id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0902.1033 | Sylvain Raybaud | Sylvain Raybaud (INRIA Lorraine - LORIA), Caroline Lavecchia (INRIA
Lorraine - LORIA), David Langlois (INRIA Lorraine - LORIA), Kamel Sma\"ili
(INRIA Lorraine - LORIA) | New Confidence Measures for Statistical Machine Translation | null | International Conference On Agents and Artificial Intelligence -
ICAART 09 (2009) | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A confidence measure is able to estimate the reliability of an hypothesis
provided by a machine translation system. The problem of confidence measure can
be seen as a process of testing : we want to decide whether the most probable
sequence of words provided by the machine translation system is correct or not.
In the following we describe several original word-level confidence measures
for machine translation, based on mutual information, n-gram language model and
lexical features language model. We evaluate how well they perform individually
or together, and show that using a combination of confidence measures based on
mutual information yields a classification error rate as low as 25.1% with an
F-measure of 0.708.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:28:58 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Raybaud",
"Sylvain",
"",
"INRIA Lorraine - LORIA"
],
[
"Lavecchia",
"Caroline",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Langlois",
"David",
"",
"INRIA Lorraine - LORIA"
],
[
"Smaïli",
"Kamel",
"",
"INRIA Lorraine - LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0902.1035 | Sid Touati | Sid Touati (PRISM) | Towards a Statistical Methodology to Evaluate Program Speedups and their
Optimisation Techniques | 12 pages | null | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The community of program optimisation and analysis, code performance
evaluation, parallelisation and optimising compilation has published since many
decades hundreds of research and engineering articles in major conferences and
journals. These articles study efficient algorithms, strategies and techniques
to accelerate programs execution times, or optimise other performance metrics
(MIPS, code size, energy/power, MFLOPS, etc.). Many speedups are published, but
nobody is able to reproduce them exactly. The non-reproducibility of our
research results is a dark point of the art, and we cannot be qualified as {\it
computer scientists} if we do not provide rigorous experimental methodology.
This article provides a first effort towards a correct statistical protocol for
analysing and measuring speedups. As we will see, some common mistakes are done
by the community inside published articles, explaining part of the
non-reproducibility of the results. Our current article is not sufficient by
its own to deliver a complete experimental methodology, further efforts must be
done by the community to decide about a common protocol for our future
experiences. Anyway, our community should take care about the aspect of
reproducibility of the results in the future.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:30:53 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Feb 2009 15:50:41 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Feb 2009 08:23:45 GMT"
},
{
"version": "v4",
"created": "Thu, 19 Feb 2009 13:34:55 GMT"
},
{
"version": "v5",
"created": "Fri, 27 Feb 2009 10:08:32 GMT"
},
{
"version": "v6",
"created": "Thu, 5 Mar 2009 05:36:54 GMT"
},
{
"version": "v7",
"created": "Thu, 2 Apr 2009 09:50:06 GMT"
},
{
"version": "v8",
"created": "Mon, 6 Jul 2009 11:46:38 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Touati",
"Sid",
"",
"PRISM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0902.1037 | Anna Kucerova | A. Ibrahimbegovic, C. Knopf-Lenoir, A. Kucerova and P. Villon | Optimal design and optimal control of structures undergoing finite
rotations and elastic deformations | 35 pages, 11 figures | International Journal for Numerical Methods in Engineering, 61
(14), 2428-2460, 2004) | 10.1002/nme.1150 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we deal with the optimal design and optimal control of
structures undergoing large rotations. In other words, we show how to find the
corresponding initial configuration and the corresponding set of multiple load
parameters in order to recover a desired deformed configuration or some
desirable features of the deformed configuration as specified more precisely by
the objective or cost function. The model problem chosen to illustrate the
proposed optimal design and optimal control methodologies is the one of
geometrically exact beam. First, we present a non-standard formulation of the
optimal design and optimal control problems, relying on the method of Lagrange
multipliers in order to make the mechanics state variables independent from
either design or control variables and thus provide the most general basis for
developing the best possible solution procedure. Two different solution
procedures are then explored, one based on the diffuse approximation of
response function and gradient method and the other one based on genetic
algorithm. A number of numerical examples are given in order to illustrate both
the advantages and potential drawbacks of each of the presented procedures.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:43:09 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Feb 2009 10:12:33 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Ibrahimbegovic",
"A.",
""
],
[
"Knopf-Lenoir",
"C.",
""
],
[
"Kucerova",
"A.",
""
],
[
"Villon",
"P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0902.1038 | Wadie Guizani | J\'er\'emy Barbay (DCC), Gonzalo Navarro (DCC) | Compressed Representations of Permutations, and Applications | null | STACS 2009 (2009) 111-122 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We explore various techniques to compress a permutation $\pi$ over n
integers, taking advantage of ordered subsequences in $\pi$, while supporting
its application $\pi$(i) and the application of its inverse $\pi^{-1}(i)$ in
small time. Our compression schemes yield several interesting byproducts, in
many cases matching, improving or extending the best existing results on
applications such as the encoding of a permutation in order to support iterated
applications $\pi^k(i)$ of it, of integer functions, and of inverted lists and
suffix arrays.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:48:32 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Barbay",
"Jérémy",
"",
"DCC"
],
[
"Navarro",
"Gonzalo",
"",
"DCC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1040 | Pierre Courrieu | Pierre Courrieu (LPC) | Fast solving of Weighted Pairing Least-Squares systems | null | Journal of Computational and Applied Mathematics 231, 1 (2009)
39-48 | 10.1016/j.cam.2009.01.016 | null | cs.MS cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a generalization of the "weighted least-squares" (WLS),
named "weighted pairing least-squares" (WPLS), which uses a rectangular weight
matrix and is suitable for data alignment problems. Two fast solving methods,
suitable for solving full rank systems as well as rank deficient systems, are
studied. Computational experiments clearly show that the best method, in terms
of speed, accuracy, and numerical stability, is based on a special {1, 2,
3}-inverse, whose computation reduces to a very simple generalization of the
usual "Cholesky factorization-backward substitution" method for solving linear
systems.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:51:09 GMT"
},
{
"version": "v2",
"created": "Fri, 29 May 2009 09:02:51 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Courrieu",
"Pierre",
"",
"LPC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0902.1041 | Wadie Guizani | Laurent Bienvenu, Rod Downey | Kolmogorov Complexity and Solovay Functions | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 147-158 | null | null | cs.CC cs.IT math.IT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Solovay proved that there exists a computable upper bound f of the
prefix-free Kolmogorov complexity function K such that f (x) = K(x) for
infinitely many x. In this paper, we consider the class of computable functions
f such that K(x) <= f (x)+O(1) for all x and f (x) <= K(x) + O(1) for
infinitely many x, which we call Solovay functions. We show that Solovay
functions present interesting connections with randomness notions such as
Martin-L\"of randomness and K-triviality.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:52:48 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Bienvenu",
"Laurent",
""
],
[
"Downey",
"Rod",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0902.1042 | Wadie Guizani | Mikolaj Bojanczyk | Weak Mso with the Unbounding Quantifier | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 159-170 | null | null | cs.FL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new class of languages of infinite words is introduced, called the
max-regular languages, extending the class of $\omega$-regular languages. The
class has two equivalent descriptions: in terms of automata (a type of
deterministic counter automaton), and in terms of logic (weak monadic
second-order logic with a bounding quantifier). Effective translations between
the logic and automata are given.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:53:15 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Bojanczyk",
"Mikolaj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.1043 | Glencora Borradaile | Glencora Borradaile, Erik D. Demaine (MIT), Siamak Tazari | Polynomial-Time Approximation Schemes for Subset-Connectivity Problems
in Bounded-Genus Graphs | Updated version from the conference (STACS) version | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 171-182 | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the first polynomial-time approximation schemes (PTASes) for the
following subset-connectivity problems in edge-weighted graphs of bounded
genus: Steiner tree, low-connectivity survivable-network design, and subset
TSP. The schemes run in O(n log n) time for graphs embedded on both orientable
and non-orientable surfaces. This work generalizes the PTAS frameworks of
Borradaile, Klein, and Mathieu from planar graphs to bounded-genus graphs: any
future problems shown to admit the required structure theorem for planar graphs
will similarly extend to bounded-genus graphs.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 09:53:53 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Mar 2011 20:00:50 GMT"
}
]
| 2011-03-02T00:00:00 | [
[
"Borradaile",
"Glencora",
"",
"MIT"
],
[
"Demaine",
"Erik D.",
"",
"MIT"
],
[
"Tazari",
"Siamak",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1045 | Dimiter Kovachev | Krassimir Yankov Iordjev, Dimiter Stoichkov Kovachev | On finding a particular class of combinatorial identities | 5 pages | null | null | null | cs.DM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, a class of combinatorial identities is proved. A method is
used which is based on the following rule: counting elements of a given set in
two ways and making equal the obtained results. This rule is known as "counting
in two ways". The principle of inclusion and exclusion is used for obtaining a
class of (0,1)-matrices.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 10:01:51 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Feb 2009 10:27:52 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Iordjev",
"Krassimir Yankov",
""
],
[
"Kovachev",
"Dimiter Stoichkov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1047 | Wadie Guizani | Nicolas Bousquet (ENS Cachan), Jean Daligault (LIRMM), Stephan
Thomasse (LIRMM), Anders Yeo | A Polynomial Kernel For Multicut In Trees | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 183-194 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The MULTICUT IN TREES problem consists in deciding, given a tree, a set of
requests (i.e. paths in the tree) and an integer k, whether there exists a set
of k edges cutting all the requests. This problem was shown to be FPT by Guo
and Niedermeyer. They also provided an exponential kernel. They asked whether
this problem has a polynomial kernel. This question was also raised by Fellows.
We show that MULTICUT IN TREES has a polynomial kernel.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 10:11:09 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Bousquet",
"Nicolas",
"",
"ENS Cachan"
],
[
"Daligault",
"Jean",
"",
"LIRMM"
],
[
"Thomasse",
"Stephan",
"",
"LIRMM"
],
[
"Yeo",
"Anders",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1048 | Wadie Guizani | Fr\'ed\'erique Bassino (LIPN), Julien David (IGM), Cyril Nicaud (IGM) | On the Average Complexity of Moore's State Minimization Algorithm | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 123-134 | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that, for any arbitrary finite alphabet and for the uniform
distribution over deterministic and accessible automata with n states, the
average complexity of Moore's state minimization algorithm is in O(n log n).
Moreover this bound is tight in the case of unary utomata.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 10:13:52 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Bassino",
"Frédérique",
"",
"LIPN"
],
[
"David",
"Julien",
"",
"IGM"
],
[
"Nicaud",
"Cyril",
"",
"IGM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.1080 | Baptiste Jeudy | Baptiste Jeudy (LAHC), Christine Largeron (LAHC), Fran\c{c}ois
Jacquenet (LAHC) | A Model for Managing Collections of Patterns | null | ACM Symposium on Applied Computing, Seoul : Cor\'ee, R\'epublique
de (2007) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data mining algorithms are now able to efficiently deal with huge amount of
data. Various kinds of patterns may be discovered and may have some great
impact on the general development of knowledge. In many domains, end users may
want to have their data mined by data mining tools in order to extract patterns
that could impact their business. Nevertheless, those users are often
overwhelmed by the large quantity of patterns extracted in such a situation.
Moreover, some privacy issues, or some commercial one may lead the users not to
be able to mine the data by themselves. Thus, the users may not have the
possibility to perform many experiments integrating various constraints in
order to focus on specific patterns they would like to extract. Post processing
of patterns may be an answer to that drawback. Thus, in this paper we present a
framework that could allow end users to manage collections of patterns. We
propose to use an efficient data structure on which some algebraic operators
may be used in order to retrieve or access patterns in pattern bases.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 12:50:12 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Jeudy",
"Baptiste",
"",
"LAHC"
],
[
"Largeron",
"Christine",
"",
"LAHC"
],
[
"Jacquenet",
"François",
"",
"LAHC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.1104 | Anirban Banerji | Anirban Banerji, Aniket Magarkar | How happy is your web browsing? A model to quantify satisfaction of an
Internet user, searching for desired information | null | Physica A: Statistical Mechanics and its Applications, 391:
4215-4224, 2012 | 10.1016/j.physa.2012.02.002 | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We feel happy when web-browsing operations provide us with necessary
information; otherwise, we feel bitter. How to measure this happiness (or
bitterness)? How does the profile of happiness grow and decay during the course
of web-browsing? We propose a probabilistic framework that models evolution of
user satisfaction, on top of his/her continuous frustration at not finding the
required information. It is found that the cumulative satisfaction profile of a
web-searching individual can be modeled effectively as the sum of random number
of random terms, where each term is mutually independent random variable,
originating from 'memoryless' Poisson flow. Evolution of satisfaction over the
entire time interval of user's browsing was modeled with auto-correlation
analysis. A utilitarian marker, magnitude of greater than unity of which
describe happy web-searching operations; and an empirical limit that connects
user's satisfaction with his frustration level - are proposed too. Presence of
pertinent information in the very first page of a web-site and magnitude of the
decay parameter of user satisfaction (frustration, irritation etc.), are found
to be two key aspects that dominate web-browser's psychology. The proposed
model employed different combination of decay parameter, searching time and
number of helpful web-sites. Obtained results are found to match the results
from three real-life case-studies.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 14:55:20 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Nov 2011 11:06:17 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Dec 2011 07:39:50 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Banerji",
"Anirban",
""
],
[
"Magarkar",
"Aniket",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0902.1169 | Gagan Raj Gupta | Gagan Raj Gupta, Sujay Sanghavi and Ness B. Shroff | Node Weighted Scheduling | To appear in Sigmetrics 2009 | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a new class of online policies for scheduling in
input-buffered crossbar switches. Our policies are throughput optimal for a
large class of arrival processes which satisfy strong-law of large numbers.
Given an initial configuration and no further arrivals, our policies drain all
packets in the system in the minimal amount of time (providing an online
alternative to the batch approach based on Birkhoff-VonNeumann decompositions).
