id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0902.3865 | Eric Jaeger | Eric Jaeger (LIP6, Dcssi/SDS/Lti), Th\'er\`ese Hardin (LIP6) | Yet Another Deep Embedding of B:Extending de Bruijn Notations | 16 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present Bicoq3, a deep embedding of the B system in Coq, focusing on the
technical aspects of the development. The main subjects discussed are related
to the representation of sets and maps, the use of induction principles, and
the introduction of a new de Bruijn notation providing solutions to various
problems related to the mechanisation of languages and logics.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2009 08:53:36 GMT"
}
]
| 2009-02-24T00:00:00 | [
[
"Jaeger",
"Eric",
"",
"LIP6, Dcssi/SDS/Lti"
],
[
"Hardin",
"Thérèse",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.3883 | Lars Eirik Danielsen | Lars Eirik Danielsen and Matthew G. Parker | Directed Graph Representation of Half-Rate Additive Codes over GF(4) | Presented at International Workshop on Coding and Cryptography (WCC
2009), 10-15 May 2009, Ullensvang, Norway. (14 pages, 2 figures) | Des. Codes Cryptogr. 59, pp. 119-130, 2011 | 10.1007/s10623-010-9469-6 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that (n,2^n) additive codes over GF(4) can be represented as directed
graphs. This generalizes earlier results on self-dual additive codes over
GF(4), which correspond to undirected graphs. Graph representation reduces the
complexity of code classification, and enables us to classify additive (n,2^n)
codes over GF(4) of length up to 7. From this we also derive classifications of
isodual and formally self-dual codes. We introduce new constructions of
circulant and bordered circulant directed graph codes, and show that these
codes will always be isodual. A computer search of all such codes of length up
to 26 reveals that these constructions produce many codes of high minimum
distance. In particular, we find new near-extremal formally self-dual codes of
length 11 and 13, and isodual codes of length 24, 25, and 26 with better
minimum distance than the best known self-dual codes.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2009 10:35:11 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Aug 2009 12:17:16 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Dec 2009 09:42:50 GMT"
}
]
| 2011-03-17T00:00:00 | [
[
"Danielsen",
"Lars Eirik",
""
],
[
"Parker",
"Matthew G.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.3958 | Laurent Doyen | Laurent Doyen and Jean-Francois Raskin | Antichains for the Automata-Based Approach to Model-Checking | null | Logical Methods in Computer Science, Volume 5, Issue 1 (March 2,
2009) lmcs:1027 | 10.2168/LMCS-5(1:5)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose and evaluate antichain algorithms to solve the universality and
language inclusion problems for nondeterministic Buechi automata, and the
emptiness problem for alternating Buechi automata. To obtain those algorithms,
we establish the existence of simulation pre-orders that can be exploited to
efficiently evaluate fixed points on the automata defined during the
complementation step (that we keep implicit in our approach). We evaluate the
performance of the algorithm to check the universality of Buechi automata using
the random automaton model recently proposed by Tabakov and Vardi. We show that
on the difficult instances of this probabilistic model, our algorithm
outperforms the standard ones by several orders of magnitude.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2009 17:17:11 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Mar 2009 18:54:55 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Doyen",
"Laurent",
""
],
[
"Raskin",
"Jean-Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.3979 | Anastasios Giovanidis | Anastasios Giovanidis, Gerhard Wunder and Joerg Buehler | Optimal Control of a Single Queue with Retransmissions: Delay-Dropping
Tradeoffs | 29 pages, 8 figures, submitted to IEEE Transactions on Wireless
Communications | IEEE Transactions on Wireless Communications (Volume:8 , Issue: 7
), pp. 3736 - 3746,. July 2009 | 10.1109/TWC.2009.080959 | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A single queue incorporating a retransmission protocol is investigated,
assuming that the sequence of per effort success probabilities in the Automatic
Retransmission reQuest (ARQ) chain is a priori defined and no channel state
information at the transmitter is available. A Markov Decision Problem with an
average cost criterion is formulated where the possible actions are to either
continue the retransmission process of an erroneous packet at the next time
slot or to drop the packet and move on to the next packet awaiting for
transmission. The cost per slot is a linear combination of the current queue
length and a penalty term in case dropping is chosen as action. The
investigation seeks policies that provide the best possible average packet
delay-dropping trade-off for Quality of Service guarantees. An optimal
deterministic stationary policy is shown to exist, several structural
properties of which are obtained. Based on that, a class of suboptimal
<L,K>-policies is introduced. These suggest that it is almost optimal to use a
K-truncated ARQ protocol as long as the queue length is lower than L, else send
all packets in one shot. The work concludes with an evaluation of the optimal
delay-dropping tradeoff using dynamic programming and a comparison between the
optimal and suboptimal policies.
| [
{
"version": "v1",
"created": "Mon, 23 Feb 2009 19:48:51 GMT"
}
]
| 2013-12-03T00:00:00 | [
[
"Giovanidis",
"Anastasios",
""
],
[
"Wunder",
"Gerhard",
""
],
[
"Buehler",
"Joerg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0902.4042 | Leonard Kwuida | Rokia Missaoui, Leonard Kwuida, Mohamed Quafafou, Jean Vaillancourt | Algebraic operators for querying pattern bases | null | null | null | null | cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The objectives of this research work which is intimately related to pattern
discovery and management are threefold: (i) handle the problem of pattern
manipulation by defining operations on patterns, (ii) study the problem of
enriching and updating a pattern set (e.g., concepts, rules) when changes occur
in the user's needs and the input data (e.g., object/attribute insertion or
elimination, taxonomy utilization), and (iii) approximate a "presumed" concept
using a related pattern space so that patterns can augment data with knowledge.
To conduct our work, we use formal concept analysis (FCA) as a framework for
pattern discovery and management and we take a joint database-FCA perspective
by defining operators similar in spirit to relational algebra operators,
investigating approximation in concept lattices and exploiting existing work
related to operations on contexts and lattices to formalize such operators.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 00:43:56 GMT"
}
]
| 2009-02-25T00:00:00 | [
[
"Missaoui",
"Rokia",
""
],
[
"Kwuida",
"Leonard",
""
],
[
"Quafafou",
"Mohamed",
""
],
[
"Vaillancourt",
"Jean",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0902.4045 | M. Amin Khajehnejad | M.Amin Khajehnejad, Alexandros G. Dimakis, Weiyu Xu, Babak Hassibi | Sparse Recovery of Positive Signals with Minimal Expansion | 25 pages, submitted for publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the sparse recovery problem of reconstructing a
high-dimensional non-negative sparse vector from lower dimensional linear
measurements. While much work has focused on dense measurement matrices, sparse
measurement schemes are crucial in applications, such as DNA microarrays and
sensor networks, where dense measurements are not practically feasible. One
possible construction uses the adjacency matrices of expander graphs, which
often leads to recovery algorithms much more efficient than $\ell_1$
minimization. However, to date, constructions based on expanders have required
very high expansion coefficients which can potentially make the construction of
such graphs difficult and the size of the recoverable sets small.
In this paper, we construct sparse measurement matrices for the recovery of
non-negative vectors, using perturbations of the adjacency matrix of an
expander graph with much smaller expansion coefficient. We present a necessary
and sufficient condition for $\ell_1$ optimization to successfully recover the
unknown vector and obtain expressions for the recovery threshold. For certain
classes of measurement matrices, this necessary and sufficient condition is
further equivalent to the existence of a "unique" vector in the constraint set,
which opens the door to alternative algorithms to $\ell_1$ minimization. We
further show that the minimal expansion we use is necessary for any graph for
which sparse recovery is possible and that therefore our construction is tight.
We finally present a novel recovery algorithm that exploits expansion and is
much faster than $\ell_1$ optimization. Finally, we demonstrate through
theoretical bounds, as well as simulation, that our method is robust to noise
and approximate sparsity.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 01:01:54 GMT"
}
]
| 2009-02-25T00:00:00 | [
[
"Khajehnejad",
"M. Amin",
""
],
[
"Dimakis",
"Alexandros G.",
""
],
[
"Xu",
"Weiyu",
""
],
[
"Hassibi",
"Babak",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4060 | Ken Yamamoto | Ken Yamamoto, Yoshihiro Yamazaki | Network of two-Chinese-character compound words in Japanese language | null | Physica A 388, 2555-2560 (2009) | 10.1016/j.physa.2009.02.032 | null | cs.CL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some statistical properties of a network of two-Chinese-character compound
words in Japanese language are reported. In this network, a node represents a
Chinese character and an edge represents a two-Chinese-character compound word.
It is found that this network has properties of "small-world" and "scale-free."
A network formed by only Chinese characters for common use ({\it joyo-kanji} in
Japanese), which is regarded as a subclass of the original network, also has
small-world property. However, a degree distribution of the network exhibits no
clear power law. In order to reproduce disappearance of the power-law property,
a model for a selecting process of the Chinese characters for common use is
proposed.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 04:53:49 GMT"
}
]
| 2012-05-15T00:00:00 | [
[
"Yamamoto",
"Ken",
""
],
[
"Yamazaki",
"Yoshihiro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0902.4073 | Amelia Sparavigna | Amelia Sparavigna | Dipole and Quadrupole Moments in Image Processing | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes an algorithm for image processing, obtained by adapting
to image maps the definitions of two well-known physical quantities. These
quantities are the dipole and quadrupole moments of a charge distribution. We
will see how it is possible to define dipole and quadrupole moments for the
gray-tone maps and apply them in the development of algorithms for edge
detection.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 20:34:43 GMT"
}
]
| 2009-02-25T00:00:00 | [
[
"Sparavigna",
"Amelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0902.4091 | Johannes Bluemlein | J. Bl\"umlein, M. Kauers, S. Klein, and C. Schneider | Determining the closed forms of the $O(a_s^3)$ anomalous dimensions and
Wilson coefficients from Mellin moments by means of computer algebra | 38 pages, 1 style file, 2 FORM files, 2 Mathematica files | Comput.Phys.Commun.180:2143-2165,2009 | 10.1016/j.cpc.2009.06.020 | DESY 09-002, SFB/CPP-09-22 | hep-ph cs.SC math-ph math.AG math.CO math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Single scale quantities, as anomalous dimensions and hard scattering cross
sections, in renormalizable Quantum Field Theories are found to obey difference
equations of finite order in Mellin space. It is often easier to calculate
fixed moments for these quantities compared to a direct attempt to derive them
in terms of harmonic sums and their generalizations involving the Mellin
parameter $N$. Starting from a sufficiently large number of given moments, we
establish linear recurrence relations of lowest possible order with polynomial
coefficients of usually high degree. Then these recurrence equations are solved
in terms of d'Alembertian solutions where the involved nested sums are
represented in optimal nested depth. Given this representation, it is then an
easy task to express the result in terms of harmonic sums. In this process we
compactify the result such that no algebraic relations occur among the sums
involved. We demonstrate the method for the QCD unpolarized anomalous
dimensions and massless Wilson coefficients to 3--loop order treating the
contributions for individual color coefficients. For the most complicated
subproblem 5114 moments were needed in order to produce a recurrence of order
35 whose coefficients have degrees up to 938. About four months of CPU time
were needed to establish and solve the recurrences for the anomalous dimensions
and Wilson coefficients on a 2 GHz machine requiring less than 10 GB of memory.
No algorithm is known yet to provide such a high number of moments for 3--loop
quantities. Yet the method presented shows that it is possible to establish and
solve recurrences of rather large order and and degree, occurring in physics
problems, uniquely, fast and reliably with computer algebra.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 16:41:37 GMT"
}
]
| 2009-12-10T00:00:00 | [
[
"Blümlein",
"J.",
""
],
[
"Kauers",
"M.",
""
],
[
"Klein",
"S.",
""
],
[
"Schneider",
"C.",
""
]
]
| [
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0902.4095 | Johannes Bluemlein | J. Bl\"umlein, M. Kauers, S. Klein, and C. Schneider | From Moments to Functions in Quantum Chromodynamics | 7 pages, 2 subsidiary files | PoS ACAT08:106,2008 | null | DESY 09-011, SFB-CPP-09/17 | hep-ph cs.SC math-ph math.AG math.CO math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Single-scale quantities, like the QCD anomalous dimensions and Wilson
coefficients, obey difference equations. Therefore their analytic form can be
determined from a finite number of moments. We demonstrate this in an explicit
calculation by establishing and solving large scale recursions by means of
computer algebra for the anomalous dimensions and Wilson coefficients in
unpolarized deeply inelastic scattering from their Mellin moments to 3-loop
order.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 08:32:40 GMT"
}
]
| 2014-11-18T00:00:00 | [
[
"Blümlein",
"J.",
""
],
[
"Kauers",
"M.",
""
],
[
"Klein",
"S.",
""
],
[
"Schneider",
"C.",
""
]
]
| [
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0902.4098 | Pavel Chebotarev | Pavel Chebotarev and Rafig Agaev | Coordination in multiagent systems and Laplacian spectra of digraphs | 15 pages, 2 figures, 40 references. To appear in Automation and
Remote Control, Vol.70, No.3, 2009 | Automation and Remote Control, Vol.70 (2009), No.3, P. 469-483 | 10.1134/S0005117909030126 | null | cs.MA cs.DM math.CO math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructing and studying distributed control systems requires the analysis
of the Laplacian spectra and the forest structure of directed graphs. In this
paper, we present some basic results of this analysis partially obtained by the
present authors. We also discuss the application of these results to
decentralized control and touch upon some problems of spectral graph theory.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 09:35:26 GMT"
}
]
| 2009-03-20T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Agaev",
"Rafig",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0902.4106 | Shih-Chun Lin | Shih-Chun Lin, Pin-Hsun Lin, Chung-Pi Lee, Hsuan-Jung Su | Filter and nested-lattice code design for fading MIMO channels with
side-information | submitted to IEEE Transactions on Communications, Feb, 2009 | IEEE Transactions on Communications, vol. 59. No. 6, pp. 1489 -
1494, June 2011 | 10.1109/TCOMM.2011.050211.090113A | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Linear-assignment Gel'fand-Pinsker coding (LA-GPC) is a coding technique for
channels with interference known only at the transmitter, where the known
interference is treated as side-information (SI). As a special case of LA-GPC,
dirty paper coding has been shown to be able to achieve the optimal
interference-free rate for interference channels with perfect channel state
information at the transmitter (CSIT). In the cases where only the channel
distribution information at the transmitter (CDIT) is available, LA-GPC also
has good (sometimes optimal) performance in a variety of fast and slow fading
SI channels. In this paper, we design the filters in nested-lattice based
coding to make it achieve the same rate performance as LA-GPC in multiple-input
multiple-output (MIMO) channels. Compared with the random Gaussian codebooks
used in previous works, our resultant coding schemes have an algebraic
structure and can be implemented in practical systems. A simulation in a
slow-fading channel is also provided, and near interference-free error
performance is obtained. The proposed coding schemes can serve as the
fundamental building blocks to achieve the promised rate performance of MIMO
Gaussian broadcast channels with CDIT or perfect CSIT
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 09:54:57 GMT"
}
]
| 2011-06-28T00:00:00 | [
[
"Lin",
"Shih-Chun",
""
],
[
"Lin",
"Pin-Hsun",
""
],
[
"Lee",
"Chung-Pi",
""
],
[
"Su",
"Hsuan-Jung",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4127 | Vladimir Vovk | Alexey Chernov and Vladimir Vovk | Prediction with expert evaluators' advice | 18 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new protocol for prediction with expert advice in which each
expert evaluates the learner's and his own performance using a loss function
that may change over time and may be different from the loss functions used by
the other experts. The learner's goal is to perform better or not much worse
than each expert, as evaluated by that expert, for all experts simultaneously.
