id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0903.0544 | Robin Moser | Robin A. Moser, G\'abor Tardos | A constructive proof of the general Lovasz Local Lemma | 8 pages | null | null | null | cs.DS cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Lovasz Local Lemma [EL75] is a powerful tool to non-constructively prove
the existence of combinatorial objects meeting a prescribed collection of
criteria. In his breakthrough paper [Bec91], Beck demonstrated that a
constructive variant can be given under certain more restrictive conditions.
Simplifications of his procedure and relaxations of its restrictions were
subsequently exhibited in several publications [Alo91, MR98, CS00, Mos06,
Sri08, Mos08]. In [Mos09], a constructive proof was presented that works under
negligible restrictions, formulated in terms of the Bounded Occurrence
Satisfiability problem. In the present paper, we reformulate and improve upon
these findings so as to directly apply to almost all known applications of the
general Local Lemma.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 14:42:01 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Mar 2009 21:10:07 GMT"
},
{
"version": "v3",
"created": "Wed, 20 May 2009 23:30:04 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Moser",
"Robin A.",
""
],
[
"Tardos",
"Gábor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.0548 | Li Chia Choo | Li-Chia Choo and Kai-Kit Wong | On the 3-Receiver Broadcast Channel with Degraded Message Sets and
Confidential Messages | Revised version submiitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, bounds to the rate-equivocation region for the general
3-receiver broadcast channel (BC) with degraded message sets, are presented for
confidential messages to be kept secret from one of the receivers. This model
is more general than the 2-receiver BCs with confidential messages with an
external wiretapper, and the recently studied 3-receiver degraded BCs with
confidential messages, since in the model studied in this paper, the conditions
on the receivers are general and the wiretapper receives the common message.
Wyner's code partitioning combined with double-binning is used to show the
achievable rate tuples. Error probability analysis and equivocation calculation
are also provided. The secure coding scheme is sufficient to provide security
for the 3-receiver BC with 2 or 3 degraded message sets, for the scenarios: (i)
3 degraded message sets, where the first confidential message is sent to
receivers 1 and 2 and the second confidential message is sent to receiver 1,
(ii) 2 degraded message sets, where one confidential message is sent to
receiver 1, and (iii) 2 degraded message sets, where one confidential message
is sent to receivers 1 and 2. The proof for the outer bound is shown for the
cases where receiver 1 is more capable than the wiretap receiver 3, for the
first two scenarios. Under the condition that both receivers 1 and 2 are less
noisy than the wiretap receiver 3, the inner and outer bounds coincide, giving
the rate-equivocation region for (iii). In addition, a new outer bound for the
general 3-receiver BC with 3 degraded messages is obtained.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 14:53:11 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Oct 2009 16:10:28 GMT"
}
]
| 2009-10-27T00:00:00 | [
[
"Choo",
"Li-Chia",
""
],
[
"Wong",
"Kai-Kit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0566 | Gilles Z\'emor | Jean-Pierre Tillich and Gilles Zemor | Quantum LDPC codes with positive rate and minimum distance proportional
to n^{1/2} | 21 pages | IEEE Trans. Inform. Theory. Vol. 60, No 2, pp. 1193--1202. 2014 | 10.1109/TIT.2013.2292061 | null | cs.IT math.IT quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The current best asymptotic lower bound on the minimum distance of quantum
LDPC codes with fixed non-zero rate is logarithmic in the blocklength. We
propose a construction of quantum LDPC codes with fixed non-zero rate and prove
that the minimum distance grows proportionally to the square root of the
blocklength.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 16:41:00 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Jan 2013 09:25:05 GMT"
}
]
| 2015-03-05T00:00:00 | [
[
"Tillich",
"Jean-Pierre",
""
],
[
"Zemor",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0903.0571 | Fortis Alexandra Ms. | Rolf Andreas Rasenack | Adaptation of Black-Box Software Components | 16 pages, exposed on 2nd "European Conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008),153-168 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The globalization of the software market leads to crucial problems for
software companies. More competition between software companies arises and
leads to the force on companies to develop ever newer software products in ever
shortened time interval. Therefor the time to market for software systems is
shortened and obviously the product life cycle is shortened too[...]The
approach introduced here presents the novel technique together with a
supportive environment that enables developers to cope with the adaptability of
black-box software components. A supported environment will be designed that
checks the compatibility of black-box software components with the assistance
of their specifications.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 17:01:54 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Rasenack",
"Rolf Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.0572 | Fortis Alexandra Ms. | Tiberiu Marius Karnyanszky, Corina Musuroi, Carla Amira Karnyanszky | Expert Software for the Determination of Juvenile People's Obesity | 8 pages, exposed on 2nd "European Conference on Computer Science and
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 113-120 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Keeping the health condition at the juvenile population is the concern of
both the medical staff and the physical education teachers. Considering the
steady tendency of the growth of the number of the youth with excessive weight
(overweighted or obese) the intervention to combat this phenomenon must be
initiated in the early stage when this condition occurs. The screening method
for evaluating the body weight presented in this study uses a calculus program
through which, based on the input data (age, sex, weight the width of the skin
fold) an evaluation regarding each juvenile's weight and the body structure can
be done. This program can be used in schools, high schools, universities, to
signal the weight excess and to appreciate the intervention results for getting
a normal weight.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 17:18:26 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Karnyanszky",
"Tiberiu Marius",
""
],
[
"Musuroi",
"Corina",
""
],
[
"Karnyanszky",
"Carla Amira",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0903.0578 | Fortis Alexandra Ms. | Tiberiu Marius Karnyanszky, Bogdan Ion Selariu | About Testing the Speed of Calculating the Shortest Route | 6 pages, exposed on the 2nd "European Conference on Computer Science
& Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 121-126 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Applied into a various area of domains, the graph theory and its applications
allow the determination of the shortest route. The common algorithm to solve
this problem is Bellman-Kalaba, based on the matrix multiplying operation. If
the graph is very large (e.g., the dimension of the associated incidence matrix
is big) one of the main problems is to reduce the calculus time. This paper
presents a testing method able to analyze if an acceleration of the
Bellman-Kalaba is possible and able to determine the time efficiency.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 17:32:01 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Karnyanszky",
"Tiberiu Marius",
""
],
[
"Selariu",
"Bogdan Ion",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.0588 | Fortis Alexandra Ms. | Catalin Tuican, Tiberiu Marius Karnyanszky, Bogdan Ioan Selariu | Expert System for Quality Assessment in "Tibiscus" University | 10 pages, exposed on 2nd "European Conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 239-248 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The periodical evaluation of the teaching staff in "Tibiscus" University is
based on the specification of the Romanian Agency for Quality Assurance in
Higher Education (ARACIS), namely "The quality of teaching and researching
staff: The universities must dispose of teaching staff which, as number and
functional base must be correctly allocated to the total number of students,
depending on the study domain and regarding the qualifications it must depend
on the specific of the study program and the proposed quality objectives." This
paper presents the implementation of an expert system, offering to the students
the possibility to perform the evaluation in a modern way and to the evaluation
committee a quick access to all necessary data.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 17:55:47 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Tuican",
"Catalin",
""
],
[
"Karnyanszky",
"Tiberiu Marius",
""
],
[
"Selariu",
"Bogdan Ioan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0903.0595 | Xiaohu Shang | Xiaohu Shang, Biao Chen, Gerhard Kramer and H. Vincent Poor | Noisy-interference Sum-rate Capacity of Parallel Gaussian Interference
Channels | 32 pages, 8 figures, submitted to IEEE trans. on Information Theory
in Feb | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sum-rate capacity of the parallel Gaussian interference channel is shown
to be achieved by independent transmission across sub-channels and treating
interference as noise in each sub-channel if the channel coefficients and power
constraints satisfy a certain condition. The condition requires the
interference to be weak, a situation commonly encountered in, e.g., digital
subscriber line transmission. The optimal power allocation is characterized by
using the concavity of sum-rate capacity as a function of the power
constraints.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 18:40:54 GMT"
}
]
| 2009-03-04T00:00:00 | [
[
"Shang",
"Xiaohu",
""
],
[
"Chen",
"Biao",
""
],
[
"Kramer",
"Gerhard",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0604 | Ben Liang | Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa | On Stability Region and Delay Performance of Linear-Memory Randomized
Scheduling for Time-Varying Networks | Long version of preprint to appear in the IEEE Transactions on
Networking | null | 10.1109/TNET.2009.2017742 | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Throughput optimal scheduling policies in general require the solution of a
complex and often NP-hard optimization problem. Related literature has shown
that in the context of time-varying channels, randomized scheduling policies
can be employed to reduce the complexity of the optimization problem but at the
expense of a memory requirement that is exponential in the number of data
flows. In this paper, we consider a Linear-Memory Randomized Scheduling Policy
(LM-RSP) that is based on a pick-and-compare principle in a time-varying
network with $N$ one-hop data flows. For general ergodic channel processes, we
study the performance of LM-RSP in terms of its stability region and average
delay. Specifically, we show that LM-RSP can stabilize a fraction of the
capacity region. Our analysis characterizes this fraction as well as the
average delay as a function of channel variations and the efficiency of LM-RSP
in choosing an appropriate schedule vector. Applying these results to a class
of Markovian channels, we provide explicit results on the stability region and
delay performance of LM-RSP.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 19:37:05 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Lotfinezhad",
"Mahdi",
""
],
[
"Liang",
"Ben",
""
],
[
"Sousa",
"Elvino S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0625 | Edith Cohen | Edith Cohen, Haim Kaplan | Leveraging Discarded Samples for Tighter Estimation of Multiple-Set
Aggregates | 16 pages | null | null | null | cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many datasets such as market basket data, text or hypertext documents, and
sensor observations recorded in different locations or time periods, are
modeled as a collection of sets over a ground set of keys. We are interested in
basic aggregates such as the weight or selectivity of keys that satisfy some
selection predicate defined over keys' attributes and membership in particular
sets. This general formulation includes basic aggregates such as the Jaccard
coefficient, Hamming distance, and association rules.
