Bhargava",
"Vijay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0221 | Alireza Avanaki | Alireza Avanaki | Over-enhancement Reduction in Local Histogram Equalization using its
Degrees of Freedom | null | null | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A well-known issue of local (adaptive) histogram equalization (LHE) is
over-enhancement (i.e., generation of spurious details) in homogenous areas of
the image. In this paper, we show that the LHE problem has many solutions due
to the ambiguity in ranking pixels with the same intensity. The LHE solution
space can be searched for the images having the maximum PSNR or structural
similarity (SSIM) with the input image. As compared to the results of the prior
art, these solutions are more similar to the input image while offering the
same local contrast.
Index Terms: histogram modification or specification, contrast enhancement
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 10:41:53 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Sep 2009 10:14:32 GMT"
}
]
| 2009-09-14T00:00:00 | [
[
"Avanaki",
"Alireza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0902.0239 | Andrzej Woszczyna | Wojciech Czaja, Zdzislaw A. Golda, Andrzej Woszczyna | The acoustic wave equation in the expanding universe. Sachs-Wolfe
theorem | 5 pages LaTeX, Some minor changes introduced | null | null | null | cs.SC gr-qc physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper the acoustic field propagating in the early hot ($p=\epsilon/$)
universe of arbitrary space curvature ($K=0, \pm 1$) is considered. The field
equations are reduced to the d'Alembert equation in an auxiliary static
Roberson-Walker space-time. Symbolic computation in {\em Mathematica} is
applied.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 10:36:47 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Apr 2009 11:32:15 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Apr 2009 10:11:20 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Czaja",
"Wojciech",
""
],
[
"Golda",
"Zdzislaw A.",
""
],
[
"Woszczyna",
"Andrzej",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
}
]
|
0902.0241 | Baris Baykant Alagoz | B. Baykant Alagoz | Hierarchical Triple-Modular Redundancy (H-TMR) Network For Digital
Systems | Proposition section was added | OncuBilim Algorithm And Systems Labs. Vol.08, Art.No:05,(2008) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Hierarchical application of Triple-Modular Redundancy (TMR) increases fault
tolerance of digital Integrated Circuit (IC). In this paper, a simple
probabilistic model was proposed for analysis of fault masking performance of
hierarchical TMR networks. Performance improvements obtained by second order
TMR network were theoretically compared with first order TMR network.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 10:38:54 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Feb 2009 11:19:04 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Alagoz",
"B. Baykant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0902.0261 | Tomoyuki Yamakami | Tomoyuki Yamakami | Immunity and Pseudorandomness of Context-Free Languages | A4, 23 pages, 10 pt. A complete revision of the initial version that
was posted in February 2009 | Theoretical Computer Science, vol. 412, pp.6432-6450, 2011 | 10.1016/j.tcs.2011.07.013 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss the computational complexity of context-free languages,
concentrating on two well-known structural properties---immunity and
pseudorandomness. An infinite language is REG-immune (resp., CFL-immune) if it
contains no infinite subset that is a regular (resp., context-free) language.
We prove that (i) there is a context-free REG-immune language outside REG/n and
(ii) there is a REG-bi-immune language that can be computed deterministically
using logarithmic space. We also show that (iii) there is a CFL-simple set,
where a CFL-simple language is an infinite context-free language whose
complement is CFL-immune. Similar to the REG-immunity, a REG-primeimmune
language has no polynomially dense subsets that are also regular. We further
prove that (iv) there is a context-free language that is REG/n-bi-primeimmune.
Concerning pseudorandomness of context-free languages, we show that (v) CFL
contains REG/n-pseudorandom languages. Finally, we prove that (vi) against
REG/n, there exists an almost 1-1 pseudorandom generator computable in
nondeterministic pushdown automata equipped with a write-only output tape and
(vii) against REG, there is no almost 1-1 weakly pseudorandom generator
computable deterministically in linear time by a single-tape Turing machine.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 12:21:23 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jul 2011 13:18:33 GMT"
}
]
| 2011-09-20T00:00:00 | [
[
"Yamakami",
"Tomoyuki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0902.0271 | Jarek Duda | Jarek Duda | Asymmetric numeral systems | 47 pages, 6 figures | null | null | null | cs.IT cs.CR math.GM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper will be presented new approach to entropy coding: family of
generalizations of standard numeral systems which are optimal for encoding
sequence of equiprobable symbols, into asymmetric numeral systems - optimal for
freely chosen probability distributions of symbols. It has some similarities to
Range Coding but instead of encoding symbol in choosing a range, we spread
these ranges uniformly over the whole interval. This leads to simpler encoder -
instead of using two states to define range, we need only one. This approach is
very universal - we can obtain from extremely precise encoding (ABS) to
extremely fast with possibility to additionally encrypt the data (ANS). This
encryption uses the key to initialize random number generator, which is used to
calculate the coding tables. Such preinitialized encryption has additional
advantage: is resistant to brute force attack - to check a key we have to make
whole initialization. There will be also presented application for new approach
to error correction: after an error in each step we have chosen probability to
observe that something was wrong. There will be also presented application for
new approach to error correction: after an error in each step we have chosen
probability to observe that something was wrong. We can get near Shannon's
limit for any noise level this way with expected linear time of correction.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 16:07:06 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Feb 2009 18:18:17 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Mar 2009 14:09:40 GMT"
},
{
"version": "v4",
"created": "Fri, 3 Apr 2009 19:59:53 GMT"
},
{
"version": "v5",
"created": "Thu, 21 May 2009 20:18:13 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Duda",
"Jarek",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0320 | Michael Chertkov | Vladimir Y. Chernyak (Wayne State) and Michael Chertkov (LANL) | Planar Graphical Models which are Easy | 27 pages, 11 figures; misprints corrected | null | 10.1088/1742-5468/2010/11/P11007 | LA-UR 09-00533 | cond-mat.stat-mech cond-mat.dis-nn cs.CC cs.IT math-ph math.IT math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a rich family of binary variables statistical mechanics models on
a given planar graph which are equivalent to Gaussian Grassmann Graphical
models (free fermions) defined on the same graph. Calculation of the partition
function (weighted counting) for such a model is easy (of polynomial
complexity) as reducible to evaluation of a Pfaffian of a matrix of size equal
to twice the number of edges in the graph. In particular, this approach touches
upon Holographic Algorithms of Valiant and utilizes the Gauge Transformations
discussed in our previous works.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 17:23:26 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Dec 2009 23:41:30 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Feb 2010 03:26:46 GMT"
},
{
"version": "v4",
"created": "Fri, 2 Jul 2010 17:08:59 GMT"
},
{
"version": "v5",
"created": "Wed, 29 Sep 2010 16:17:45 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Chernyak",
"Vladimir Y.",
"",
"Wayne State"
],
[
"Chertkov",
"Michael",
"",
"LANL"
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0902.0322 | Gregoire Jacob M. | Gregoire Jacob, Herve Debar and Eric Filiol | Malware Detection using Attribute-Automata to parse Abstract Behavioral
Descriptions | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most behavioral detectors of malware remain specific to a given language and
platform, mostly PE executables for Windows. The objective of this paper is to
define a generic approach for behavioral detection based on two layers
respectively responsible for abstraction and detection. The first abstraction
layer remains specific to a platform and a language. This first layer
interprets the collected instructions, API calls and arguments and classifies
these operations as well as the involved objects according to their purpose in
the malware lifecycle. The second detection layer remains generic and is
totally interoperable between the different abstraction components. This layer
relies on parallel automata parsing attribute-grammars where semantic rules are
used for object typing (object classification) and object binding (data-flow).