If the loss functions used by the experts are all proper scoring rules and all
mixable, we show that the defensive forecasting algorithm enjoys the same
performance guarantee as that attainable by the Aggregating Algorithm in the
standard setting and known to be optimal. This result is also applied to the
case of "specialist" (or "sleeping") experts. In this case, the defensive
forecasting algorithm reduces to a simple modification of the Aggregating
Algorithm.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 11:47:03 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Mar 2009 16:28:41 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Chernov",
"Alexey",
""
],
[
"Vovk",
"Vladimir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0902.4157 | Fabrice Theoleyre | Fabrice Theoleyre (LIG), Eryk Schiller (LIG), Andrzej Duda (LIG) | Efficient Greedy Geographical Non-Planar Routing with Reactive
Deflection | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel geographical routing scheme for spontaneous wireless mesh
networks. Greedy geographical routing has many advantages, but suffers from
packet losses occurring at the border of voids. In this paper, we propose a
flexible greedy routing scheme that can be adapted to any variant of
geographical routing and works for any connectivity graph, not necessarily Unit
Disk Graphs. The idea is to reactively detect voids, backtrack packets, and
propagate information on blocked sectors to reduce packet loss. We also propose
an extrapolating algorithm to reduce the latency of void discovery and to limit
route stretch. Performance evaluation via simulation shows that our modified
greedy routing avoids most of packet losses.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 14:32:57 GMT"
}
]
| 2009-02-25T00:00:00 | [
[
"Theoleyre",
"Fabrice",
"",
"LIG"
],
[
"Schiller",
"Eryk",
"",
"LIG"
],
[
"Duda",
"Andrzej",
"",
"LIG"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.4177 | Krishnan Prasad | K. Prasad, B. Sundar Rajan | Convolutional Codes for Network-Error Correction | 10 pages, 5 figures; Revised version; A shortened version of this
paper is to appear in the proceedings of GlobeComm 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we introduce convolutional codes for network-error correction
in the context of coherent network coding. We give a construction of
convolutional codes that correct a given set of error patterns, as long as
consecutive errors are separated by a certain interval. We also give some
bounds on the field size and the number of errors that can get corrected in a
certain interval. Compared to previous network error correction schemes, using
convolutional codes is seen to have advantages in field size and decoding
technique. Some examples are discussed which illustrate the several possible
situations that arise in this context.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 15:57:38 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Feb 2009 13:31:05 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Aug 2009 13:18:12 GMT"
}
]
| 2009-08-06T00:00:00 | [
[
"Prasad",
"K.",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4185 | Lenka Zdeborova | Lenka Zdeborov\'a and Florent Krzakala | Quiet Planting in the Locked Constraint Satisfaction Problems | 21 pages, revised version | SIAM J. Discrete Math. 25, 750-770 (2011) | 10.1137/090750755 | null | cond-mat.stat-mech cond-mat.dis-nn cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the planted ensemble of locked constraint satisfaction problems. We
describe the connection between the random and planted ensembles. The use of
the cavity method is combined with arguments from reconstruction on trees and
first and second moment considerations; in particular the connection with the
reconstruction on trees appears to be crucial. Our main result is the location
of the hard region in the planted ensemble. In a part of that hard region
instances have with high probability a single satisfying assignment.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 16:45:07 GMT"
},
{
"version": "v2",
"created": "Fri, 14 May 2010 23:14:03 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jul 2010 00:10:46 GMT"
}
]
| 2011-07-19T00:00:00 | [
[
"Zdeborová",
"Lenka",
""
],
[
"Krzakala",
"Florent",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.4218 | Pavel Chebotarev | Pavel Chebotarev | On graph theoretic results underlying the analysis of consensus in
multi-agent systems | 3 pages, 13 references. Submitted | Proceedings of the IEEE, Vol. 98, No. 7, July 2010 | 10.1109/JPROC.2010.2049911 | null | cs.MA cs.DM math.CO math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This note corrects a pretty serious mistake and some inaccuracies in
"Consensus and cooperation in networked multi-agent systems" by R.
Olfati-Saber, J.A. Fax, and R.M. Murray, published in Vol. 95 of the
Proceedings of the IEEE (2007, No. 1, P. 215-233). It also mentions several
stronger results applicable to the class of problems under consideration and
addresses the issue of priority whose interpretation in the above-mentioned
paper is not exact.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 19:10:41 GMT"
}
]
| 2010-06-04T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0902.4221 | Michael Neufeld | Michael Neufeld, Craig Partridge | Semantic Network Layering | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The stack in various forms has been widely used as an architectural template
for networking systems. Recently the stack has been subject to criticism for a
lack of flexibility. However, when it comes right down to it nobody has offered
a truly compelling alternative. Various cross-layer optimizations have been
proposed, but these optimizations are frequently hacks to achieve a particular
goal and offer no direct insight into why the existing network stack is
inadequate. We propose that a fundamental problem with the existing network
stack is that it attempts to layer functionality that is not well-suited to
layering. In this work we use a "bottom up" model of information computation,
storage, and transfer and the "top down" goals of networking systems to
formulate a modular decomposition of networking systems. Based on this modular
decomposition we propose a semantic layered structure for networking systems
that eliminates many awkward cross-layer interactions that arise in the
canonical layered stack.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 20:31:34 GMT"
}
]
| 2009-02-25T00:00:00 | [
[
"Neufeld",
"Michael",
""
],
[
"Partridge",
"Craig",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.4228 | Vamsi Potluru | Vamsi K. Potluru, Sergey M. Plis, Morten Morup, Vince D. Calhoun,
Terran Lane | Multiplicative updates For Non-Negative Kernel SVM | 4 pages, 1 figure, 1 table | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present multiplicative updates for solving hard and soft margin support
vector machines (SVM) with non-negative kernels. They follow as a natural
extension of the updates for non-negative matrix factorization. No additional
param- eter setting, such as choosing learning, rate is required. Ex- periments
demonstrate rapid convergence to good classifiers. We analyze the rates of
asymptotic convergence of the up- dates and establish tight bounds. We test the
performance on several datasets using various non-negative kernels and report
equivalent generalization errors to that of a standard SVM.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 20:38:32 GMT"
}
]
| 2009-02-25T00:00:00 | [
[
"Potluru",
"Vamsi K.",
""
],
[
"Plis",
"Sergey M.",
""
],
[
"Morup",
"Morten",
""
],
[
"Calhoun",
"Vince D.",
""
],
[
"Lane",
"Terran",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0902.4246 | Oleg Kurmaev | Oleg Kurmaev | Constant-Weight and Constant-Charge Binary Run-Length Limited Codes | 29 pages, submitted to IEEE Transactions on Information Theory. This
paper is a corrected version of a paper with the same title that appeared on
the arXiv in Feb. 2009. The major change is in Section VI, in which
Subsection D is now well defined | null | 10.1109/TIT.2011.2145490 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constant-weight and constant-charge binary sequences with constrained run
length of zeros are introduced. For these sequences, the weight and the charge
distribution are found. Then, recurrent and direct formulas for calculating the
number of these sequences are obtained. With considering these numbers of
constant-weight and constant-charge RLL sequences as coefficients of convergent
power series, generating functions are derived. The fact, that generating
function for enumerating constant-charge RLL sequences does not have a closed
form, is proved. Implementation of encoding and decoding procedures using
Cover's enumerative scheme is shown. On the base of obtained results, some
examples, such as enumeration of running-digital-sum (RDS) constrained RLL
sequences or peak-shifts control capability are also provided.
| [
{
"version": "v1",
"created": "Tue, 24 Feb 2009 21:33:58 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jun 2009 19:16:47 GMT"
}
]
| 2012-02-07T00:00:00 | [
[
"Kurmaev",
"Oleg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4250 | N. Raj Rao | N. Raj Rao and Jack W. Silverstein | Fundamental limit of sample generalized eigenvalue based detection of
signals in noise using relatively few signal-bearing and noise-only samples | Submitted to the IEEE Journal of Selected Topics in Signal
Processing, Special Issue on Model Order Selection in Signal Processing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The detection problem in statistical signal processing can be succinctly
formulated: Given m (possibly) signal bearing, n-dimensional signal-plus-noise
snapshot vectors (samples) and N statistically independent n-dimensional
noise-only snapshot vectors, can one reliably infer the presence of a signal?
This problem arises in the context of applications as diverse as radar, sonar,
wireless communications, bioinformatics, and machine learning and is the
critical first step in the subsequent signal parameter estimation phase.
The signal detection problem can be naturally posed in terms of the sample
generalized eigenvalues. The sample generalized eigenvalues correspond to the
eigenvalues of the matrix formed by "whitening" the signal-plus-noise sample
covariance matrix with the noise-only sample covariance matrix. In this article
we prove a fundamental asymptotic limit of sample generalized eigenvalue based
detection of signals in arbitrarily colored noise when there are relatively few
signal bearing and noise-only samples.
Numerical simulations highlight the accuracy of our analytical prediction and
permit us to extend our heuristic definition of the effective number of
identifiable signals in colored noise. We discuss implications of our result
for the detection of weak and/or closely spaced signals in sensor array
processing, abrupt change detection in sensor networks, and clustering
methodologies in machine learning.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 13:22:10 GMT"
}
]
| 2009-02-26T00:00:00 | [
[
"Rao",
"N. Raj",
""
],
[
"Silverstein",
"Jack W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4291 | Moshe Mishali | Moshe Mishali and Yonina C. Eldar | From Theory to Practice: Sub-Nyquist Sampling of Sparse Wideband Analog
Signals | 17 pages, 12 figures, to appear in IEEE Journal of Selected Topics in
Signal Processing, the special issue on Compressed Sensing | null | 10.1109/JSTSP.2010.2042414 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conventional sub-Nyquist sampling methods for analog signals exploit prior
information about the spectral support. In this paper, we consider the
challenging problem of blind sub-Nyquist sampling of multiband signals, whose
unknown frequency support occupies only a small portion of a wide spectrum. Our
primary design goals are efficient hardware implementation and low
computational load on the supporting digital processing. We propose a system,
named the modulated wideband converter, which first multiplies the analog
signal by a bank of periodic waveforms. The product is then lowpass filtered
and sampled uniformly at a low rate, which is orders of magnitude smaller than
Nyquist. Perfect recovery from the proposed samples is achieved under certain
necessary and sufficient conditions. We also develop a digital architecture,
which allows either reconstruction of the analog input, or processing of any
band of interest at a low rate, that is, without interpolating to the high
Nyquist rate. Numerical simulations demonstrate many engineering aspects:
robustness to noise and mismodeling, potential hardware simplifications,
realtime performance for signals with time-varying support and stability to
quantization effects. We compare our system with two previous approaches:
periodic nonuniform sampling, which is bandwidth limited by existing hardware
devices, and the random demodulator, which is restricted to discrete multitone
signals and has a high computational load. In the broader context of Nyquist
sampling, our scheme has the potential to break through the bandwidth barrier
of state-of-the-art analog conversion technologies such as interleaved
converters.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 06:33:41 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Aug 2009 19:49:12 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Nov 2009 19:53:51 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Mishali",
"Moshe",
""
],
[
"Eldar",
"Yonina C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4337 | Ludmila Scharf | Helmut Alt, Ludmila Scharf, Daria Schymura | Probabilistic Matching of Planar Regions | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze a probabilistic algorithm for matching shapes modeled by planar
regions under translations and rigid motions (rotation and translation). Given
shapes $A$ and $B$, the algorithm computes a transformation $t$ such that with
high probability the area of overlap of $t(A)$ and $B$ is close to maximal. In
the case of polygons, we give a time bound that does not depend significantly
on the number of vertices.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 14:51:45 GMT"
}
]
| 2009-02-26T00:00:00 | [
[
"Alt",
"Helmut",
""
],
[
"Scharf",
"Ludmila",
""
],
[
"Schymura",
"Daria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0902.4348 | Sandor Vagvolgyi | Sandor Vagvolgyi | On ground word problem of term equation systems | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give semi-decision procedures for the ground word problem of variable
preserving term equation systems and term equation systems. They are natural
improvements of two well known trivial semi-decision procedures. We show the
correctness of our procedures.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 11:35:02 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Sep 2012 06:22:14 GMT"
}
]
| 2012-09-10T00:00:00 | [
[
"Vagvolgyi",
"Sandor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0902.4394 | Holger Rauhut | Holger Rauhut | Circulant and Toeplitz matrices in compressed sensing | 6 pages, submitted to Proc. SPARS'09 (Saint-Malo) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed sensing seeks to recover a sparse vector from a small number of
linear and non-adaptive measurements. While most work so far focuses on
Gaussian or Bernoulli random measurements we investigate the use of partial
random circulant and Toeplitz matrices in connection with recovery by
$\ell_1$-minization. In contrast to recent work in this direction we allow the
use of an arbitrary subset of rows of a circulant and Toeplitz matrix. Our
recovery result predicts that the necessary number of measurements to ensure
sparse reconstruction by $\ell_1$-minimization with random partial circulant or
Toeplitz matrices scales linearly in the sparsity up to a $\log$-factor in the
ambient dimension. This represents a significant improvement over previous
recovery results for such matrices. As a main tool for the proofs we use a new
version of the non-commutative Khintchine inequality.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 15:41:38 GMT"
}
]
| 2009-02-26T00:00:00 | [
[
"Rauhut",
"Holger",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4447 | Zhenning Kong | Zhenning Kong and Edmund M. Yeh | Percolation Processes and Wireless Network Resilience to
Degree-Dependent and Cascading Node Failures | null | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of wireless network resilience to node failures from a
percolation-based perspective. In practical wireless networks, it is often the
case that the failure probability of a node depends on its degree (number of
neighbors). We model this phenomenon as a degree-dependent site percolation
process on random geometric graphs. In particular, we obtain analytical
conditions for the existence of phase transitions within this model.