We show that it is possible for policies in our class to be throughput optimal
even if they are not constrained to be maximal in every time slot.
Most algorithms for switch scheduling take an edge based approach; in
contrast, we focus on scheduling (a large enough set of) the most congested
ports. This alternate approach allows for lower-complexity algorithms, and also
requires a non-standard technique to prove throughput-optimality. One algorithm
in our class, Maximum Vertex-weighted Matching (MVM) has worst-case complexity
similar to Max-size Matching, and in simulations shows slightly better delay
performance than Max-(edge)weighted-Matching (MWM).
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 20:34:09 GMT"
}
]
| 2009-02-09T00:00:00 | [
[
"Gupta",
"Gagan Raj",
""
],
[
"Sanghavi",
"Sujay",
""
],
[
"Shroff",
"Ness B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0902.1179 | Goetz Schwandtner | Martin Grohe, Goetz Schwandtner | The Complexity of Datalog on Linear Orders | 21 pages | Logical Methods in Computer Science, Volume 5, Issue 1 (February
27, 2009) lmcs:811 | 10.2168/LMCS-5(1:4)2009 | null | cs.LO cs.CC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the program complexity of datalog on both finite and infinite linear
orders. Our main result states that on all linear orders with at least two
elements, the nonemptiness problem for datalog is EXPTIME-complete. While
containment of the nonemptiness problem in EXPTIME is known for finite linear
orders and actually for arbitrary finite structures, it is not obvious for
infinite linear orders. It sharply contrasts the situation on other infinite
structures; for example, the datalog nonemptiness problem on an infinite
successor structure is undecidable. We extend our upper bound results to
infinite linear orders with constants.
As an application, we show that the datalog nonemptiness problem on Allen's
interval algebra is EXPTIME-complete.
| [
{
"version": "v1",
"created": "Sun, 8 Feb 2009 17:56:09 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2009 22:32:04 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Grohe",
"Martin",
""
],
[
"Schwandtner",
"Goetz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0902.1182 | Fr\'ed\'eric Meunier | Olivier Durand de G\'evigney, Fr\'ed\'eric Meunier, Christian Popa,
Julien Reygner, Ayrin Romero | Directed paths on a tree: coloring, multicut and kernel | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the present paper, we study algorithmic questions for the arc-intersection
graph of directed paths on a tree. Such graphs are known to be perfect (proved
by Monma and Wei in 1986). We present faster algorithms than all previously
known algorithms for solving the minimum coloring and the minimum clique cover
problems. They both run in $O(np)$ time, where $n$ is the number of vertices of
the tree and $p$ the number of paths. Another result is a polynomial algorithm
computing a kernel in the intersection graph, when its edges are oriented in a
clique-acyclic way. Indeed, such a kernel exists for any perfect graph by a
theorem of Boros and Gurvich. Such algorithms computing kernels are known only
for few classes of perfect graphs.
| [
{
"version": "v1",
"created": "Fri, 6 Feb 2009 21:15:02 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"de Gévigney",
"Olivier Durand",
""
],
[
"Meunier",
"Frédéric",
""
],
[
"Popa",
"Christian",
""
],
[
"Reygner",
"Julien",
""
],
[
"Romero",
"Ayrin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1220 | Lalitha Sankar | Lalitha Sankar, Yingbin Liang, Narayan Mandayam, H. Vincent Poor | Opportunistic Communications in Fading Multiaccess Relay Channels | Submitted to the IEEE Trans. on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of optimal resource allocation is studied for ergodic fading
orthogonal multiaccess relay channels (MARCs) in which the users (sources)
communicate with a destination with the aid of a half-duplex relay that
transmits on a channel orthogonal to that used by the transmitting sources.
Under the assumption that the instantaneous fading state information is
available at all nodes, the maximum sum-rate and the optimal user and relay
power allocations (policies) are developed for a decode-and-forward (DF) relay.
With the observation that a DF relay results in two multiaccess channels, one
at the relay and the other at the destination, a single known lemma on the
sum-rate of two intersecting polymatroids is used to determine the DF sum-rate
and the optimal user and relay policies. The lemma also enables a broad
topological classification of fading MARCs into one of three types. The first
type is the set of partially clustered MARCs where a user is clustered either
with the relay or with the destination such that the users waterfill on their
bottle-neck links to the distant receiver. The second type is the set of
clustered MARCs where all users are either proximal to the relay or to the
destination such that opportunistic multiuser scheduling to one of the
receivers is optimal. The third type consists of arbitrarily clustered MARCs
which are a combination of the first two types, and for this type it is shown
that the optimal policies are opportunistic non-waterfilling solutions. The
analysis is extended to develop the rate region of a K-user orthogonal
half-duplex MARC. Finally, cutset outer bounds are used to show that DF
achieves the capacity region for a class of clustered orthogonal half-duplex
MARCs.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 04:37:04 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Sankar",
"Lalitha",
""
],
[
"Liang",
"Yingbin",
""
],
[
"Mandayam",
"Narayan",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1227 | Raajay Viswanathan | Avinash Achar, Srivatsan Laxman, Raajay Viswanathan and P. S. Sastry | Discovering general partial orders in event streams | null | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Frequent episode discovery is a popular framework for pattern discovery in
event streams. An episode is a partially ordered set of nodes with each node
associated with an event type. Efficient (and separate) algorithms exist for
episode discovery when the associated partial order is total (serial episode)
and trivial (parallel episode). In this paper, we propose efficient algorithms
for discovering frequent episodes with general partial orders. These algorithms
can be easily specialized to discover serial or parallel episodes. Also, the
algorithms are flexible enough to be specialized for mining in the space of
certain interesting subclasses of partial orders. We point out that there is an
inherent combinatorial explosion in frequent partial order mining and most
importantly, frequency alone is not a sufficient measure of interestingness. We
propose a new interestingness measure for general partial order episodes and a
discovery method based on this measure, for filtering out uninteresting partial
orders. Simulations demonstrate the effectiveness of our algorithms.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 07:50:02 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Dec 2009 06:18:30 GMT"
}
]
| 2009-12-11T00:00:00 | [
[
"Achar",
"Avinash",
""
],
[
"Laxman",
"Srivatsan",
""
],
[
"Viswanathan",
"Raajay",
""
],
[
"Sastry",
"P. S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0902.1232 | Soubhik Chakraborty | Soubhik Chakraborty | On Why and What of Randomness | This article will definitely assist both teaching and research(esp on
the interface of statistics and computing) | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has several objectives. First, it separates randomness from
lawlessness and shows why even genuine randomness does not imply lawlessness.
Second, it separates the question -why should I call a phenomenon random? (and
answers it in part one) from the patent question -What is a random sequence?
-for which the answer lies in Kolmogorov complexity (which is explained in part
two). While answering the first question the note argues why there should be
four motivating factors for calling a phenomenon random: ontic, epistemic,
pseudo and telescopic, the first two depicting genuine randomness and the last
two false. Third, ontic and epistemic randomness have been distinguished from
ontic and epistemic probability. Fourth, it encourages students to be applied
statisticians and advises against becoming armchair theorists but this is
interestingly achieved by a straight application of telescopic randomness.
Overall, it tells (the teacher) not to jump to probability without explaining
randomness properly first and similarly advises the students to read (and
understand) randomness minutely before taking on probability.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 10:46:55 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Chakraborty",
"Soubhik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0902.1253 | Wadie Guizani | Laurent Boyer, Guillaume Theyssier (LM-Savoie) | On Local Symmetries And Universality In Cellular Autmata | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 195-206 | null | null | cs.DM math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cellular automata (CA) are dynamical systems defined by a finite local rule
but they are studied for their global dynamics. They can exhibit a wide range
of complex behaviours and a celebrated result is the existence of
(intrinsically) universal CA, that is CA able to fully simulate any other CA.
In this paper, we show that the asymptotic density of universal cellular
automata is 1 in several families of CA defined by local symmetries. We extend
results previously established for captive cellular automata in two significant
ways. First, our results apply to well-known families of CA (e.g. the family of
outer-totalistic CA containing the Game of Life) and, second, we obtain such
density results with both increasing number of states and increasing
neighbourhood. Moreover, thanks to universality-preserving encodings, we show
that the universality problem remains undecidable in some of those families.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 17:54:02 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Boyer",
"Laurent",
"",
"LM-Savoie"
],
[
"Theyssier",
"Guillaume",
"",
"LM-Savoie"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
]
|
0902.1254 | Wadie Guizani | Mahdi Cheraghchi (EPFL), Amin Shokrollahi (EPFL) | Almost-Uniform Sampling of Points on High-Dimensional Algebraic
Varieties | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 277-288 | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of uniform sampling of points on an algebraic
variety. Specifically, we develop a randomized algorithm that, given a small
set of multivariate polynomials over a sufficiently large finite field,
produces a common zero of the polynomials almost uniformly at random. The
statistical distance between the output distribution of the algorithm and the
uniform distribution on the set of common zeros is polynomially small in the
field size, and the running time of the algorithm is polynomial in the
description of the polynomials and their degrees provided that the number of
the polynomials is a constant.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 17:56:02 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Cheraghchi",
"Mahdi",
"",
"EPFL"
],
[
"Shokrollahi",
"Amin",
"",
"EPFL"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.1255 | Wadie Guizani | Sourav Chakraborty, Eldar Fischer, Arie Matsliah, Raphael Yuster | Hardness and Algorithms for Rainbow Connectivity | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 243-254 | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An edge-colored graph G is rainbow connected if any two vertices are
connected by a path whose edges have distinct colors. The rainbow connectivity
of a connected graph G, denoted rc(G), is the smallest number of colors that
are needed in order to make G rainbow connected. In addition to being a natural
combinatorial problem, the rainbow connectivity problem is motivated by
applications in cellular networks. In this paper we give the first proof that
computing rc(G) is NP-Hard. In fact, we prove that it is already NP-Complete to
decide if rc(G) = 2, and also that it is NP-Complete to decide whether a given
edge-colored (with an unbounded number of colors) graph is rainbow connected.
On the positive side, we prove that for every $\epsilon$ > 0, a connected graph
with minimum degree at least $\epsilon n$ has bounded rainbow connectivity,
where the bound depends only on $\epsilon$, and the corresponding coloring can
be constructed in polynomial time. Additional non-trivial upper bounds, as well
as open problems and conjectures are also pre sented.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 17:56:42 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2009 08:08:47 GMT"
}
]
| 2009-02-17T00:00:00 | [
[
"Chakraborty",
"Sourav",
""
],
[
"Fischer",
"Eldar",
""
],
[
"Matsliah",
"Arie",
""
],
[
"Yuster",
"Raphael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1256 | Wadie Guizani | Andrei A. Bulatov, Victor Dalmau, Martin Grohe, Daniel Marx | Enumerating Homomorphisms | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 231-242 | null | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The homomorphism problem for relational structures is an abstract way of
formulating constraint satisfaction problems (CSP) and various problems in
database theory. The decision version of the homomorphism problem received a
lot of attention in literature; in particular, the way the graph-theoretical
structure of the variables and constraints influences the complexity of the
problem is intensively studied. Here we study the problem of enumerating all
the solutions with polynomial delay from a similar point of view. It turns out
that the enumeration problem behaves very differently from the decision
version. We give evidence that it is unlikely that a characterization result
similar to the decision version can be obtained. Nevertheless, we show
nontrivial cases where enumeration can be done with polynomial delay.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 17:57:24 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Bulatov",
"Andrei A.",
""
],
[
"Dalmau",
"Victor",
""
],
[
"Grohe",
"Martin",
""
],
[
"Marx",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.1257 | Tom Hirschowitz | Tom Hirschowitz (LM-Savoie), Xavier Leroy (INRIA Rocquencourt), J. B.
Wells | Compilation of extended recursion in call-by-value functional languages | 62 pages, uses pic | Higher-Order and Symbolic Computation 22, 1 (2009) 3-66 | 10.1007/s10990-009-9042-z | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper formalizes and proves correct a compilation scheme for
mutually-recursive definitions in call-by-value functional languages. This
scheme supports a wider range of recursive definitions than previous methods.