To feed detection and to experiment with our approach we have developed two
different abstraction components: one processing system call traces from native
code and one processing the VBScript interpreted language. The different
experimentations have provided promising detection rates, in particular for
script files (89%), with almost none false positives. In the case of process
traces, the detection rate remains significant (51%) but could be increased by
more sophisticated collection tools.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 17:36:48 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Jacob",
"Gregoire",
""
],
[
"Debar",
"Herve",
""
],
[
"Filiol",
"Eric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0902.0337 | Kaibin Huang | Kaibin Huang and Vincent K. N. Lau | Stability and Delay of Zero-Forcing SDMA with Limited Feedback | 26 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the stability and queueing delay of Space Division
Multiple Access (SDMA) systems with bursty traffic, where zero-forcing
beamforming enables simultaneous transmission to multiple mobiles. Computing
beamforming vectors relies on quantized channel state information (CSI)
feedback (limited feedback) from mobiles. Define the stability region for SDMA
as the set of multiuser packet-arrival rates for which the steady-state queue
lengths are finite. Given perfect CSI feedback and equal power allocation over
scheduled queues, the stability region is proved to be a convex polytope having
the derived vertices. For any set of arrival rates in the stability region,
multiuser queues are shown to be stabilized by a joint queue-and-beamforming
control policy that maximizes the departure-rate-weighted sum of queue lengths.
The stability region for limited feedback is found to be the perfect-CSI region
multiplied by one minus a small factor. The required number of feedback bits
per mobile is proved to scale logarithmically with the inverse of the above
factor as well as linearly with the number of transmit antennas minus one. The
effects of limited feedback on queueing delay are also quantified. For Poisson
arrival processes, CSI quantization errors are shown to multiply average
queueing delay by a factor larger than one. This factor can be controlled by
adjusting the number of feedback bits per mobile following the derived
relationship. For general arrival processes, CSI errors are found to increase
Kingman's bound on the tail probability of the instantaneous delay by one plus
a small factor. The required number of feedback bits per mobile is shown to
scale logarithmically with this factor.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 19:05:59 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Huang",
"Kaibin",
""
],
[
"Lau",
"Vincent K. N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0353 | Vahab Mirrokni | Jon Lee, Vahab Mirrokni, Viswanath Nagarjan, Maxim Sviridenko | Non-monotone submodular maximization under matroid and knapsack
constraints | null | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Submodular function maximization is a central problem in combinatorial
optimization, generalizing many important problems including Max Cut in
directed/undirected graphs and in hypergraphs, certain constraint satisfaction
problems, maximum entropy sampling, and maximum facility location problems.
Unlike submodular minimization, submodular maximization is NP-hard. For the
problem of maximizing a non-monotone submodular function, Feige, Mirrokni, and
Vondr\'ak recently developed a $2\over 5$-approximation algorithm \cite{FMV07},
however, their algorithms do not handle side constraints.} In this paper, we
give the first constant-factor approximation algorithm for maximizing any
non-negative submodular function subject to multiple matroid or knapsack
constraints. We emphasize that our results are for {\em non-monotone}
submodular functions. In particular, for any constant $k$, we present a
$({1\over k+2+{1\over k}+\epsilon})$-approximation for the submodular
maximization problem under $k$ matroid constraints, and a $({1\over
5}-\epsilon)$-approximation algorithm for this problem subject to $k$ knapsack
constraints ($\epsilon>0$ is any constant). We improve the approximation
guarantee of our algorithm to ${1\over k+1+{1\over k-1}+\epsilon}$ for $k\ge 2$
partition matroid constraints. This idea also gives a $({1\over
k+\epsilon})$-approximation for maximizing a {\em monotone} submodular function
subject to $k\ge 2$ partition matroids, which improves over the previously best
known guarantee of $\frac{1}{k+1}$.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 20:36:59 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Lee",
"Jon",
""
],
[
"Mirrokni",
"Vahab",
""
],
[
"Nagarjan",
"Viswanath",
""
],
[
"Sviridenko",
"Maxim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.0354 | Sergey Loyka | Victoria Kostina, Sergey Loyka | Optimum Power and Rate Allocation for Coded V-BLAST | accepted by ICC-09 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An analytical framework for minimizing the outage probability of a coded
spatial multiplexing system while keeping the rate close to the capacity is
developed. Based on this framework, specific strategies of optimum power and
rate allocation for the coded V-BLAST architecture are obtained and its
performance is analyzed. A fractional waterfilling algorithm, which is shown to
optimize both the capacity and the outage probability of the coded V-BLAST, is
proposed. Compact, closed-form expressions for the optimum allocation of the
average power are given. The uniform allocation of average power is shown to be
near optimum at moderate to high SNR for the coded V-BLAST with the average
rate allocation (when per-stream rates are set to match the per-stream
capacity). The results reported also apply to multiuser detection and channel
equalization relying on successive interference cancelation.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 20:49:25 GMT"
}
]
| 2009-02-03T00:00:00 | [
[
"Kostina",
"Victoria",
""
],
[
"Loyka",
"Sergey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0382 | Vahab Mirrokni | Vahab Mirrokni and Alexander Skopalik | On the complexity of Nash dynamics and Sink Equilibria | null | null | null | null | cs.GT cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Studying Nash dynamics is an important approach for analyzing the outcome of
games with repeated selfish behavior of self-interested agents. Sink equilibria
has been introduced by Goemans, Mirrokni, and Vetta for studying social cost on
Nash dynamics over pure strategies in games. However, they do not address the
complexity of sink equilibria in these games. Recently, Fabrikant and
Papadimitriou initiated the study of the complexity of Nash dynamics in two
classes of games. In order to completely understand the complexity of Nash
dynamics in a variety of games, we study the following three questions for
various games: (i) given a state in game, can we verify if this state is in a
sink equilibrium or not? (ii) given an instance of a game, can we verify if
there exists any sink equilibrium other than pure Nash equilibria? and (iii)
given an instance of a game, can we verify if there exists a pure Nash
equilibrium (i.e, a sink equilibrium with one state)?