Furthermore, in networks carrying traffic load, the failure of one node can
result in redistribution of the load onto other nearby nodes. If these nodes
fail due to excessive load, then this process can result in a cascading
failure. Using a simple but descriptive model, we show that the cascading
failure problem for large-scale wireless networks is equivalent to a
degree-dependent site percolation on random geometric graphs. We obtain
analytical conditions for cascades in this model.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 19:16:58 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Aug 2009 13:44:28 GMT"
}
]
| 2009-08-28T00:00:00 | [
[
"Kong",
"Zhenning",
""
],
[
"Yeh",
"Edmund M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4449 | Zhenning Kong | Zhenning Kong and Edmund M. Yeh | Connectivity, Percolation, and Information Dissemination in Large-Scale
Wireless Networks with Dynamic Links | null | null | null | null | cs.IT cs.NI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the problem of disseminating broadcast messages in wireless
networks with time-varying links from a percolation-based perspective. Using a
model of wireless networks based on random geometric graphs with dynamic on-off
links, we show that the delay for disseminating broadcast information exhibits
two behavioral regimes, corresponding to the phase transition of the underlying
network connectivity. When the dynamic network is in the subcritical phase,
ignoring propagation delays, the delay scales linearly with the Euclidean
distance between the sender and the receiver. When the dynamic network is in
the supercritical phase, the delay scales sub-linearly with the distance.
Finally, we show that in the presence of a non-negligible propagation delay,
the delay for information dissemination scales linearly with the Euclidean
distance in both the subcritical and supercritical regimes, with the rates for
the linear scaling being different in the two regimes.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 19:21:32 GMT"
}
]
| 2009-02-26T00:00:00 | [
[
"Kong",
"Zhenning",
""
],
[
"Yeh",
"Edmund M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0902.4460 | Pavel Chebotarev | V.I. Borzenko, Z.M. Lezina, A. K.Loginov, Ya.Yu. Tsodikova, and P.Yu.
Chebotarev | Strategies of Voting in Stochastic Environment: Egoism and Collectivism | 18 pages, 7 figures, translated from Russian by M.A. Kasner | Automation and Remote Control, 2006, Vol. 67, No. 2, pp. 311-328.
Original Russian text published in Avtomatika i Telemekhanika, 2006, No. 2,
pp. 154-173 | 10.1134/S0005117906020093 | null | math.OC cs.MA math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consideration was given to a model of social dynamics controlled by
successive collective decisions based on the threshold majority procedures. The
current system state is characterized by the vector of participants' capitals
(utilities). At each step, the voters can either retain their status quo or
accept the proposal which is a vector of the algebraic increments in the
capitals of the participants. In this version of the model, the vector is
generated stochastically. Comparative utility of two social attitudes--egoism
and collectivism--was analyzed. It was established that, except for some
special cases, the collectivists have advantages, which makes realizable the
following scenario: on the conditions of protecting the corporate interests, a
group is created which is joined then by the egoists attracted by its
achievements. At that, group egoism approaches altruism. Additionally, one of
the considered variants of collectivism handicaps manipulation of voting by the
organizers.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 20:46:54 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Borzenko",
"V. I.",
""
],
[
"Lezina",
"Z. M.",
""
],
[
"Loginov",
"A. K.",
""
],
[
"Tsodikova",
"Ya. Yu.",
""
],
[
"Chebotarev",
"P. Yu.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0902.4463 | Evghenii Gaburov | Evghenii Gaburov, Stefan Harfst and Simon Portegies Zwart | SAPPORO: A way to turn your graphics cards into a GRAPE-6 | 13 pages, 9 figures, accepted to New Astronomy | null | 10.1016/j.newast.2009.03.002 | null | astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present Sapporo, a library for performing high-precision gravitational
N-body simulations on NVIDIA Graphical Processing Units (GPUs). Our library
mimics the GRAPE-6 library, and N-body codes currently running on GRAPE-6 can
switch to Sapporo by a simple relinking of the library. The precision of our
library is comparable to that of GRAPE-6, even though internally the GPU
hardware is limited to single precision arithmetics. This limitation is
effectively overcome by emulating double precision for calculating the distance
between particles. The performance loss of this operation is small (< 20%)
compared to the advantage of being able to run at high precision. We tested the
library using several GRAPE-6-enabled N-body codes, in particular with Starlab
and phiGRAPE. We measured peak performance of 800 Gflop/s for running with 10^6
particles on a PC with four commercial G92 architecture GPUs (two GeForce
9800GX2). As a production test, we simulated a 32k Plummer model with equal
mass stars well beyond core collapse. The simulation took 41 days, during which
the mean performance was 113 Gflop/s. The GPU did not show any problems from
running in a production environment for such an extended period of time.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 21:00:05 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Mar 2009 07:39:34 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Gaburov",
"Evghenii",
""
],
[
"Harfst",
"Stefan",
""
],
[
"Zwart",
"Simon Portegies",
""
]
]
| [
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0902.4481 | Jian Tan | Predrag R. Jelenkovic and Jian Tan | Stability of Finite Population ALOHA with Variable Packets | 14 pages, 5 figures | null | null | EE2009-02-20 | cs.PF cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | ALOHA is one of the most basic Medium Access Control (MAC) protocols and
represents a foundation for other more sophisticated distributed and
asynchronous MAC protocols, e.g., CSMA. In this paper, unlike in the
traditional work that focused on mean value analysis, we study the
distributional properties of packet transmission delays over an ALOHA channel.
We discover a new phenomenon showing that a basic finite population ALOHA model
with variable size (exponential) packets is characterized by power law
transmission delays, possibly even resulting in zero throughput. These results
are in contrast to the classical work that shows exponential delays and
positive throughput for finite population ALOHA with fixed packets.
Furthermore, we characterize a new stability condition that is entirely derived
from the tail behavior of the packet and backoff distributions that may not be
determined by mean values. The power law effects and the possible instability
might be diminished, or perhaps eliminated, by reducing the variability of
packets. However, we show that even a slotted (synchronized) ALOHA with packets
of constant size can exhibit power law delays when the number of active users
is random. From an engineering perspective, our results imply that the
variability of packet sizes and number of active users need to be taken into
consideration when designing robust MAC protocols, especially for ad-hoc/sensor
networks where other factors, such as link failures and mobility, might further
compound the problem.
| [
{
"version": "v1",
"created": "Wed, 25 Feb 2009 22:59:58 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Feb 2009 22:34:03 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Jelenkovic",
"Predrag R.",
""
],
[
"Tan",
"Jian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4508 | Luo Jinquan | Jinquan Luo, Yuansheng Tang and Hongyu Wang | Exponential Sums, Cyclic Codes and Sequences: the Odd Characteristic
Kasami Case | null | null | null | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $q=p^n$ with $n=2m$ and $p$ be an odd prime. Let $0\leq k\leq n-1$ and
$k\neq m$. In this paper we determine the value distribution of following
exponential(character) sums \[\sum\limits_{x\in \bF_q}\zeta_p^{\Tra_1^m (\alpha
x^{p^{m}+1})+\Tra_1^n(\beta x^{p^k+1})}\quad(\alpha\in \bF_{p^m},\beta\in
\bF_{q})\] and \[\sum\limits_{x\in \bF_q}\zeta_p^{\Tra_1^m (\alpha
x^{p^{m}+1})+\Tra_1^n(\beta x^{p^k+1}+\ga x)}\quad(\alpha\in
\bF_{p^m},\beta,\ga\in \bF_{q})\] where $\Tra_1^n: \bF_q\ra \bF_p$ and
$\Tra_1^m: \bF_{p^m}\ra\bF_p$ are the canonical trace mappings and
$\zeta_p=e^{\frac{2\pi i}{p}}$ is a primitive $p$-th root of unity. As
applications: (1). We determine the weight distribution of the cyclic codes
$\cC_1$ and $\cC_2$ over $\bF_{p^t}$ with parity-check polynomials
$h_2(x)h_3(x)$ and $h_1(x)h_2(x)h_3(x)$ respectively where $t$ is a divisor of
$d=\gcd(m,k)$, and $h_1(x)$, $h_2(x)$ and $h_3(x)$ are the minimal polynomials
of $\pi^{-1}$, $\pi^{-(p^k+1)}$ and $\pi^{-(p^m+1)}$ over $\bF_{p^t}$
respectively for a primitive element $\pi$ of $\bF_q$. (2). We determine the
correlation distribution among a family of m-sequences. This paper extends the
results in \cite{Zen Li}.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 06:04:14 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Luo",
"Jinquan",
""
],
[
"Tang",
"Yuansheng",
""
],
[
"Wang",
"Hongyu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4509 | Luo Jinquan | Jinquan Luo, San Ling and Chaoping Xing | Cyclic Codes and Sequences from a Class of Dembowski-Ostrom Functions | null | null | null | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $q=p^n$ with $p$ be an odd prime. Let $0\leq k\leq n-1$ and $k\neq n/2$.
In this paper we determine the value distribution of following
exponential(character) sums \[\sum\limits_{x\in \bF_q}\zeta_p^{\Tra_1^n(\alpha
x^{p^{3k}+1}+\beta x^{p^k+1})}\quad(\alpha\in \bF_{p^m},\beta\in \bF_{q})\] and
\[\sum\limits_{x\in \bF_q}\zeta_p^{\Tra_1^n(\alpha x^{p^{3k}+1}+\beta
x^{p^k+1}+\ga x)}\quad(\alpha\in \bF_{p^m},\beta,\ga\in \bF_{q})\] where
$\Tra_1^n: \bF_q\ra \bF_p$ and $\Tra_1^m: \bF_{p^m}\ra\bF_p$ are the canonical
trace mappings and $\zeta_p=e^{\frac{2\pi i}{p}}$ is a primitive $p$-th root of
unity. As applications: (1). We determine the weight distribution of the cyclic
codes $\cC_1$ and $\cC_2$ over $\bF_{p^t}$ with parity-check polynomials
$h_2(x)h_3(x)$ and $h_1(x)h_2(x)h_3(x)$ respectively where $t$ is a divisor of
$d=\gcd(n,k)$, and $h_1(x)$, $h_2(x)$ and $h_3(x)$ are the minimal polynomials
of $\pi^{-1}$, $\pi^{-(p^k+1)}$ and $\pi^{-(p^{3k}+1)}$ over $\bF_{p^t}$
respectively for a primitive element $\pi$ of $\bF_q$. (2). We determine the
correlation distribution among a family of m-sequences.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 05:36:31 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Luo",
"Jinquan",
""
],
[
"Ling",
"San",
""
],
[
"Xing",
"Chaoping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4510 | Luo Jinquan | Jinquan Luo, Hongyu Wang and Yuansheng Tang | Cyclic Codes and Sequences: the Generalized Kasami Case | null | null | null | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $q=2^n$ with $n=2m$ . Let $1\leq k\leq n-1$ and $k\neq m$. In this paper
we determine the value distribution of following exponential sums
\[\sum\limits_{x\in \bF_q}(-1)^{\Tra_1^m (\alpha x^{2^{m}+1})+\Tra_1^n(\beta
x^{2^k+1})}\quad(\alpha\in \bF_{2^m},\beta\in \bF_{q})\] and
\[\sum\limits_{x\in \bF_q}(-1)^{\Tra_1^m (\alpha x^{2^{m}+1})+\Tra_1^n(\beta
x^{2^k+1}+\ga x)}\quad(\alpha\in \bF_{2^m},\beta,\ga\in \bF_{q})\] where
$\Tra_1^n: \bF_q\ra \bF_2$ and $\Tra_1^m: \bF_{p^m}\ra\bF_2$ are the canonical
trace mappings. As applications: (1). We determine the weight distribution of
the binary cyclic codes $\cC_1$ and $\cC_2$ with parity-check polynomials
$h_2(x)h_3(x)$ and $h_1(x)h_2(x)h_3(x)$ respectively where $h_1(x)$, $h_2(x)$
and $h_3(x)$ are the minimal polynomials of $\pi^{-1}$, $\pi^{-(2^k+1)}$ and
$\pi^{-(2^m+1)}$ over $\bF_{2}$ respectively for a primitive element $\pi$ of
$\bF_q$. (2). We determine the correlation distribution among a family of
m-sequences. This paper is the binary version of Luo, Tang and Wang\cite{Luo
Tan} and extends the results in Kasami\cite{Kasa1}, Van der Vlugt\cite{Vand2}
and Zeng, Liu and Hu\cite{Zen Liu}.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 05:43:16 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Luo",
"Jinquan",
""
],
[
"Wang",
"Hongyu",
""
],
[
"Tang",
"Yuansheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4511 | Luo Jinquan | Jinquan Luo, San Ling, Chaoping Xing | Cyclic Codes and Sequences from Kasami-Welch Functions | null | null | null | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $q=2^n$, $0\leq k\leq n-1$ and $k\neq n/2$. In this paper we determine
the value distribution of following exponential sums \[\sum\limits_{x\in
\bF_q}(-1)^{\Tra_1^n(\alpha x^{2^{3k}+1}+\beta x^{2^k+1})}\quad(\alpha,\beta\in
\bF_{q})\] and \[\sum\limits_{x\in \bF_q}(-1)^{\Tra_1^n(\alpha
x^{2^{3k}+1}+\beta x^{2^k+1}+\ga x)}\quad(\alpha,\beta,\ga\in \bF_{q})\] where
$\Tra_1^n: \bF_{2^n}\ra \bF_2$ is the canonical trace mapping. As applications:
(1). We determine the weight distribution of the binary cyclic codes $\cC_1$
and $\cC_2$ with parity-check polynomials $h_2(x)h_3(x)$ and
$h_1(x)h_2(x)h_3(x)$ respectively where $h_1(x)$, $h_2(x)$ and $h_3(x)$ are the
minimal polynomials of $\pi^{-1}$, $\pi^{-(2^k+1)}$ and $\pi^{-(2^{3k}+1)}$
respectively for a primitive element $\pi$ of $\bF_q$. (2). We determine the
correlation distribution among a family of binary m-sequences.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 05:49:14 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Luo",
"Jinquan",
""
],
[
"Ling",
"San",
""
],
[
"Xing",
"Chaoping",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4514 | Pavel Chebotarev | Pavel Chebotarev | Analytical Expression of the Expected Values of Capital at Voting in the
Stochastic Environment | 13 pages, 5 figures, translated from Russian by M.A. Kasner | Automation and Remote Control, 2006, Vol. 67, No. 2, pp. 480-492.