We formalize our technique as a translation scheme to a lambda-calculus
featuring in-place update of memory blocks, and prove the translation to be
correct.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 18:00:30 GMT"
}
]
| 2010-02-01T00:00:00 | [
[
"Hirschowitz",
"Tom",
"",
"LM-Savoie"
],
[
"Leroy",
"Xavier",
"",
"INRIA Rocquencourt"
],
[
"Wells",
"J. B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0902.1258 | Baptiste Jeudy | Baptiste Jeudy (LAHC), Fran\c{c}ois Rioult (GREYC) | Extraction de concepts sous contraintes dans des donn\'ees d'expression
de g\`enes | null | Conf\'erence sur l'apprentissage automatique, Nice : France (2005) | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a technique to extract constrained formal concepts.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 18:01:09 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Jeudy",
"Baptiste",
"",
"LAHC"
],
[
"Rioult",
"François",
"",
"GREYC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0902.1259 | Baptiste Jeudy | Baptiste Jeudy (LAHC, EURISE), Fran\c{c}ois Rioult (GREYC) | Database Transposition for Constrained (Closed) Pattern Mining | null | Knowledge Discovery in Inductive Databases, Third International
Workshop, KDID 2004, Pisa, Italy, Septembre 2004, Revised Selected and
Invited Papers, Bart Goethals, Arno Siebes (Ed.) (2004) 89-107 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, different works proposed a new way to mine patterns in databases
with pathological size. For example, experiments in genome biology usually
provide databases with thousands of attributes (genes) but only tens of objects
(experiments). In this case, mining the "transposed" database runs through a
smaller search space, and the Galois connection allows to infer the closed
patterns of the original database. We focus here on constrained pattern mining
for those unusual databases and give a theoretical framework for database and
constraint transposition. We discuss the properties of constraint transposition
and look into classical constraints. We then address the problem of generating
the closed patterns of the original database satisfying the constraint,
starting from those mined in the "transposed" database. Finally, we show how to
generate all the patterns satisfying the constraint from the closed ones.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 18:01:56 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Jeudy",
"Baptiste",
"",
"LAHC, EURISE"
],
[
"Rioult",
"François",
"",
"GREYC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0902.1260 | Wadie Guizani | Ho-Leung Chan, Jeff Edmonds, Tak-Wah Lam, Lap-Kei Lee, Alberto
Marchetti-Spaccamela, Kirk Pruhs | Nonclairvoyant Speed Scaling for Flow and Energy | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 255-264 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study online nonclairvoyant speed scaling to minimize total flow time plus
energy. We first consider the traditional model where the power function is P
(s) = s\^\propto. We give a nonclairvoyant algorithm that is shown to be
O(\propto\^3)-competitive. We then show an \Omega(\propto\^(1/3-\epsilon))
lower bound on the competitive ratio of any nonclairvoyant algorithm. We also
show that there are power functions for which no nonclairvoyant algorithm can
be O(1)-competitive.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 18:02:32 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Chan",
"Ho-Leung",
""
],
[
"Edmonds",
"Jeff",
""
],
[
"Lam",
"Tak-Wah",
""
],
[
"Lee",
"Lap-Kei",
""
],
[
"Marchetti-Spaccamela",
"Alberto",
""
],
[
"Pruhs",
"Kirk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1261 | Wadie Guizani | Victor Chepoi (LIF), M. Seston (LIF) | An Approximation Algorithm for l\infty-Fitting Robinson Structures to
Distances | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 265-276 | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a factor 16 approximation algorithm for the
following NP-hard distance fitting problem: given a finite set X and a distance
d on X, find a Robinsonian distance dR on X minimizing the l\infty-error ||d -
dR||\infty = maxx,y\epsilonX {|d(x, y) - dR(x, y)|}. A distance dR on a finite
set X is Robinsonian if its matrix can be symmetrically permuted so that its
elements do not decrease when moving away from the main diagonal along any row
or column. Robinsonian distances generalize ultrametrics, line distances and
occur in the seriation problems and in classification.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 18:03:11 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Chepoi",
"Victor",
"",
"LIF"
],
[
"Seston",
"M.",
"",
"LIF"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.1267 | Zilong Wang | Zilong Wang, Guang Gong | A Note on the Diagonalization of the Discrete Fourier Transform | 12 pages, accepted by Applied and Computational Harmonic Analysis | null | 10.1016/j.acha.2009.05.003 | null | cs.IT cs.DM math.IT math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Following the approach developed by S. Gurevich and R. Hadani, an analytical
formula of the canonical basis of the DFT is given for the case $N=p$ where $p$
is a prime number and $p\equiv 1$ (mod 4).
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 19:54:09 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2009 22:01:50 GMT"
}
]
| 2009-12-02T00:00:00 | [
[
"Wang",
"Zilong",
""
],
[
"Gong",
"Guang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0902.1275 | Jalil Seifali Harsini | Jalil Seifali Harsini, Farshad Lahouti | Delay Performance Optimization for Multiuser Diversity Systems with
Bursty-Traffic and Heterogeneous Wireless Links | 6 pages, 4 figures, 1 table | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a cross-layer approach for optimizing the delay
performance of a multiuser diversity system with heterogeneous block-fading
channels and a delay-sensitive bursty-traffic. We consider the downlink of a
time-slotted multiuser system employing opportunistic scheduling with fair
performance at the medium access (MAC) layer and adaptive modulation and coding
(AMC) with power control at the physical layer. Assuming individual user
buffers which temporarily store the arrival traffic of users at the MAC layer,
we first present a large deviations based statistical model to evaluate the
delay-bound violation of packets in the user buffers. Aiming at minimizing the
delay probability of the individual users, we then optimize the AMC and power
control module subject to a target packet-error rate constraint. In the case of
a quantized feedback channel, we also present a constant-power AMC based
opportunistic scheduling scheme. Numerical and simulation results are provided
to evaluate the delay performance of the proposed adaptation schemes in a
multiuser setup.
| [
{
"version": "v1",
"created": "Sat, 7 Feb 2009 21:54:45 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Harsini",
"Jalil Seifali",
""
],
[
"Lahouti",
"Farshad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1278 | Salah A. Aly | Salah A. Aly, Zhenning Kong, Emina Soljanin | Fountain Codes Based Distributed Storage Algorithms for Large-scale
Wireless Sensor Networks | A method to estimate the total number of nodes in a graph is
presented in this 12 pages | Proc. IEEE/ACM IPSN 2008, pp 171-182 | 10.1109/IPSN.2008.64 | null | cs.IT cs.DS cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider large-scale sensor networks with n nodes, out of which k are in
possession, (e.g., have sensed or collected in some other way) k information
packets. In the scenarios in which network nodes are vulnerable because of, for
example, limited energy or a hostile environment, it is desirable to
disseminate the acquired information throughout the network so that each of the
n nodes stores one (possibly coded) packet and the original k source packets
can be recovered later in a computationally simple way from any (1 + \epsilon)k
nodes for some small \epsilon > 0.
We developed two distributed algorithms for solving this problem based on
simple random walks and Fountain codes. Unlike all previously developed
schemes, our solution is truly distributed, that is, nodes do not know n, k or
connectivity in the network, except in their own neighborhoods, and they do not
maintain any routing tables. In the first algorithm, all the sensors have the
knowledge of n and k. In the second algorithm, each sensor estimates these
parameters through the random walk dissemination. We present analysis of the
communication/transmission and encoding/decoding complexity of these two
algorithms, and provide extensive simulation results as well
| [
{
"version": "v1",
"created": "Sun, 8 Feb 2009 07:49:20 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Kong",
"Zhenning",
""
],
[
"Soljanin",
"Emina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1284 | Daniel Hsu | Daniel Hsu, Sham M. Kakade, John Langford, Tong Zhang | Multi-Label Prediction via Compressed Sensing | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider multi-label prediction problems with large output spaces under
the assumption of output sparsity -- that the target (label) vectors have small
support. We develop a general theory for a variant of the popular error
correcting output code scheme, using ideas from compressed sensing for
exploiting this sparsity. The method can be regarded as a simple reduction from
multi-label regression problems to binary regression problems. We show that the
number of subproblems need only be logarithmic in the total number of possible
labels, making this approach radically more efficient than others. We also
state and prove robustness guarantees for this method in the form of regret
transform bounds (in general), and also provide a more detailed analysis for
the linear prediction setting.
| [
{
"version": "v1",
"created": "Sun, 8 Feb 2009 02:30:06 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jun 2009 16:23:28 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Hsu",
"Daniel",
""
],
[
"Kakade",
"Sham M.",
""
],
[
"Langford",
"John",
""
],
[
"Zhang",
"Tong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0902.1299 | Hirotada Kobayashi | Hirotada Kobayashi, Francois Le Gall, Harumichi Nishimura, Martin
Roetteler | Perfect Quantum Network Communication Protocol Based on Classical
Network Coding | LaTeX2e, 10 pages, 2 figures | Proceedings 2010 IEEE International Symposium on Information
Theory (ISIT 2010), pp. 2686-2690 | 10.1109/ISIT.2010.5513644 | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a problem of quantum communication between parties that
are connected through a network of quantum channels. The model in this paper
assumes that there is no prior entanglement shared among any of the parties,
but that classical communication is free. The task is to perfectly transfer an
unknown quantum state from a source subsystem to a target subsystem, where both
source and target are formed by ordered sets of some of the nodes. It is proved
that a lower bound of the rate at which this quantum communication task is
possible is given by the classical min-cut max-flow theorem of network coding,
where the capacities in question are the quantum capacities of the edges of the
network.
| [
{
"version": "v1",
"created": "Sun, 8 Feb 2009 09:10:41 GMT"
}
]
| 2016-05-30T00:00:00 | [
[
"Kobayashi",
"Hirotada",
""
],
[
"Gall",
"Francois Le",
""
],
[
"Nishimura",
"Harumichi",
""
],
[
"Roetteler",
"Martin",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1351 | Cristina Fernandez-Cordoba | C. Fern\'andez-C\'ordoba and K. T. Phelps | On the minimum distance graph of an extended Preparata code | null | null | null | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The minimum distance graph of an extended Preparata code P(m) has vertices
corresponding to codewords and edges corresponding to pairs of codewords that
are distance 6 apart. The clique structure of this graph is investigated and it
is established that the minimum distance graphs of two extended Preparata codes
are isomorphic if and only if the codes are equivalent.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2009 01:03:29 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Fernández-Córdoba",
"C.",
""
],
[
"Phelps",
"K. T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1364 | Sadagopan Narasimhan | N.S.Narayanaswamy, N.Sadagopan and Apoorve Dubey | A Note on Contractible Edges in Chordal Graphs | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contraction of an edge merges its end points into a new vertex which is
adjacent to each neighbor of the end points of the edge. An edge in a
$k$-connected graph is {\em contractible} if its contraction does not result in
a graph of lower connectivity. We characterize contractible edges in chordal
graphs using properties of tree decompositions with respect to minimal vertex
separators.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2009 05:07:07 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Narayanaswamy",
"N. S.",
""
],
[
"Sadagopan",
"N.",
""
],
[
"Dubey",
"Apoorve",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1378 | Pierre Fraigniaud | Yuval Emek, Pierre Fraigniaud, Amos Korman, Adi Rosen | On the Additive Constant of the k-server Work Function Algorithm | 7 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the Work Function Algorithm for the k-server problem. We show
that if the Work Function Algorithm is c-competitive, then it is also strictly
(2c)-competitive. As a consequence of [Koutsoupias and Papadimitriou, JACM
1995] this also shows that the Work Function Algorithm is strictly
(4k-2)-competitive.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2009 07:47:19 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Emek",
"Yuval",
""
],
[
"Fraigniaud",
"Pierre",
""
],
[
"Korman",
"Amos",
""
],
[
"Rosen",
"Adi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1394 | Francesca Lo Piccolo | Giuseppe Bianchi, Nicola Blefari Melazzi, Lorenzo Bracciale, Francesca
Lo Piccolo, Stefano Salsano | Fundamental delay bounds in peer-to-peer chunk-based real-time streaming
systems | 8 pages, 5 figures | Proceedings of 21st International Teletraffic Congress (ITC 21),
2009 | null | null | cs.PF cs.MM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper addresses the following foundational question: what is the maximum
theoretical delay performance achievable by an overlay peer-to-peer streaming
system where the streamed content is subdivided into chunks? As shown in this
paper, when posed for chunk-based systems, and as a consequence of the
store-and-forward way in which chunks are delivered across the network, this
question has a fundamentally different answer with respect to the case of
systems where the streamed content is distributed through one or more flows
(sub-streams). To circumvent the complexity emerging when directly dealing with
delay, we express performance in term of a convenient metric, called "stream
diffusion metric". We show that it is directly related to the end-to-end
minimum delay achievable in a P2P streaming network. In a homogeneous scenario,
we derive a performance bound for such metric, and we show how this bound
relates to two fundamental parameters: the upload bandwidth available at each
node, and the number of neighbors a node may deliver chunks to. In this bound,
k-step Fibonacci sequences do emerge, and appear to set the fundamental laws
that characterize the optimal operation of chunk-based systems.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2009 10:05:48 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Feb 2010 17:56:48 GMT"
}
]
| 2010-02-01T00:00:00 | [
[
"Bianchi",
"Giuseppe",
""
],
[
"Melazzi",
"Nicola Blefari",
""
],
[
"Bracciale",
"Lorenzo",
""
],
[
"Piccolo",
"Francesca Lo",
""
],
[
"Salsano",
"Stefano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0902.1400 | Wadie Guizani | Erik D. Demaine (MIT), Mohammadtaghi Hajiaghayi (MIT), Hamid Mahini,
Morteza Zadimoghaddam | The Price of Anarchy in Cooperative Network Creation Games | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 301-312 | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In general, the games are played on a host graph, where each node is a
selfish independent agent (player) and each edge has a fixed link creation cost
\alpha. Together the agents create a network (a subgraph of the host graph)
while selfishly minimizing the link creation costs plus the sum of the
distances to all other players (usage cost). In this paper, we pursue two
important facets of the network creation game. First, we study extensively a
natural version of the game, called the cooperative model, where nodes can
collaborate and share the cost of creating any edge in the host graph. We prove
the first nontrivial bounds in this model, establishing that the price of
anarchy is polylogarithmic in n for all values of α in complete host
graphs. This bound is the first result of this type for any version of the
network creation game; most previous general upper bounds are polynomial in n.
Interestingly, we also show that equilibrium graphs have polylogarithmic
diameter for the most natural range of \alpha (at most n polylg n). Second, we
study the impact of the natural assumption that the host graph is a general
graph, not necessarily complete. This model is a simple example of nonuniform
creation costs among the edges (effectively allowing weights of \alpha and
\infty). We prove the first assemblage of upper and lower bounds for this
context, stablishing nontrivial tight bounds for many ranges of \alpha, for
both the unilateral and cooperative versions of network creation. In
particular, we establish polynomial lower bounds for both versions and many
ranges of \alpha, even for this simple nonuniform cost model, which sharply
contrasts the conjectured constant bounds for these games in complete (uniform)
graphs.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2009 10:31:34 GMT"
}
]
| 2009-02-10T00:00:00 | [
[
"Demaine",
"Erik D.",
"",
"MIT"
],
[
"Hajiaghayi",
"Mohammadtaghi",
"",
"MIT"
],
[
"Mahini",
"Hamid",
""
],
[
"Zadimoghaddam",
"Morteza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0902.1475 | Frank E. Walter | Frank E. Walter, Stefano Battiston, Frank Schweitzer | Personalised and Dynamic Trust in Social Networks | Revised, added Empirical Validation, submitted to Recommender Systems
2009 | null | null | null | cs.CY cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a novel trust metric for social networks which is suitable for
application in recommender systems. It is personalised and dynamic and allows
to compute the indirect trust between two agents which are not neighbours based
on the direct trust between agents that are neighbours. In analogy to some
personalised versions of PageRank, this metric makes use of the concept of
feedback centrality and overcomes some of the limitations of other trust
metrics.In particular, it does not neglect cycles and other patterns
characterising social networks, as some other algorithms do. In order to apply
the metric to recommender systems, we propose a way to make trust dynamic over
time. We show by means of analytical approximations and computer simulations
that the metric has the desired properties. Finally, we carry out an empirical
validation on a dataset crawled from an Internet community and compare the
performance of a recommender system using our metric to one using collaborative
filtering.