In this paper, we almost answer all of the above questions for a variety of
classes of games with succinct representation, including anonymous games,
player-specific and weighted congestion games, valid-utility games, and
two-sided market games. In particular, for most of these problems, we show that
(i) it is PSPACE-complete to verify if a given state is in a sink equilibrium,
(ii) it is NP-hard to verify if there exists a pure Nash equilibrium in the
game or not, (iii) it is PSPACE-complete to verify if there exists any sink
equilibrium other than pure Nash equilibria. To solve these problems, we
illustrate general techniques that could be used to answer similar questions in
other classes of games.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 21:37:22 GMT"
}
]
| 2009-02-04T00:00:00 | [
[
"Mirrokni",
"Vahab",
""
],
[
"Skopalik",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.0392 | Christos Dimitrakakis | Christos Dimitrakakis | Tree Exploration for Bayesian RL Exploration | 13 pages, 1 figure. Slightly extended and corrected version (notation
errors and lower bound calculation) of homonymous paper presented at the
conference of Computational Intelligence for Modelling, Control and
Automation 2008 (CIMCA'08) | null | null | IAS-08-04 | stat.ML cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Research in reinforcement learning has produced algorithms for optimal
decision making under uncertainty that fall within two main types. The first
employs a Bayesian framework, where optimality improves with increased
computational time. This is because the resulting planning task takes the form
of a dynamic programming problem on a belief tree with an infinite number of
states. The second type employs relatively simple algorithm which are shown to
suffer small regret within a distribution-free framework. This paper presents a
lower bound and a high probability upper bound on the optimal value function
for the nodes in the Bayesian belief tree, which are analogous to similar
bounds in POMDPs. The bounds are then used to create more efficient strategies
for exploring the tree. The resulting algorithms are compared with the
distribution-free algorithm UCB1, as well as a simpler baseline algorithm on
multi-armed bandit problems.
| [
{
"version": "v1",
"created": "Mon, 2 Feb 2009 22:37:23 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Sep 2011 08:13:36 GMT"
}
]
| 2011-09-22T00:00:00 | [
[
"Dimitrakakis",
"Christos",
""
]
]
| [
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0902.0417 | Daniel Salmond | Daniel Salmond, Alex Grant, Terence Chan and Ian Grivell | Decoding Network Codes by Message Passing | 5 pages, submitted to ISIT 2009. Added an additional reference | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we show how to construct a factor graph from a network code.
This provides a systematic framework for decoding using message passing
algorithms. The proposed message passing decoder exploits knowledge of the
underlying communications network topology to simplify decoding. For uniquely
decodeable linear network codes on networks with error-free links, only the
message supports (rather than the message values themselves) are required to be
passed. This proposed simplified support message algorithm is an instance of
the sum-product algorithm. Our message-passing framework provides a basis for
the design of network codes and control of network topology with a view toward
quantifiable complexity reduction in the sink terminals.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 01:38:36 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2009 01:55:28 GMT"
}
]
| 2009-04-21T00:00:00 | [
[
"Salmond",
"Daniel",
""
],
[
"Grant",
"Alex",
""
],
[
"Chan",
"Terence",
""
],
[
"Grivell",
"Ian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0458 | Keith Martin | Keith M. Martin | On the Applicability of Combinatorial Designs to Key Predistribution for
Wireless Sensor Networks | null | null | null | null | cs.CR cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The constraints of lightweight distributed computing environments such as
wireless sensor networks lend themselves to the use of symmetric cryptography
to provide security services. The lack of central infrastructure after
deployment of such networks requires the necessary symmetric keys to be
predistributed to participating nodes. The rich mathematical structure of
combinatorial designs has resulted in the proposal of several key
predistribution schemes for wireless sensor networks based on designs. We
review and examine the appropriateness of combinatorial designs as a tool for
building key predistribution schemes suitable for such environments.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 09:54:41 GMT"
}
]
| 2009-02-04T00:00:00 | [
[
"Martin",
"Keith M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.0465 | Bin Jiang | Bin Jiang and Xintao Liu | AxialGen: A Research Prototype for Automatically Generating the Axial
Map | 9 pages, 4 figures | Proceedings of CUPUM 2009, the 11th International Conference on
Computers in Urban Planning and Urban Management, Hong Kong, 16-18 June 2009 | null | null | cs.RO cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | AxialGen is a research prototype for automatically generating the axial map,
which consists of the least number of the longest visibility lines (or axial
lines) for representing individual linearly stretched parts of open space of an
urban environment. Open space is the space between closed spaces such as
buildings and street blocks. This paper aims to provide an accessible guide to
software AxialGen, and the underlying concepts and ideas. We concentrate on the
explanation and illustration of the key concept of bucket: its definition,
formation and how it is used in generating the axial map.
Keywords: Bucket, visibility, medial axes, axial lines, isovists, axial map
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 10:08:03 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jun 2009 23:11:24 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Apr 2011 16:20:08 GMT"
}
]
| 2011-04-08T00:00:00 | [
[
"Jiang",
"Bin",
""
],
[
"Liu",
"Xintao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0902.0469 | Gregoire Jacob M. | Gregoire Jacob, Eric Filiol and Herve Debar | Formalization of malware through process calculi | Corrected version from CSF reviews Shorter version submitted to
ESORICS | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Since the seminal work from F. Cohen in the eighties, abstract virology has
seen the apparition of successive viral models, all based on Turing-equivalent
formalisms. But considering recent malware such as rootkits or k-ary codes,
these viral models only partially cover these evolved threats. The problem is
that Turing-equivalent models do not support interactive computations. New
models have thus appeared, offering support for these evolved malware, but
loosing the unified approach in the way. This article provides a basis for a
unified malware model founded on process algebras and in particular the
Join-Calculus. In terms of expressiveness, the new model supports the
fundamental definitions based on self-replication and adds support for
interactions, concurrency and non-termination allows the definition of more
complex behaviors. Evolved malware such as rootkits can now be thoroughly
modeled. In terms of detection and prevention, the fundamental results of
undecidability and isolation still hold. However the process-based model has
permitted to establish new results: identification of fragments from the
Join-Calculus where malware detection becomes decidable, formal definition of
the non-infection property, approximate solutions to restrict malware
propagation.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 10:40:36 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Apr 2009 09:08:26 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Jacob",
"Gregoire",
""
],
[
"Filiol",
"Eric",
""
],
[
"Debar",
"Herve",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0902.0514 | Ross Duncan | Lucas Dixon and Ross Duncan | Graphical Reasoning in Compact Closed Categories for Quantum Computation | 21 pages, 9 figures. This is the journal version of the paper
published at AISC | null | null | null | cs.SC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compact closed categories provide a foundational formalism for a variety of
important domains, including quantum computation. These categories have a
natural visualisation as a form of graphs. We present a formalism for
equational reasoning about such graphs and develop this into a generic proof
system with a fixed logical kernel for equational reasoning about compact
closed categories. Automating this reasoning process is motivated by the slow
and error prone nature of manual graph manipulation. A salient feature of our
system is that it provides a formal and declarative account of derived results
that can include `ellipses'-style notation. We illustrate the framework by
instantiating it for a graphical language of quantum computation and show how
this can be used to perform symbolic computation.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 14:21:01 GMT"
}
]
| 2009-02-04T00:00:00 | [
[
"Dixon",
"Lucas",
""
],
[
"Duncan",
"Ross",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.0524 | Sujit Gujar Mr | Sujit Gujar and Y Narahari | An Optimal Multi-Unit Combinatorial Procurement Auction with Single
Minded Bidders | 8 Pages, Managing Complexity in Distributed World, MCDES 2008: IISc
Centenary Conference of Division of Electrical Sciences Added 2 references in
newer version | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The current art in optimal combinatorial auctions is limited to handling the
case of single units of multiple items, with each bidder bidding on exactly one
bundle (single minded bidders). This paper extends the current art by proposing
an optimal auction for procuring multiple units of multiple items when the
bidders are single minded. The auction minimizes the cost of procurement while
satisfying Bayesian incentive compatibility and interim individual rationality.