Original Russian text published in Avtomatika i Telemekhanika, 2006, No. 3,
pp. 152-165 | 10.1134/S000511790603012X | null | math.OC cs.MA cs.SI cs.SY math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the simplest version of the model of group decision making in the
stochastic environment, the participants are segregated into egoists and a
group of collectivists. A "proposal of the environment" is a stochastically
generated vector of algebraic increments of participants' capitals. The social
dynamics is determined by the sequence of proposals accepted by a majority
voting (with a threshold) of the participants. In this paper, we obtain
analytical expressions for the expected values of capitals for all the
participants, including collectivists and egoists. In addition, distinctions
between some principles of group voting are discussed.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 06:25:07 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Feb 2009 22:51:44 GMT"
}
]
| 2011-06-06T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0902.4521 | Heng Huang | Dijun Luo, Heng Huang, Chris Ding | Are Tensor Decomposition Solutions Unique? On the global convergence of
HOSVD and ParaFac algorithms | Submitted to CVPR2009 in Nov. 20, 2008 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For tensor decompositions such as HOSVD and ParaFac, the objective functions
are nonconvex. This implies, theoretically, there exists a large number of
local optimas: starting from different starting point, the iteratively improved
solution will converge to different local solutions. This non-uniqueness
present a stability and reliability problem for image compression and
retrieval. In this paper, we present the results of a comprehensive
investigation of this problem. We found that although all tensor decomposition
algorithms fail to reach a unique global solution on random data and severely
scrambled data; surprisingly however, on all real life several data sets (even
with substantial scramble and occlusions), HOSVD always produce the unique
global solution in the parameter region suitable to practical applications,
while ParaFac produce non-unique solutions. We provide an eigenvalue based rule
for the assessing the solution uniqueness.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 07:20:49 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Luo",
"Dijun",
""
],
[
"Huang",
"Heng",
""
],
[
"Ding",
"Chris",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.4527 | Nikolaos Livathinos | Nikolaos S. Livathinos | EXtensible Animator for Mobile Simulations: EXAMS | 9 pages with 7 figures | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most widely used simulation environments for mobile wireless
networks is the Network Simulator 2 (NS-2). However NS-2 stores its outcome in
a text file, so there is a need for a visualization tool to animate the
simulation of the wireless network. The purpose of this tool is to help the
researcher examine in detail how the wireless protocol works both on a network
and a node basis. It is clear that much of this information is protocol
dependent and cannot be depicted properly by a general purpose animation
process. Existing animation tools do not provide this level of information
neither permit the specific protocol to control the animation at all. EXAMS is
an NS-2 visualization tool for mobile simulations which makes possible the
portrayal of NS-2 internal information like transmission properties and node
data structures. This is mainly possible due to EXAMS extensible architecture
which separates the animation process into a general and a protocol specific
part. The latter can be developed independently by the protocol designer and
loaded on demand. These and other useful characteristics of the EXAMS tool can
be an invaluable help for a researcher in order to investigate and debug a
mobile networking protocol.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 08:03:30 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Livathinos",
"Nikolaos S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0902.4535 | Fortis Alexandra Ms. | Simona Angela Apostol, Cosmin Catu, Corina Vernic | Electronical Health Record's Systems. Interoperability | 14 pages | Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 7-20 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Understanding the importance that the electronic medical health records
system has, with its various structural types and grades, has led to the
elaboration of a series of standards and quality control methods, meant to
control its functioning. In time, the electronic health records system has
evolved along with the medical data change of structure. Romania has not yet
managed to fully clarify this concept, various definitions still being
encountered, such as "Patient's electronic chart", "Electronic health file". A
slow change from functional interoperability (OSI level 6) to semantic
interoperability (level 7) is being aimed at the moment. This current article
will try to present the main electronic files models, from a functional
interoperability system's possibility to be created perspective.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 09:06:29 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Apostol",
"Simona Angela",
""
],
[
"Catu",
"Cosmin",
""
],
[
"Vernic",
"Corina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0902.4572 | Saloua Chettibi | Saloua Chettibi, M. Benmohamed | A Multipath Energy-Aware On demand Source Routing Protocol for Mobile
Ad-Hoc Networks | null | 1st Workshop on Next Generation Networks: Mobility, WNGN,, Maroc
(2009) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy consumption is the most challenging issue in routing protocol design
for mobile ad-hoc networks (MANETs), since mobile nodes are battery powered.
Furthermore, replacing or recharging batteries is often impossible in critical
environments such as in military or rescue missions. In a MANET, the energy
depletion of a node does not affect the node itself only, but the overall
network lifetime. In this paper, we present multipath and energy-aware on
demand source routing (MEA-DSR) protocol, which exploits route diversity and
information about batteries-energy levels for balancing energy consumption
between mobile nodes. Simulation results, have shown that MEA-DSR protocol is
more energy efficient than DSR in almost mobility scenarios.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 12:47:12 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Chettibi",
"Saloua",
""
],
[
"Benmohamed",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.4577 | Zhen-hai Jing | Zhenhai Jing, Baoming Bai and Xiao Ma | Using Distributed Rate-Splitting Game to Approach Rate Region Boundary
of the Gaussian Interference Channel | 29 pages, 10 figures, submitted to IEEE Trans on Information
Theory,Feb.,2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Determining how to approach the rate boundary of the Gaussian interference
channel in practical system is a big concern. In this paper, a distributed
rate-splitting (DRS) scheme is proposed to approach the rate region boundary of
the Gaussian interference channel. It is shown that the DRS scheme can be
formulated as a non-cooperative game. We introduce the Stackelberg equilibrium
(SE) with multiple leaders as the equilibrium point of the non-cooperative
game. Therefore, an iterative multiple waterlevels water-filling algorithm
(IML-WFA) is developed to efficiently reach the SE of the non-cooperative game.
The existence of SE is established for the game. Numerical examples show that
the rate-tuples achieved by the DRS are very close to the boundary of the
well-known HK region.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 13:05:58 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2009 10:24:05 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Mar 2010 09:10:42 GMT"
}
]
| 2010-03-23T00:00:00 | [
[
"Jing",
"Zhenhai",
""
],
[
"Bai",
"Baoming",
""
],
[
"Ma",
"Xiao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4640 | Gabriel Cardona | Gabriel Cardona, Merce Llabres, Francesc Rossello, Gabriel Valiente | The comparison of tree-sibling time consistent phylogenetic networks is
graph isomorphism-complete | 10 pages, 3 figures | null | null | null | q-bio.PE cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a previous work, we gave a metric on the class of semibinary tree-sibling
time consistent phylogenetic networks that is computable in polynomial time; in
particular, the problem of deciding if two networks of this kind are isomorphic
is in P. In this paper, we show that if we remove the semibinarity condition
above, then the problem becomes much harder. More precisely, we proof that the
isomorphism problem for generic tree-sibling time consistent phylogenetic
networks is polynomially equivalent to the graph isomorphism problem. Since the
latter is believed to be neither in P nor NP-complete, the chances are that it
is impossible to define a metric on the class of all tree-sibling time
consistent phylogenetic networks that can be computed in polynomial time.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 17:30:07 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Cardona",
"Gabriel",
""
],
[
"Llabres",
"Merce",
""
],
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0902.4647 | Andrea Goldsmith | Yifan Liang, Andrea Goldsmith and Michelle Effros | Source-Channel Coding and Separation for Generalized Communication
Systems | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider transmission of stationary and ergodic sources over non-ergodic
composite channels with channel state information at the receiver (CSIR).
Previously we introduced alternate capacity definitions to Shannon capacity,
including the capacity versus outage and the expected capacity. These
generalized definitions relax the constraint of Shannon capacity that all
transmitted information must be decoded at the receiver. In this work alternate
end-to-end distortion metrics such as the distortion versus outage and the
expected distortion are introduced to relax the constraint that a single
distortion level has to be maintained for all channel states. For transmission
of stationary and ergodic sources over stationary and ergodic channels, the
classical Shannon separation theorem enables separate design of source and
channel codes and guarantees optimal performance. For generalized communication
systems, we show that different end-to-end distortion metrics lead to different
conclusions about separation optimality even for the same source and channel
models.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 17:37:27 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Liang",
"Yifan",
""
],
[
"Goldsmith",
"Andrea",
""
],
[
"Effros",
"Michelle",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0902.4658 | Dmitry Zinoviev | Dmitry Zinoviev, Vy Duong | Toward Understanding Friendship in Online Social Networks | 4 pages, 4 figures. Presented virtually at ICTKS'2008 (Huntsville,
AL). Accepted to the International Journal of Technology, Knowledge, and
Society | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | All major on-line social networks, such as MySpace, Facebook, LiveJournal,
and Orkut, are built around the concept of friendship. It is not uncommon for a
social network participant to have over 100 friends. A natural question arises:
are they all real friends of hers, or does she mean something different when
she calls them "friends?" Speaking in other words, what is the relationship
between off-line (real, traditional) friendship and its on-line (virtual)
namesake? In this paper, we use sociological data to suggest that there is a
significant difference between the concepts of virtual and real friendships. We
further investigate the structure of on-line friendship and observe that it
follows the Pareto (or double Pareto) distribution and is subject to age
stratification but not to gender segregation. We introduce the concept of
digital personality that quantifies the willingness of a social network
participant to engage in virtual friendships.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 18:19:04 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Zinoviev",
"Dmitry",
""
],
[
"Duong",
"Vy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0902.4663 | Amelia Sparavigna | Amelia Sparavigna | Dipole Vectors in Images Processing | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Instead of evaluating the gradient field of the brightness map of an image,
we propose the use of dipole vectors. This approach is obtained by adapting to
the image gray-tone distribution the definition of the dipole moment of charge
distributions. We will show how to evaluate the dipoles and obtain a vector
field, which can be a good alternative to the gradient field in pattern
recognition.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 18:42:30 GMT"
}
]
| 2009-02-27T00:00:00 | [
[
"Sparavigna",
"Amelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0902.4682 | Claus-Peter Wirth | Claus-Peter Wirth, Joerg Siekmann, Christoph Benzmueller, Serge
Autexier | Lectures on Jacques Herbrand as a Logician | ii + 82 pages | null | null | SEKI Report SR-2009-01 | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give some lectures on the work on formal logic of Jacques Herbrand, and
sketch his life and his influence on automated theorem proving. The intended
audience ranges from students interested in logic over historians to logicians.
Besides the well-known correction of Herbrand's False Lemma by Goedel and
Dreben, we also present the hardly known unpublished correction of Heijenoort
and its consequences on Herbrand's Modus Ponens Elimination. Besides Herbrand's
Fundamental Theorem and its relation to the Loewenheim-Skolem-Theorem, we
carefully investigate Herbrand's notion of intuitionism in connection with his
notion of falsehood in an infinite domain. We sketch Herbrand's two proofs of
the consistency of arithmetic and his notion of a recursive function, and last
but not least, present the correct original text of his unification algorithm
with a new translation.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 19:59:17 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Feb 2009 18:29:54 GMT"
},
{
"version": "v3",
"created": "Tue, 12 May 2009 19:09:43 GMT"
},
{
"version": "v4",
"created": "Thu, 30 Jun 2011 18:43:12 GMT"
},
{
"version": "v5",
"created": "Tue, 27 May 2014 08:58:06 GMT"
}
]
| 2014-05-28T00:00:00 | [
[
"Wirth",
"Claus-Peter",
""
],
[
"Siekmann",
"Joerg",
""
],
[
"Benzmueller",
"Christoph",
""
],
[
"Autexier",
"Serge",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0902.4723 | Joerg Endrullis | Joerg Endrullis, Herman Geuvers, Hans Zantema | Degrees of Undecidability in Rewriting | null | null | null | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Undecidability of various properties of first order term rewriting systems is
well-known. An undecidable property can be classified by the complexity of the
formula defining it. This gives rise to a hierarchy of distinct levels of
undecidability, starting from the arithmetical hierarchy classifying properties
using first order arithmetical formulas and continuing into the analytic
hierarchy, where also quantification over function variables is allowed.
In this paper we consider properties of first order term rewriting systems
and classify them in this hierarchy. Weak and strong normalization for single
terms turn out to be Sigma-0-1-complete, while their uniform versions as well
as dependency pair problems with minimality flag are Pi-0-2-complete. We find
that confluence is Pi-0-2-complete both for single terms and uniform.
Unexpectedly weak confluence for ground terms turns out to be harder than weak
confluence for open terms. The former property is Pi-0-2-complete while the
latter is Sigma-0-1-complete (and thereby recursively enumerable).