On massive data sets, exact computation can be inefficient or infeasible.
Sketches based on coordinated random samples are classic summaries that support
approximate query processing.
Queries are resolved by generating a sketch (sample) of the union of sets
used in the predicate from the sketches these sets and then applying an
estimator to this union-sketch.
We derive novel tighter (unbiased) estimators that leverage sampled keys that
are present in the union of applicable sketches but excluded from the union
sketch. We establish analytically that our estimators dominate estimators
applied to the union-sketch for {\em all queries and data sets}. Empirical
evaluation on synthetic and real data reveals that on typical applications we
can expect a 25%-4 fold reduction in estimation error.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 21:21:02 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Cohen",
"Edith",
""
],
[
"Kaplan",
"Haim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.0650 | Mehmet Ak\c{c}akaya | Mehmet Ak\c{c}akaya, Jinsoo Park, Vahid Tarokh | Compressive Sensing Using Low Density Frames | 11 pages, 6 figures, Submitted to IEEE Transactions on Signal
Processing | null | null | null | cs.IT math.IT stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the compressive sensing of a sparse or compressible signal ${\bf
x} \in {\mathbb R}^M$. We explicitly construct a class of measurement matrices,
referred to as the low density frames, and develop decoding algorithms that
produce an accurate estimate $\hat{\bf x}$ even in the presence of additive
noise. Low density frames are sparse matrices and have small storage
requirements. Our decoding algorithms for these frames have $O(M)$ complexity.
Simulation results are provided, demonstrating that our approach significantly
outperforms state-of-the-art recovery algorithms for numerous cases of
interest. In particular, for Gaussian sparse signals and Gaussian noise, we are
within 2 dB range of the theoretical lower bound in most cases.
| [
{
"version": "v1",
"created": "Tue, 3 Mar 2009 23:05:04 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Akçakaya",
"Mehmet",
""
],
[
"Park",
"Jinsoo",
""
],
[
"Tarokh",
"Vahid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
}
]
|
0903.0666 | Matthew Mckay Dr. | Matthew R. McKay, Iain B. Collings, and Antonia M. Tulino | Achievable Sum Rate of MIMO MMSE Recievers: A General Analytic Framework | to appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the achievable sum rate of multiple-input
multiple-output (MIMO) wireless systems employing linear minimum mean-squared
error (MMSE) receivers. We present a new analytic framework which unveils an
interesting connection between the achievable sum rate with MMSE receivers and
the ergodic mutual information achieved with optimal receivers. This simple but
powerful result enables the vast prior literature on ergodic MIMO mutual
information to be directly applied to the analysis of MMSE receivers. The
framework is particularized to various Rayleigh and Rician channel scenarios to
yield new exact closed-form expressions for the achievable sum rate, as well as
simplified expressions in the asymptotic regimes of high and low signal to
noise ratios. These expressions lead to the discovery of key insights into the
performance of MIMO MMSE receivers under practical channel conditions.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 01:05:41 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"McKay",
"Matthew R.",
""
],
[
"Collings",
"Iain B.",
""
],
[
"Tulino",
"Antonia M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.0673 | Robert McKilliam | Robby G. McKilliam, Warren D. Smith and I. Vaughan L. Clarkson | Linear-time nearest point algorithms for Coxeter lattices | submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2039090 | null | cs.IT math.IT math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Coxeter lattices, which we denote $A_{n/m}$, are a family of lattices
containing many of the important lattices in low dimensions. This includes
$A_n$, $E_7$, $E_8$ and their duals $A_n^*$, $E_7^*$ and $E_8^*$. We consider
the problem of finding a nearest point in a Coxeter lattice. We describe two
new algorithms, one with worst case arithmetic complexity $O(n\log{n})$ and the
other with worst case complexity O(n) where $n$ is the dimension of the
lattice. We show that for the particular lattices $A_n$ and $A_n^*$ the
algorithms reduce to simple nearest point algorithms that already exist in the
literature.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 01:38:50 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"McKilliam",
"Robby G.",
""
],
[
"Smith",
"Warren D.",
""
],
[
"Clarkson",
"I. Vaughan L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0903.0682 | Raymond Chi-Wing Wong | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang and Yabo Xu | Preserving Individual Privacy in Serial Data Publishing | null | null | null | null | cs.DB cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While previous works on privacy-preserving serial data publishing consider
the scenario where sensitive values may persist over multiple data releases, we
find that no previous work has sufficient protection provided for sensitive
values that can change over time, which should be the more common case. In this
work we propose to study the privacy guarantee for such transient sensitive
values, which we call the global guarantee. We formally define the problem for
achieving this guarantee and derive some theoretical properties for this
problem. We show that the anonymized group sizes used in the data anonymization
is a key factor in protecting individual privacy in serial publication. We
propose two strategies for anonymization targeting at minimizing the average
group size and the maximum group size. Finally, we conduct experiments on a
medical dataset to show that our method is highly efficient and also produces
published data of very high utility.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 09:36:29 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Wong",
"Raymond Chi-Wing",
""
],
[
"Fu",
"Ada Wai-Chee",
""
],
[
"Liu",
"Jia",
""
],
[
"Wang",
"Ke",
""
],
[
"Xu",
"Yabo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.0694 | Gerard Briscoe Mr | Gerard Briscoe and Alexandros Marinos | Digital Ecosystems in the Clouds: Towards Community Cloud Computing | 7 pages, 3 figures, IEEE Digital EcosystemS and Technologies DEST
(2009) | null | null | null | cs.NI cs.DC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cloud Computing is rising fast, with its data centres growing at an
unprecedented rate. However, this has come with concerns of privacy, efficiency
at the expense of resilience, and environmental sustainability, because of the
dependence on Cloud vendors such as Google, Amazon, and Microsoft. Community
Cloud Computing makes use of the principles of Digital Ecosystems to provide a
paradigm for Clouds in the community, offering an alternative architecture for
the use cases of Cloud Computing. It is more technically challenging to deal
with issues of distributed computing, such as latency, differential resource
management, and additional security requirements. However, these are not
insurmountable challenges, and with the need to retain control over our digital
lives and the potential environmental consequences, it is a challenge we must
pursue.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 17:27:34 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Mar 2009 03:12:00 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Oct 2009 01:16:50 GMT"
}
]
| 2009-10-05T00:00:00 | [
[
"Briscoe",
"Gerard",
""
],
[
"Marinos",
"Alexandros",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.0695 | Shai Haim | Shai Haim and Toby Walsh | Online Estimation of SAT Solving Runtime | 6 pages, 3 figures. Proc. of the 11th International Conf. on Theory
and Applications of Satisfiability Testing, Guangzhou, China, May 2008 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an online method for estimating the cost of solving SAT problems.
Modern SAT solvers present several challenges to estimate search cost including
non-chronological backtracking, learning and restarts. Our method uses a linear
model trained on data gathered at the start of search. We show the
effectiveness of this method using random and structured problems. We
demonstrate that predictions made in early restarts can be used to improve
later predictions. We also show that we can use such cost estimations to select
a solver from a portfolio.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 04:56:07 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Haim",
"Shai",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0696 | Megan Owen | Megan Owen | Computing Geodesic Distances in Tree Space | 24 pages, 7 figures; v2: substantially revised for clarity | null | null | null | math.CO cs.CG cs.DM math.MG q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present two algorithms for computing the geodesic distance between
phylogenetic trees in tree space, as introduced by Billera, Holmes, and
Vogtmann (2001). We show that the possible combinatorial types of shortest
paths between two trees can be compactly represented by a partially ordered
set. We calculate the shortest distance along each candidate path by converting
the problem into one of finding the shortest path through a certain region of
Euclidean space. In particular, we show there is a linear time algorithm for
finding the shortest path between a point in the all positive orthant and a
point in the all negative orthant of R^k contained in the subspace of R^k
consisting of all orthants with the first i coordinates non-positive and the
remaining coordinates non-negative for 0 <= i <= k.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 04:57:00 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Jun 2011 01:14:40 GMT"
}
]
| 2011-06-08T00:00:00 | [
[
"Owen",
"Megan",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
]
|
0903.0710 | Veronika Rehn-Sonigo | Anne Benoit (INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique
du Parall\'elisme), Henri Casanova, Veronika Rehn-Sonigo (INRIA Rh\^one-Alpes
/ LIP Laboratoire de l'Informatique du Parall\'elisme), Yves Robert (INRIA
Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme) | Resource Allocation for Multiple Concurrent In-Network Stream-Processing
Applications | null | null | null | RR-6864 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the operator mapping problem for in-network
stream-processing applications. In-network stream-processing amounts to
applying one or more trees of operators in steady-state, to multiple data
objects that are continuously updated at different locations in the network.