Under appropriate regularity conditions, this optimal auction also satisfies
dominant strategy incentive compatibility.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 15:05:26 GMT"
},
{
"version": "v2",
"created": "Sun, 8 Feb 2009 17:04:10 GMT"
},
{
"version": "v3",
"created": "Sat, 24 Apr 2010 04:52:31 GMT"
}
]
| 2010-04-27T00:00:00 | [
[
"Gujar",
"Sujit",
""
],
[
"Narahari",
"Y",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0902.0558 | Marc Portoles Comeras | Marc Portoles-Comeras, Albert Cabellos-Aparicio, Josep
Mangues-Bafalluy, Jordi Domingo-Pascual | Analysis of bandwidth measurement methodologies over WLAN systems | 14 pages, 17 figures, | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | WLAN devices have become a fundamental component of nowadays network
deployments. However, even though traditional networking applications run
mostly unchanged over wireless links, the actual interaction between these
applications and the dynamics of wireless transmissions is not yet fully
understood. An important example of such applications are bandwidth estimation
tools. This area has become a mature research topic with well-developed
results. Unfortunately recent studies have shown that the application of these
results to WLAN links is not straightforward. The main reasons for this is that
the assumptions taken to develop bandwidth measurements tools do not hold any
longer in the presence of wireless links (e.g. non-FIFO scheduling). This paper
builds from these observations and its main goal is to analyze the interaction
between probe packets and WLAN transmissions in bandwidth estimation processes.
The paper proposes an analytical model that better accounts for the
particularities of WLAN links. The model is validated through extensive
experimentation and simulation and reveals that (1) the distribution of the
delay to transmit probing packets is not the same for the whole probing
sequence, this biases the measurements process and (2) existing tools and
techniques point at the achievable throughput rather than the available
bandwidth or the capacity, as previously assumed.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 17:23:55 GMT"
}
]
| 2009-02-04T00:00:00 | [
[
"Portoles-Comeras",
"Marc",
""
],
[
"Cabellos-Aparicio",
"Albert",
""
],
[
"Mangues-Bafalluy",
"Josep",
""
],
[
"Domingo-Pascual",
"Jordi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0902.0562 | Lorenzo Cappellari | Lorenzo Cappellari and Andrea De Giusti | A Unified Perspective on Parity- and Syndrome-Based Binary Data
Compression Using Off-the-Shelf Turbo Codecs | 10 pages, 10 figures (11 graphic files organized with subfigures), 1
table; completely reviewed with a focus on non-uniform sources; submitted to
IEEE Trans. Commun | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of compressing memoryless binary data with or without
side information at the decoder. We review the parity- and the syndrome-based
approaches and discuss their theoretical limits, assuming that there exists a
virtual binary symmetric channel between the source and the side information,
and that the source is not necessarily uniformly distributed. We take a
factor-graph-based approach in order to devise how to take full advantage of
the ready-available iterative decoding procedures when turbo codes are
employed, in both a parity- or a syndrome-based fashion. We end up obtaining a
unified decoder formulation that holds both for error-free and for error-prone
encoder-to-decoder transmission over generic channels. To support the
theoretical results, the different compression systems analyzed in the paper
are also experimentally tested. They are compared against several different
approaches proposed in literature and shown to be competitive in a variety of
cases.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 17:34:29 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Nov 2009 12:21:55 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Aug 2010 05:28:48 GMT"
}
]
| 2010-08-03T00:00:00 | [
[
"Cappellari",
"Lorenzo",
""
],
[
"De Giusti",
"Andrea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0606 | M. Angeles Serrano | M. Angeles Serrano, Alessandro Flammini, and Filippo Menczer | Beyond Zipf's law: Modeling the structure of human language | 9 pages, 4 figures | null | null | null | cs.CL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human language, the most powerful communication system in history, is closely
associated with cognition. Written text is one of the fundamental
manifestations of language, and the study of its universal regularities can
give clues about how our brains process information and how we, as a society,
organize and share it. Still, only classical patterns such as Zipf's law have
been explored in depth. In contrast, other basic properties like the existence
of bursts of rare words in specific documents, the topical organization of
collections, or the sublinear growth of vocabulary size with the length of a
document, have only been studied one by one and mainly applying heuristic
methodologies rather than basic principles and general mechanisms. As a
consequence, there is a lack of understanding of linguistic processes as
complex emergent phenomena. Beyond Zipf's law for word frequencies, here we
focus on Heaps' law, burstiness, and the topicality of document collections,
which encode correlations within and across documents absent in random null
models. We introduce and validate a generative model that explains the
simultaneous emergence of all these patterns from simple rules. As a result, we
find a connection between the bursty nature of rare words and the topical
organization of texts and identify dynamic word ranking and memory across
documents as key mechanisms explaining the non trivial organization of written
text. Our research can have broad implications and practical applications in
computer science, cognitive science, and linguistics.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 21:04:33 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Serrano",
"M. Angeles",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0902.0620 | Joerg Rothe | Claudia Lindner and Joerg Rothe | Degrees of Guaranteed Envy-Freeness in Finite Bounded Cake-Cutting
Protocols | 37 pages, 4 figures | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cake-cutting protocols aim at dividing a ``cake'' (i.e., a divisible
resource) and assigning the resulting portions to several players in a way that
each of the players feels to have received a ``fair'' amount of the cake. An
important notion of fairness is envy-freeness: No player wishes to switch the
portion of the cake received with another player's portion. Despite intense
efforts in the past, it is still an open question whether there is a
\emph{finite bounded} envy-free cake-cutting protocol for an arbitrary number
of players, and even for four players. We introduce the notion of degree of
guaranteed envy-freeness (DGEF) as a measure of how good a cake-cutting
protocol can approximate the ideal of envy-freeness while keeping the protocol
finite bounded (trading being disregarded). We propose a new finite bounded
proportional protocol for any number n \geq 3 of players, and show that this
protocol has a DGEF of 1 + \lceil (n^2)/2 \rceil. This is the currently best
DGEF among known finite bounded cake-cutting protocols for an arbitrary number
of players. We will make the case that improving the DGEF even further is a
tough challenge, and determine, for comparison, the DGEF of selected known
finite bounded cake-cutting protocols.
| [
{
"version": "v1",
"created": "Tue, 3 Feb 2009 21:21:23 GMT"
},
{
"version": "v2",
"created": "Mon, 11 May 2009 15:15:22 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Jun 2009 08:52:58 GMT"
},
{
"version": "v4",
"created": "Wed, 23 Sep 2009 14:14:33 GMT"
},
{
"version": "v5",
"created": "Mon, 19 Oct 2009 09:23:44 GMT"
}
]
| 2009-10-19T00:00:00 | [
[
"Lindner",
"Claudia",
""
],
[
"Rothe",
"Joerg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0902.0657 | Mohammad H. Taghavi | Mohammad H. Taghavi, Amin Shokrollahi, Paul H. Siegel | Efficient implementation of linear programming decoding | 44 pages, submitted to IEEE Transactions on Information Theory, Dec.