The most surprising result is on dependency pair problems without minimality
flag: we prove this to be Pi-1-1-complete, which means that this property
exceeds the arithmetical hierarchy and is essentially analytic.
| [
{
"version": "v1",
"created": "Thu, 26 Feb 2009 22:59:29 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Endrullis",
"Joerg",
""
],
[
"Geuvers",
"Herman",
""
],
[
"Zantema",
"Hans",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0902.4730 | Saul Youssef | Saul Youssef, John Brunelle, John Huth, David C. Parkes, Margo Seltzer
and Jim Shank | Minimal Economic Distributed Computing | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an ideal distributed computing infrastructure, users would be able to use
diverse distributed computing resources in a simple coherent way, with
guaranteed security and efficient use of shared resources in accordance with
the wishes of the owners of the resources. Our strategy for approaching this
ideal is to first find the simplest structure within which these goals can
plausibly be achieved. This structure, we find, is given by a particular
recursive distributive lattice freely constructed from a presumed partially
ordered set of all data in the infrastructure. Minor syntactic adjustments to
the resulting algebra yields a simple language resembling a UNIX shell, a
concept of execution and an interprocess protocol. Persons, organizations and
servers within the system express their interests explicitly via a hierarchical
currency. The currency provides a common framework for treating authentication,
access control and resource sharing as economic problems while also introducing
a new dimension for improving the infrastructure over time by designing system
components which compete with each other to earn the currency. We explain these
results, discuss experience with an implementation called egg and point out
areas where more research is needed.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2009 00:00:55 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Youssef",
"Saul",
""
],
[
"Brunelle",
"John",
""
],
[
"Huth",
"John",
""
],
[
"Parkes",
"David C.",
""
],
[
"Seltzer",
"Margo",
""
],
[
"Shank",
"Jim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0902.4779 | Florent Autrusseau | Jiazi Yi (IRCCyN), Eddy Cizeron (IRCCyN), Salima Hamma (IRCCyN),
Beno\^it Parrein (IRCCyN) | Simulation and Performance Analysis of MP-OLSR for Mobile Ad hoc
Networks | null | IEEE WCNC 2008, Las Vegas : \'Etats-Unis d'Am\'erique (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile
nodes which dynamically exchange data without reliance on a fixed base station
or a wired backbone network, which makes routing a crucial issue for the design
of a ad hoc networks. In this paper we discussed a hybrid multipath routing
protocol named MP-OLSR. It is based on the link state algorithm and employs
periodic exchange of messages to maintain topology information of the networks.
In the mean time, it updates the routing table in an on-demand scheme and
forwards the packets in multiple paths which have been determined at the
source. If a link failure is detected, the algorithm recovers the route
automatically. Concerning the instability of the wireless networks, the
redundancy coding is used to improve the delivery ratio. The simulation in NS2
shows that the new protocol can effectively improve the performance of the
networks.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2009 09:37:53 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Yi",
"Jiazi",
"",
"IRCCyN"
],
[
"Cizeron",
"Eddy",
"",
"IRCCyN"
],
[
"Hamma",
"Salima",
"",
"IRCCyN"
],
[
"Parrein",
"Benoît",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.4781 | Florent Autrusseau | Jiazi Yi (IRCCyN), Eddy Cizeron (IRCCyN), Salima Hamma (IRCCyN),
Beno\^it Parrein (IRCCyN), Pascal Lesage (IRCCyN) | Implementation of Multipath and Multiple Description Coding in OLSR | null | 4th OLSR Interop/Work Shop, Ottawa : Canada (2008) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we discussed the application and the implementation of
multipath routing and multiple description coding (MDC) extension of OLSR,
called MP-OLSR. It is based on the link state algorithm and employs periodic
exchange of messages to maintain topology information of the networks. In the
mean time, it updates the routing table in an on-demand scheme and forwards the
packets in multiple paths which have been determined at the source. If a link
failure is detected, the algorithm recovers the route automatically. Concerning
the instability of the wireless networks, the multiple description coding is
used to improve reliability of the network transmission, and several methods
are proposed to allocate the redundancy in different paths. The simulation in
NS2 shows that the new protocol can effectively improve the performance of the
networks. The implementation of MP-OLSR is also proposed in the end.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2009 09:39:03 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Yi",
"Jiazi",
"",
"IRCCyN"
],
[
"Cizeron",
"Eddy",
"",
"IRCCyN"
],
[
"Hamma",
"Salima",
"",
"IRCCyN"
],
[
"Parrein",
"Benoît",
"",
"IRCCyN"
],
[
"Lesage",
"Pascal",
"",
"IRCCyN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0902.4822 | Xavier Grehant | Xavier Grehant and Sverre Jarp | Lightweight Task Analysis for Cache-Aware Scheduling on Heterogeneous
Clusters | The paper was originally published in: ISBN #: 1-60132-084-1 (a
two-volume set) Proceedings of the 2008 International Conference on Parallel
and Distributed Processing Techniques and Applications (PDPTA'08) Editors:
Hamid R. Arabnia and Youngsong Mun | null | null | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel characterization of how a program stresses cache. This
characterization permits fast performance prediction in order to simulate and
assist task scheduling on heterogeneous clusters. It is based on the estimation
of stack distance probability distributions. The analysis requires the
observation of a very small subset of memory accesses, and yields a reasonable
to very accurate prediction in constant time.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2009 12:47:22 GMT"
}
]
| 2009-03-02T00:00:00 | [
[
"Grehant",
"Xavier",
""
],
[
"Jarp",
"Sverre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0902.4881 | Pierre Cornilleau | Pierre Cornilleau, Sergio Guerrero | Controllability and observabiliy of an artificial advection-diffusion
problem | 20 pages, accepted for publication in MCSS. DOI:
10.1007/s00498-012-0076-0 | Mathematics of Control, Signals, and Systems July 2012, Volume 24,
Issue 3, pp 265-294 | 10.1007/s00498-012-0076-0 | null | math.OC cs.SY math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the controllability of an artificial
advection-diffusion system through the boundary. Suitable Carleman estimates
give us the observability on the adjoint system in the one dimensional case. We
also study some basic properties of our problem such as backward uniqueness and
we get an intuitive result on the control cost for vanishing viscosity.
| [
{
"version": "v1",
"created": "Fri, 27 Feb 2009 17:57:23 GMT"
},
{
"version": "v2",
"created": "Tue, 3 May 2011 10:23:12 GMT"
},
{
"version": "v3",
"created": "Wed, 8 Jun 2011 12:05:35 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Feb 2012 09:28:33 GMT"
},
{
"version": "v5",
"created": "Sat, 3 Mar 2012 10:28:33 GMT"
}
]
| 2016-04-05T00:00:00 | [
[
"Cornilleau",
"Pierre",
""
],
[
"Guerrero",
"Sergio",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
}
]
|
0903.0034 | Vladimir Braverman | Vladimir Braverman, Rafail Ostrovsky | Measuring Independence of Datasets | null | null | null | null | cs.DS cs.DB cs.IR cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A data stream model represents setting where approximating pairwise, or
$k$-wise, independence with sublinear memory is of considerable importance. In
the streaming model the joint distribution is given by a stream of $k$-tuples,
with the goal of testing correlations among the components measured over the
entire stream. In the streaming model, Indyk and McGregor (SODA 08) recently
gave exciting new results for measuring pairwise independence. The Indyk and
McGregor methods provide $\log{n}$-approximation under statistical distance
between the joint and product distributions in the streaming model. Indyk and
McGregor leave, as their main open question, the problem of improving their
$\log n$-approximation for the statistical distance metric.
In this paper we solve the main open problem posed by of Indyk and McGregor
for the statistical distance for pairwise independence and extend this result
to any constant $k$. In particular, we present an algorithm that computes an
$(\epsilon, \delta)$-approximation of the statistical distance between the
joint and product distributions defined by a stream of $k$-tuples. Our
algorithm requires $O(({1\over \epsilon}\log({nm\over \delta}))^{(30+k)^k})$
memory and a single pass over the data stream.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 01:29:54 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Braverman",
"Vladimir",
""
],
[
"Ostrovsky",
"Rafail",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0903.0035 | Hari Pyla | Hari K. Pyla, Bharath Ramesh, Calvin J. Ribbens and Srinidhi
Varadarajan | ScALPEL: A Scalable Adaptive Lightweight Performance Evaluation Library
for application performance monitoring | 10 pages, 4 figures, 2 tables | null | null | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As supercomputers continue to grow in scale and capabilities, it is becoming
increasingly difficult to isolate processor and system level causes of
performance degradation. Over the last several years, a significant number of
performance analysis and monitoring tools have been built/proposed. However,
these tools suffer from several important shortcomings, particularly in
distributed environments. In this paper we present ScALPEL, a Scalable Adaptive
Lightweight Performance Evaluation Library for application performance
monitoring at the functional level. Our approach provides several distinct
advantages. First, ScALPEL is portable across a wide variety of architectures,
and its ability to selectively monitor functions presents low run-time
overhead, enabling its use for large-scale production applications. Second, it
is run-time configurable, enabling both dynamic selection of functions to
profile as well as events of interest on a per function basis. Third, our
approach is transparent in that it requires no source code modifications.
Finally, ScALPEL is implemented as a pluggable unit by reusing existing
performance monitoring frameworks such as Perfmon and PAPI and extending them
to support both sequential and MPI applications.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 04:11:39 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Pyla",
"Hari K.",
""
],
[
"Ramesh",
"Bharath",
""
],
[
"Ribbens",
"Calvin J.",
""
],
[
"Varadarajan",
"Srinidhi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0903.0041 | Vit Niennattrakul | Vit Niennattrakul and Chotirat Ann Ratanamahatana | Learning DTW Global Constraint for Time Series Classification | The first runner up of Workshop and Challenge on Time Series
Classification held in conjunction with SIGKDD 2007. 8 pages, 5 figures | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | 1-Nearest Neighbor with the Dynamic Time Warping (DTW) distance is one of the
most effective classifiers on time series domain. Since the global constraint
has been introduced in speech community, many global constraint models have
been proposed including Sakoe-Chiba (S-C) band, Itakura Parallelogram, and
Ratanamahatana-Keogh (R-K) band. The R-K band is a general global constraint
model that can represent any global constraints with arbitrary shape and size
effectively. However, we need a good learning algorithm to discover the most
suitable set of R-K bands, and the current R-K band learning algorithm still
suffers from an 'overfitting' phenomenon. In this paper, we propose two new
learning algorithms, i.e., band boundary extraction algorithm and iterative
learning algorithm. The band boundary extraction is calculated from the bound
of all possible warping paths in each class, and the iterative learning is
adjusted from the original R-K band learning. We also use a Silhouette index, a
well-known clustering validation technique, as a heuristic function, and the
lower bound function, LB_Keogh, to enhance the prediction speed. Twenty
datasets, from the Workshop and Challenge on Time Series Classification, held
in conjunction of the SIGKDD 2007, are used to evaluate our approach.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 05:46:31 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Niennattrakul",
"Vit",
""
],
[
"Ratanamahatana",
"Chotirat Ann",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0050 | Abuzer Yakaryilmaz | Abuzer Yakaryilmaz and A. C. Cem Say | Succinctness of two-way probabilistic and quantum finite automata | A new version, 21 pages, latex | Discrete Mathematics & Theoretical Computer Science, Vol 12, No 4
(2010) | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that two-way probabilistic and quantum finite automata (2PFA's and
2QFA's) can be considerably more concise than both their one-way versions
(1PFA's and 1QFA's), and two-way nondeterministic finite automata (2NFA's). For
this purpose, we demonstrate several infinite families of regular languages
which can be recognized with some fixed probability greater than $ {1/2} $ by
just tuning the transition amplitudes of a 2QFA (and, in one case, a 2PFA) with
a constant number of states, whereas the sizes of the corresponding 1PFA's,
1QFA's and 2NFA's grow without bound. We also show that 2QFA's with mixed
states can support highly efficient probability amplification. The weakest
known model of computation where quantum computers recognize more languages
with bounded error than their classical counterparts is introduced.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 07:33:50 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Dec 2009 13:14:43 GMT"
}
]
| 2014-01-29T00:00:00 | [
[
"Yakaryilmaz",
"Abuzer",
""
],
[
"Say",
"A. C. Cem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.0051 | Fortis Alexandra Ms. | Petre Bucur, Lucian Luca | Non Linear System for a Veritable PID Substitute | 4 pages, exposed on 2nd "European Conference on Computer Sience and
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 21-24 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper deals with a non-linear system largely used in biology, which, in
certain conditions and for particular coefficient values, becomes linear, with
a linear diagram over a large range of time. It can be used as a veritable
regulator in systems' control
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 07:35:51 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Bucur",
"Petre",
""
],
[
"Luca",
"Lucian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.0053 | Fortis Alexandra Ms. | Alexandra Fortis, Florin Fortis | Workflow Patterns in Process Modeling | 14 pages, exposed on 2nd "European Conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 81-94 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes an introduction to one of the newest modelling methods,
an executable model based on workflows. We present the terminology for some
basic workflow patterns, as described in the Workflow Management Coalition
Terminology and Glossary.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 08:30:56 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Fortis",
"Alexandra",
""
],
[
"Fortis",
"Florin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.0054 | Fortis Alexandra Ms. | Alexandra Fortis, Alexandru Cicortas, Victoria Iordan | Considerations on Resource Usage in Exceptions and Failures in Workflows | 12 pages, exposed on 2nd "European Conference on Computer science and
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 69-80 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a description of some point of view of different authors
related to the failures and exceptions that appear in workflows, as a direct
consequence of unavailability of resources involved in the workflow. Each of
these interpretations is typical for a certain situation, depending on the
authors' interpretation of failures and exceptions in workflows modeling real
dynamical systems.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 08:40:04 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Fortis",
"Alexandra",
""
],
[
"Cicortas",
"Alexandru",
""
],
[
"Iordan",
"Victoria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.0061 | Matthias Hesse | Matthias Hesse, Jerome Lebrun, Lutz Lampe (UBC), Luc Deneire | Separable Implementation of L2-Orthogonal STC CPM with Fast Decoding | null | IEEE International Conference on Communications (2009) | 10.1109/ICC.2009.5199452 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an alternative separable implementation of
L2-orthogonal space-time codes (STC) for continuous phase modulation (CPM). In
this approach, we split the STC CPM transmitter into a single conventional CPM
modulator and a correction filter bank. While the CPM modulator is common to
all transmit antennas, the correction filter bank applies different correction
units to each antenna. Thereby desirable code properties as orthogonality and
full diversity are achievable with just a slightly larger bandwidth demand.
This new representation has three main advantages. First, it allows to easily
generalize the orthogonality condition to any arbitrary number of transmit
antennas. Second, for a quite general set of correction functions that we
detail, it can be proved that full diversity is achieved. Third, by separating
the modulation and correction steps inside the receiver, a simpler receiver can
be designed as a bank of data independent inverse correction filters followed
by a single CPM demodulator. Therefore, in this implementation, only one
correlation filter bank for the detection of all transmitted signals is
necessary. The decoding effort grows only linearly with the number of transmit
antennas.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 10:01:35 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Hesse",
"Matthias",
"",
"UBC"
],
[
"Lebrun",
"Jerome",
"",
"UBC"
],
[
"Lampe",
"Lutz",
"",
"UBC"
],
[
"Deneire",
"Luc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0064 | Xiang Yan | Xiang Yan, Benjamin Van Roy | Manipulation Robustness of Collaborative Filtering Systems | null | null | null | null | cs.LG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A collaborative filtering system recommends to users products that similar
users like. Collaborative filtering systems influence purchase decisions, and
hence have become targets of manipulation by unscrupulous vendors. We provide
theoretical and empirical results demonstrating that while common nearest
neighbor algorithms, which are widely used in commercial systems, can be highly
susceptible to manipulation, two classes of collaborative filtering algorithms
which we refer to as linear and asymptotically linear are relatively robust.