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2009 16:53:01 GMT"
},
{
"version": "v2",
"created": "Sat, 9 May 2009 17:48:23 GMT"
}
]
| 2009-05-09T00:00:00 | [
[
"Walter",
"Frank E.",
""
],
[
"Battiston",
"Stefano",
""
],
[
"Schweitzer",
"Frank",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0902.1505 | Deping Ye | Deping Ye | On the Bures Volume of Separable Quantum States | 27 pages. To appear in the Journal of Mathematical Physics | JOURNAL OF MATHEMATICAL PHYSICS 50, 083502 (2009) | 10.1063/1.3187216 | null | quant-ph cs.IT math.FA math.IT math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We obtain two sided estimates for the Bures volume of an arbitrary subset of
the set of $N\times N$ density matrices, in terms of the Hilbert-Schmidt volume
of that subset. For general subsets, our results are essentially optimal (for
large $N$). As applications, we derive in particular nontrivial lower and upper
bounds for the Bures volume of sets of separable states and for sets of states
with positive partial transpose.
PACS numbers: 02.40.Ft, 03.65.Db, 03.65.Ud, 03.67.Mn
| [
{
"version": "v1",
"created": "Mon, 9 Feb 2009 19:46:53 GMT"
},
{
"version": "v2",
"created": "Thu, 21 May 2009 21:58:46 GMT"
}
]
| 2010-07-09T00:00:00 | [
[
"Ye",
"Deping",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
]
|
0902.1587 | Publications Loria | Alain Finkel (LSV), Jean Goubault-Larrecq (LSV) | Forward analysis for WSTS, Part I: Completions | null | 26th International Symposium on Theoretical Aspects of Computer
Science - STACS 2009 (2009) 433-444 | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Well-structured transition systems provide the right foundation to compute a
finite basis of the set of predecessors of the upward closure of a state. The
dual problem, to compute a finite representation of the set of successors of
the downward closure of a state, is harder: Until now, the theoretical
framework for manipulating downward-closed sets was missing. We answer this
problem, using insights from domain theory (dcpos and ideal completions), from
topology (sobrifications), and shed new light on the notion of adequate domains
of limits.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 06:42:24 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Finkel",
"Alain",
"",
"LSV"
],
[
"Goubault-Larrecq",
"Jean",
"",
"LSV"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.1591 | Paolo Minero | Paolo Minero and Young-Han Kim | Correlated Sources over Broadcast Channels | 9 pages, 1 figure. Updated version, with proofs and minor changes | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of reliable transmission of correlated sources over the broadcast
channel, originally studied by Han and Costa, is revisited. An alternative
characterization of their sufficient condition for reliable transmission is
given, which includes results of Marton for channel coding over broadcast
channels and of Gray and Wyner for distributed source coding. A
``minimalistic'' coding scheme is presented, which is based on joint typicality
encoding and decoding, without requiring the use of Cover's superposition
coding, random hashing, and common part between two sources. The analysis of
the coding scheme is also conceptually simple and relies on a new multivariate
covering lemma and an application of the Fourier--Motzkin elimination
procedure.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 19:57:24 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Dec 2009 19:09:46 GMT"
}
]
| 2009-12-22T00:00:00 | [
[
"Minero",
"Paolo",
""
],
[
"Kim",
"Young-Han",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1602 | Wadie Guizani | Nathalie Aubrun (IGM), Mathieu Sablik (LATP) | An Order on Sets of Tilings Corresponding to an Order on Languages | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 99-110 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditionally a tiling is defined with a finite number of finite forbidden
patterns. We can generalize this notion considering any set of patterns.
Generalized tilings defined in this way can be studied with a dynamical point
of view, leading to the notion of subshift. In this article we establish a
correspondence between an order on subshifts based on dynamical transformations
on them and an order on languages of forbidden patterns based on computability
properties.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 08:37:40 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Aubrun",
"Nathalie",
"",
"IGM"
],
[
"Sablik",
"Mathieu",
"",
"LATP"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1604 | Wadie Guizani | Eda Baykan (EPFL), Monika Henzinger (EPFL), Stefan F. Keller,
Sebastian De Castelberg, Markus Kinzler | A Comparison of Techniques for Sampling Web Pages | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 13-30 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As the World Wide Web is growing rapidly, it is getting increasingly
challenging to gather representative information about it. Instead of crawling
the web exhaustively one has to resort to other techniques like sampling to
determine the properties of the web. A uniform random sample of the web would
be useful to determine the percentage of web pages in a specific language, on a
topic or in a top level domain. Unfortunately, no approach has been shown to
sample the web pages in an unbiased way. Three promising web sampling
algorithms are based on random walks. They each have been evaluated
individually, but making a comparison on different data sets is not possible.
We directly compare these algorithms in this paper. We performed three random
walks on the web under the same conditions and analyzed their outcomes in
detail. We discuss the strengths and the weaknesses of each algorithm and
propose improvements based on experimental results.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 08:44:14 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Baykan",
"Eda",
"",
"EPFL"
],
[
"Henzinger",
"Monika",
"",
"EPFL"
],
[
"Keller",
"Stefan F.",
""
],
[
"De Castelberg",
"Sebastian",
""
],
[
"Kinzler",
"Markus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1605 | Wadie Guizani | Nicole Schweikardt | Lower Bounds for Multi-Pass Processing of Multiple Data Streams | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 51-62 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper gives a brief overview of computation models for data stream
processing, and it introduces a new model for multi-pass processing of multiple
streams, the so-called mp2s-automata. Two algorithms for solving the set
disjointness problem wi th these automata are presented. The main technical
contribution of this paper is the proof of a lower bound on the size of memory
and the number of heads that are required for solvin g the set disjointness
problem with mp2s-automata.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 08:46:27 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Schweikardt",
"Nicole",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1609 | Publications Loria | Andr\'e Gronemeier | Asymptotically Optimal Lower Bounds on the NIH-Multi-Party Information | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 505-516 | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Here we prove an asymptotically optimal lower bound on the information
complexity of the k-party disjointness function with the unique intersection
promise, an important special case of the well known disjointness problem, and
the ANDk-function in the number in the hand model. Our (n/k) bound for
disjointness improves on an earlier (n/(k log k)) bound by Chakrabarti et al.
(2003), who obtained an asymptotically tight lower bound for one-way protocols,
but failed to do so for the general case. Our result eliminates both the gap
between the upper and the lower bound for unrestricted protocols and the gap
between the lower bounds for one-way protocols and unrestricted protocols.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 09:13:26 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Gronemeier",
"André",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.1610 | Stefano Zacchiroli | Roberto Di Cosmo (PPS), Stefano Zacchiroli (PPS), Paulo Trezentos | Package upgrades in FOSS distributions: details and challenges | null | International Workshop On Hot Topics In Software Upgrades
Proceedings of the 1st International Workshop on Hot Topics in Software
Upgrades, Nashville, Tennessee : \'Etats-Unis d'Am\'erique (2008) | 10.1145/1490283.1490292 | null | cs.SE cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The upgrade problems faced by Free and Open Source Software distributions
have characteristics not easily found elsewhere. We describe the structure of
packages and their role in the upgrade process. We show that state of the art
package managers have shortcomings inhibiting their ability to cope with
frequent upgrade failures. We survey current countermeasures to such failures,
argue that they are not satisfactory, and sketch alternative solutions.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 09:14:59 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Di Cosmo",
"Roberto",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
],
[
"Trezentos",
"Paulo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
]
|
0902.1612 | Mohab Safey El Din | Mohab Safey El Din (LIP6, INRIA Rocquencourt), \'Eric Schost | A baby steps/giant steps Monte Carlo algorithm for computing roadmaps in
smooth compact real hypersurfaces | null | null | null | RR-6832 | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of constructing roadmaps of real algebraic sets. The
problem was introduced by Canny to answer connectivity questions and solve
motion planning problems. Given $s$ polynomial equations with rational
coefficients, of degree $D$ in $n$ variables, Canny's algorithm has a Monte
Carlo cost of $s^n\log(s) D^{O(n^2)}$ operations in $\mathbb{Q}$; a
deterministic version runs in time $s^n \log(s) D^{O(n^4)}$. The next
improvement was due to Basu, Pollack and Roy, with an algorithm of
deterministic cost $s^{d+1} D^{O(n^2)}$ for the more general problem of
computing roadmaps of semi-algebraic sets ($d \le n$ is the dimension of an
associated object). We give a Monte Carlo algorithm of complexity
$(nD)^{O(n^{1.5})}$ for the problem of computing a roadmap of a compact
hypersurface $V$ of degree $D$ in $n$ variables; we also have to assume that
$V$ has a finite number of singular points. Even under these extra assumptions,
no previous algorithm featured a cost better than $D^{O(n^2)}$.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 09:20:30 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Din",
"Mohab Safey El",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Schost",
"Éric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0902.1617 | Ashish Goel | Ashish Goel and Michael Kapralov and Sanjeev Khanna | Perfect Matchings in \~O(n^{1.5}) Time in Regular Bipartite Graphs | Added analysis of the Hopcroft-Karp algorithm on the subsampled graph | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the well-studied problem of finding a perfect matching in
$d$-regular bipartite graphs with $2n$ vertices and $m = nd$ edges. While the
best-known algorithm for general bipartite graphs (due to Hopcroft and Karp)
takes $O(m \sqrt{n})$ time, in regular bipartite graphs, a perfect matching is
known to be computable in $O(m)$ time. Very recently, the $O(m)$ bound was
improved to $O(\min\{m, \frac{n^{2.5}\ln n}{d}\})$ expected time, an expression
that is bounded by $\tilde{O}(n^{1.75})$. In this paper, we further improve
this result by giving an $O(\min\{m, \frac{n^2\ln^3 n}{d}\})$ expected time
algorithm for finding a perfect matching in regular bipartite graphs; as a
function of $n$ alone, the algorithm takes expected time $O((n\ln n)^{1.5})$.
To obtain this result, we design and analyze a two-stage sampling scheme that
reduces the problem of finding a perfect matching in a regular bipartite graph
to the same problem on a subsampled bipartite graph with $O(n\ln n)$ edges that
has a perfect matching with high probability. The matching is then recovered
using the Hopcroft-Karp algorithm. While the standard analysis of Hopcroft-Karp
gives us an $\tilde{O}(n^{1.5})$ running time, we present a tighter analysis
for our special case that results in the stronger $\tilde{O}(\min\{m,
\frac{n^2}{d} \})$ time mentioned earlier.
Our proof of correctness of this sampling scheme uses a new correspondence
theorem between cuts and Hall's theorem ``witnesses'' for a perfect matching in
a bipartite graph that we prove. We believe this theorem may be of independent
interest; as another example application, we show that a perfect matching in
the support of an $n \times n$ doubly stochastic matrix with $m$ non-zero
entries can be found in expected time $\tilde{O}(m + n^{1.5})$.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 09:45:27 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2009 01:57:21 GMT"
}
]
| 2009-07-30T00:00:00 | [
[
"Goel",
"Ashish",
""
],
[
"Kapralov",
"Michael",
""
],
[
"Khanna",
"Sanjeev",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1629 | Anna Kucerova | O. Hrstka and A. Kucerova | Improvements of real coded genetic algorithms based on differential
operators preventing premature convergence | 23 pages, 2 figures, 4 tables | Advances in Engineering Software, 35 (3-4), 237-246, 2004 | 10.1016/S0965-9978(03)00113-3 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents several types of evolutionary algorithms (EAs) used for
global optimization on real domains. The interest has been focused on
multimodal problems, where the difficulties of a premature convergence usually
occurs. First the standard genetic algorithm (SGA) using binary encoding of
real values and its unsatisfactory behavior with multimodal problems is briefly
reviewed together with some improvements of fighting premature convergence. Two
types of real encoded methods based on differential operators are examined in
detail: the differential evolution (DE), a very modern and effective method
firstly published by R. Storn and K. Price, and the simplified real-coded
differential genetic algorithm SADE proposed by the authors. In addition, an
improvement of the SADE method, called CERAF technology, enabling the
population of solutions to escape from local extremes, is examined. All methods
are tested on an identical set of objective functions and a systematic
comparison based on a reliable methodology is presented. It is confirmed that
real coded methods generally exhibit better behavior on real domains than the
binary algorithms, even when extended by several improvements. Furthermore, the
positive influence of the differential operators due to their possibility of
self-adaptation is demonstrated. From the reliability point of view, it seems
that the real encoded differential algorithm, improved by the technology
described in this paper, is a universal and reliable method capable of solving
all proposed test problems.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 11:02:50 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Hrstka",
"O.",
""
],
[
"Kucerova",
"A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.1634 | Massimiliano Sala Prof. | Eleonora Guerrini, Massimiliano Sala | A bound on the size of linear codes | A new version of this article is now available | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a bound on the size of linear codes. This bound is independent of
other known bounds, e.g. the Griesmer bound.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 11:50:48 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jun 2012 11:05:48 GMT"
}
]
| 2012-06-28T00:00:00 | [
[
"Guerrini",
"Eleonora",
""
],
[
"Sala",
"Massimiliano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1647 | Anna Kucerova | O. Hrstka, A. Kucerova, M. Leps and J. Zeman | A competitive comparison of different types of evolutionary algorithms | 25 pages, 8 figures, 5 tables | Computers & Structures, 81 (18-19), 1979-1990, 2003 | 10.1016/S0045-7949(03)00217-7 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents comparison of several stochastic optimization algorithms
developed by authors in their previous works for the solution of some problems
arising in Civil Engineering. The introduced optimization methods are: the
integer augmented simulated annealing (IASA), the real-coded augmented
simulated annealing (RASA), the differential evolution (DE) in its original
fashion developed by R. Storn and K. Price and simplified real-coded
differential genetic algorithm (SADE). Each of these methods was developed for
some specific optimization problem; namely the Chebychev trial polynomial
problem, the so called type 0 function and two engineering problems - the
reinforced concrete beam layout and the periodic unit cell problem
respectively. Detailed and extensive numerical tests were performed to examine
the stability and efficiency of proposed algorithms. The results of our
experiments suggest that the performance and robustness of RASA, IASA and SADE
methods are comparable, while the DE algorithm performs slightly worse. This
fact together with a small number of internal parameters promotes the SADE
method as the most robust for practical use.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 13:41:15 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Hrstka",
"O.",
""
],
[
"Kucerova",
"A.",
""
],
[
"Leps",
"M.",
""
],
[
"Zeman",
"J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.1661 | Marcin Pilipczuk | Marek Cygan and Marcin Pilipczuk | Even Faster Exact Bandwidth | Paper submitted to Transaction on Algorithms on 5th Nov 2008 | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We deal with exact algorithms for Bandwidth, a long studied NP-hard problem.