2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While linear programming (LP) decoding provides more flexibility for
finite-length performance analysis than iterative message-passing (IMP)
decoding, it is computationally more complex to implement in its original form,
due to both the large size of the relaxed LP problem, and the inefficiency of
using general-purpose LP solvers. This paper explores ideas for fast LP
decoding of low-density parity-check (LDPC) codes. We first prove, by modifying
the previously reported Adaptive LP decoding scheme to allow removal of
unnecessary constraints, that LP decoding can be performed by solving a number
of LP problems that contain at most one linear constraint derived from each of
the parity-check constraints. By exploiting this property, we study a sparse
interior-point implementation for solving this sequence of linear programs.
Since the most complex part of each iteration of the interior-point algorithm
is the solution of a (usually ill-conditioned) system of linear equations for
finding the step direction, we propose a preconditioning algorithm to
facilitate iterative solution of such systems. The proposed preconditioning
algorithm is similar to the encoding procedure of LDPC codes, and we
demonstrate its effectiveness via both analytical methods and computer
simulation results.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 04:29:27 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Taghavi",
"Mohammad H.",
""
],
[
"Shokrollahi",
"Amin",
""
],
[
"Siegel",
"Paul H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0668 | Shamgar Gurevich | SHamgar Gurevich (UC Berkeley) and Ronny Hadani (U of Chicago) | Application of the Weil representation: diagonalization of the discrete
Fourier transform | To appear in the Proceedings of the Sixth Workshop on Lie Theory and
Geometry, Cordoba, November 13 - 17, 2007 (Editors: C. S. Gordon, F.
Grunewald, C. Olmos, J. A. Tirao, J. A. Wolf). Key word: Discrete Fourier
transform; Weil representation; Canonical eigenvectors; Oscillator transform;
Fast oscillator transform | null | null | null | cs.IT cs.DM math.IT math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We survey a new application of the Weil representation to construct a
canonical basis of eigenvectors for the discrete Fourier transform (DFT). The
transition matrix from the standard basis to the canonical basis defines a
novel transform which we call the discrete oscillator transform (DOT for
short). In addition, we describe a fast algorithm for computing the DOT in
certain cases.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 08:12:20 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Gurevich",
"SHamgar",
"",
"UC Berkeley"
],
[
"Hadani",
"Ronny",
"",
"U of Chicago"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0902.0673 | Gianluca Argentini | Gianluca Argentini | Optimal profiles in variable speed flows | 5 pages, 3 figures | null | null | null | math.HO cs.CE math.OC physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Where a 2D problem of optimal profile in variable speed flow is resolved in a
class of convex Bezier curves, using symbolic and numerical computations.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 09:07:16 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Argentini",
"Gianluca",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Physics",
"code": "physics.flu-dyn",
"description": "Turbulence, instabilities, incompressible/compressible flows, reacting flows. Aero/hydrodynamics, fluid-structure interactions, acoustics. Biological fluid dynamics, micro/nanofluidics, interfacial phenomena. Complex fluids, suspensions and granular flows, porous media flows. Geophysical flows, thermoconvective and stratified flows. Mathematical and computational methods for fluid dynamics, fluid flow models, experimental techniques.",
"span": "(Fluid Dynamics)"
}
]
|
0902.0744 | Joe Futrelle | James D. Myers, Joe Futrelle, Jeff Gaynor, Joel Plutchak, Peter
Bajcsy, Jason Kastner, Kailash Kotwani, Jong Sung Lee, Luigi Marini, Rob
Kooper, Robert E. McGrath, Terry McLaren, Alejandro Rodriguez, Yong Liu
(National Center for Supercomputing Applications, University of Illinois at
Urbana-Champaign) | Embedding Data within Knowledge Spaces | 10 pages with 1 figure. Corrected incorrect transliteration in
abstract | null | null | null | cs.AI cs.HC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The promise of e-Science will only be realized when data is discoverable,
accessible, and comprehensible within distributed teams, across disciplines,
and over the long-term--without reliance on out-of-band (non-digital) means. We
have developed the open-source Tupelo semantic content management framework and
are employing it to manage a wide range of e-Science entities (including data,
documents, workflows, people, and projects) and a broad range of metadata
(including provenance, social networks, geospatial relationships, temporal
relations, and domain descriptions). Tupelo couples the use of global
identifiers and resource description framework (RDF) statements with an
aggregatable content repository model to provide a unified space for securely
managing distributed heterogeneous content and relationships.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 16:52:41 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Myers",
"James D.",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Futrelle",
"Joe",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Gaynor",
"Jeff",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Plutchak",
"Joel",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Bajcsy",
"Peter",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Kastner",
"Jason",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Kotwani",
"Kailash",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Lee",
"Jong Sung",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Marini",
"Luigi",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Kooper",
"Rob",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"McGrath",
"Robert E.",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"McLaren",
"Terry",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Rodriguez",
"Alejandro",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
],
[
"Liu",
"Yong",
"",
"National Center for Supercomputing Applications, University of Illinois at\n Urbana-Champaign"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0902.0746 | Katia Jaffr?s-Runser | Katia Jaffr\`es-Runser, Cristina Comaniciu, Jean-Marie Gorce | Interference and Congestion Aware Gradient Broadcasting Routing for
Wireless Sensor Networks | submitted to Eurasip Journal on Wireless Communications and
Networking, special issue on Interference Management in Wireless
Communication Systems: Theory and Applications in November 2009 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of reliable transmission of data through a
sensor network. We focus on networks rapidly deployed in harsh environments.