The goal is to compute some final data at some desired rate. Different operator
trees may share common subtrees. Therefore, it may be possible to reuse some
intermediate results in different application trees. The first contribution of
this work is to provide complexity results for different instances of the basic
problem, as well as integer linear program formulations of various problem
instances. The second second contribution is the design of several
polynomial-time heuristics. One of the primary objectives of these heuristics
is to reuse intermediate results shared by multiple applications. Our
quantitative comparisons of these heuristics in simulation demonstrates the
importance of choosing appropriate processors for operator mapping. It also
allow us to identify a heuristic that achieves good results in practice.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 08:15:00 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Benoit",
"Anne",
"",
"INRIA Rhône-Alpes / LIP Laboratoire de l'Informatique\n du Parallélisme"
],
[
"Casanova",
"Henri",
"",
"INRIA Rhône-Alpes\n / LIP Laboratoire de l'Informatique du Parallélisme"
],
[
"Rehn-Sonigo",
"Veronika",
"",
"INRIA Rhône-Alpes\n / LIP Laboratoire de l'Informatique du Parallélisme"
],
[
"Robert",
"Yves",
"",
"INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0903.0730 | Fortis Alexandra Ms. | Delia Sabina Stinga | Grid Technologies | 6 pages, exposed on 2nd "European Conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 181-186 | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper contains the most important aspects of computing grids. Grid
computing allows high performance distributed systems to act as a single
computer. An overview of grids structure and techniques is given in order to
understand the way grids work.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 11:08:20 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Stinga",
"Delia Sabina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0903.0735 | Joost Broekens | Joost Broekens | Modeling the Experience of Emotion | null | null | null | null | cs.AI cs.HC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Affective computing has proven to be a viable field of research comprised of
a large number of multidisciplinary researchers resulting in work that is
widely published. The majority of this work consists of computational models of
emotion recognition, computational modeling of causal factors of emotion and
emotion expression through rendered and robotic faces. A smaller part is
concerned with modeling the effects of emotion, formal modeling of cognitive
appraisal theory and models of emergent emotions. Part of the motivation for
affective computing as a field is to better understand emotional processes
through computational modeling. One of the four major topics in affective
computing is computers that have emotions (the others are recognizing,
expressing and understanding emotions). A critical and neglected aspect of
having emotions is the experience of emotion (Barrett, Mesquita, Ochsner, and
Gross, 2007): what does the content of an emotional episode look like, how does
this content change over time and when do we call the episode emotional. Few
modeling efforts have these topics as primary focus. The launch of a journal on
synthetic emotions should motivate research initiatives in this direction, and
this research should have a measurable impact on emotion research in
psychology. I show that a good way to do so is to investigate the psychological
core of what an emotion is: an experience. I present ideas on how the
experience of emotion could be modeled and provide evidence that several
computational models of emotion are already addressing the issue.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 11:26:24 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Broekens",
"Joost",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0903.0737 | Fortis Alexandra Ms. | Daniela Ilea | C# - Connecting a Mobile Application to Oracle Server via Web Services | 6 pages, exposed on 2nd "European Comference on Computer Science and
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 101-106 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article is focused on mobile development using Visual Studio 2005, web
services and their connection to Oracle server, willing to help programmers to
realize simple and useful mobile applications.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 11:35:22 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Ilea",
"Daniela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.0742 | Amitabha Bagchi | Amitabha Bagchi, Adit Madan, Achal Premi | Hierarchical neighbor graphs: A low stretch connected structure for
points in Euclidean space | null | Ad Hoc Sens. Wirel. Ne 26(1-4):171-191, 2015 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce hierarchical neighbor graphs, a new architecture for connecting
ad hoc wireless nodes distributed in a plane. The structure has the flavor of
hierarchical clustering and requires only local knowledge and minimal
computation at each node to be formed and repaired. Hence, it is a suitable
interconnection model for an ad hoc wireless sensor network. The structure is
able to use energy efficiently by reorganizing dynamically when the battery
power of heavily utilized nodes degrades and is able to achieve throughput,
energy efficiency and network lifetimes that compare favorably with the leading
proposals for data collation in sensor networks such as LEACH (Heinzelman et.
al., 2002). Additionally, hierarchical neighbor graphs have low power stretch
i.e. the power required to connect nodes through the network is a small factor
higher than the power required to connect them directly. Our structure also
compares favorably to mathematical structures proposed for connecting points in
a plane e.g. nearest-neighbor graphs (Ballister et. al., 2005), $\theta$-graphs
(Ruppert and Seidel, 1991), in that it has expected constant degree and does
not require any significant computation or global information to be formed.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 12:03:41 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Apr 2009 15:44:38 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Aug 2009 10:44:36 GMT"
}
]
| 2015-09-30T00:00:00 | [
[
"Bagchi",
"Amitabha",
""
],
[
"Madan",
"Adit",
""
],
[
"Premi",
"Achal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.0748 | Agung Trisetyarso | Agung Trisetyarso and Rodney Van Meter | Circuit Design for A Measurement-Based Quantum Carry-Lookahead Adder | 28 pages and 14 figures | Int. J. Quantum Inf. 8, 843 (2010) | 10.1142/S0219749910006496 | null | quant-ph cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the design and evaluation of a quantum carry-lookahead adder
(QCLA) using measurement-based quantum computation (MBQC), called MBQCLA. QCLA
was originally designed for an abstract, concurrent architecture supporting
long-distance communication, but most realistic architectures heavily constrain
communication distances. The quantum carry-lookahead adder is faster than a
quantum ripple-carry adder; QCLA has logarithmic depth while ripple adders have
linear depth. MBQCLA utilizes MBQC's ability to transfer quantum states in unit
time to accelerate addition. MBQCLA breaks the latency limit of addition
circuits in nearest neighbor-only architectures : compared to the $\Theta(n)$
limit on circuit depth for linear nearest-neighbor architectures, it can reach
$\Theta(log n)$ depth. MBQCLA is an order of magnitude faster than a
ripple-carry adder when adding registers longer than 100 qubits, but requires a
cluster state that is an order of magnitude larger. The cluster state resources
can be classified as computation and communication; for the unoptimized form,
$\approx$ 88 % of the resources are used for communication. Hand optimization
of horizontal communication costs results in a $\approx$ 12% reduction in
spatial resources for the in-place MBQCLA circuit. For comparison, a graph
state quantum carry-lookahead adder (GSQCLA) uses only $\approx$ 9 % of the
spatial resources of the MBQCLA.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 12:32:01 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 04:45:05 GMT"
}
]
| 2010-10-04T00:00:00 | [
[
"Trisetyarso",
"Agung",
""
],
[
"Van Meter",
"Rodney",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0903.0786 | Carlos Loria-Saenz A | Carlos Loria-Saenz | On Requirements for Programming Exercises from an E-learning Perspective | ii + 31 pages | null | null | SEKI Working-Paper SWP-2008-01 | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we deal with the question of modeling programming exercises for
novices pointing to an e-learning scenario. Our purpose is to identify basic
requirements, raise some key questions and propose potential answers from a
conceptual perspective. Presented as a general picture, we hypothetically
situate our work in a general context where e-learning instructional material
needs to be adapted to form part of an introductory Computer Science (CS)
e-learning course at the CS1-level. Meant is a potential course which aims at
improving novices skills and knowledge on the essentials of programming by
using e-learning based approaches in connection (at least conceptually) with a
general host framework like Activemath (www.activemath.org). Our elaboration
covers contextual and, particularly, cognitive elements preparing the terrain
for eventual research stages in a derived project, as indicated. We concentrate
our main efforts on reasoning mechanisms about exercise complexity that can
eventually offer tool support for the task of exercise authoring. We base our
requirements analysis on our own perception of the exercise subsystem provided
by Activemath especially within the domain reasoner area. We enrich the
analysis by bringing to the discussion several relevant contextual elements
from the CS1 courses, its definition and implementation. Concerning cognitive
models and exercises, we build upon the principles of Bloom's Taxonomy as a
relatively standardized basis and use them as a framework for study and
analysis of complexity in basic programming exercises. Our analysis includes
requirements for the domain reasoner which are necessary for the exercise
analysis. We propose for such a purpose a three-layered conceptual model
considering exercise evaluation, programming and metaprogramming.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 15:29:42 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2009 18:50:57 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Loria-Saenz",
"Carlos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0802 | Tomasz Truderung | Ralf Kuesters, Tomasz Truderung | An Epistemic Approach to Coercion-Resistance for Electronic Voting
Protocols | An extended version of a paper from IEEE Symposium on Security and
Privacy (S&P) 2009 | null | 10.1109/SP.2009.13 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coercion resistance is an important and one of the most intricate security
requirements of electronic voting protocols. Several definitions of coercion
resistance have been proposed in the literature, including definitions based on
symbolic models. However, existing definitions in such models are rather
restricted in their scope and quite complex.