These results provide guidance for the design of future collaborative filtering
systems.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 11:17:12 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Apr 2009 04:18:30 GMT"
}
]
| 2009-04-19T00:00:00 | [
[
"Yan",
"Xiang",
""
],
[
"Van Roy",
"Benjamin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0069 | Pierre-Louis Cayrel | Pierre-Louis Cayrel, Philippe Gaborit, David Galindo and Marc Girault | Improved identity-based identification using correcting codes | 9 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a new identity-based identification scheme based on
error-correcting codes is proposed. Two well known code-based schemes are
combined : the signature scheme by Courtois, Finiasz and Sendrier and an
identification scheme by Stern. A proof of security for the scheme in the
Random Oracle Model is given.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 12:05:58 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Cayrel",
"Pierre-Louis",
""
],
[
"Gaborit",
"Philippe",
""
],
[
"Galindo",
"David",
""
],
[
"Girault",
"Marc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.0094 | Yi Su | Yi Su and Mihaela van der Schaar | Dynamic Conjectures in Random Access Networks Using Bio-inspired
Learning | 41 pages, 15 figures | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a conjecture-based distributed learning approach that
enables autonomous nodes to independently optimize their transmission
probabilities in random access networks. We model the interaction among
multiple self-interested nodes as a game. It is well-known that the Nash
equilibria in this game result in zero throughput for all the nodes if they
take myopic best-response, thereby leading to a network collapse. This paper
enables nodes to behave as intelligent entities which can proactively gather
information, form internal conjectures on how their competitors would react to
their actions, and update their beliefs according to their local observations.
In this way, nodes are capable to autonomously "learn" the behavior of their
competitors, optimize their own actions, and eventually cultivate reciprocity
in the random access network. To characterize the steady-state outcome, the
conjectural equilibrium is introduced. Inspired by the biological phenomena of
"derivative action" and "gradient dynamics", two distributed conjecture-based
action update mechanisms are proposed to stabilize the random access network.
The sufficient conditions that guarantee the proposed conjecture-based learning
algorithms to converge are derived. Moreover, it is shown that all the
achievable operating points in the throughput region are essentially stable
conjectural equilibria corresponding to different conjectures. We investigate
how the conjectural equilibrium can be selected in heterogeneous networks and
how the proposed methods can be extended to ad-hoc networks. Simulations verify
that the system performance significantly outperforms existing protocols, such
as IEEE 802.11 DCF protocol and the PMAC protocol, in terms of throughput,
fairness, convergence, and stability.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 20:42:05 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Dec 2009 23:58:27 GMT"
}
]
| 2009-12-09T00:00:00 | [
[
"Su",
"Yi",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.0096 | Manoj Panda | Manoj K. Panda and Anurag Kumar | Modeling Multi-Cell IEEE 802.11 WLANs with Application to Channel
Assignment | Technical Report, Indian Institute of Science, Bangalore, 17 pages | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a simple and accurate analytical model for multi-cell
infrastructure IEEE 802.11 WLANs. Our model applies if the cell radius, $R$, is
much smaller than the carrier sensing range, $R_{cs}$. We argue that, the
condition $R_{cs} >> R$ is likely to hold in a dense deployment of Access
Points (APs) where, for every client or station (STA), there is an AP very
close to the STA such that the STA can associate with the AP at a high physical
rate. We develop a scalable cell level model for such WLANs with saturated AP
and STA queues as well as for TCP-controlled long file downloads. The accuracy
of our model is demonstrated by comparison with ns-2 simulations. We also
demonstrate how our analytical model could be applied in conjunction with a
Learning Automata (LA) algorithm for optimal channel assignment. Based on the
insights provided by our analytical model, we propose a simple decentralized
algorithm which provides static channel assignments that are Nash equilibria in
pure strategies for the objective of maximizing normalized network throughput.
Our channel assignment algorithm requires neither any explicit knowledge of the
topology nor any message passing, and provides assignments in only as many
steps as there are channels. In contrast to prior work, our approach to channel
assignment is based on the throughput metric.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 02:29:37 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Mar 2009 17:31:07 GMT"
}
]
| 2009-03-14T00:00:00 | [
[
"Panda",
"Manoj K.",
""
],
[
"Kumar",
"Anurag",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0903.0099 | Mehrdad Taki Dr. | Mehrdad Taki and Farshad Lahouti | Spectral Efficiency Optimized Adaptive Transmission for Cognitive Radios
in an Interference Channel | accepted in ICC 2009 | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper, we consider a primary and a cognitive user transmitting over a
wireless fading interference channel. The primary user transmits with a
constant power and utilizes an adaptive modulation and coding (AMC) scheme
satisfying a bit error rate requirement. We propose a link adaptation scheme to
maximize the average spectral efficiency of the cognitive radio, while a
minimum required spectral efficiency for the primary user is provisioned. The
resulting problem is constrained to also satisfy a bit error rate requirement
and a power constraint for the cognitive link. The AMC mode selection and power
control at the cognitive transmitter is optimized based on the scaled signal to
noise plus interference ratio feedback of both links. The problem is then cast
as a nonlinear discrete optimization problem for which a fast and efficient
suboptimum solution is presented. We also present a scheme with rate adaption
and a constant power. An important characteristic of the proposed schemes is
that no negotiation between the users is required. Comparisons with underlay
and interweave approaches to cognitive radio with adaptive transmission
demonstrate the efficiency of the proposed solutions.
| [
{
"version": "v1",
"created": "Sat, 28 Feb 2009 19:39:14 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Taki",
"Mehrdad",
""
],
[
"Lahouti",
"Farshad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0116 | Siddhartha Sen | Bernhard Haeupler, Siddhartha Sen, and Robert E. Tarjan | Heaps Simplified | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The heap is a basic data structure used in a wide variety of applications,
including shortest path and minimum spanning tree algorithms. In this paper we
explore the design space of comparison-based, amortized-efficient heap
implementations. From a consideration of dynamic single-elimination
tournaments, we obtain the binomial queue, a classical heap implementation, in
a simple and natural way. We give four equivalent ways of representing heaps
arising from tournaments, and we obtain two new variants of binomial queues, a
one-tree version and a one-pass version. We extend the one-pass version to
support key decrease operations, obtaining the {\em rank-pairing heap}, or {\em
rp-heap}. Rank-pairing heaps combine the performance guarantees of Fibonacci
heaps with simplicity approaching that of pairing heaps. Like pairing heaps,
rank-pairing heaps consist of trees of arbitrary structure, but these trees are
combined by rank, not by list position, and rank changes, but not structural
changes, cascade during key decrease operations.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 00:19:10 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Haeupler",
"Bernhard",
""
],
[
"Sen",
"Siddhartha",
""
],
[
"Tarjan",
"Robert E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0126 | Beihang He | Beihang He | Villager's dilemma | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With deeper study of the Game Theory, some conditions of Prisoner's Dilemma
is no longer suitable of games in real life. So we try to develop a new
model-Villager's Dilemma which has more realistic conditions to stimulate the
process of game. It is emphasize that Prisoner's Dilemma is an exception which
is lack of universality and the importance of rules in the game. And it puts
forward that to let the rule maker take part in the game and specifies game
players can stop the game as they like. This essay describes the basic model,
the villager's dilemma (VD) and put some extended use of it, and points out the
importance of rules and the effect it has on the result of the game. It briefly
describes the disadvantage of Prisoner's Dilemma and advantage Villager's
Dilemma has. It summarizes the premise and scope of application of Villager's
Dilemma, and provides theory foundation for making rules for game and forecast
of the future of the game.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 07:32:21 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"He",
"Beihang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.0134 | Ali Pourmohammad | Ahmad Reza Eskandari, Ali Pourmohammad | Recognition of Regular Shapes in Satelite Images | This paper has been withdrawn | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the author ali pourmohammad.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 11:10:27 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Jan 2010 10:32:52 GMT"
}
]
| 2010-01-08T00:00:00 | [
[
"Eskandari",
"Ahmad Reza",
""
],
[
"Pourmohammad",
"Ali",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0903.0136 | Daniel Cosmin Porumbel | Daniel Cosmin Porumbel | A polynomial graph extension procedure for improving graph isomorphism
algorithms | A typo mistake! | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present in this short note a polynomial graph extension procedure that can
be used to improve any graph isomorphism algorithm. This construction
propagates new constraints from the isomorphism constraints of the input graphs
(denoted by $G(V,E)$ and $G'(V',E')$). Thus, information from the edge
structures of $G$ and $G'$ is "hashed" into the weighted edges of the extended
graphs. A bijective mapping is an isomorphism of the initial graphs if and only
if it is an isomorphism of the extended graphs. As such, the construction
enables the identification of pair of vertices $i\in V$ and $i'\in V'$ that can
not be mapped by any isomorphism $h^*:V \to V'$ (e.g. if the extended edges of
$i$ and $i'$ are different). A forbidding matrix $F$, that encodes all pairs of
incompatible mappings $(i,i')$, is constructed in order to be used by a
different algorithm. Moreover, tests on numerous graph classes show that the
matrix $F$ might leave only one compatible element for each $i \in V$.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 12:54:57 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Mar 2009 07:31:53 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Porumbel",
"Daniel Cosmin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0153 | Ralph Kretschmer | Patricio Galeas (1), Ralph Kretschmer (2), Bernd Freisleben (1) ((1)
University of Marburg, Germany, (2) Kretschmer Software, Siegen, Germany) | Document Relevance Evaluation via Term Distribution Analysis Using
Fourier Series Expansion | 9 pages, submitted to proceedings of JCDL-2009 | Proceedings of the 2009 Joint international Conference on Digital
Libraries (Austin, TX, USA, June 15 - 19, 2009). JCDL '09. ACM, New York, NY,
277-284 | 10.1145/1555400.1555446 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In addition to the frequency of terms in a document collection, the
distribution of terms plays an important role in determining the relevance of
documents for a given search query. In this paper, term distribution analysis
using Fourier series expansion as a novel approach for calculating an abstract
representation of term positions in a document corpus is introduced. Based on
this approach, two methods for improving the evaluation of document relevance
are proposed: (a) a function-based ranking optimization representing a user
defined document region, and (b) a query expansion technique based on
overlapping the term distributions in the top-ranked documents. Experimental
results demonstrate the effectiveness of the proposed approach in providing new
possibilities for optimizing the retrieval process.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 17:08:17 GMT"
}
]
| 2009-07-18T00:00:00 | [
[
"Galeas",
"Patricio",
""
],
[
"Kretschmer",
"Ralph",
""
],
[
"Freisleben",
"Bernd",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.0173 | Alexander Gutfraind | Alexander Gutfraind and Aric Hagberg and Feng Pan | Optimal Interdiction of Unreactive Markovian Evaders | Accepted at the Sixth International Conference on integration of AI
and OR Techniques in Constraint Programming for Combinatorial Optimization
Problems (CPAIOR 2009) | CPAIOR 2009 | null | LA-UR-09-00560 | cs.DM cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The interdiction problem arises in a variety of areas including military
logistics, infectious disease control, and counter-terrorism. In the typical
formulation of network interdiction, the task of the interdictor is to find a
set of edges in a weighted network such that the removal of those edges would
maximally increase the cost to an evader of traveling on a path through the
network.
Our work is motivated by cases in which the evader has incomplete information
about the network or lacks planning time or computational power, e.g. when
authorities set up roadblocks to catch bank robbers, the criminals do not know
all the roadblock locations or the best path to use for their escape.
We introduce a model of network interdiction in which the motion of one or
more evaders is described by Markov processes and the evaders are assumed not
to react to interdiction decisions. The interdiction objective is to find an
edge set of size B, that maximizes the probability of capturing the evaders.
We prove that similar to the standard least-cost formulation for
deterministic motion this interdiction problem is also NP-hard. But unlike that
problem our interdiction problem is submodular and the optimal solution can be
approximated within 1-1/e using a greedy algorithm. Additionally, we exploit
submodularity through a priority evaluation strategy that eliminates the linear
complexity scaling in the number of network edges and speeds up the solution by
orders of magnitude. Taken together the results bring closer the goal of
finding realistic solutions to the interdiction problem on global-scale
networks.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 20:10:51 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Gutfraind",
"Alexander",
""
],
[
"Hagberg",
"Aric",
""
],
[
"Pan",
"Feng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0174 | Zhe Chen | Zhe Chen, Dunwei Wen | Accelerating and Evaluation of Syntactic Parsing in Natural Language
Question Answering Systems | 7 pages, International Conference on Artificial Intelligence
(ICAI'07) | null | null | null | cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the development of Natural Language Processing (NLP), more and more
systems want to adopt NLP in User Interface Module to process user input, in
order to communicate with user in a natural way. However, this raises a speed
problem. That is, if NLP module can not process sentences in durable time
delay, users will never use the system. As a result, systems which are strict
with processing time, such as dialogue systems, web search systems, automatic
customer service systems, especially real-time systems, have to abandon NLP
module in order to get a faster system response. This paper aims to solve the
speed problem. In this paper, at first, the construction of a syntactic parser
which is based on corpus machine learning and statistics model is introduced,
and then a speed problem analysis is performed on the parser and its
algorithms. Based on the analysis, two accelerating methods, Compressed POS Set
and Syntactic Patterns Pruning, are proposed, which can effectively improve the
time efficiency of parsing in NLP module. To evaluate different parameters in
the accelerating algorithms, two new factors, PT and RT, are introduced and
explained in detail. Experiments are also completed to prove and test these
methods, which will surely contribute to the application of NLP.
| [
{
"version": "v1",
"created": "Sun, 1 Mar 2009 20:39:52 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Mar 2009 11:37:36 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Chen",
"Zhe",
""
],
[
"Wen",
"Dunwei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0903.0194 | Marko A. Rodriguez | Marko A. Rodriguez | A Graph Analysis of the Linked Data Cloud | null | null | null | KRS-2009-01 | cs.CY cs.AI cs.SC | http://creativecommons.org/licenses/by/3.0/ | The Linked Data community is focused on integrating Resource Description
Framework (RDF) data sets into a single unified representation known as the Web
of Data. The Web of Data can be traversed by both man and machine and shows
promise as the \textit{de facto} standard for integrating data world wide much
like the World Wide Web is the \textit{de facto} standard for integrating
documents. On February 27$^\text{th}$ of 2009, an updated Linked Data cloud
visualization was made publicly available. This visualization represents the
various RDF data sets currently in the Linked Data cloud and their interlinking
relationships. For the purposes of this article, this visual representation was
manually transformed into a directed graph and analyzed.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 04:47:28 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0903.0197 | Sean Cleary | Sean Cleary and Katherine St. John | Rotation Distance is Fixed-Parameter Tractable | 9 pages, 3 figures | Inform. Process. Lett. 109 (2009), no. 16, 918-922 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rotation distance between trees measures the number of simple operations it
takes to transform one tree into another. There are no known polynomial-time
algorithms for computing rotation distance. In the case of ordered rooted
trees, we show that the rotation distance between two ordered trees is
fixed-parameter tractable, in the parameter, k, the rotation distance. The
proof relies on the kernalization of the initial trees to trees with size
bounded by 7k.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 01:36:50 GMT"
}
]
| 2018-03-19T00:00:00 | [
[
"Cleary",
"Sean",
""
],
[
"John",
"Katherine St.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0199 | Sean Cleary | Sean Cleary and Katherine St. John | A Linear-Time Approximation Algorithm for Rotation Distance | 5 pages, 1 figure | J. Graph Algorithms Appl. 14 (2010), no. 2, 385-390 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rotation distance between rooted binary trees measures the number of simple
operations it takes to transform one tree into another. There are no known
polynomial-time algorithms for computing rotation distance. We give an
efficient, linear-time approximation algorithm, which estimates the rotation
distance, within a provable factor of 2, between ordered rooted binary trees. .