For these networks, important design requirements are fast data transmission
and rapid network setup, as well as minimized energy consumption for increased
network lifetime. We propose a novel broadcasting solution that accounts for
the interference impact and the congestion level of the channel, in order to
improve robustness, energy consumption and delay performance, compared to a
benchmark routing protocol, the GRAB algorithm. Three solutions are proposed:
P-GRAB, a probabilistic routing algorithm for interference mitigation, U-GRAB,
a utility-based algorithm that adjusts to real-time congestion and UP-GRAB, a
combination of P-GRAB and U-GRAB. It is shown that P-GRAB provides the best
performance for geometry-aware networks while the U-GRAB approach is the best
option for unreliable and unstable networks.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 17:06:04 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Jan 2010 11:39:26 GMT"
}
]
| 2010-01-06T00:00:00 | [
[
"Jaffrès-Runser",
"Katia",
""
],
[
"Comaniciu",
"Cristina",
""
],
[
"Gorce",
"Jean-Marie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.0755 | Pere Constans | Pere Constans | A Simple Extraction Procedure for Bibliographical Author Field | null | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A procedure for bibliographic author metadata extraction from scholarly texts
is presented. The author segments are identified based on capitalization and
line break patterns. Two main author layout templates, which can retrieve from
a varied set of title pages, are provided. Additionally, several disambiguating
rules are described.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 17:36:41 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Constans",
"Pere",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0902.0763 | Sourabh Saha | Sourabh Saha | Genetic algorithm based optimization and post optimality analysis of
multi-pass face milling | null | null | null | null | cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an optimization technique for the multi-pass face milling
process. Genetic algorithm (GA) is used to obtain the optimum cutting
parameters by minimizing the unit production cost for a given amount of
material removal. Cutting speed, feed and depth of cut for the finish and rough
passes are the cutting parameters. An equal depth of cut for roughing passes
has been considered. A lookup table containing the feasible combinations of
depth of cut in finish and rough passes is generated so as to reduce the number
of variables by one. The resulting mixed integer nonlinear optimization problem
is solved in a single step using GA. The entire technique is demonstrated in a
case study. Post optimality analysis of the example problem is done to develop
a strategy for optimizing without running GA again for different values of
total depth of cut.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 18:29:21 GMT"
}
]
| 2009-02-05T00:00:00 | [
[
"Saha",
"Sourabh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0902.0782 | Katia Jaffres-Runser | Katia Jaffr\`es-Runser, Cristina Comaniciu, Jean-Marie Gorce | A Multiobjective Optimization Framework for Routing in Wireless Ad Hoc
Networks | null | IEEE International Symposium on Conference Modeling and
Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) 2010 | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless ad hoc networks are seldom characterized by one single performance
metric, yet the current literature lacks a flexible framework to assist in
characterizing the design tradeoffs in such networks. In this work, we address
this problem by proposing a new modeling framework for routing in ad hoc
networks, which used in conjunction with metaheuristic multiobjective search
algorithms, will result in a better understanding of network behavior and
performance when multiple criteria are relevant. Our approach is to take a
holistic view of the network that captures the cross-interactions among
interference management techniques implemented at various layers of the
protocol stack. The resulting framework is a complex multiobjective
optimization problem that can be efficiently solved through existing
multiobjective search techniques. In this contribution, we present the Pareto
optimal sets for an example sensor network when delay, robustness and energy
are considered. The aim of this paper is to present the framework and hence for
conciseness purposes, the multiobjective optimization search is not developed
herein.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 19:48:42 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Jan 2010 11:15:29 GMT"
}
]
| 2010-08-17T00:00:00 | [
[
"Jaffrès-Runser",
"Katia",
""
],
[
"Comaniciu",
"Cristina",
""
],
[
"Gorce",
"Jean-Marie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0902.0789 | Richard J. Mathar | Richard J. Mathar | The series limit of sum_k 1/[k log k (log log k)^2] | Appendix B concering series of log(k)/(k^2-a^2) added in in Version 3 | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The slowly converging series sum_{k=3}^infinity 1/[k * log k * (log log k)^a]
is evaluated to 38.4067680928 at a=2. After some initial terms, the infinite
tail of the sum is replaced by the integral of the associated interpolating
function, which is available in simple analytic form. Biases that originate
from the difference between the smooth area under the function and the
corresponding Riemann sum are corrected by standard means. The cases a=3 and
a=4 are computed in the same manner.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 20:49:12 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Feb 2009 18:27:33 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Jun 2021 19:54:57 GMT"
}
]
| 2021-06-25T00:00:00 | [
[
"Mathar",
"Richard J.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0902.0798 | Ernesto Diaz-Aviles | Ernesto Diaz-Aviles | Alleviating Media Bias Through Intelligent Agent Blogging | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Consumers of mass media must have a comprehensive, balanced and plural
selection of news to get an unbiased perspective; but achieving this goal can
be very challenging, laborious and time consuming. News stories development
over time, its (in)consistency, and different level of coverage across the
media outlets are challenges that a conscientious reader has to overcome in
order to alleviate bias.
In this paper we present an intelligent agent framework currently
facilitating analysis of the main sources of on-line news in El Salvador. We
show how prior tools of text analysis and Web 2.0 technologies can be combined
with minimal manual intervention to help individuals on their rational decision
process, while holding media outlets accountable for their work.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 21:25:59 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Diaz-Aviles",
"Ernesto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.0822 | Ye Wang | Ye Wang and Prakash Ishwar | Bootstrapped Oblivious Transfer and Secure Two-Party Function
Computation | 5 pages, 2 figures. Submitted to 2009 IEEE International Symposium on
Information Theory, Seoul, South Korea | null | null | null | cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an information theoretic framework for the secure two-party
function computation (SFC) problem and introduce the notion of SFC capacity. We
study and extend string oblivious transfer (OT) to sample-wise OT. We propose
an efficient, perfectly private OT protocol utilizing the binary erasure
channel or source. We also propose the bootstrap string OT protocol which
provides disjoint (weakened) privacy while achieving a multiplicative increase
in rate, thus trading off security for rate. Finally, leveraging our OT
protocol, we construct a protocol for SFC and establish a general lower bound
on SFC capacity of the binary erasure channel and source.
| [
{
"version": "v1",
"created": "Wed, 4 Feb 2009 23:47:37 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Wang",
"Ye",
""
],
[
"Ishwar",
"Prakash",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0828 | Qin Xiaolin | Xiaolin Qin, Yong Feng, Jingwei Chen, Jingzhong Zhang | Finding Exact Minimal Polynomial by Approximations | null | null | null | null | cs.CC cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new algorithm for reconstructing an exact algebraic number from
its approximate value using an improved parameterized integer relation
construction method. Our result is consistent with the existence of error
controlling on obtaining an exact rational number from its approximation. The
algorithm is applicable for finding exact minimal polynomial by its approximate
root. This also enables us to provide an efficient method of converting the
rational approximation representation to the minimal polynomial representation,
and devise a simple algorithm to factor multivariate polynomials with rational
coefficients.