In this paper, we therefore propose a new definition of coercion resistance
in a symbolic setting, based on an epistemic approach. Our definition is
relatively simple and intuitive. It allows for a fine-grained formulation of
coercion resistance and can be stated independently of a specific, symbolic
protocol and adversary model. As a proof of concept, we apply our definition to
three voting protocols. In particular, we carry out the first rigorous analysis
of the recently proposed Civitas system. We precisely identify those conditions
under which this system guarantees coercion resistance or fails to be coercion
resistant. We also analyze protocols proposed by Lee et al. and Okamoto.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 16:49:00 GMT"
},
{
"version": "v2",
"created": "Fri, 29 May 2009 10:51:25 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Kuesters",
"Ralf",
""
],
[
"Truderung",
"Tomasz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.0829 | Marko Horvat | Marko Horvat, Sinisa Popovic, Nikola Bogunovic and Kresimir Cosic | Tagging multimedia stimuli with ontologies | 7 pages, 7 figures, 1 table, submitted for publication (MIPRO 2009) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Successful management of emotional stimuli is a pivotal issue concerning
Affective Computing (AC) and the related research. As a subfield of Artificial
Intelligence, AC is concerned not only with the design of computer systems and
the accompanying hardware that can recognize, interpret, and process human
emotions, but also with the development of systems that can trigger human
emotional response in an ordered and controlled manner. This requires the
maximum attainable precision and efficiency in the extraction of data from
emotionally annotated databases While these databases do use keywords or tags
for description of the semantic content, they do not provide either the
necessary flexibility or leverage needed to efficiently extract the pertinent
emotional content. Therefore, to this extent we propose an introduction of
ontologies as a new paradigm for description of emotionally annotated data. The
ability to select and sequence data based on their semantic attributes is vital
for any study involving metadata, semantics and ontological sorting like the
Semantic Web or the Social Semantic Desktop, and the approach described in the
paper facilitates reuse in these areas as well.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 18:13:41 GMT"
}
]
| 2009-03-05T00:00:00 | [
[
"Horvat",
"Marko",
""
],
[
"Popovic",
"Sinisa",
""
],
[
"Bogunovic",
"Nikola",
""
],
[
"Cosic",
"Kresimir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.0843 | Jordi Planes | Vasco Manquinho and Joao Marques-Silva and Jordi Planes | Algorithms for Weighted Boolean Optimization | 14 pages, 2 algorithms, 3 tables, 1 figure | null | null | null | cs.AI cs.LO | http://creativecommons.org/licenses/by/3.0/ | The Pseudo-Boolean Optimization (PBO) and Maximum Satisfiability (MaxSAT)
problems are natural optimization extensions of Boolean Satisfiability (SAT).
In the recent past, different algorithms have been proposed for PBO and for
MaxSAT, despite the existence of straightforward mappings from PBO to MaxSAT
and vice-versa. This papers proposes Weighted Boolean Optimization (WBO), a new
unified framework that aggregates and extends PBO and MaxSAT. In addition, the
paper proposes a new unsatisfiability-based algorithm for WBO, based on recent
unsatisfiability-based algorithms for MaxSAT. Besides standard MaxSAT, the new
algorithm can also be used to solve weighted MaxSAT and PBO, handling
pseudo-Boolean constraints either natively or by translation to clausal form.
Experimental results illustrate that unsatisfiability-based algorithms for
MaxSAT can be orders of magnitude more efficient than existing dedicated
algorithms. Finally, the paper illustrates how other algorithms for either PBO
or MaxSAT can be extended to WBO.
| [
{
"version": "v1",
"created": "Wed, 4 Mar 2009 20:21:56 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Mar 2009 09:18:32 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Manquinho",
"Vasco",
""
],
[
"Marques-Silva",
"Joao",
""
],
[
"Planes",
"Jordi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.0889 | David Doty | David Doty, Matthew J. Patitz | A Domain-Specific Language for Programming in the Tile Assembly Model | null | null | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a domain-specific language (DSL) for creating sets of tile types
for simulations of the abstract Tile Assembly Model. The language defines
objects known as tile templates, which represent related groups of tiles, and a
small number of basic operations on tile templates that help to eliminate the
error-prone drudgery of enumerating such tile types manually or with low-level
constructs of general-purpose programming languages. The language is
implemented as a class library in Python (a so-called internal DSL), but is
presented independently of Python or object-oriented programming, with emphasis
on supporting the creation of visual editing tools for programmatically
creating large sets of complex tile types without needing to write a program.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 01:19:35 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Doty",
"David",
""
],
[
"Patitz",
"Matthew J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0903.0914 | Freddy Munoz | Freddy Munoz (INRIA - Irisa), Benoit Baudry (INRIA - Irisa) | Artificial table testing dynamically adaptive systems | null | null | null | RR-6866 | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamically Adaptive Systems (DAS) are systems that modify their behavior and
structure in response to changes in their surrounding environment. Critical
mission systems increasingly incorporate adaptation and response to the
environment; examples include disaster relief and space exploration systems.
These systems can be decomposed in two parts: the adaptation policy that
specifies how the system must react according to the environmental changes and
the set of possible variants to reconfigure the system. A major challenge for
testing these systems is the combinatorial explosions of variants and
envi-ronment conditions to which the system must react. In this paper we focus
on testing the adaption policy and propose a strategy for the selection of
envi-ronmental variations that can reveal faults in the policy. Artificial
Shaking Table Testing (ASTT) is a strategy inspired by shaking table testing
(STT), a technique widely used in civil engineering to evaluate building's
structural re-sistance to seismic events. ASTT makes use of artificial
earthquakes that simu-late violent changes in the environmental conditions and
stresses the system adaptation capability. We model the generation of
artificial earthquakes as a search problem in which the goal is to optimize
different types of envi-ronmental variations.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 05:36:22 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Munoz",
"Freddy",
"",
"INRIA - Irisa"
],
[
"Baudry",
"Benoit",
"",
"INRIA - Irisa"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.0938 | Gregory Gutin | Nathann Cohen, Fedor V. Fomin, Gregory Gutin, Eun Jung Kim, Saket
Saurabh, Anders Yeo | Algorithm for Finding $k$-Vertex Out-trees and its Application to
$k$-Internal Out-branching Problem | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An out-tree $T$ is an oriented tree with only one vertex of in-degree zero. A
vertex $x$ of $T$ is internal if its out-degree is positive. We design
randomized and deterministic algorithms for deciding whether an input digraph
contains a given out-tree with $k$ vertices. The algorithms are of runtime
$O^*(5.704^k)$ and $O^*(5.704^{k(1+o(1))})$, respectively. We apply the
deterministic algorithm to obtain a deterministic algorithm of runtime
$O^*(c^k)$, where $c$ is a constant, for deciding whether an input digraph
contains a spanning out-tree with at least $k$ internal vertices. This answers
in affirmative a question of Gutin, Razgon and Kim (Proc. AAIM'08).
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 16:15:16 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Cohen",
"Nathann",
""
],
[
"Fomin",
"Fedor V.",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Kim",
"Eun Jung",
""
],
[
"Saurabh",
"Saket",
""
],
[
"Yeo",
"Anders",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.0952 | Fortis Alexandra Ms. | V. V. Gotsulenko, L. A. Gaponova, P. I. Kogut | Definition of Strange Attractor in Benard problem for Generalized
Couette Cell | 6 pages, exposed on 2nd "European Conference on Computer Science and
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 95-100 | null | null | nlin.CD cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For movements of the viscous continuous flow in generalized Couette cell the
dynamic system describing the central limiting variety is received.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 10:45:51 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Gotsulenko",
"V. V.",
""
],
[
"Gaponova",
"L. A.",
""
],
[
"Kogut",
"P. I.",
""
]
]
| [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0903.0960 | Fortis Alexandra Ms. | Georgiana Petruta Fintineanu | Directing RF Terminals Using TELNET Applications | 8 pages, exposed on 2nd "European Conference on Computer Sicence &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 61-68 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present study aims to emphasize the way in which the TELNET protocol for
directing the mobile terminals is used and works. The paper is structured in
three parts: the first two parts are a theoretic presentation of the TELNET
protocol, respectively of the mobile terminals. The third part contains an
application of the way in which a mobile terminal can be programmed using the
TELNET protocol.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 11:00:42 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Fintineanu",
"Georgiana Petruta",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.0962 | Fortis Alexandra Ms. | Leonard Mada | Hospital Acquired Infections: Advantages of a Computerized Surveillance | 10 pages, exposed on 2nd "European Conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 135-144 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To asses the advantages of a computerized surveillance system to detect
Healthcare-Associated Infections (HAI). All HAI reported to the Timis County
branch of the Romanian National Health Insurance and the Public Health
Authority during the year 2007 were collected and assessed for validity
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 11:15:23 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Mada",
"Leonard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.0992 | Fortis Alexandra Ms. | Diana Sophia Codat | L'entreprise franco-roumaine face au Internet | 6 pages, exposed on 2nd "European conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 25-30 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main goal of the present work is to analyze the activity of the French
companies from Romania related to the increasing use of the information and
communication technology in the productive field. The convergent assembly of
information and communication technologies and the process of economic
globalization have led to a profound transformation of the economic activity.