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 01:40:14 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Jul 2009 19:32:46 GMT"
}
]
| 2018-03-19T00:00:00 | [
[
"Cleary",
"Sean",
""
],
[
"John",
"Katherine St.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0200 | Marko A. Rodriguez | Marko A. Rodriguez and Alberto Pepe | Faith in the Algorithm, Part 1: Beyond the Turing Test | null | Proceedings of the AISB Symposium on Computing and Philosophy, The
Society for the Study of Artificial Intelligence and Simulation of Behaviour,
Edinburgh, Scotland, April 2009. | null | LA-UR-09-00052 | cs.CY cs.AI | http://creativecommons.org/licenses/publicdomain/ | Since the Turing test was first proposed by Alan Turing in 1950, the primary
goal of artificial intelligence has been predicated on the ability for
computers to imitate human behavior. However, the majority of uses for the
computer can be said to fall outside the domain of human abilities and it is
exactly outside of this domain where computers have demonstrated their greatest
contribution to intelligence. Another goal for artificial intelligence is one
that is not predicated on human mimicry, but instead, on human amplification.
This article surveys various systems that contribute to the advancement of
human and social intelligence.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 02:01:40 GMT"
}
]
| 2010-02-16T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Pepe",
"Alberto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0207 | Fangwen Fu | Fangwen Fu, Mihaela van der Schaar | A Systematic Framework for Dynamically Optimizing Multi-User Wireless
Video Transmission | 36 pages, 13 figures | null | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we formulate the collaborative multi-user wireless video
transmission problem as a multi-user Markov decision process (MUMDP) by
explicitly considering the users' heterogeneous video traffic characteristics,
time-varying network conditions and the resulting dynamic coupling between the
wireless users. These environment dynamics are often ignored in existing
multi-user video transmission solutions. To comply with the decentralized
nature of wireless networks, we propose to decompose the MUMDP into local MDPs
using Lagrangian relaxation. Unlike in conventional multi-user video
transmission solutions stemming from the network utility maximization
framework, the proposed decomposition enables each wireless user to
individually solve its own dynamic cross-layer optimization (i.e. the local
MDP) and the network coordinator to update the Lagrangian multipliers (i.e.
resource prices) based on not only current, but also future resource needs of
all users, such that the long-term video quality of all users is maximized.
However, solving the MUMDP requires statistical knowledge of the experienced
environment dynamics, which is often unavailable before transmission time. To
overcome this obstacle, we then propose a novel online learning algorithm,
which allows the wireless users to update their policies in multiple states
during one time slot. This is different from conventional learning solutions,
which often update one state per time slot. The proposed learning algorithm can
significantly improve the learning performance, thereby dramatically improving
the video quality experienced by the wireless users over time. Our simulation
results demonstrate the efficiency of the proposed MUMDP framework as compared
to conventional multi-user video transmission solutions.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 04:49:27 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Fu",
"Fangwen",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0903.0211 | Nina Narodytska | Christian Bessiere, Emmanuel Hebrard, Brahim Hnich, Zeynep Kiziltan,
Toby Walsh | Range and Roots: Two Common Patterns for Specifying and Propagating
Counting and Occurrence Constraints | 41 pages, 7 figures | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose Range and Roots which are two common patterns useful for
specifying a wide range of counting and occurrence constraints. We design
specialised propagation algorithms for these two patterns. Counting and
occurrence constraints specified using these patterns thus directly inherit a
propagation algorithm. To illustrate the capabilities of the Range and Roots
constraints, we specify a number of global constraints taken from the
literature. Preliminary experiments demonstrate that propagating counting and
occurrence constraints using these two patterns leads to a small loss in
performance when compared to specialised global constraints and is competitive
with alternative decompositions using elementary constraints.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 05:58:11 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Bessiere",
"Christian",
""
],
[
"Hebrard",
"Emmanuel",
""
],
[
"Hnich",
"Brahim",
""
],
[
"Kiziltan",
"Zeynep",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0276 | Maziar Nekovee | Maziar Nekovee | Impact of Cognitive Radio on Future Management of Spectrum | Invited Paper, presented at the International Conference on Cognitive
Radio Oriented Wireless Communications and Networks (CrownCom), May 2008,
Singapore | null | null | null | cs.AI cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cognitive radio is a breakthrough technology which is expected to have a
profound impact on the way radio spectrum will be accessed, managed and shared
in the future. In this paper I examine some of the implications of cognitive
radio for future management of spectrum. Both a near-term view involving the
opportunistic spectrum access model and a longer-term view involving a
self-regulating dynamic spectrum access model within a society of cognitive
radios are discussed.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 12:27:12 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Nekovee",
"Maziar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.0279 | Jean Dezert | Jean Dezert (ONERA), Florentin Smarandache | An introduction to DSmT | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The management and combination of uncertain, imprecise, fuzzy and even
paradoxical or high conflicting sources of information has always been, and
still remains today, of primal importance for the development of reliable
modern information systems involving artificial reasoning. In this
introduction, we present a survey of our recent theory of plausible and
paradoxical reasoning, known as Dezert-Smarandache Theory (DSmT), developed for
dealing with imprecise, uncertain and conflicting sources of information. We
focus our presentation on the foundations of DSmT and on its most important
rules of combination, rather than on browsing specific applications of DSmT
available in literature. Several simple examples are given throughout this
presentation to show the efficiency and the generality of this new approach.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 12:31:00 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Dezert",
"Jean",
"",
"ONERA"
],
[
"Smarandache",
"Florentin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0302 | Dejan Spasov | Dejan Spasov, Marjan Gusev | Asymptotic Improvement of the Binary Gilbert-Varshamov Bound on the Code
Rate | This submission has been withdrawn by author [arXiv admin] | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We compute the code parameters for binary linear codes obtained by greedy
constructing the parity check matrix. Then we show that these codes improve the
Gilbert-Varshamov (GV) bound on the code size and rate. This result counter
proves the conjecture on the asymptotical exactness of the binary GV bound.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 14:13:48 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Mar 2009 22:09:22 GMT"
}
]
| 2009-03-12T00:00:00 | [
[
"Spasov",
"Dejan",
""
],
[
"Gusev",
"Marjan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0307 | Satish Babu Korada | Satish Babu Korada and Rudiger Urbanke | Polar Codes are Optimal for Lossy Source Coding | 15 pages, submitted to Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider lossy source compression of a binary symmetric source using polar
codes and the low-complexity successive encoding algorithm. It was recently
shown by Arikan that polar codes achieve the capacity of arbitrary symmetric
binary-input discrete memoryless channels under a successive decoding strategy.
We show the equivalent result for lossy source compression, i.e., we show that
this combination achieves the rate-distortion bound for a binary symmetric
source. We further show the optimality of polar codes for various problems
including the binary Wyner-Ziv and the binary Gelfand-Pinsker problem
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 14:32:18 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Korada",
"Satish Babu",
""
],
[
"Urbanke",
"Rudiger",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0308 | Pat Morin | Joachim Gudmundsson, Pat Morin, and Michiel Smid | Algorithms for Marketing-Mix Optimization | 12 pages, 4 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algorithms for determining quality/cost/price tradeoffs in saturated markets
are considered. A product is modeled by $d$ real-valued qualities whose sum
determines the unit cost of producing the product. This leads to the following
optimization problem: given a set of $n$ customers, each of whom has certain
minimum quality requirements and a maximum price they are willing to pay,
design a new product and select a price for that product in order to maximize
the resulting profit. An $O(n\log n)$ time algorithm is given for the case,
$d=1$, of linear products, and $O(n(\log n)^{d+1})$ time approximation
algorithms are given for products with any constant number, $d$, of qualities.
To achieve the latter result, an $O(nk^{d-1})$ bound on the complexity of an
arrangement of homothetic simplices in $\R^d$ is given, where $k$ is the
maximum number of simplices that all contain a single points.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 14:38:09 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Gudmundsson",
"Joachim",
""
],
[
"Morin",
"Pat",
""
],
[
"Smid",
"Michiel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0903.0314 | Marvin Schiller | Marvin Schiller and Christoph Benzmueller | Granularity-Adaptive Proof Presentation | Extended Version. This SEKI Working-Paper refines and extends the
following publication: Granularity-Adaptive Proof Presentation. Proceedings
of the 14th International Conference on Artificial Intelligence in Education;
Brighton, UK, 2009. Submitted | null | null | SEKI Working-Paper SWP-2009-01 | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When mathematicians present proofs they usually adapt their explanations to
their didactic goals and to the (assumed) knowledge of their addressees. Modern
automated theorem provers, in contrast, present proofs usually at a fixed level
of detail (also called granularity). Often these presentations are neither
intended nor suitable for human use. A challenge therefore is to develop user-
and goal-adaptive proof presentation techniques that obey common mathematical
practice. We present a flexible and adaptive approach to proof presentation
that exploits machine learning techniques to extract a model of the specific
granularity of proof examples and employs this model for the automated
generation of further proofs at an adapted level of granularity.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 15:52:15 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Mar 2009 13:55:04 GMT"
},
{
"version": "v3",
"created": "Tue, 12 May 2009 19:43:59 GMT"
},
{
"version": "v4",
"created": "Mon, 25 May 2009 21:27:30 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Schiller",
"Marvin",
""
],
[
"Benzmueller",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0353 | Rustam Tagiew | Rustam Tagiew | General Game Management Agent | null | null | null | null | cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The task of managing general game playing in a multi-agent system is the
problem addressed in this paper. It is considered to be done by an agent. There
are many reasons for constructing such an agent, called general game management
agent. This agent manages strategic interactions between other agents -
players, natural or also artificial. The agent records the interaction for
further benchmarking and analysis. He can also be used for a kind of restricted
communications. His behavior is defined by a game description written in a
logic-based language. The language, we present for this application, is more
expressive than the language GDL, which is already used for such purposes. Our
language can represent imperfect information and time dependent elements of a
game. Time dependent elements like delays and timeouts are of crucial
importance for interactions between players with bounded processing power like
humans. We provide examples to show the feasibility of our approach. A way for
game theoretical solving of an interaction description in our language is
considered as future work.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 18:48:40 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Tagiew",
"Rustam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0903.0367 | Yury Makarychev | Konstantin Makarychev and Yury Makarychev | How to Play Unique Games on Expanders | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note we improve a recent result by Arora, Khot, Kolla, Steurer,
Tulsiani, and Vishnoi on solving the Unique Games problem on expanders.
Given a $(1-\varepsilon)$-satisfiable instance of Unique Games with the
constraint graph $G$, our algorithm finds an assignment satisfying at least a
$1- C \varepsilon/h_G$ fraction of all constraints if $\varepsilon < c
\lambda_G$ where $h_G$ is the edge expansion of $G$, $\lambda_G$ is the second
smallest eigenvalue of the Laplacian of $G$, and $C$ and $c$ are some absolute
constants.
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 20:40:53 GMT"
}
]
| 2009-03-03T00:00:00 | [
[
"Makarychev",
"Konstantin",
""
],
[
"Makarychev",
"Yury",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0391 | Yuriy Arbitman | Yuriy Arbitman, Moni Naor and Gil Segev | De-amortized Cuckoo Hashing: Provable Worst-Case Performance and
Experimental Results | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cuckoo hashing is a highly practical dynamic dictionary: it provides
amortized constant insertion time, worst case constant deletion time and lookup
time, and good memory utilization. However, with a noticeable probability
during the insertion of n elements some insertion requires \Omega(log n) time.
Whereas such an amortized guarantee may be suitable for some applications, in
other applications (such as high-performance routing) this is highly
undesirable.
Recently, Kirsch and Mitzenmacher (Allerton '07) proposed a de-amortization
of cuckoo hashing using various queueing techniques that preserve its
attractive properties. Kirsch and Mitzenmacher demonstrated a significant
improvement to the worst case performance of cuckoo hashing via experimental
results, but they left open the problem of constructing a scheme with provable
properties.
In this work we follow Kirsch and Mitzenmacher and present a de-amortization
of cuckoo hashing that provably guarantees constant worst case operations.