For a long time nothing better than the trivial O*(n!) exhaustive search was
known. In 2000, Feige an Kilian came up with a O*(10^n)-time algorithm.
Recently we presented algorithm that runs in O*(5^n) time and O*(2^n) space..
In this paper we present a major modification to our algorithm which makes it
run in O(4.83^n) time with the cost of O*(4^n) space complexity. This
modification allowed us to perform Measure & Conquer analysis for the time
complexity which was not used for such types of problems before.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 14:51:57 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Cygan",
"Marek",
""
],
[
"Pilipczuk",
"Marcin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1665 | Anna Kucerova | A. Kucerova, D. Brancherie, A. Ibrahimbegovic, J. Zeman and Z. Bittnar | Novel anisotropic continuum-discrete damage model capable of
representing localized failure of massive structures. Part II: identification
from tests under heterogeneous stress field | 18 pages, 12 figures, 6 tables | Engineering Computations, 26(1/2), 128-144, 2009 | 10.1108/02644400910924834 | null | cs.NE cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In Part I of this paper we have presented a simple model capable of
describing the localized failure of a massive structure. In this part, we
discuss the identification of the model parameters from two kinds of
experiments: a uniaxial tensile test and a three-point bending test. The former
is used only for illustration of material parameter response dependence, and we
focus mostly upon the latter, discussing the inverse optimization problem for
which the specimen is subjected to a heterogeneous stress field.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 14:45:50 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Kucerova",
"A.",
""
],
[
"Brancherie",
"D.",
""
],
[
"Ibrahimbegovic",
"A.",
""
],
[
"Zeman",
"J.",
""
],
[
"Bittnar",
"Z.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0902.1690 | Anna Kucerova | A. Kucerova, M. Leps and J. Zeman | Back analysis of microplane model parameters using soft computing
methods | 21 pages, 27 figures, 7 tables | CAMES: Computer Assisted Mechanics and Engineering Sciences, 14
(2), 219-242, 2007 | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new procedure based on layered feed-forward neural networks for the
microplane material model parameters identification is proposed in the present
paper. Novelties are usage of the Latin Hypercube Sampling method for the
generation of training sets, a systematic employment of stochastic sensitivity
analysis and a genetic algorithm-based training of a neural network by an
evolutionary algorithm. Advantages and disadvantages of this approach together
with possible extensions are thoroughly discussed and analyzed.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 16:43:06 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Kucerova",
"A.",
""
],
[
"Leps",
"M.",
""
],
[
"Zeman",
"J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.1693 | Christian Hoffmann | Markus Bl\"aser, Christian Hoffmann | Fast Evaluation of Interlace Polynomials on Graphs of Bounded Treewidth | v4: Minor error in Lemma 5.5 fixed, Section 6.6 added, minor
improvements. 44 pages, 14 figures | Algorithmica, 61(1):3-35, 2011 | 10.1007/s00453-010-9439-4 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the multivariate interlace polynomial introduced by Courcelle
(2008), which generalizes several interlace polynomials defined by Arratia,
Bollobas, and Sorkin (2004) and by Aigner and van der Holst (2004). We present
an algorithm to evaluate the multivariate interlace polynomial of a graph with
n vertices given a tree decomposition of the graph of width k. The best
previously known result (Courcelle 2008) employs a general logical framework
and leads to an algorithm with running time f(k)*n, where f(k) is doubly
exponential in k. Analyzing the GF(2)-rank of adjacency matrices in the context
of tree decompositions, we give a faster and more direct algorithm. Our
algorithm uses 2^{3k^2+O(k)}*n arithmetic operations and can be efficiently
implemented in parallel.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 16:41:35 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2009 12:21:47 GMT"
},
{
"version": "v3",
"created": "Thu, 1 Oct 2009 11:53:59 GMT"
},
{
"version": "v4",
"created": "Wed, 21 Jul 2010 09:19:49 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Bläser",
"Markus",
""
],
[
"Hoffmann",
"Christian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1700 | Pierre Charbit | Pierre Charbit, Fabien de Montgolfier, Mathieu Raffinot | Linear Time Split Decomposition Revisited | 18 pages, submitted | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a family F of subsets of a ground set V, its orthogonal is defined to
be the family of subsets that do not overlap any element of F.
Using this tool we revisit the problem of designing a simple linear time
algorithm for undirected graph split (also known as 1-join) decomposition.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 17:16:28 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Jul 2009 12:34:36 GMT"
},
{
"version": "v3",
"created": "Mon, 28 Jun 2010 16:22:02 GMT"
}
]
| 2010-06-29T00:00:00 | [
[
"Charbit",
"Pierre",
""
],
[
"de Montgolfier",
"Fabien",
""
],
[
"Raffinot",
"Mathieu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1734 | Seyed Saeed Changiz Rezaei | Seyed Saeed, Changiz Rezaei, Shahab Oveis Gharan, Amir K. Khandani | A New Achievable Rate for the Gaussian Parallel Relay Channel | 22 pages, 9 figures, Submitted to Transaction on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Schein and Gallager introduced the Gaussian parallel relay channel in 2000.
They proposed the Amplify-and-Forward (AF) and the Decode-and-Forward (DF)
strategies for this channel. For a long time, the best known achievable rate
for this channel was based on the AF and DF with time sharing (AF-DF).
Recently, a Rematch-and-Forward (RF) scheme for the scenario in which different
amounts of bandwidth can be assigned to the first and second hops were
proposed.
In this paper, we propose a \emph{Combined Amplify-and-Decode Forward (CADF)}
scheme for the Gaussian parallel relay channel. We prove that the CADF scheme
always gives a better achievable rate compared to the RF scheme, when there is
a bandwidth mismatch between the first hop and the second hop. Furthermore, for
the equal bandwidth case (Schein's setup), we show that the time sharing
between the CADF and the DF schemes (CADF-DF) leads to a better achievable rate
compared to the time sharing between the RF and the DF schemes (RF-DF) as well
as the AF-DF.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 20:32:06 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Saeed",
"Seyed",
""
],
[
"Rezaei",
"Changiz",
""
],
[
"Gharan",
"Shahab Oveis",
""
],
[
"Khandani",
"Amir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1735 | Publications Loria | Robert Els\"asser, Thomas Sauerwald | Cover Time and Broadcast Time | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 373-384 | null | null | cs.DS math.PR math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new technique for bounding the cover time of random walks by
relating it to the runtime of randomized broadcast. In particular, we strongly
confirm for dense graphs the intuition of Chandra et al. \cite{CRRST97} that
"the cover time of the graph is an appropriate metric for the performance of
certain kinds of randomized broadcast algorithms". In more detail, our results
are as follows: For any graph $G=(V,E)$ of size $n$ and minimum degree
$\delta$, we have $\mathcal{R}(G)= \Oh(\frac{|E|}{\delta} \cdot \log n)$, where
$\mathcal{R}(G)$ denotes the quotient of the cover time and broadcast time.
This bound is tight for binary trees and tight up to logarithmic factors for
many graphs including hypercubes, expanders and lollipop graphs. For any
$\delta$-regular (or almost $\delta$-regular) graph $G$ it holds that
$\mathcal{R}(G) = \Omega(\frac{\delta^2}{n} \cdot \frac{1}{\log n})$. Together
with our upper bound on $\mathcal{R}(G)$, this lower bound strongly confirms
the intuition of Chandra et al. for graphs with minimum degree $\Theta(n)$,
since then the cover time equals the broadcast time multiplied by $n$
(neglecting logarithmic factors). Conversely, for any $\delta$ we construct
almost $\delta$-regular graphs that satisfy $\mathcal{R}(G) = \Oh(\max
\{\sqrt{n},\delta \} \cdot \log^2 n)$. Since any regular expander satisfies
$\mathcal{R}(G) = \Theta(n)$, the strong relationship given above does not hold
if $\delta$ is polynomially smaller than $n$. Our bounds also demonstrate that
the relationship between cover time and broadcast time is much stronger than
the known relationships between any of them and the mixing time (or the closely
related spectral gap).
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 20:32:11 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Elsässer",
"Robert",
""
],
[
"Sauerwald",
"Thomas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0902.1736 | Philippe Robert | Yousra Chabchoub (INRIA), Christine Fricker (INRIA), Fabrice Guillemin
(FT R&D), Philippe Robert (INRIA) | On the Statistical Characterization of Flows in Internet Traffic with
Application to Sampling | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new method of estimating some statistical characteristics of TCP flows in
the Internet is developed in this paper. For this purpose, a new set of random
variables (referred to as observables) is defined. When dealing with sampled
traffic, these observables can easily be computed from sampled data. By
adopting a convenient mouse/elephant dichotomy also dependent on traffic, it is
shown how these variables give a reliable statistical representation of the
number of packets transmitted by large flows during successive time intervals
with an appropriate duration. A mathematical framework is developed to estimate
the accuracy of the method. As an application, it is shown how one can estimate
the number of large TCP flows when only sampled traffic is available. The
algorithm proposed is tested against experimental data collected from different
types of IP networks.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 20:32:49 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2009 12:57:45 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Chabchoub",
"Yousra",
"",
"INRIA"
],
[
"Fricker",
"Christine",
"",
"INRIA"
],
[
"Guillemin",
"Fabrice",
"",
"FT R&D"
],
[
"Robert",
"Philippe",
"",
"INRIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.1737 | Publications Loria | Gianni Franceschini, Roberto Grossi, S. Muthukrishnan | Optimal cache-aware suffix selection | null | 26th International Symposium on Theoretical Aspects of Computer
Science - STACS 2009 (2009) 457-468 | null | null | cs.DS cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given string $S[1..N]$ and integer $k$, the {\em suffix selection} problem is
to determine the $k$th lexicographically smallest amongst the suffixes $S[i...
N]$, $1 \leq i \leq N$. We study the suffix selection problem in the
cache-aware model that captures two-level memory inherent in computing systems,
for a \emph{cache} of limited size $M$ and block size $B$. The complexity of
interest is the number of block transfers. We present an optimal suffix
selection algorithm in the cache-aware model, requiring $\Thetah{N/B}$ block
transfers, for any string $S$ over an unbounded alphabet (where characters can
only be compared), under the common tall-cache assumption (i.e.
$M=\Omegah{B^{1+\epsilon}}$, where $\epsilon<1$). Our algorithm beats the
bottleneck bound for permuting an input array to the desired output array,
which holds for nearly any nontrivial problem in hierarchical memory models.
| [
{
"version": "v1",
"created": "Tue, 10 Feb 2009 20:33:06 GMT"
}
]
| 2009-02-11T00:00:00 | [
[
"Franceschini",
"Gianni",
""
],
[
"Grossi",
"Roberto",
""
],
[
"Muthukrishnan",
"S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0902.1786 | Shuai Zhang | Christian Schlegel and Shuai Zhang | On the Dynamics of the Error Floor Behavior in (Regular) LDPC Codes | 15 pages, submitted to IEEE Trans. Inf. Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that dominant trapping sets of regular LDPC codes, so called
absorption sets, undergo a two-phased dynamic behavior in the iterative
message-passing decoding algorithm. Using a linear dynamic model for the
iteration behavior of these sets, it is shown that they undergo an initial
geometric growth phase which stabilizes in a final bit-flipping behavior where
the algorithm reaches a fixed point. This analysis is shown to lead to very
accurate numerical calculations of the error floor bit error rates down to
error rates that are inaccessible by simulation. The topology of the dominant
absorption sets of an example code, the IEEE 802.3an (2048,1723) regular LDPC
code, are identified and tabulated using topological relationships in
combination with search algorithms.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 00:29:55 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Feb 2009 23:40:14 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Schlegel",
"Christian",
""
],
[
"Zhang",
"Shuai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1790 | David Ellerman | David Ellerman | Counting Distinctions: On the Conceptual Foundations of Shannon's
Information Theory | null | null | null | null | cs.IT cs.LO math.IT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Categorical logic has shown that modern logic is essentially the logic of
subsets (or "subobjects"). Partitions are dual to subsets so there is a dual
logic of partitions where a "distinction" [an ordered pair of distinct elements
(u,u') from the universe U ] is dual to an "element". An element being in a
subset is analogous to a partition p on U making a distinction, i.e., if u and
u' were in different blocks of p. Subset logic leads to finite probability
theory by taking the (Laplacian) probability as the normalized size of each
subset-event of a finite universe. The analogous step in the logic of
partitions is to assign to a partition the number of distinctions made by a
partition normalized by the total number of ordered pairs |UxU| from the finite
universe. That yields a notion of "logical entropy" for partitions and a
"logical information theory." The logical theory directly counts the
(normalized) number of distinctions in a partition while Shannon's theory gives
the average number of binary partitions needed to make those same distinctions.