The present paper is part of a series of studies made on the French firms from
Romania between 2007 and 2008.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 14:04:07 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jun 2009 13:12:54 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Codat",
"Diana Sophia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0903.1002 | Saquib Razak | Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, Khaled A. Harras | How do Wireless Chains Behave? The Impact of MAC Interactions | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a Multi-hop Wireless Networks (MHWN), packets are routed between source
and destination using a chain of intermediate nodes; chains are a fundamental
communication structure in MHWNs whose behavior must be understood to enable
building effective protocols. The behavior of chains is determined by a number
of complex and interdependent processes that arise as the sources of different
chain hops compete to transmit their packets on the shared medium. In this
paper, we show that MAC level interactions play the primary role in determining
the behavior of chains. We evaluate the types of chains that occur based on the
MAC interactions between different links using realistic propagation and packet
forwarding models. We discover that the presence of destructive interactions,
due to different forms of hidden terminals, does not impact the throughput of
an isolated chain significantly. However, due to the increased number of
retransmissions required, the amount of bandwidth consumed is significantly
higher in chains exhibiting destructive interactions, substantially influencing
the overall network performance. These results are validated by testbed
experiments. We finally study how different types of chains interfere with each
other and discover that well behaved chains in terms of self-interference are
more resilient to interference from other chains.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 14:24:28 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Razak",
"Saquib",
""
],
[
"Kolar",
"Vinay",
""
],
[
"Abu-Ghazaleh",
"Nael B.",
""
],
[
"Harras",
"Khaled A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.1017 | Fortis Alexandra Ms. | Emil Schwab | On the Category of Partial Bijections | 8 pages, exposed on 2nd "European Conference on Computer Science &
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 173-180 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Categories of partial functions have become increasingly important
principally because of their applications in theoretical computer science. In
this note we prove that the category of partial bijections between sets as an
inverse-Baer*-category with closed projections and in which the idempotent
split is an exact category. Finally the Noether isomorphism theorems are given
for this exact category.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 14:54:42 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Schwab",
"Emil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.1022 | Alyson Fletcher | Alyson K. Fletcher, Sundeep Rangan, and Vivek K Goyal | On-Off Random Access Channels: A Compressed Sensing Framework | 18 pages, 5 figures; addition of inadvertently omitted support
information and acknowledgments | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a simple on-off random multiple access channel, where n
users communicate simultaneously to a single receiver over m degrees of
freedom. Each user transmits with probability lambda, where typically lambda n
< m << n, and the receiver must detect which users transmitted. We show that
when the codebook has i.i.d. Gaussian entries, detecting which users
transmitted is mathematically equivalent to a certain sparsity detection
problem considered in compressed sensing. Using recent sparsity results, we
derive upper and lower bounds on the capacities of these channels. We show that
common sparsity detection algorithms, such as lasso and orthogonal matching
pursuit (OMP), can be used as tractable multiuser detection schemes and have
significantly better performance than single-user detection. These methods do
achieve some near-far resistance but--at high signal-to-noise ratios
(SNRs)--may achieve capacities far below optimal maximum likelihood detection.
We then present a new algorithm, called sequential OMP, that illustrates that
iterative detection combined with power ordering or power shaping can
significantly improve the high SNR performance. Sequential OMP is analogous to
successive interference cancellation in the classic multiple access channel.
Our results thereby provide insight into the roles of power control and
multiuser detection on random-access signalling.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 15:52:41 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Mar 2009 04:37:30 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Fletcher",
"Alyson K.",
""
],
[
"Rangan",
"Sundeep",
""
],
[
"Goyal",
"Vivek K",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1032 | Mohammad Raza | Mohammad Raza and Philippa Gardner | Footprints in Local Reasoning | LMCS 2009 (FOSSACS 2008 special issue) | Logical Methods in Computer Science, Volume 5, Issue 2 (April 24,
2009) lmcs:1118 | 10.2168/LMCS-5(2:4)2009 | null | cs.SE cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Local reasoning about programs exploits the natural local behaviour common in
programs by focussing on the footprint - that part of the resource accessed by
the program. We address the problem of formally characterising and analysing
the footprint notion for abstract local functions introduced by Calcagno, O
Hearn and Yang. With our definition, we prove that the footprints are the only
essential elements required for a complete specification of a local function.
We formalise the notion of small specifications in local reasoning and show
that for well-founded resource models, a smallest specification always exists
that only includes the footprints, and also present results for the
non-well-founded case. Finally, we use this theory of footprints to investigate
the conditions under which the footprints correspond to the smallest safe
states. We present a new model of RAM in which, unlike the standard model, the
footprints of every program correspond to the smallest safe states, and we also
identify a general condition on the primitive commands of a programming
language which guarantees this property for arbitrary models.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 17:06:05 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Apr 2009 17:59:14 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Raza",
"Mohammad",
""
],
[
"Gardner",
"Philippa",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.1033 | \'Angel del R\'io | Jose Joaquin Bernal, Angel del Rio, Juan Jacobo Simon | Group code structures on affine-invariant codes | 7 pages | null | null | null | cs.IT math.GR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A group code structure of a linear code is a description of the code as
one-sided or two-sided ideal of a group algebra of a finite group. In these
realizations, the group algebra is identified with the ambient space, and the
group elements with the coordinates of the ambient space. It is well known that
every affine-invariant code of length $p^m$, with $p$ prime, can be realized as
an ideal of the group algebra $\F\I$, where $\I$ is the underlying additive
group of the field with $p^m$ elements. In this paper we describe all the group
code structures of an affine-invariant code of length $p^m$ in terms of a
family of maps from $\I$ to the group of automorphisms of $\I$.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 17:08:01 GMT"
}
]
| 2009-03-06T00:00:00 | [
[
"Bernal",
"Jose Joaquin",
""
],
[
"del Rio",
"Angel",
""
],
[
"Simon",
"Juan Jacobo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1059 | Tiberiu Marius Karnyanszky | Tiberiu Marius Karnyanszky | Home Heating Systems Design using PHP and MySQL Databases | 8 pages (121-128), 5th "Actualities and Perspectives in Hard and
Soft", 2007 | Ann. Univ. Tibiscus Comp. Sci. Series 5 (2007), 121-128 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the use of a computer application based on a MySQL
database, managed by PHP programs, allowing the selection of a heating device
using coefficient-based calculus.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 18:33:52 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Karnyanszky",
"Tiberiu Marius",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0903.1061 | Tiberiu Marius Karnyanszky | Ovidiu Crista, Tiberiu Marius Karnyanszky | Application for Evaluation of the Professional Competencies of the
Teaching Staff | 6 pages (71-76), 5th "Actualities and Perspectives in Hard and Soft",
2007 | Ann. Univ. Tibiscus Comp. Sci. Series 5 (2007), 71-76 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of the presented application is to offer a full support for
universities in retrieving the feedback from their students with regard to
their teachers. This is the main reason we described it in this paper. To build
this application the following tools have been used: Microsoft Notepad 5.1 (to
make the source files), Adobe Photoshop CS3 (to make the background image) and
Adobe Flash Media Encoder 8 (to render the video clips).
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 18:41:47 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Crista",
"Ovidiu",
""
],
[
"Karnyanszky",
"Tiberiu Marius",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0903.1095 | Jakub Mare\v{c}ek | Edmund K. Burke, Jakub Marecek, Andrew J. Parkes, Hana Rudova | Decomposition, Reformulation, and Diving in University Course
Timetabling | 45 pages, 7 figures. Improved typesetting of figures and tables | Computers and Operations Research (2010) 37(3), 582-597 | 10.1016/j.cor.2009.02.023 | NOTTCS-TR-2008-02 | cs.DS cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many real-life optimisation problems, there are multiple interacting
components in a solution. For example, different components might specify
assignments to different kinds of resource. Often, each component is associated
with different sets of soft constraints, and so with different measures of soft
constraint violation. The goal is then to minimise a linear combination of such
measures. This paper studies an approach to such problems, which can be thought
of as multiphase exploitation of multiple objective-/value-restricted
submodels. In this approach, only one computationally difficult component of a
problem and the associated subset of objectives is considered at first. This
produces partial solutions, which define interesting neighbourhoods in the
search space of the complete problem. Often, it is possible to pick the initial
component so that variable aggregation can be performed at the first stage, and
the neighbourhoods to be explored next are guaranteed to contain feasible
solutions. Using integer programming, it is then easy to implement heuristics
producing solutions with bounds on their quality.
Our study is performed on a university course timetabling problem used in the
2007 International Timetabling Competition, also known as the Udine Course
Timetabling Problem. In the proposed heuristic, an objective-restricted
neighbourhood generator produces assignments of periods to events, with
decreasing numbers of violations of two period-related soft constraints. Those
are relaxed into assignments of events to days, which define neighbourhoods
that are easier to search with respect to all four soft constraints. Integer
programming formulations for all subproblems are given and evaluated using ILOG
CPLEX 11. The wider applicability of this approach is analysed and discussed.
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 20:40:32 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Mar 2009 17:16:13 GMT"
}
]
| 2014-04-10T00:00:00 | [
[
"Burke",
"Edmund K.",
""
],
[
"Marecek",
"Jakub",
""
],
[
"Parkes",
"Andrew J.",
""
],
[
"Rudova",
"Hana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.1125 | Aharon Bar Hillel | Ran Gilad-Bachrach, Aharon Bar-Hillel, Liat Ein-Dor | Efficient Human Computation | 8 pages, 1 figure | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collecting large labeled data sets is a laborious and expensive task, whose
scaling up requires division of the labeling workload between many teachers.