Specifically, for any sequence of polynomially many operations, with
overwhelming probability over the randomness of the initialization phase, each
operation is performed in constant time. Our theoretical analysis and
experimental results indicate that the scheme is highly efficient, and provides
a practical alternative to the only other known dynamic dictionary with such
worst case guarantees, due to Dietzfelbinger and Meyer auf der Heide (ICALP
'90).
| [
{
"version": "v1",
"created": "Mon, 2 Mar 2009 21:21:47 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Arbitman",
"Yuriy",
""
],
[
"Naor",
"Moni",
""
],
[
"Segev",
"Gil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0419 | Gourab Ghoshal | Gourab Ghoshal, Vinko Zlatic, Guido Caldarelli, and M. E. J. Newman | Random hypergraphs and their applications | 11 pages, 7 figures | Phys. Rev. E 79, 066118 (2009) | 10.1103/PhysRevE.79.066118 | null | physics.soc-ph cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last few years we have witnessed the emergence, primarily in on-line
communities, of new types of social networks that require for their
representation more complex graph structures than have been employed in the
past. One example is the folksonomy, a tripartite structure of users,
resources, and tags -- labels collaboratively applied by the users to the
resources in order to impart meaningful structure on an otherwise
undifferentiated database. Here we propose a mathematical model of such
tripartite structures which represents them as random hypergraphs. We show that
it is possible to calculate many properties of this model exactly in the limit
of large network size and we compare the results against observations of a real
folksonomy, that of the on-line photography web site Flickr. We show that in
some cases the model matches the properties of the observed network well, while
in others there are significant differences, which we find to be attributable
to the practice of multiple tagging, i.e., the application by a single user of
many tags to one resource, or one tag to many resources.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 03:38:09 GMT"
}
]
| 2009-08-13T00:00:00 | [
[
"Ghoshal",
"Gourab",
""
],
[
"Zlatic",
"Vinko",
""
],
[
"Caldarelli",
"Guido",
""
],
[
"Newman",
"M. E. J.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0903.0422 | Hirotaka Ono | Kazuhisa Makino and Hirotaka Ono | Deductive Inference for the Interiors and Exteriors of Horn Theories | 20 pages, 1 figure, An extended abstract of this article was
presented in Proceedings of Algorithms and Computation, 19th International
Symposium (ISAAC 2008), Lecture Notes in Computer Science, Vol. 5369, pp.
390-401, Springer-Verlag Berlin Heidelberg, 2008 | null | null | null | cs.AI cs.CC cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the deductive inference for the interiors and
exteriors of Horn knowledge bases, where the interiors and exteriors were
introduced by Makino and Ibaraki to study stability properties of knowledge
bases. We present a linear time algorithm for the deduction for the interiors
and show that it is co-NP-complete for the deduction for the exteriors. Under
model-based representation, we show that the deduction problem for interiors is
NP-complete while the one for exteriors is co-NP-complete. As for Horn
envelopes of the exteriors, we show that it is linearly solvable under
model-based representation, while it is co-NP-complete under formula-based
representation. We also discuss the polynomially solvable cases for all the
intractable problems.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 01:58:52 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Makino",
"Kazuhisa",
""
],
[
"Ono",
"Hirotaka",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.0443 | Xiangyun Zhou | Xiangyun Zhou, Parastoo Sadeghi, Tharaka A. Lamahewa and Salman
Durrani | Design Guidelines for Training-based MIMO Systems with Feedback | Submitted to IEEE Trans. Signal Processing | IEEE Transactions on Signal Processing, vol. 57, no. 10, pp.
4014-4026, Oct. 2009 | 10.1109/TSP.2009.2023930 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the optimal training and data transmission strategies
for block fading multiple-input multiple-output (MIMO) systems with feedback.
We consider both the channel gain feedback (CGF) system and the channel
covariance feedback (CCF) system. Using an accurate capacity lower bound as a
figure of merit, we investigate the optimization problems on the temporal power
allocation to training and data transmission as well as the training length.
For CGF systems without feedback delay, we prove that the optimal solutions
coincide with those for non-feedback systems. Moreover, we show that these
solutions stay nearly optimal even in the presence of feedback delay. This
finding is important for practical MIMO training design. For CCF systems, the
optimal training length can be less than the number of transmit antennas, which
is verified through numerical analysis. Taking this fact into account, we
propose a simple yet near optimal transmission strategy for CCF systems, and
derive the optimal temporal power allocation over pilot and data transmission.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 04:45:50 GMT"
}
]
| 2013-06-27T00:00:00 | [
[
"Zhou",
"Xiangyun",
""
],
[
"Sadeghi",
"Parastoo",
""
],
[
"Lamahewa",
"Tharaka A.",
""
],
[
"Durrani",
"Salman",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0445 | Salah A. Aly | Salah A. Aly, Zhenning Kong, Emina Soljanin | Raptor Codes Based Distributed Storage Algorithms for Wireless Sensor
Networks | published in IEEE ISIT 2008 | null | 10.1109/ISIT.2008.4595350 | null | cs.IT cs.DS cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a distributed storage problem in a large-scale wireless sensor
network with $n$ nodes among which $k$ acquire (sense) independent data. The
goal is to disseminate the acquired information throughout the network so that
each of the $n$ sensors stores one possibly coded packet and the original $k$
data packets can be recovered later in a computationally simple way from any
$(1+\epsilon)k$ of nodes for some small $\epsilon>0$. We propose two Raptor
codes based distributed storage algorithms for solving this problem. In the
first algorithm, all the sensors have the knowledge of $n$ and $k$. In the
second one, we assume that no sensor has such global information.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 06:04:30 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Kong",
"Zhenning",
""
],
[
"Soljanin",
"Emina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0460 | Toby Walsh | Alan Frisch, Brahim Hnich, Zeynep Kiziltan, Ian Miguel, Toby Walsh | Filtering Algorithms for the Multiset Ordering Constraint | null | Artificial Intelligence, 173 (2), 299-328, 2009 | 10.1016/j.artint.2008.11.001 | null | cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constraint programming (CP) has been used with great success to tackle a wide
variety of constraint satisfaction problems which are computationally
intractable in general. Global constraints are one of the important factors
behind the success of CP. In this paper, we study a new global constraint, the
multiset ordering constraint, which is shown to be useful in symmetry breaking
and searching for leximin optimal solutions in CP. We propose efficient and
effective filtering algorithms for propagating this global constraint. We show
that the algorithms are sound and complete and we discuss possible extensions.
We also consider alternative propagation methods based on existing constraints
in CP toolkits. Our experimental results on a number of benchmark problems
demonstrate that propagating the multiset ordering constraint via a dedicated
algorithm can be very beneficial.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 08:04:42 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Frisch",
"Alan",
""
],
[
"Hnich",
"Brahim",
""
],
[
"Kiziltan",
"Zeynep",
""
],
[
"Miguel",
"Ian",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0465 | Toby Walsh | Toby Walsh | Breaking Value Symmetry | Proceedings of the Twenty-Third AAAI Conference on Artificial
Intelligence | AAAI 2008: 1585-1588 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Symmetry is an important factor in solving many constraint satisfaction
problems. One common type of symmetry is when we have symmetric values. In a
recent series of papers, we have studied methods to break value symmetries. Our
results identify computational limits on eliminating value symmetry. For
instance, we prove that pruning all symmetric values is NP-hard in general.
Nevertheless, experiments show that much value symmetry can be broken in
practice. These results may be useful to researchers in planning, scheduling
and other areas as value symmetry occurs in many different domains.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 08:36:47 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0467 | Toby Walsh | Christian Bessiere and Emmanuel Hebrard and Brahim Hnich and Zeynep
Kiziltan and Toby Walsh | The Parameterized Complexity of Global Constraints | Proceedings of the Twenty-Third AAAI Conference on Artificial
Intelligence | AAAI-2008, 235-240, 2008 | null | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We argue that parameterized complexity is a useful tool with which to study
global constraints. In particular, we show that many global constraints which
are intractable to propagate completely have natural parameters which make them
fixed-parameter tractable and which are easy to compute. This tractability
tends either to be the result of a simple dynamic program or of a decomposition
which has a strong backdoor of bounded size. This strong backdoor is often a
cycle cutset. We also show that parameterized complexity can be used to study
other aspects of constraint programming like symmetry breaking. For instance,
we prove that value symmetry is fixed-parameter tractable to break in the
number of symmetries. Finally, we argue that parameterized complexity can be
used to derive results about the approximability of constraint propagation.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 08:44:47 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Bessiere",
"Christian",
""
],
[
"Hebrard",
"Emmanuel",
""
],
[
"Hnich",
"Brahim",
""
],
[
"Kiziltan",
"Zeynep",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.0470 | Toby Walsh | Claude-Guy Quimper and Toby Walsh | Decompositions of Grammar Constraints | Proceedings of the Twenty-Third AAAI Conference on Artificial
Intelligence | AAAI 2008: 1567-1570 | null | null | cs.AI cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A wide range of constraints can be compactly specified using automata or
formal languages. In a sequence of recent papers, we have shown that an
effective means to reason with such specifications is to decompose them into
primitive constraints. We can then, for instance, use state of the art SAT
solvers and profit from their advanced features like fast unit propagation,
clause learning, and conflict-based search heuristics. This approach holds
promise for solving combinatorial problems in scheduling, rostering, and
configuration, as well as problems in more diverse areas like bioinformatics,
software testing and natural language processing. In addition, decomposition
may be an effective method to propagate other global constraints.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 08:53:03 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Quimper",
"Claude-Guy",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0903.0471 | Toby Walsh | Christian Bessiere, Emmanuel Hebrard, Brahim Hnich, Zeynep Kiziltan,
Toby Walsh | SLIDE: A Useful Special Case of the CARDPATH Constraint | 18th European Conference on Artificial Intelligence | ECAI 2008: 475-479 | 10.3233/978-1-58603-891-5-475 | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the CardPath constraint. This ensures a given constraint holds a
number of times down a sequence of variables. We show that SLIDE, a special
case of CardPath where the slid constraint must hold always, can be used to
encode a wide range of sliding sequence constraints including CardPath itself.
We consider how to propagate SLIDE and provide a complete propagator for
CardPath. Since propagation is NP-hard in general, we identify special cases
where propagation takes polynomial time. Our experiments demonstrate that using
SLIDE to encode global constraints can be as efficient and effective as
specialised propagators.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 09:06:22 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Bessiere",
"Christian",
""
],
[
"Hebrard",
"Emmanuel",
""
],
[
"Hnich",
"Brahim",
""
],
[
"Kiziltan",
"Zeynep",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.0475 | Nina Narodytska | George Katsirelos, Nina Narodytska, Toby Walsh | Reformulating Global Grammar Constraints | 15 pages, 4 figures | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An attractive mechanism to specify global constraints in rostering and other
domains is via formal languages. For instance, the Regular and Grammar
constraints specify constraints in terms of the languages accepted by an
automaton and a context-free grammar respectively. Taking advantage of the
fixed length of the constraint, we give an algorithm to transform a
context-free grammar into an automaton. We then study the use of minimization
techniques to reduce the size of such automata and speed up propagation. We
show that minimizing such automata after they have been unfolded and domains
initially reduced can give automata that are more compact than minimizing
before unfolding and reducing. Experimental results show that such
transformations can improve the size of rostering problems that we can 'model
and run'.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 09:31:41 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Katsirelos",
"George",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0479 | Nina Narodytska | George Katsirelos, Nina Narodytska, Toby Walsh | Combining Symmetry Breaking and Global Constraints | 15 pages, 4 figures | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new family of constraints which combine together lexicographical
ordering constraints for symmetry breaking with other common global
constraints. We give a general purpose propagator for this family of
constraints, and show how to improve its complexity by exploiting properties of
the included global constraints.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 09:52:01 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Katsirelos",
"George",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0519 | Fortis Alexandra Ms. | Tiberiu Marius Karnyanszky, Laurentiu Dan Lacrama, Lucian Luca, Ioana
Iacob | Teacher's Evaluation - a Component of Quality Assessment System | 6 pages, exposed on 2nd "European Conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 107 - 112 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the most important activities to increase the importance and the
responsibility of the higher education is the quality management, assessment
and evaluation. Starting from 2006, a national mechanism was created in Romania
and all the educational institutions have to apply a concrete algorithm to
ensure the internal evaluation, the external evaluation and, the most
important, to increase the quality of the educational process. This paper
presents the implementation of the quality assessment in "Tibiscus" University
of Timisoara, particularly at the Faculty of Computers and Applied Computer
Science.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 12:50:05 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Karnyanszky",
"Tiberiu Marius",
""
],
[
"Lacrama",
"Laurentiu Dan",
""
],
[
"Luca",
"Lucian",
""
],
[
"Iacob",
"Ioana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0903.0520 | Francesco Pasquale | Andrea E.F. Clementi, Francesco Pasquale, and Riccardo Silvestri | MANETS: High mobility can make up for low transmission power | 18 pages | null | null | null | cs.DM cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a Mobile Ad-hoc NETworks (MANET) formed by "n" nodes that move
independently at random over a finite square region of the plane. Nodes
exchange data if they are at distance at most "r" within each other, where r>0
is the node transmission radius. The "flooding time" is the number of time
steps required to broadcast a message from a source node to every node of the
network. Flooding time is an important measure of the speed of information
spreading in dynamic networks.
We derive a nearly-tight upper bound on the flooding time which is a
decreasing function of the maximal "velocity" of the nodes. It turns out that,
when the node velocity is sufficiently high, even if the node transmission
radius "r" is far below the "connectivity threshold", the flooding time does
not asymptotically depend on "r". This implies that flooding can be very fast
even though every "snapshot" (i.e. the static random geometric graph at any
fixed time) of the MANET is fully disconnected. Data reach all nodes quickly
despite these ones use very low transmission power.
Our result is the first analytical evidence of the fact that high, random
node mobility strongly speed-up information spreading and, at the same time,
let nodes save energy.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 12:50:27 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Clementi",
"Andrea E. F.",
""
],
[
"Pasquale",
"Francesco",
""
],
[
"Silvestri",
"Riccardo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0903.0538 | Fortis Alexandra Ms. | Dan Laurentiu Lacrama, Florin Alexa, Adriana Balta | Real-time Texture Error Detection | 8 pages, exposed on 2nd "European conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 127-134 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper advocates an improved solution for real-time error detection of
texture errors that occurs in the production process in textile industry. The
research is focused on the mono-color products with 3D texture model (Jaquard
fabrics). This is a more difficult task than, for example, 2D multicolor
textures.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 14:08:24 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Lacrama",
"Dan Laurentiu",
""
],
[
"Alexa",
"Florin",
""
],
[
"Balta",
"Adriana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.