Compared with other methods, this method has the numerical computation
advantage of high efficiency. The experimental results show that the method is
more efficient than \emph{identify} in \emph{Maple} 11 for obtaining an exact
algebraic number from its approximation. In this paper, we completely implement
how to obtain exact results by numerical approximate computations.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 00:49:13 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Qin",
"Xiaolin",
""
],
[
"Feng",
"Yong",
""
],
[
"Chen",
"Jingwei",
""
],
[
"Zhang",
"Jingzhong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0902.0838 | Syed Jafar | Syed A. Jafar | The Ergodic Capacity of Phase-Fading Interference Networks | 19 pages | IEEE Transactions on Information Theory, Vol. 57, No. 12, Pages:
7685-7694, December 2011 | 10.1109/TIT.2011.2169110 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We identify the role of equal strength interference links as bottlenecks on
the ergodic sum capacity of a $K$ user phase-fading interference network, i.e.,
an interference network where the fading process is restricted primarily to
independent and uniform phase variations while the channel magnitudes are held
fixed across time. It is shown that even though there are $K(K-1)$ cross-links,
only about $K/2$ disjoint and equal strength interference links suffice to
determine the capacity of the network regardless of the strengths of the rest
of the cross channels. This scenario is called a \emph{minimal bottleneck
state}. It is shown that ergodic interference alignment is capacity optimal for
a network in a minimal bottleneck state. The results are applied to large
networks. It is shown that large networks are close to bottleneck states with a
high probability, so that ergodic interference alignment is close to optimal
for large networks. Limitations of the notion of bottleneck states are also
highlighted for channels where both the phase and the magnitudes vary with
time. It is shown through an example that for these channels, joint coding
across different bottleneck states makes it possible to circumvent the capacity
bottlenecks.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 03:17:44 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Mar 2012 13:02:29 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Jafar",
"Syed A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0850 | Pedro Pablo P\'erez Velasco | Pedro Pablo Perez Velasco, Juan de Lara | Matrix Graph Grammars and Monotone Complex Logics | 30 pages, 12 figures | null | null | null | cs.DM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Graph transformation is concerned with the manipulation of graphs by means of
rules. Graph grammars have been traditionally studied using techniques from
category theory. In previous works, we introduced Matrix Graph Grammars (MGGs)
as a purely algebraic approach for the study of graph grammars and graph
dynamics, based on the representation of graphs by means of their adjacency
matrices. MGGs have been succesfully applied to problems such as applicability
of rule sequences, sequentialization and reachability, providing new analysis
techniques and generalizing and improving previous results.
Our next objective is to generalize MGGs in order to approach computational
complexity theory and "static" properties of graphs out of the "dynamics" of
certain grammars. In the present work, we start building bridges between MGGs
and complexity by introducing what we call "Monotone Complex Logic", which
allows establishing a (bijective) link between MGGs and complex analysis. We
use this logic to recast the formulation and basic building blocks of MGGs as
more proper geometric and analytic concepts (scalar products, norms,
distances). MGG rules can also be interpreted - via operators - as complex
numbers. Interestingly, the subset they define can be characterized as the
Sierpinski gasket.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 06:13:13 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Velasco",
"Pedro Pablo Perez",
""
],
[
"de Lara",
"Juan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.0892 | Mark Flanagan | Mark F. Flanagan | A Unified Framework for Linear-Programming Based Communication Receivers | 13 pages, 6 figures. To appear in the IEEE Transactions on
Communications | null | 10.1109/TCOMM.2011.100411.100417 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that a large class of communication systems which admit a
sum-product algorithm (SPA) based receiver also admit a corresponding
linear-programming (LP) based receiver. The two receivers have a relationship
defined by the local structure of the underlying graphical model, and are
inhibited by the same phenomenon, which we call 'pseudoconfigurations'. This
concept is a generalization of the concept of 'pseudocodewords' for linear
codes. It is proved that the LP receiver has the 'maximum likelihood
certificate' property, and that the receiver output is the lowest cost
pseudoconfiguration. Equivalence of graph-cover pseudoconfigurations and
linear-programming pseudoconfigurations is also proved. A concept of 'system
pseudodistance' is defined which generalizes the existing concept of
pseudodistance for binary and nonbinary linear codes. It is demonstrated how
the LP design technique may be applied to the problem of joint equalization and
decoding of coded transmissions over a frequency selective channel, and a
simulation-based analysis of the error events of the resulting LP receiver is
also provided. For this particular application, the proposed LP receiver is
shown to be competitive with other receivers, and to be capable of
outperforming turbo equalization in bit and frame error rate performance.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 12:01:29 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jul 2010 15:54:37 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Aug 2011 15:50:34 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Flanagan",
"Mark F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0899 | Camilla Schwind | R\'egis Alenda (LSIS), Nicola Olivetti (LSIS), Camilla Schwind (LIF) | Comparative concept similarity over Minspaces: Axiomatisation and
Tableaux Calculus | 25 pages | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the logic of comparative concept similarity $\CSL$ introduced by
Sheremet, Tishkovsky, Wolter and Zakharyaschev to capture a form of qualitative
similarity comparison. In this logic we can formulate assertions of the form "
objects A are more similar to B than to C". The semantics of this logic is
defined by structures equipped by distance functions evaluating the similarity
degree of objects. We consider here the particular case of the semantics
induced by \emph{minspaces}, the latter being distance spaces where the minimum
of a set of distances always exists. It turns out that the semantics over
arbitrary minspaces can be equivalently specified in terms of preferential
structures, typical of conditional logics. We first give a direct
axiomatisation of this logic over Minspaces. We next define a decision
procedure in the form of a tableaux calculus. Both the calculus and the
axiomatisation take advantage of the reformulation of the semantics in terms of
preferential structures.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 12:55:42 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Alenda",
"Régis",
"",
"LSIS"
],
[
"Olivetti",
"Nicola",
"",
"LSIS"
],
[
"Schwind",
"Camilla",
"",
"LIF"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.0901 | Lisa Brouwers | Lisa Brouwers, Martin Camitz, Baki Cakici, Kalle M\"akil\"a, Paul
Saretok | MicroSim: Modeling the Swedish Population | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents a unique, large-scale and spatially explicit
microsimulation model that uses official anonymized register data collected
from all individuals living in Sweden. Individuals are connected to households
and workplaces and represent crucial links in the Swedish social contact
network. This enables significant policy experiments in the domain of epidemic
outbreaks. Development of the model started in 2004 at the Swedish Institute
for Infectious Disease Control (SMI) in Solna, Sweden with the goal of creating
a tool for testing the effects of intervention policies. These interventions
include mass vaccination, targeted vaccination, isolation and social
distancing. The model was initially designed for simulating smallpox outbreaks.