When the number of classes is large, miscorrespondences between the labels
given by the different teachers are likely to occur, which, in the extreme
case, may reach total inconsistency. In this paper we describe how globally
consistent labels can be obtained, despite the absence of teacher coordination,
and discuss the possible efficiency of this process in terms of human labor. We
define a notion of label efficiency, measuring the ratio between the number of
globally consistent labels obtained and the number of labels provided by
distributed teachers. We show that the efficiency depends critically on the
ratio alpha between the number of data instances seen by a single teacher, and
the number of classes. We suggest several algorithms for the distributed
labeling problem, and analyze their efficiency as a function of alpha. In
addition, we provide an upper bound on label efficiency for the case of
completely uncoordinated teachers, and show that efficiency approaches 0 as the
ratio between the number of labels each teacher provides and the number of
classes drops (i.e. alpha goes to 0).
| [
{
"version": "v1",
"created": "Thu, 5 Mar 2009 22:39:46 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Gilad-Bachrach",
"Ran",
""
],
[
"Bar-Hillel",
"Aharon",
""
],
[
"Ein-Dor",
"Liat",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0903.1136 | Toby Walsh | Toby Walsh | Symmetry Breaking Using Value Precedence | 17th European Conference on Artificial Intelligence | ECAI 2006, 168-172 | 10.1088/1126-6708/2009/06/075 | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a comprehensive study of the use of value precedence constraints
to break value symmetry. We first give a simple encoding of value precedence
into ternary constraints that is both efficient and effective at breaking
symmetry. We then extend value precedence to deal with a number of
generalizations like wreath value and partial interchangeability. We also show
that value precedence is closely related to lexicographical ordering. Finally,
we consider the interaction between value precedence and symmetry breaking
constraints for variable symmetries.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 01:04:50 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.1137 | Toby Walsh | Toby Walsh | Complexity of Terminating Preference Elicitation | 7th International Joint Conference on Autonomous Agents and
Multiagent Systems (AAMAS 2008) | AAMAS 2008: 967-974 | null | null | cs.AI cs.CC cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complexity theory is a useful tool to study computational issues surrounding
the elicitation of preferences, as well as the strategic manipulation of
elections aggregating together preferences of multiple agents. We study here
the complexity of determining when we can terminate eliciting preferences, and
prove that the complexity depends on the elicitation strategy. We show, for
instance, that it may be better from a computational perspective to elicit all
preferences from one agent at a time than to elicit individual preferences from
multiple agents. We also study the connection between the strategic
manipulation of an election and preference elicitation. We show that what we
can manipulate affects the computational complexity of manipulation. In
particular, we prove that there are voting rules which are easy to manipulate
if we can change all of an agent's vote, but computationally intractable if we
can change only some of their preferences. This suggests that, as with
preference elicitation, a fine-grained view of manipulation may be informative.
Finally, we study the connection between predicting the winner of an election
and preference elicitation. Based on this connection, we identify a voting rule
where it is computationally difficult to decide the probability of a candidate
winning given a probability distribution over the votes.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 01:14:44 GMT"
}
]
| 2012-04-18T00:00:00 | [
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0903.1139 | Toby Walsh | Christian Bessiere and Emmanuel Hebrard and Brahim Hnich and Toby
Walsh | The Complexity of Reasoning with Global Constraints | null | Constraints 12(2): 239-259 (2007) | null | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constraint propagation is one of the techniques central to the success of
constraint programming. To reduce search, fast algorithms associated with each
constraint prune the domains of variables. With global (or non-binary)
constraints, the cost of such propagation may be much greater than the
quadratic cost for binary constraints. We therefore study the computational
complexity of reasoning with global constraints. We first characterise a number
of important questions related to constraint propagation. We show that such
questions are intractable in general, and identify dependencies between the
tractability and intractability of the different questions. We then demonstrate
how the tools of computational complexity can be used in the design and
analysis of specific global constraints. In particular, we illustrate how
computational complexity can be used to determine when a lesser level of local
consistency should be enforced, when constraints can be safely generalized,
when decomposing constraints will reduce the amount of pruning, and when
combining constraints is tractable.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 01:32:14 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Bessiere",
"Christian",
""
],
[
"Hebrard",
"Emmanuel",
""
],
[
"Hnich",
"Brahim",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.1146 | Toby Walsh | Toby Walsh | Breaking Value Symmetry | Principles and Practice of Constraint Programming - CP 2007, 13th
International Conference, CP 2007, Providence, RI, USA, September 23-27,
2007, Proceedings. Lecture Notes in Computer Science 4741 Springer 2007, ISBN
978-3-540-74969- | null | null | COMIC-2007-008 | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One common type of symmetry is when values are symmetric. For example, if we
are assigning colours (values) to nodes (variables) in a graph colouring
problem then we can uniformly interchange the colours throughout a colouring.
For a problem with value symmetries, all symmetric solutions can be eliminated
in polynomial time. However, as we show here, both static and dynamic methods
to deal with symmetry have computational limitations. With static methods,
pruning all symmetric values is NP-hard in general. With dynamic methods, we
can take exponential time on problems which static methods solve without
search.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 03:50:17 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.1147 | Toby Walsh | Yasuhiko Takenaga and Toby Walsh | Tetravex is NP-complete | null | Inf. Process. Lett. 99(5): 171-174 (2006) | null | null | cs.CC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tetravex is a widely played one person computer game in which you are given
$n^2$ unit tiles, each edge of which is labelled with a number. The objective
is to place each tile within a $n$ by $n$ square such that all neighbouring
edges are labelled with an identical number. Unfortunately, playing Tetravex is
computationally hard. More precisely, we prove that deciding if there is a
tiling of the Tetravex board is NP-complete. Deciding where to place the tiles
is therefore NP-hard. This may help to explain why Tetravex is a good puzzle.
This result compliments a number of similar results for one person games
involving tiling. For example, NP-completeness results have been shown for: the
offline version of Tetris, KPlumber (which involves rotating tiles containing
drawings of pipes to make a connected network), and shortest sliding puzzle
problems. It raises a number of open questions. For example, is the infinite
version Turing-complete? How do we generate Tetravex problems which are truly
puzzling as random NP-complete problems are often surprising easy to solve? Can
we observe phase transition behaviour? What about the complexity of the problem
when it is guaranteed to have an unique solution? How do we generate puzzles
with unique solutions?
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 04:00:47 GMT"
}
]
| 2012-04-18T00:00:00 | [
[
"Takenaga",
"Yasuhiko",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.1150 | Toby Walsh | S. Armagan Tarim and Suresh Manandhar and Toby Walsh | Stochastic Constraint Programming: A Scenario-Based Approach | null | Constraints 11(1): 53-80 (2006) | 10.1007/s10601-006-6849-7 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To model combinatorial decision problems involving uncertainty and
probability, we introduce scenario based stochastic constraint programming.
Stochastic constraint programs contain both decision variables, which we can
set, and stochastic variables, which follow a discrete probability
distribution. We provide a semantics for stochastic constraint programs based
on scenario trees. Using this semantics, we can compile stochastic constraint
programs down into conventional (non-stochastic) constraint programs. This
allows us to exploit the full power of existing constraint solvers. We have
implemented this framework for decision making under uncertainty in stochastic
OPL, a language which is based on the OPL constraint modelling language
[Hentenryck et al., 1999]. To illustrate the potential of this framework, we
model a wide range of problems in areas as diverse as portfolio
diversification, agricultural planning and production/inventory management.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 04:12:20 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Tarim",
"S. Armagan",
""
],
[
"Manandhar",
"Suresh",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.1152 | Toby Walsh | Toby Walsh | Stochastic Constraint Programming | Proceedings of the 15th Eureopean Conference on Artificial
Intelligence | ECAI 2002: 111-115 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To model combinatorial decision problems involving uncertainty and
probability, we introduce stochastic constraint programming. Stochastic
constraint programs contain both decision variables (which we can set) and
stochastic variables (which follow a probability distribution). They combine
together the best features of traditional constraint satisfaction, stochastic
integer programming, and stochastic satisfiability. We give a semantics for
stochastic constraint programs, and propose a number of complete algorithms and
approximation procedures. Finally, we discuss a number of extensions of
stochastic constraint programming to relax various assumptions like the
independence between stochastic variables, and compare with other approaches
for decision making under uncertainty.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 04:20:41 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.1157 | Georgios Rodolakis | Philippe Jacquet, Bernard Mans and Georgios Rodolakis | Information Propagation Speed in Mobile and Delay Tolerant Networks | null | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to increase our understanding of the fundamental
performance limits of mobile and Delay Tolerant Networks (DTNs), where
end-to-end multi-hop paths may not exist and communication routes may only be
available through time and mobility. We use analytical tools to derive generic
theoretical upper bounds for the information propagation speed in large scale
mobile and intermittently connected networks. In other words, we upper-bound
the optimal performance, in terms of delay, that can be achieved using any
routing algorithm. We then show how our analysis can be applied to specific
mobility and graph models to obtain specific analytical estimates. In
particular, in two-dimensional networks, when nodes move at a maximum speed $v$
and their density $\nu$ is small (the network is sparse and surely
disconnected), we prove that the information propagation speed is upper bounded
by ($1+O(\nu^2))v$ in the random way-point model, while it is upper bounded by
$O(\sqrt{\nu v} v)$ for other mobility models (random walk, Brownian motion).