Thus the logical theory is seen as providing a conceptual underpinning for
Shannon's theory based on the logical notion of "distinctions." (forthcoming in
Synthese)
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 01:34:21 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Ellerman",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0902.1792 | Shipra Agrawal | Shipra Agrawal, Yichuan Ding, Amin Saberi, Yinyu Ye | Correlation Robust Stochastic Optimization | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a robust model proposed by Scarf, 1958, for stochastic
optimization when only the marginal probabilities of (binary) random variables
are given, and the correlation between the random variables is unknown. In the
robust model, the objective is to minimize expected cost against worst possible
joint distribution with those marginals. We introduce the concept of
correlation gap to compare this model to the stochastic optimization model that
ignores correlations and minimizes expected cost under independent Bernoulli
distribution. We identify a class of functions, using concepts of summable cost
sharing schemes from game theory, for which the correlation gap is well-bounded
and the robust model can be approximated closely by the independent
distribution model. As a result, we derive efficient approximation factors for
many popular cost functions, like submodular functions, facility location, and
Steiner tree. As a byproduct, our analysis also yields some new results in the
areas of social welfare maximization and existence of Walrasian equilibria,
which may be of independent interest.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 01:51:42 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Apr 2009 23:58:09 GMT"
},
{
"version": "v3",
"created": "Sun, 11 Oct 2009 05:54:01 GMT"
}
]
| 2009-10-11T00:00:00 | [
[
"Agrawal",
"Shipra",
""
],
[
"Ding",
"Yichuan",
""
],
[
"Saberi",
"Amin",
""
],
[
"Ye",
"Yinyu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1809 | Pedro Pablo P\'erez Velasco | Pedro Pablo Perez Velasco, Juan de Lara Jaramillo | Matrix Graph Grammars with Application Conditions | 38 pages, 23 figures. This version is the one published in Fundamenta
Informaticae. It incorporates all the comments and amendments from the
referees | null | null | null | cs.DM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In the Matrix approach to graph transformation we represent simple digraphs
and rules with Boolean matrices and vectors, and the rewriting is expressed
using Boolean operators only. In previous works, we developed analysis
techniques enabling the study of the applicability of rule sequences, their
independence, state reachability and the minimal graph able to fire a sequence.
In the present paper we improve our framework in two ways. First, we make
explicit (in the form of a Boolean matrix) some negative implicit information
in rules. This matrix (called nihilation matrix) contains the elements that, if
present, forbid the application of the rule (i.e. potential dangling edges, or
newly added edges, which cannot be already present in the simple digraph).
Second, we introduce a novel notion of application condition, which combines
graph diagrams together with monadic second order logic. This allows for more
flexibility and expressivity than previous approaches, as well as more concise
conditions in certain cases. We demonstrate that these application conditions
can be embedded into rules (i.e. in the left hand side and the nihilation
matrix), and show that the applicability of a rule with arbitrary application
conditions is equivalent to the applicability of a sequence of plain rules
without application conditions. Therefore, the analysis of the former is
equivalent to the analysis of the latter, showing that in our framework no
additional results are needed for the study of application conditions.
Moreover, all analysis techniques of [21, 22] for the study of sequences can be
applied to application conditions.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 06:53:29 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Nov 2009 07:30:35 GMT"
}
]
| 2009-11-16T00:00:00 | [
[
"Velasco",
"Pedro Pablo Perez",
""
],
[
"Jaramillo",
"Juan de Lara",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.1834 | Sebastien Tixeuil | St\'ephane Devismes (VERIMAG - IMAG), Franck Petit (LIP, INRIA
Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme),
S\'ebastien Tixeuil (LIP6) | Optimal Probabilistic Ring Exploration by Asynchronous Oblivious Robots | null | null | null | RR-6838 | cs.DS cs.CC cs.DC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a team of $k$ identical, oblivious, asynchronous mobile robots
that are able to sense (\emph{i.e.}, view) their environment, yet are unable to
communicate, and evolve on a constrained path. Previous results in this weak
scenario show that initial symmetry yields high lower bounds when problems are
to be solved by \emph{deterministic} robots. In this paper, we initiate
research on probabilistic bounds and solutions in this context, and focus on
the \emph{exploration} problem of anonymous unoriented rings of any size. It is
known that $\Theta(\log n)$ robots are necessary and sufficient to solve the
problem with $k$ deterministic robots, provided that $k$ and $n$ are coprime.
By contrast, we show that \emph{four} identical probabilistic robots are
necessary and sufficient to solve the same problem, also removing the coprime
constraint. Our positive results are constructive.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 10:18:32 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Devismes",
"Stéphane",
"",
"VERIMAG - IMAG"
],
[
"Petit",
"Franck",
"",
"LIP, INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0902.1835 | Stefan Kratsch | Stefan Kratsch | Polynomial Kernelizations for MIN F^+Pi_1 and MAX NP | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It has been observed in many places that constant-factor approximable
problems often admit polynomial or even linear problem kernels for their
decision versions, e.g., Vertex Cover, Feedback Vertex Set, and Triangle
Packing. While there exist examples like Bin Packing, which does not admit any
kernel unless P = NP, there apparently is a strong relation between these two
polynomial-time techniques. We add to this picture by showing that the natural
decision versions of all problems in two prominent classes of constant-factor
approximable problems, namely MIN F^+\Pi_1 and MAX NP, admit polynomial problem
kernels. Problems in MAX SNP, a subclass of MAX NP, are shown to admit kernels
with a linear base set, e.g., the set of vertices of a graph. This extends
results of Cai and Chen (JCSS 1997), stating that the standard
parameterizations of problems in MAX SNP and MIN F^+\Pi_1 are fixed-parameter
tractable, and complements recent research on problems that do not admit
polynomial kernelizations (Bodlaender et al. JCSS 2009).
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 10:19:38 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Dec 2011 12:19:53 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Kratsch",
"Stefan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.1853 | Arash Amini | F. Marvasti, A. Amini, F. Haddadi, M. Soltanolkotabi, B. H. Khalaj, A.
Aldroubi, S. Holm, S. Sanei and J. Chambers | A Unified Approach to Sparse Signal Processing | 43 pages, 40 figures, 15 tables | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A unified view of sparse signal processing is presented in tutorial form by
bringing together various fields. For each of these fields, various algorithms
and techniques, which have been developed to leverage sparsity, are described
succinctly. The common benefits of significant reduction in sampling rate and
processing manipulations are revealed.
The key applications of sparse signal processing are sampling, coding,
spectral estimation, array processing, component analysis, and multipath
channel estimation. In terms of reconstruction algorithms, linkages are made
with random sampling, compressed sensing and rate of innovation. The redundancy
introduced by channel coding in finite/real Galois fields is then related to
sampling with similar reconstruction algorithms. The methods of Prony,
Pisarenko, and MUSIC are next discussed for sparse frequency domain
representations. Specifically, the relations of the approach of Prony to an
annihilating filter and Error Locator Polynomials in coding are emphasized; the
Pisarenko and MUSIC methods are further improvements of the Prony method. Such
spectral estimation methods is then related to multi-source location and DOA
estimation in array processing. The notions of sparse array beamforming and
sparse sensor networks are also introduced. Sparsity in unobservable source
signals is also shown to facilitate source separation in SCA; the algorithms
developed in this area are also widely used in compressed sensing. Finally, the
multipath channel estimation problem is shown to have a sparse formulation;
algorithms similar to sampling and coding are used to estimate OFDM channels.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 16:58:19 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Marvasti",
"F.",
""
],
[
"Amini",
"A.",
""
],
[
"Haddadi",
"F.",
""
],
[
"Soltanolkotabi",
"M.",
""
],
[
"Khalaj",
"B. H.",
""
],
[
"Aldroubi",
"A.",
""
],
[
"Holm",
"S.",
""
],
[
"Sanei",
"S.",
""
],
[
"Chambers",
"J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1866 | Sylvain Perifel | Pascal Koiran (LIP), Sylvain Perifel (LIAFA) | A Superpolynomial Lower Bound on the Size of Uniform Non-constant-depth
Threshold Circuits for the Permanent | 11 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the permanent cannot be computed by DLOGTIME-uniform threshold
or arithmetic circuits of depth o(log log n) and polynomial size.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 12:39:25 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Koiran",
"Pascal",
"",
"LIP"
],
[
"Perifel",
"Sylvain",
"",
"LIAFA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.1868 | Publications Loria | Fabian Kuhn (CSAIL) | Local Multicoloring Algorithms: Computing a Nearly-Optimal TDMA Schedule
in Constant Time | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 613-624 | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The described multicoloring problem has direct applications in the context of
wireless ad hoc and sensor networks. In order to coordinate the access to the
shared wireless medium, the nodes of such a network need to employ some medium
access control (MAC) protocol. Typical MAC protocols control the access to the
shared channel by time (TDMA), frequency (FDMA), or code division multiple
access (CDMA) schemes. Many channel access schemes assign a fixed set of time
slots, frequencies, or (orthogonal) codes to the nodes of a network such that
nodes that interfere with each other receive disjoint sets of time slots,
frequencies, or code sets. Finding a valid assignment of time slots,
frequencies, or codes hence directly corresponds to computing a multicoloring
of a graph $G$. The scarcity of bandwidth, energy, and computing resources in
ad hoc and sensor networks, as well as the often highly dynamic nature of these
networks require that the multicoloring can be computed based on as little and
as local information as possible.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 12:42:21 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Kuhn",
"Fabian",
"",
"CSAIL"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.1871 | Kaninda Musumbu | Kaninda Musumbu (LaBRI) | Abstraction and Refinement in Static Model-Checking | null | IEEE-Computer Society International Conference on Computer Science
and Information Technology, ICCSIT-2008 (2008) 107 - 112 | null | null | cs.DS cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | interpretation is a general methodology for building static analyses of
programs. It was introduced by P. and R. Cousot in \cite{cc}. We present, in
this paper, an application of a generic abstract interpretation to domain of
model-checking. Dynamic checking are usually easier to use, because the concept
are establishe d and wide well know. But they are usually limited to systems
whose states space is finite. In an other part, certain faults cannot be
detected dynamically, even by keeping track of the history of the states
space.Indeed, the classical problem of finding the right test cases is far from
trivial and limit the abilities of dynamic checkers further. Static checking
have the advantage that they work on a more abstract level than dynamic checker
and can verify system properties for all inputs. Problem, it is hard to
guarantee that a violation of a modeled property corresponds to a fault in the
concrete system. We propose an approach, in which we generate counter-examples
dynamically using the abstract interpretation techniques.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 12:46:17 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Musumbu",
"Kaninda",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0902.1884 | Georg Hager | Markus Wittmann and Georg Hager | A Proof of Concept for Optimizing Task Parallelism by Locality Queues | 8 pages, 2 figures | null | null | null | cs.PF cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Task parallelism as employed by the OpenMP task construct, although ideal for
tackling irregular problems or typical producer/consumer schemes, bears some
potential for performance bottlenecks if locality of data access is important,
which is typically the case for memory-bound code on ccNUMA systems. We present
a programming technique which ameliorates adverse effects of dynamic task
distribution by sorting tasks into locality queues, each of which is preferably
processed by threads that belong to the same locality domain. Dynamic
scheduling is fully preserved inside each domain, and is preferred over
possible load imbalance even if non-local access is required. The effectiveness
of the approach is demonstrated using a blocked six-point stencil solver as a
toy model.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 13:51:27 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Wittmann",
"Markus",
""
],
[
"Hager",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0902.1891 | Nitin Vats | Nitin Vats | NNRU, a noncommutative analogue of NTRU | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | NTRU public key cryptosystem is well studied lattice-based Cryptosystem along
with Ajtai-Dwork and GGH systems. Underlying
NTRU is a hard mathematical problem of finding short vectors in a certain
lattice. (Shamir 1997) presented a lattice-based attack by which he could find
the original secret key or alternate key. Shamir concluded if one designs a
variant of NTRU where the calculations involved during encryption and
decryption are non-commutative then the system will be secure against Lattice
based attack.This paper presents a new cryptosystem with above property and we
have proved that it is completely secure against Lattice based attack. It
operates in the non-commutative ring M=M_k Z[X]/(X^n - I_{k*k}, where M is a
matrix ring of k*k matrices of polynomials in R={Z}[X]/(X^n-1). Moreover We
have got speed improvement by a factor of O(k^{1.624) over NTRU for the same
bit of information.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 13:48:04 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Vats",
"Nitin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0902.1911 | Junsheng Zhang | Hai Zhuge and Junsheng Zhang | Topological Centrality and Its Applications | 15 pages | null | null | KGRC-2009-02 | cs.IR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent development of network structure analysis shows that it plays an
important role in characterizing complex system of many branches of sciences.
Different from previous network centrality measures, this paper proposes the
notion of topological centrality (TC) reflecting the topological positions of
nodes and edges in general networks, and proposes an approach to calculating
the topological centrality. The proposed topological centrality is then used to
discover communities and build the backbone network. Experiments and
applications on research network show the significance of the proposed
approach.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 15:14:11 GMT"
}
]
| 2009-02-12T00:00:00 | [
[
"Zhuge",
"Hai",
""
],
[
"Zhang",
"Junsheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.1942 | Scott Kominers | Noam D. Elkies, Scott D. Kominers | On the Classification of Type II Codes of Length 24 | 5 pages; v2: fixed minor typos | SIAM Journal on Discrete Mathematics 23(4), (2010), 2173-2177 | null | null | math.NT cs.DM cs.IT math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a new, purely coding-theoretic proof of Koch's criterion on the
tetrad systems of Type II codes of length 24 using the theory of harmonic
weight enumerators. This approach is inspired by Venkov's approach to the
classification of the root systems of Type II lattices in R^{24}, and gives a
new instance of the analogy between lattices and codes.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 17:09:18 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Feb 2009 04:47:44 GMT"
}
]
| 2011-01-04T00:00:00 | [
[
"Elkies",
"Noam D.",
""
],
[
"Kominers",
"Scott D.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1947 | Federico Penna | Federico Penna, Roberto Garello, Maurizio A. Spirito | Cooperative Spectrum Sensing based on the Limiting Eigenvalue Ratio
Distribution in Wishart Matrices | 7 pages, 2 figures, submitted to IEEE Communications Letters | Communications Letters, IEEE, vol.13, no.7, pp.507-509, July 2009 | 10.1109/LCOMM.2009.090425 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in random matrix theory have spurred the adoption of
eigenvalue-based detection techniques for cooperative spectrum sensing in
cognitive radio. Most of such techniques use the ratio between the largest and
the smallest eigenvalues of the received signal covariance matrix to infer the
presence or absence of the primary signal. The results derived so far in this
field are based on asymptotical assumptions, due to the difficulties in
characterizing the exact distribution of the eigenvalues ratio. By exploiting a
recent result on the limiting distribution of the smallest eigenvalue in
complex Wishart matrices, in this paper we derive an expression for the
limiting eigenvalue ratio distribution, which turns out to be much more
accurate than the previous approximations also in the non-asymptotical region.