In 2006, it was modified to support simulations of pandemic influenza. All nine
millions members of the Swedish population are represented in the model. This
article is a technical description of the simulation model; the input data, the
simulation engine and the basic object types.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 13:37:51 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Brouwers",
"Lisa",
""
],
[
"Camitz",
"Martin",
""
],
[
"Cakici",
"Baki",
""
],
[
"Mäkilä",
"Kalle",
""
],
[
"Saretok",
"Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0902.0919 | Yassine Ariba | Yassine Ariba (LAAS), Fr\'ed\'eric Gouaisbaut (LAAS), Yann Labit
(LAAS) | Multiple time-delays system modeling and control for router management | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the overload problem of a single congested router in
TCP (Transmission Control Protocol) networks. To cope with the congestion
phenomenon, we design a feedback control based on a multiple time-delays model
of the set TCP/AQM (Active Queue Management). Indeed, using robust control
tools, especially in the quadratic separation framework, the TCP/AQM model is
rewritten as an intercon- nected system and a structured state feedback is
constructed to stabilize the network variables. Finally, we illustrate the
proposed methodology with a numerical example and simulations using NS-2
simulator.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 15:17:31 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Ariba",
"Yassine",
"",
"LAAS"
],
[
"Gouaisbaut",
"Frédéric",
"",
"LAAS"
],
[
"Labit",
"Yann",
"",
"LAAS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.0920 | Yassine Ariba | Yassine Ariba (LAAS), Yann Labit (LAAS), Fr\'ed\'eric Gouaisbaut
(LAAS) | Design and performance evaluation of a state-space based AQM | null | International Conference on Communication Theory, Reliability, and
Quality of Service, Bucharest : Roumanie (2008) | 10.1109/CTRQ.2008.15 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent research has shown the link between congestion control in
communication networks and feedback control system. In this paper, the design
of an active queue management (AQM) which can be viewed as a controller, is
considered. Based on a state space representation of a linearized fluid flow
model of TCP, the AQM design is converted to a state feedback synthesis problem
for time delay systems. Finally, an example extracted from the literature and
simulations via a network simulator NS (under cross traffic conditions) support
our study.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 15:24:36 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Ariba",
"Yassine",
"",
"LAAS"
],
[
"Labit",
"Yann",
"",
"LAAS"
],
[
"Gouaisbaut",
"Frédéric",
"",
"LAAS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.0922 | Yassine Ariba | Yann Labit (LAAS), Yassine Ariba (LAAS), Fr\'ed\'eric Gouaisbaut
(LAAS) | On Designing Lyapunov-Krasovskii Based AQM for Routers Supporting TCP
Flows | null | 46th IEEE Conference on Decision and Control, New Orleans :
\'Etats-Unis d'Am\'erique (2007) | 10.1109/CDC.2007.4434673 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the last few years, we assist to a growing interest of designing AQM
(Active Queue Management) using control theory. In this paper, we focus on the
synthesis of an AQM based on the Lyapunov theory for time delay systems. With
the help of a recently developed Lyapunov-Krasovskii functional and using a
state space representation of a linearized fluid model of TCP, two robust AQMs
stabilizing the TCP model are constructed. Notice that our results are
constructive and the synthesis problem is reduced to a convex optimization
scheme expressed in terms of linear matrix inequalities (LMIs). Finally, an
example extracted from the literature and simulations via {\it NS simulator}
support our study.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 15:24:57 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Labit",
"Yann",
"",
"LAAS"
],
[
"Ariba",
"Yassine",
"",
"LAAS"
],
[
"Gouaisbaut",
"Frédéric",
"",
"LAAS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.0924 | Ivan Jureta | Ivan Jureta, John Mylopoulos, Stephane Faulkner | Towards a Theory of Requirements Elicitation: Acceptability Condition
for the Relative Validity of Requirements | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A requirements engineering artifact is valid relative to the stakeholders of
the system-to-be if they agree on the content of that artifact. Checking
relative validity involves a discussion between the stakeholders and the
requirements engineer. This paper proposes (i) a language for the
representation of information exchanged in a discussion about the relative
validity of an artifact; (ii) the acceptability condition, which, when it
verifies in a discussion captured in the proposed language, signals that the
relative validity holds for the discussed artifact and for the participants in
the discussion; and (iii) reasoning procedures to automatically check the
acceptability condition in a discussions captured by the proposed language.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 15:26:41 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Jureta",
"Ivan",
""
],
[
"Mylopoulos",
"John",
""
],
[
"Faulkner",
"Stephane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0902.0926 | Yassine Ariba | Yassine Ariba (LAAS), Fr\'ed\'eric Gouaisbaut (LAAS), Sandy Rahme
(LAAS), Yann Labit (LAAS) | Robust control tools for traffic monitoring in TCP/AQM networks | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several studies have considered control theory tools for traffic control in
communication networks, as for example the congestion control issue in IP
(Internet Protocol) routers. In this paper, we propose to design a linear
observer for time-delay systems to address the traffic monitoring issue in
TCP/AQM (Transmission Control Protocol/Active Queue Management) networks. Due
to several propagation delays and the queueing delay, the set TCP/AQM is
modeled as a multiple delayed system of a particular form. Hence, appropriate
robust control tools as quadratic separation are adopted to construct a delay
dependent observer for TCP flows estimation. Note that, the developed mechanism
enables also the anomaly detection issue for a class of DoS (Denial of Service)
attacks. At last, simulations via the network simulator NS-2 and an emulation
experiment validate the proposed methodology.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 15:33:02 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Ariba",
"Yassine",
"",
"LAAS"
],
[
"Gouaisbaut",
"Frédéric",
"",
"LAAS"
],
[
"Rahme",
"Sandy",
"",
"LAAS"
],
[
"Labit",
"Yann",
"",
"LAAS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.0947 | Michele Wigger | Amos Lapidoth and Michele A. Wigger | On the Gaussian MAC with Imperfect Feedback | To appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New achievable rate regions are derived for the two-user additive white
Gaussian multiple-access channel with noisy feedback. The regions exhibit the
following two properties. Irrespective of the (finite) Gaussian feedback-noise
variances, the regions include rate points that lie outside the no-feedback
capacity region, and when the feedback-noise variances tend to 0 the regions
converge to the perfect-feedback capacity region. The new achievable regions
also apply to the partial-feedback setting where one of the transmitters has a
noisy feedback link and the other transmitter has no feedback at all. Again,
irrespective of the (finite) noise variance on the feedback link, the regions
include rate points that lie outside the no-feedback capacity region. Moreover,
in the case of perfect partial feedback, i.e., where the only feedback link is
noise-free, for certain channel parameters the new regions include rate points
that lie outside the Cover-Leung region. This answers in the negative the
question posed by van der Meulen as to whether the Cover-Leung region equals
the capacity region of the Gaussian multiple-access channel with perfect
partial feedback. Finally, we propose new achievable regions also for a setting
where the receiver is cognizant of the realizations of the noise sequences on
the feedback links.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 17:36:11 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Apr 2010 16:42:39 GMT"
}
]
| 2010-04-13T00:00:00 | [
[
"Lapidoth",
"Amos",
""
],
[
"Wigger",
"Michele A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.0966 | Dongwoon Bai | Dongwoon Bai, Saeed S. Ghassemzadeh, Robert R. Miller, and Vahid
Tarokh | Beam Selection Gain Versus Antenna Selection Gain | 22 pages, 4 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider beam selection using a fixed beamforming network (FBN) at a base
station with $M$ array antennas. In our setting, a Butler matrix is deployed at
the RF stage to form $M$ beams, and then the best beam is selected for
transmission. We provide the proofs of the key properties of the noncentral
chi-square distribution and the following properties of the beam selection gain
verifying that beam selection is superior to antenna selection in Rician
channels with any $K$-factors. Furthermore, we find asymptotically tight
stochastic bounds of the beam selection gain, which yield approximate closed
form expressions of the expected selection gain and the ergodic capacity. Beam
selection has the order of growth of the ergodic capacity
$\mathnormal{\Theta}(\log(M))$ regardless of user location in contrast to
$\mathnormal{\Theta}(\log(\log(M)))$ for antenna selection.
| [
{
"version": "v1",
"created": "Thu, 5 Feb 2009 19:54:36 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Feb 2009 21:41:55 GMT"
}
]
| 2009-02-06T00:00:00 | [
[
"Bai",
"Dongwoon",
""
],
[
"Ghassemzadeh",
"Saeed S.",
""
],
[
"Miller",
"Robert R.",
""
],
[
"Tarokh",
"Vahid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.