We also present simulations that confirm the validity of the bounds in these
scenarios. Finally, we generalize our results to one-dimensional and
three-dimensional networks.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 07:16:03 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Jacquet",
"Philippe",
""
],
[
"Mans",
"Bernard",
""
],
[
"Rodolakis",
"Georgios",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1183 | Xiaoying Gan | Shan Da (1), Gan Xiaoying (1), Chen Hsiao-Hwa (2), Qian Liang (1) ((1)
Shanghai Jiao Tong University, (2) National Cheng Kung University) | Fast Cycle Frequency Domain Feature Detection for Cognitive Radio
Systems | 4 pages, 3 figures, submitted to Crowncom 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In cognitive radio systems, one of the main requirements is to detect the
presence of the primary users' transmission, especially in weak signal cases.
Cyclostationary detection is always used to solve weak signal detection,
however, the computational complexity prevents it from wide usage. In this
paper, a fast cycle frequency domain feature detection algorithm has been
proposed, in which only feature frequency with significant cyclic signature is
considered for a certain modulation mode. Simulation results show that the
proposed algorithm has remarkable performance gain than energy detection when
supporting real-time detection with low computational complexity.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 10:30:20 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Da",
"Shan",
""
],
[
"Xiaoying",
"Gan",
""
],
[
"Hsiao-Hwa",
"Chen",
""
],
[
"Liang",
"Qian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1196 | Inge Bethke | Inge Bethke, Piet Rodenburg and Arjen Sevenster | The structure of finite meadows | 12 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A meadow is a commutative ring with a total inverse operator satisfying
0^{-1}=0. We show that the class of finite meadows is the closure of the class
of Galois fields under finite products. As a corollary, we obtain a unique
representation of minimal finite meadows in terms of finite prime fields.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 12:08:55 GMT"
}
]
| 2009-03-09T00:00:00 | [
[
"Bethke",
"Inge",
""
],
[
"Rodenburg",
"Piet",
""
],
[
"Sevenster",
"Arjen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.1204 | Alexander Yu. Vlasov | Alexander Yu. Vlasov | Quantum Information Science and Nanotechnology | LaTeX, 12pt, 6 pages | null | null | null | quant-ph cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note is touched upon an application of quantum information science
(QIS) in nanotechnology area. The laws of quantum mechanics may be very
important for nano-scale objects. A problem with simulating of quantum systems
is well known and quantum computer was initially suggested by R. Feynman just
as the way to overcome such difficulties. Mathematical methods developed in QIS
also may be applied for description of nano-devices. Few illustrative examples
are mentioned and they may be related with so-called fourth generation of
nanotechnology products.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 15:49:45 GMT"
}
]
| 2010-05-11T00:00:00 | [
[
"Vlasov",
"Alexander Yu.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.1291 | Andrew M. Childs | Andris Ambainis, Andrew M. Childs, Fran\c{c}ois Le Gall, Seiichiro
Tani | The quantum query complexity of certification | 8 pages; Updated to reflect changes in final journal version and to
point out that the main result only applies for k>1 | Quantum Information and Computation 10, 181-188 (2010) | 10.26421/QIC10.3-4 | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the quantum query complexity of finding a certificate for a
d-regular, k-level balanced NAND formula. Up to logarithmic factors, we show
that the query complexity is Theta(d^{(k+1)/2}) for 0-certificates, and
Theta(d^{k/2}) for 1-certificates. In particular, this shows that the
zero-error quantum query complexity of evaluating such formulas is
O(d^{(k+1)/2}) (again neglecting a logarithmic factor). Our lower bound relies
on the fact that the quantum adversary method obeys a direct sum theorem.
| [
{
"version": "v1",
"created": "Fri, 6 Mar 2009 21:22:18 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Oct 2014 18:40:56 GMT"
}
]
| 2018-12-20T00:00:00 | [
[
"Ambainis",
"Andris",
""
],
[
"Childs",
"Andrew M.",
""
],
[
"Gall",
"François Le",
""
],
[
"Tani",
"Seiichiro",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.1337 | Paolo Frasca | Ruggero Carli, Fabio Fagnani, Paolo Frasca, Sandro Zampieri | Efficient quantization for average consensus | Based on material from the third author's PhD thesis, and on a 2007
conference paper | null | null | null | math.OC cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an algorithm which solves exponentially fast the average
consensus problem on strongly connected network of digital links. The algorithm
is based on an efficient zooming-in/zooming-out quantization scheme.
| [
{
"version": "v1",
"created": "Sat, 7 Mar 2009 11:16:35 GMT"
}
]
| 2011-07-25T00:00:00 | [
[
"Carli",
"Ruggero",
""
],
[
"Fagnani",
"Fabio",
""
],
[
"Frasca",
"Paolo",
""
],
[
"Zampieri",
"Sandro",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
]
|
0903.1352 | Alban Ponse | Jan A. Bergstra and Alban Ponse | An Instruction Sequence Semigroup with Involutive Anti-Automorphisms | 36 pages, 1 table | Scientific Annals of Computer Science, 19:57-92, 2009 | null | null | cs.PL math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an algebra of instruction sequences by presenting a semigroup C
in which programs can be represented without directional bias: in terms of the
next instruction to be executed, C has both forward and backward instructions
and a C-expression can be interpreted starting from any instruction. We provide
equations for thread extraction, i.e., C's program semantics. Then we consider
thread extraction compatible (anti-)homomorphisms and (anti-)automorphisms.
Finally we discuss some expressiveness results.
| [
{
"version": "v1",
"created": "Sat, 7 Mar 2009 17:14:44 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Nov 2009 13:19:57 GMT"
}
]
| 2009-11-07T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Ponse",
"Alban",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
]
|
0903.1374 | Benedetto Intrigila | Benedetto Intrigila and Richard Statman | The Omega Rule is $\mathbf{\Pi_{1}^{1}}$-Complete in the
$\lambda\beta$-Calculus | null | Logical Methods in Computer Science, Volume 5, Issue 2 (April 27,
2009) lmcs:1147 | 10.2168/LMCS-5(2:6)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a functional calculus, the so called \Omega-rule states that if two terms
P and Q applied to any closed term <i>N</i> return the same value (i.e. PN =
QN), then they are equal (i.e. P = Q holds). As it is well known, in the
\lambda\beta-calculus the \Omega-rule does not hold, even when the \eta-rule
(weak extensionality) is added to the calculus. A long-standing problem of H.
Barendregt (1975) concerns the determination of the logical power of the
\Omega-rule when added to the \lambda\beta-calculus. In this paper we solve the
problem, by showing that the resulting theory is \Pi\_{1}^{1}-complete.
| [
{
"version": "v1",
"created": "Sat, 7 Mar 2009 23:20:09 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2009 15:49:47 GMT"
}
]
| 2019-03-14T00:00:00 | [
[
"Intrigila",
"Benedetto",
""
],
[
"Statman",
"Richard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.1379 | Nihar Jindal | Nihar Jindal and Angel Lozano | Optimum Pilot Overhead in Wireless Communication: A Unified Treatment of
Continuous and Block-Fading Channels | Submitted to IEEE Trans. Wireless Communications | null | 10.1109/EW.2010.5483526 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The optimization of the pilot overhead in single-user wireless fading
channels is investigated, and the dependence of this overhead on various system
parameters of interest (e.g., fading rate, signal-to-noise ratio) is
quantified. The achievable pilot-based spectral efficiency is expanded with
respect to the fading rate about the no-fading point, which leads to an
accurate order expansion for the pilot overhead. This expansion identifies that
the pilot overhead, as well as the spectral efficiency penalty with respect to
a reference system with genie-aided CSI (channel state information) at the
receiver, depend on the square root of the normalized Doppler frequency.
Furthermore, it is shown that the widely-used block fading model is only a
special case of more accurate continuous fading models in terms of the
achievable pilot-based spectral efficiency, and that the overhead optimization
for multiantenna systems is effectively the same as for single-antenna systems
with the normalized Doppler frequency multiplied by the number of transmit
antennas.
| [
{
"version": "v1",
"created": "Sun, 8 Mar 2009 00:36:03 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Jindal",
"Nihar",
""
],
[
"Lozano",
"Angel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1386 | Rajkumar Buyya | Christian Vecchiola, Michael Kirley, and Rajkumar Buyya | Multi-Objective Problem Solving With Offspring on Enterprise Clouds | 8 pages | Proceedings of the 10th International Conference on
High-Performance Computing in Asia-Pacific Region (HPC Asia 2009), March 2~5,
2009, Kaohsiung, Taiwan | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a distributed implementation of a network based
multi-objective evolutionary algorithm, called EMO, by using Offspring. Network
based evolutionary algorithms have proven to be effective for multi-objective
problem solving. They feature a network of connections between individuals that
drives the evolution of the algorithm. Unfortunately, they require large
populations to be effective and a distributed implementation can leverage the
computation time. Most of the existing frameworks are limited to providing
solutions that are basic or specific to a given algorithm. Our Offspring
framework is a plug-in based software environment that allows rapid deployment
and execution of evolutionary algorithms on distributed computing environments
such as Enterprise Clouds. Its features and benefits are presented by
describing the distributed implementation of EMO.
| [
{
"version": "v1",
"created": "Sun, 8 Mar 2009 04:37:33 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Vecchiola",
"Christian",
""
],
[
"Kirley",
"Michael",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0903.1388 | Rajkumar Buyya | Chao Jin, Jayavardhana Gubbi, Rajkumar Buyya, and Marimuthu
Palaniswami | Jeeva: Enterprise Grid-enabled Web Portal for Protein Secondary
Structure Prediction | 7 pages | Proceedings of the 16th International Conference on Advanced
Computing and Communication (ADCOM 2008, IEEE Press, New York, USA), Dec.