This result is then straightforwardly applied to calculate the decision
threshold as a function of a target probability of false alarm. Numerical
simulations show that the proposed detection rule provides a substantial
performance improvement compared to the other eigenvalue-based algorithms.
| [
{
"version": "v1",
"created": "Wed, 11 Feb 2009 17:36:14 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 09:08:15 GMT"
}
]
| 2009-09-23T00:00:00 | [
[
"Penna",
"Federico",
""
],
[
"Garello",
"Roberto",
""
],
[
"Spirito",
"Maurizio A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.1996 | Jiaping Liu | Jiaping Liu, Yung Yi, Alexandre Proutiere, Mung Chiang and H. Vincent
Poor | Convergence and Tradeoff of Utility-Optimal CSMA | 6 pages, 1 figure, submitted to IEEE Communications Letters | null | 10.4108/ICST.BROADNETS2009.7401 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It has been recently suggested that in wireless networks, CSMA-based
distributed MAC algorithms could achieve optimal utility without any message
passing. We present the first proof of convergence of such adaptive CSMA
algorithms towards an arbitrarily tight approximation of utility-optimizing
schedule. We also briefly discuss the tradeoff between optimality at
equilibrium and short-term fairness practically achieved by such algorithms.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 20:41:50 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Liu",
"Jiaping",
""
],
[
"Yi",
"Yung",
""
],
[
"Proutiere",
"Alexandre",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.2036 | Mohammad H. Kayvanrad | M.H. Kayvanrad, D. Zonoobi, A.A. Kassim | Modified Papoulis-Gerchberg algorithm for sparse signal recovery | 12 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by the well-known Papoulis-Gerchberg algorithm, an iterative
thresholding algorithm for recovery of sparse signals from few observations is
proposed. The sequence of iterates turns out to be similar to that of the
thresholded Landweber iterations, although not the same. The performance of the
proposed algorithm is experimentally evaluated and compared to other
state-of-the-art methods.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 07:12:55 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Kayvanrad",
"M. H.",
""
],
[
"Zonoobi",
"D.",
""
],
[
"Kassim",
"A. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.2072 | Publications Loria | Lutz Schr\"oder, Dirk Pattinson | Strong Completeness of Coalgebraic Modal Logics | null | 26th International Symposium on Theoretical Aspects of Computer
Science - STACS 2009 (2009) 433-444 | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Canonical models are of central importance in modal logic, in particular as
they witness strong completeness and hence compactness. While the canonical
model construction is well understood for Kripke semantics, non-normal modal
logics often present subtle difficulties - up to the point that canonical
models may fail to exist, as is the case e.g. in most probabilistic logics.
Here, we present a generic canonical model construction in the semantic
framework of coalgebraic modal logic, which pinpoints coherence conditions
between syntax and semantics of modal logics that guarantee strong
completeness. We apply this method to reconstruct canonical model theorems that
are either known or folklore, and moreover instantiate our method to obtain new
strong completeness results. In particular, we prove strong completeness of
graded modal logic with finite multiplicities, and of the modal logic of exact
probabilities.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 16:03:10 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Schröder",
"Lutz",
""
],
[
"Pattinson",
"Dirk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.2073 | Olha Shkaravska | Olha Shkaravska, Marko van Eekelen and Ron van Kesteren | Polynomial Size Analysis of First-Order Shapely Functions | 35 pages, 1 figure | Logical Methods in Computer Science, Volume 5, Issue 2 (May 25,
2009) lmcs:1148 | 10.2168/LMCS-5(2:10)2009 | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a size-aware type system for first-order shapely function
definitions. Here, a function definition is called shapely when the size of the
result is determined exactly by a polynomial in the sizes of the arguments.
Examples of shapely function definitions may be implementations of matrix
multiplication and the Cartesian product of two lists. The type system is
proved to be sound w.r.t. the operational semantics of the language. The type
checking problem is shown to be undecidable in general. We define a natural
syntactic restriction such that the type checking becomes decidable, even
though size polynomials are not necessarily linear or monotonic. Furthermore,
we have shown that the type-inference problem is at least semi-decidable (under
this restriction). We have implemented a procedure that combines run-time
testing and type-checking to automatically obtain size dependencies. It
terminates on total typable function definitions.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 10:16:29 GMT"
},
{
"version": "v2",
"created": "Mon, 25 May 2009 12:01:00 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Shkaravska",
"Olha",
""
],
[
"van Eekelen",
"Marko",
""
],
[
"van Kesteren",
"Ron",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.2081 | Abuzer Yakaryilmaz | Abuzer Yakaryilmaz and A. C. Cem Say | Languages recognized by nondeterministic quantum finite automata | A new version with major revisions, 24 pages, latex | Quantum Information & Computation, Volume 10 Issue 9, September
2010, Pages 747-770 | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The nondeterministic quantum finite automaton (NQFA) is the only known case
where a one-way quantum finite automaton (QFA) model has been shown to be
strictly superior in terms of language recognition power to its probabilistic
counterpart. We give a characterization of the class of languages recognized by
NQFA's, demonstrating that it is equal to the class of exclusive stochastic
languages. We also characterize the class of languages that are recognized
necessarily by two-sided error by QFA's. It is shown that these classes remain
the same when the QFA's used in their definitions are replaced by several
different model variants that have appeared in the literature. We prove several
closure properties of the related classes. The ramifications of these results
about classical and quantum sublogarithmic space complexity classes are
examined.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 10:59:09 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Feb 2010 11:39:41 GMT"
}
]
| 2014-01-29T00:00:00 | [
[
"Yakaryilmaz",
"Abuzer",
""
],
[
"Say",
"A. C. Cem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.2104 | Dmitry Shkatov | Valentin Goranko, Dmitry Shkatov | Tableau-based decision procedure for full coalitional multiagent
temporal-epistemic logic of linear time | Proceedings of 8th International Conference on Autonomous Agents and
Multiagent Systems (AAMAS 09) | 8th International Joint Conference on Autonomous Agents and
Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume
2. IFAAMAS 2009, ISBN 978-0-9817381-7-8 | null | null | cs.LO cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a tableau-based decision procedure for the full coalitional
multiagent temporal-epistemic logic of linear time CMATEL(CD+LT). It extends
LTL with operators of common and distributed knowledge for all coalitions of
agents. The tableau procedure runs in exponential time, matching the lower
bound obtained by Halpern and Vardi for a fragment of our logic, thus providing
a complexity-optimal decision procedure for CMATEL(CD+LT).
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 13:33:52 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Nov 2019 14:15:42 GMT"
}
]
| 2019-11-22T00:00:00 | [
[
"Goranko",
"Valentin",
""
],
[
"Shkatov",
"Dmitry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0902.2108 | Olivier Serre | Vincent Gripon (LIAFA), Olivier Serre (LIAFA) | Qualitative Concurrent Stochastic Games with Imperfect Information | Automata, Languages and Programming, 36th International Colloquium,
ICALP 2009, Rhodes: Greece (2009) | null | null | null | cs.FL cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a model of games that combines concurrency, imperfect information
and stochastic aspects. Those are finite states games in which, at each round,
the two players choose, simultaneously and independently, an action. Then a
successor state is chosen accordingly to some fixed probability distribution
depending on the previous state and on the pair of actions chosen by the
players. Imperfect information is modeled as follows: both players have an
equivalence relation over states and, instead of observing the exact state,
they only know to which equivalence class it belongs. Therefore, if two partial
plays are indistinguishable by some player, he should behave the same in both
of them. We consider reachability (does the play eventually visit a final
state?) and B\"uchi objective (does the play visit infinitely often a final
state?). Our main contribution is to prove that the following problem is
complete for 2-ExpTime: decide whether the first player has a strategy that
ensures her to almost-surely win against any possible strategy of her oponent.
We also characterise those strategies needed by the first player to
almost-surely win.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 13:39:23 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jun 2009 09:55:51 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Aug 2011 11:45:27 GMT"
}
]
| 2011-08-31T00:00:00 | [
[
"Gripon",
"Vincent",
"",
"LIAFA"
],
[
"Serre",
"Olivier",
"",
"LIAFA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.2125 | Dmitry Shkatov | Valentin Goranko, Dmitry Shkatov | Tableau-based procedure for deciding satisfiability in the full
coalitional multiagent epistemic logic | Appeared in S. Artemov, A. Nerode (editors). Logical Foundations of
Computer Science 2009. Lecture Notes in Computer Science. Vol. 5407.
Springer, 2009. pp. 197--213 | null | null | null | cs.LO cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the multiagent epistemic logic CMAELCD with operators for common and
distributed knowledge for all coalitions of agents. We introduce Hintikka
structures for this logic and prove that satisfiability in such structures is
equivalent to satisfiability in standard models. Using this result, we design
an incremental tableau based decision procedure for testing satisfiability in
CMAELCD.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 14:48:24 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Goranko",
"Valentin",
""
],
[
"Shkatov",
"Dmitry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0902.2137 | Xavier Leroy | Xavier Leroy (INRIA Rocquencourt) | A formally verified compiler back-end | null | Journal of Automated Reasoning 43, 4 (2009) 363-446 | 10.1007/s10817-009-9155-4 | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article describes the development and formal verification (proof of
semantic preservation) of a compiler back-end from Cminor (a simple imperative
intermediate language) to PowerPC assembly code, using the Coq proof assistant
both for programming the compiler and for proving its correctness. Such a
verified compiler is useful in the context of formal methods applied to the
certification of critical software: the verification of the compiler guarantees
that the safety properties proved on the source code hold for the executable
compiled code as well.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 15:48:28 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jul 2009 13:07:04 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Nov 2009 09:14:31 GMT"
}
]
| 2009-11-14T00:00:00 | [
[
"Leroy",
"Xavier",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0902.2140 | Publications Loria | Juraj Hromkovic, Georg Schnitger | Ambiguity and Communication | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 553-564 | null | null | cs.FL cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ambiguity of a nondeterministic finite automaton (NFA) N for input size n
is the maximal number of accepting computations of N for an input of size n.
For all k, r 2 N we construct languages Lr,k which can be recognized by NFA's
with size k poly(r) and ambiguity O(nk), but Lr,k has only NFA's with
exponential size, if ambiguity o(nk) is required. In particular, a hierarchy
for polynomial ambiguity is obtained, solving a long standing open problem
(Ravikumar and Ibarra, 1989, Leung, 1998).
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 15:56:14 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Hromkovic",
"Juraj",
""
],
[
"Schnitger",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.2141 | Publications Loria | Marius Zimand | Extracting the Kolmogorov Complexity of Strings and Sequences from
Sources with Limited Independence | null | 26th International Symposium on Theoretical Aspects of Computer
Science - STACS 2009 (2009) 433-444 | null | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An infinite binary sequence has randomness rate at least $\sigma$ if, for
almost every $n$, the Kolmogorov complexity of its prefix of length $n$ is at
least $\sigma n$. It is known that for every rational $\sigma \in (0,1)$, on
one hand, there exists sequences with randomness rate $\sigma$ that can not be
effectively transformed into a sequence with randomness rate higher than
$\sigma$ and, on the other hand, any two independent sequences with randomness
rate $\sigma$ can be transformed into a sequence with randomness rate higher
than $\sigma$. We show that the latter result holds even if the two input
sequences have linear dependency (which, informally speaking, means that all
prefixes of length $n$ of the two sequences have in common a constant fraction
of their information). The similar problem is studied for finite strings. It is
shown that from any two strings with sufficiently large Kolmogorov complexity
and sufficiently small dependence, one can effectively construct a string that
is random even conditioned by any one of the input strings.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 15:57:40 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Zimand",
"Marius",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.2146 | Publications Loria | Kenya Ueno | A Stronger LP Bound for Formula Size Lower Bounds via Clique Constraints | null | 26th International Symposium on Theoretical Aspects of Computer
Science - STACS 2009 (2009) 433-444 | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new technique proving formula size lower bounds based on the
linear programming bound originally introduced by Karchmer, Kushilevitz and
Nisan [11] and the theory of stable set polytope. We apply it to majority
functions and prove their formula size lower bounds improved from the classical
result of Khrapchenko [13]. Moreover, we introduce a notion of unbalanced
recursive ternary majority functions motivated by a decomposition theory of
monotone self-dual functions and give integrally matching upper and lower
bounds of their formula size. We also show monotone formula size lower bounds
of balanced recursive ternary majority functions improved from the quantum
adversary bound of Laplante, Lee and Szegedy [15].
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 16:01:09 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Ueno",
"Kenya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.2149 | Publications Loria | Michael R. Fellows, Jiong Guo, Hannes Moser, Rolf Niedermeier | A Generalization of Nemhauser and Trotter's Local Optimization Theorem | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 409-420 | null | null | cs.CC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Nemhauser-Trotter local optimization theorem applies to the NP-hard
Vertex Cover problem and has applications in approximation as well as
parameterized algorithmics. We present a framework that generalizes Nemhauser
and Trotter's result to vertex deletion and graph packing problems, introducing
novel algorithmic strategies based on purely combinatorial arguments (not
referring to linear programming as the Nemhauser-Trotter result originally
did). We exhibit our framework using a generalization of Vertex Cover, called
Bounded- Degree Deletion, that has promise to become an important tool in the
analysis of gene and other biological networks. For some fixed d \geq 0,
Bounded-Degree Deletion asks to delete as few vertices as possible from a graph
in order to transform it into a graph with maximum vertex degree at most d.
Vertex Cover is the special case of d = 0. Our generalization of the
Nemhauser-Trotter theorem implies that Bounded-Degree Deletion has a problem
kernel with a linear number of vertices for every constant d. We also outline
an application of our extremal combinatorial approach to the problem of packing
stars with a bounded number of leaves. Finally, charting the border between
(parameterized) tractability and intractability for Bounded-Degree Deletion, we
provide a W[2]-hardness result for Bounded-Degree Deletion in case of unbounded
d-values.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 16:22:54 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Fellows",
"Michael R.",
""
],
[
"Guo",
"Jiong",
""
],
[
"Moser",
"Hannes",
""
],
[
"Niedermeier",
"Rolf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.2150 | Publications Loria | Babak Farzad, Lap Chi Lau, Van Bang Le, Nguyen Ngoc Tuy | Computing Graph Roots Without Short Cycles | null | 26th International Symposium on Theoretical Aspects of Computer
Science STACS 2009 (2009) 397-408 | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph G is the square of graph H if two vertices x, y have an edge in G if
and only if x, y are of distance at most two in H. Given H it is easy to
compute its square H2, however Motwani and Sudan proved that it is NP-complete
to determine if a given graph G is the square of some graph H (of girth 3). In
this paper we consider the characterization and recognition problems of graphs
that are squares of graphs of small girth, i.e. to determine if G = H2 for some
graph H of small girth. The main results are the following. - There is a graph
theoretical characterization for graphs that are squares of some graph of girth
at least 7. A corollary is that if a graph G has a square root H of girth at
least 7 then H is unique up to isomorphism. - There is a polynomial time
algorithm to recognize if G = H2 for some graph H of girth at least 6. - It is
NP-complete to recognize if G = H2 for some graph H of girth 4. These results
almost provide a dichotomy theorem for the complexity of the recognition
problem in terms of girth of the square roots. The algorithmic and graph
theoretical results generalize previous results on tree square roots, and
provide polynomial time algorithms to compute a graph square root of small
girth if it exists. Some open questions and conjectures will also be discussed.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 16:20:33 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Farzad",
"Babak",
""
],
[
"Lau",
"Lap Chi",
""
],
[
"Le",
"Van Bang",
""
],
[
"Tuy",
"Nguyen Ngoc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.2152 | Publications Loria | Sven Schewe | B\"uchi complementation made tight | null | 26th International Symposium on Theoretical Aspects of Computer
Science - STACS 2009 (2009) 433-444 | null | null | cs.FL cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The precise complexity of complementing B\"uchi automata is an intriguing and
long standing problem. While optimal complementation techniques for finite
automata are simple - it suffices to determinize them using a simple subset
construction and to dualize the acceptance condition of the resulting automaton
- B\"uchi complementation is more involved. Indeed, the construction of an
EXPTIME complementation procedure took a quarter of a century from the
introduction of B\"uchi automata in the early 60s, and stepwise narrowing the
gap between the upper and lower bound to a simple exponent (of (6e)n for
B\"uchi automata with n states) took four decades. While the distance between
the known upper (O'(0.96 n)n') and lower ('(0.76 n)n') bound on the required
number of states has meanwhile been significantly reduced, an exponential
factor remains between them. Also, the upper bound on the size of the
complement automaton is not linear in the bound of its state space. These gaps
are unsatisfactory from a theoretical point of view, but also because B\"uchi
complementation is a useful tool in formal verification, in particular for the
language containment problem. This paper proposes a B\"uchi complementation
algorithm whose complexity meets, modulo a quadratic (O(n2)) factor, the known
lower bound for B\"uchi complementation. It thus improves over previous
constructions by an exponential factor and concludes the quest for optimal
B\"uchi complementation algorithms.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 16:26:28 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Schewe",
"Sven",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.2166 | John Michael Robson | John Michael Robson (LaBRI) | Spanning Trees of Bounded Degree Graphs | null | null | null | null | cs.DM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider lower bounds on the number of spanning trees of connected graphs
with degree bounded by $d$. The question is of interest because such bounds may
improve the analysis of the improvement produced by memorisation in the runtime
of exponential algorithms. The value of interest is the constant $\beta_d$ such
that all connected graphs with degree bounded by $d$ have at least
$\beta_d^\mu$ spanning trees where $\mu$ is the cyclomatic number or excess of
the graph, namely $m-n+1$. We conjecture that $\beta_d$ is achieved by the
complete graph $K_{d+1}$ but we have not proved this for any $d$ greater than
3. We give weaker lower bounds on $\beta_d$ for $d\le 11$.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 16:57:39 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Robson",
"John Michael",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.2183 | Johan Bollen | Johan Bollen, Herbert Van de Sompel, Aric Hagberg, Ryan Chute | A principal component analysis of 39 scientific impact measures | null | Bollen J, Van de Sompel H, Hagberg A, Chute R, 2009 A Principal
Component Analysis of 39 Scientific Impact Measures. PLoS ONE 4(6): e6022.
(http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0006022) | 10.1371/journal.pone.0006022 | null | cs.DL cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The impact of scientific publications has traditionally been expressed in
terms of citation counts. However, scientific activity has moved online over
the past decade. To better capture scientific impact in the digital era, a
variety of new impact measures has been proposed on the basis of social network
analysis and usage log data. Here we investigate how these new measures relate
to each other, and how accurately and completely they express scientific
impact. We performed a principal component analysis of the rankings produced by
39 existing and proposed measures of scholarly impact that were calculated on
the basis of both citation and usage log data. Our results indicate that the
notion of scientific impact is a multi-dimensional construct that can not be
adequately measured by any single indicator, although some measures are more
suitable than others. The commonly used citation Impact Factor is not
positioned at the core of this construct, but at its periphery, and should thus
be used with caution.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 18:31:44 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Jun 2009 19:18:05 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Bollen",
"Johan",
""
],
[
"Van de Sompel",
"Herbert",
""
],
[
"Hagberg",
"Aric",
""
],
[
"Chute",
"Ryan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0902.2186 | Travis Deyle | Young Sang Choi, Travis Deyle, Charles C. Kemp | A List of Household Objects for Robotic Retrieval Prioritized by People
with ALS (Version 092008) | null | null | null | null | cs.RO cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This technical report is designed to serve as a citable reference for the
original prioritized object list that the Healthcare Robotics Lab at Georgia
Tech released on its website in September of 2008. It is also expected to serve
as the primary citable reference for the research associated with this list
until the publication of a detailed, peer-reviewed paper.
The original prioritized list of object classes resulted from a needs
assessment involving 8 motor-impaired patients with amyotrophic lateral
sclerosis (ALS) and targeted, in-person interviews of 15 motor-impaired ALS
patients. All of these participants were drawn from the Emory ALS Center.
The prioritized object list consists of 43 object classes ranked by how
important the participants considered each class to be for retrieval by an
assistive robot. We intend for this list to be used by researchers to inform
the design and benchmarking of robotic systems, especially research related to
autonomous mobile manipulation.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 18:18:42 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Choi",
"Young Sang",
""
],
[
"Deyle",
"Travis",
""
],
[
"Kemp",
"Charles C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0902.2187 | Joao Lima | Joao Paulo Lima, Veronica Teichrieb, Judith Kelner | A Standalone Markerless 3D Tracker for Handheld Augmented Reality | null | null | null | null | cs.CV cs.GR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an implementation of a markerless tracking technique
targeted to the Windows Mobile Pocket PC platform. The primary aim of this work
is to allow the development of standalone augmented reality applications for
handheld devices based on natural feature tracking. In order to achieve this
goal, a subset of two computer vision libraries was ported to the Pocket PC
platform. They were also adapted to use fixed point math, with the purpose of
improving the overall performance of the routines. The port of these libraries
opens up the possibility of having other computer vision tasks being executed
on mobile platforms. A model based tracking approach that relies on edge
information was adopted. Since it does not require a high processing power, it
is suitable for constrained devices such as handhelds. The OpenGL ES graphics
library was used to perform computer vision tasks, taking advantage of existing
graphics hardware acceleration. An augmented reality application was created
using the implemented technique and evaluations were done regarding tracking
performance and accuracy
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 18:25:13 GMT"
}
]
| 2009-02-13T00:00:00 | [
[
"Lima",
"Joao Paulo",
""
],
[
"Teichrieb",
"Veronica",
""
],
[
"Kelner",
"Judith",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0902.2206 | KIlian Weinberger | Kilian Weinberger, Anirban Dasgupta, Josh Attenberg, John Langford,
Alex Smola | Feature Hashing for Large Scale Multitask Learning | Fixed broken theorem | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Empirical evidence suggests that hashing is an effective strategy for
dimensionality reduction and practical nonparametric estimation. In this paper
we provide exponential tail bounds for feature hashing and show that the
interaction between random subspaces is negligible with high probability. We
demonstrate the feasibility of this approach with experimental results for a
new use case -- multitask learning with hundreds of thousands of tasks.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 20:06:36 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Apr 2009 16:18:39 GMT"
},
{
"version": "v3",
"created": "Wed, 20 May 2009 19:05:20 GMT"
},
{
"version": "v4",
"created": "Thu, 21 May 2009 21:18:40 GMT"
},
{
"version": "v5",
"created": "Sat, 27 Feb 2010 15:32:35 GMT"
}
]
| 2010-02-27T00:00:00 | [
[
"Weinberger",
"Kilian",
""
],
[
"Dasgupta",
"Anirban",
""
],
[
"Attenberg",
"Josh",
""
],
[
"Langford",
"John",
""
],
[
"Smola",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.2209 | Christoph Durr | Christoph Durr, Lukasz Jez and Nguyen Kim Thang | Online Scheduling of Bounded Length Jobs to Maximize Throughput | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider an online scheduling problem, motivated by the issues present at
the joints of networks using ATM and TCP/IP. Namely, IP packets have to broken
down to small ATM cells and sent out before their deadlines, but cells
corresponding to different packets can be interwoven. More formally, we
consider the online scheduling problem with preemptions, where each job j is
revealed at release time r_j, has processing time p_j, deadline d_j and weight
w_j. A preempted job can be resumed at any time. The goal is to maximize the
total weight of all jobs completed on time. Our main result are as follows: we
prove that if all jobs have processing time exactly k, the deterministic
competitive ratio is between 2.598 and 5, and when the processing times are at
most k, the deterministic competitive ratio is Theta(k/log k).
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 21:24:57 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2009 22:42:34 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Apr 2009 06:56:50 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Jez",
"Lukasz",
""
],
[
"Thang",
"Nguyen Kim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0902.2230 | Ama\c{c} Herda\u{g}delen | Ama\c{c} Herda\u{g}delen and Marco Baroni | BagPack: A general framework to represent semantic relations | Long paper presented at GEMS - Geometric Models of Natural Language
Semantics, workshop held in conjunction with the 12th Conference of the
European Chapter of the Association for Computational Linguistics (EACL-09),
Athens, Greece | null | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a way to represent word pairs instantiating arbitrary semantic
relations that keeps track of the contexts in which the words in the pair occur
both together and independently. The resulting features are of sufficient
generality to allow us, with the help of a standard supervised machine learning
algorithm, to tackle a variety of unrelated semantic tasks with good results
and almost no task-specific tailoring.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 23:02:06 GMT"
}
]
| 2009-02-16T00:00:00 | [
[
"Herdağdelen",
"Amaç",
""
],
[
"Baroni",
"Marco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0902.2235 | Heide Gluesing-Luerssen | Heide Gluesing-Luerssen | On Isometries for Convolutional Codes | 24 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we will discuss isometries and strong isometries for
convolutional codes. Isometries are weight-preserving module isomorphisms
whereas strong isometries are, in addition, degree-preserving. Special cases of
these maps are certain types of monomial transformations. We will show a form
of MacWilliams Equivalence Theorem, that is, each isometry between
convolutional codes is given by a monomial transformation. Examples show that
strong isometries cannot be characterized this way, but special attention paid
to the weight adjacency matrices allows for further descriptions. Various
distance parameters appearing in the literature on convolutional codes will be
discussed as well.
| [
{
"version": "v1",
"created": "Thu, 12 Feb 2009 23:49:52 GMT"
}
]
| 2009-02-16T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.2260 | Chun-Hung Liu | Chun-Hung Liu, Feng Xue and Jeffrey G. Andrews | Network Coding with Two-Way Relaying: Achievable Rate Regions and
Diversity-Multiplexing Tradeoffs | 27 pages, 7 figures, submitted to IEEE trans. on wireless
communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the fundamental characteristics of information exchange
via multihop network coding over two-way relaying in a wireless ad hoc network.
The end-to-end rate regions achieved by time-division multihop (TDMH),
MAC-layer network coding (MLNC) and PHY-layer network coding (PLNC) are first
characterized. It is shown that MLNC does not always achieve better rates than
TDMH, time sharing between TDMH and MLNC is able to achieve a larger rate
region, and PLNC dominates the rate regions achieved by TDMH and MLNC. An
opportunistic scheduling algorithm for MLNC and PLNC is then proposed to
stabilize the two-way relaying system for Poisson arrivals whenever the rate
pair is within the Shannon rate regions of MLNC and PLNC. To understand the
two-way transmission limits of multihop network coding, the sum-rate
optimization with or without certain traffic pattern and the end-to-end
diversity-multiplexing tradeoffs (DMTs) of two-way transmission over multiple
relay nodes are also analyzed.
| [
{
"version": "v1",
"created": "Fri, 13 Feb 2009 05:09:26 GMT"
}
]
| 2009-02-16T00:00:00 | [
[
"Liu",
"Chun-Hung",
""
],
[
"Xue",
"Feng",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.