14-17, 2008, Chennai, India | 10.1109/ADCOM.2008.4760440 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a Grid portal for protein secondary structure prediction
developed by using services of Aneka, a .NET-based enterprise Grid technology.
The portal is used by research scientists to discover new prediction structures
in a parallel manner. An SVM (Support Vector Machine)-based prediction
algorithm is used with 64 sample protein sequences as a case study to
demonstrate the potential of enterprise Grids.
| [
{
"version": "v1",
"created": "Sun, 8 Mar 2009 04:50:53 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Jin",
"Chao",
""
],
[
"Gubbi",
"Jayavardhana",
""
],
[
"Buyya",
"Rajkumar",
""
],
[
"Palaniswami",
"Marimuthu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0903.1389 | Rajkumar Buyya | Saurabh Garg, Pramod Konugurthi, and Rajkumar Buyya | A Linear Programming Driven Genetic Algorithm for Meta-Scheduling on
Utility Grids | 9 pages | Proceedings of the 16th International Conference on Advanced
Computing and Communication (ADCOM 2008, IEEE Press, New York, USA), Dec.
14-17, 2008, Chennai, India | null | null | cs.DC cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The user-level brokers in grids consider individual application QoS
requirements and minimize their cost without considering demands from other
users. This results in contention for resources and sub-optimal schedules.
Meta-scheduling in grids aims to address this scheduling problem, which is NP
hard due to its combinatorial nature. Thus, many heuristic-based solutions
using Genetic Algorithm (GA) have been proposed, apart from traditional
algorithms such as Greedy and FCFS.
We propose a Linear Programming/Integer Programming model (LP/IP) for
scheduling these applications to multiple resources. We also propose a novel
algorithm LPGA (Linear programming driven Genetic Algorithm) which combines the
capabilities of LP and GA. The aim of this algorithm is to obtain the best
metaschedule for utility grids which minimize combined cost of all users in a
coordinated manner. Simulation results show that our proposed integrated
algorithm offers the best schedule having the minimum processing cost with
negligible time overhead.
| [
{
"version": "v1",
"created": "Sun, 8 Mar 2009 04:53:54 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Garg",
"Saurabh",
""
],
[
"Konugurthi",
"Pramod",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0903.1407 | Ricardo Corr\^ea | Manoel Campelo and Ricardo C. Correa | A Lagrangian Relaxation for the Maximum Stable Set Problem | Submitted to International Transactions on Operations Research | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new integer programming formulation for the problem of finding a
maximum stable set of a graph based on representatives of stable sets. In
addition, we investigate exact solutions provided by a Lagrangian decomposition
of this formulation in which only one constraint is relaxed. Some computational
experiments were carried out with an effective multi-threaded implementation of
our algorithm in a multi-core system, and their results are presented.
| [
{
"version": "v1",
"created": "Sun, 8 Mar 2009 12:08:33 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Campelo",
"Manoel",
""
],
[
"Correa",
"Ricardo C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.1443 | Muhammad Salman Asif | Muhammad Salman Asif and Justin Romberg | Dynamic Updating for L1 Minimization | Some sections are re-organized | null | 10.1109/JSTSP.2009.2039174 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The theory of compressive sensing (CS) suggests that under certain
conditions, a sparse signal can be recovered from a small number of linear
incoherent measurements. An effective class of reconstruction algorithms
involve solving a convex optimization program that balances the L1 norm of the
solution against a data fidelity term. Tremendous progress has been made in
recent years on algorithms for solving these L1 minimization programs. These
algorithms, however, are for the most part static: they focus on finding the
solution for a fixed set of measurements.
In this paper, we will discuss "dynamic algorithms" for solving L1
minimization programs for streaming sets of measurements. We consider cases
where the underlying signal changes slightly between measurements, and where
new measurements of a fixed signal are sequentially added to the system. We
develop algorithms to quickly update the solution of several different types of
L1 optimization problems whenever these changes occur, thus avoiding having to
solve a new optimization problem from scratch. Our proposed schemes are based
on homotopy continuation, which breaks down the solution update in a systematic
and efficient way into a small number of linear steps. Each step consists of a
low-rank update and a small number of matrix-vector multiplications -- very
much like recursive least squares. Our investigation also includes dynamic
updating schemes for L1 decoding problems, where an arbitrary signal is to be
recovered from redundant coded measurements which have been corrupted by sparse
errors.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 19:27:28 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Jun 2009 21:20:00 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Asif",
"Muhammad Salman",
""
],
[
"Romberg",
"Justin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1448 | Amelia Sparavigna | Amelia Sparavigna | The Digital Restoration of Da Vinci's Sketches | null | null | null | null | cs.CV cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A sketch, found in one of Leonardo da Vinci's notebooks and covered by the
written notes of this genius, has been recently restored. The restoration
reveals a possible self-portrait of the artist, drawn when he was young. Here,
we discuss the discovery of this self-portrait and the procedure used for
restoration. Actually, this is a restoration performed on the digital image of
the sketch, a procedure that can easily extended and applied to ancient
documents for studies of art and palaeography.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 08:06:09 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Sparavigna",
"Amelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0903.1450 | R Ravi | I. Hafalir, R. Ravi, A. Sayedi | Multi-unit Auctions with Budget Constraints | null | null | null | null | cs.GT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Motivated by sponsored search auctions, we study multi-unit auctions with
budget constraints. In the mechanism we propose, Sort-Cut, understating budgets
or values is weakly dominated. Since Sort-Cut's revenue is increasing in
budgets and values, all kinds of equilibrium deviations from true valuations
turn out to be beneficial to the auctioneer. We show that the revenue of
Sort-Cut can be an order of magnitude greater than that of the natural Market
Clearing Price mechanism, and we discuss the efficiency properties of its
ex-post Nash equilibrium.
| [
{
"version": "v1",
"created": "Sun, 8 Mar 2009 20:17:40 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Mar 2011 10:22:12 GMT"
}
]
| 2011-03-03T00:00:00 | [
[
"Hafalir",
"I.",
""
],
[
"Ravi",
"R.",
""
],
[
"Sayedi",
"A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.1451 | Frederic Dambreville | Frederic Dambreville (DGA/Cta/DT/Gip) | Definition of evidence fusion rules on the basis of Referee Functions | null | null | null | null | cs.AI math.PR stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This chapter defines a new concept and framework for constructing fusion
rules for evidences. This framework is based on a referee function, which does
a decisional arbitrament conditionally to basic decisions provided by the
several sources of information. A simple sampling method is derived from this
framework. The purpose of this sampling approach is to avoid the combinatorics
which are inherent to the definition of fusion rules of evidences. This
definition of the fusion rule by the means of a sampling process makes possible
the construction of several rules on the basis of an algorithmic implementation
of the referee function, instead of a mathematical formulation. Incidentally,
it is a versatile and intuitive way for defining rules. The framework is
implemented for various well known evidence rules. On the basis of this
framework, new rules for combining evidences are proposed, which takes into
account a consensual evaluation of the sources of information.
| [
{
"version": "v1",
"created": "Sun, 8 Mar 2009 19:59:39 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2009 11:49:20 GMT"
}
]
| 2009-03-30T00:00:00 | [
[
"Dambreville",
"Frederic",
"",
"DGA/Cta/DT/Gip"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0903.1476 | Emmanuel Candes | Emmanuel J. Candes and Terence Tao | The Power of Convex Relaxation: Near-Optimal Matrix Completion | 51 pages, 12 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is concerned with the problem of recovering an unknown matrix from
a small fraction of its entries. This is known as the matrix completion
problem, and comes up in a great number of applications, including the famous
Netflix Prize and other similar questions in collaborative filtering. In
general, accurate recovery of a matrix from a small number of entries is
impossible; but the knowledge that the unknown matrix has low rank radically
changes this premise, making the search for solutions meaningful.
This paper presents optimality results quantifying the minimum number of
entries needed to recover a matrix of rank r exactly by any method whatsoever
(the information theoretic limit). More importantly, the paper shows that,
under certain incoherence assumptions on the singular vectors of the matrix,
recovery is possible by solving a convenient convex program as soon as the
number of entries is on the order of the information theoretic limit (up to
logarithmic factors). This convex program simply finds, among all matrices
consistent with the observed entries, that with minimum nuclear norm. As an
example, we show that on the order of nr log(n) samples are needed to recover a
random n x n matrix of rank r by any method, and to be sure, nuclear norm
minimization succeeds as soon as the number of entries is of the form nr
polylog(n).
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 03:52:26 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Candes",
"Emmanuel J.",
""
],
[
"Tao",
"Terence",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1484 | Neri Merhav | Neri Merhav | Physics of the Shannon Limits | 9 pages; submitted to IEEE Trans. on Inform. Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a simple physical interpretation, in the context of the second law
of thermodynamics, to the information inequality (a.k.a. the Gibbs' inequality,
which is also equivalent to the log-sum inequality), asserting that the
relative entropy between two probability distributions cannot be negative.
Since this inequality stands at the basis of the data processing theorem (DPT),
and the DPT in turn is at the heart of most, if not all, proofs of converse
theorems in Shannon theory, it is observed that conceptually, the roots of
fundamental limits of Information Theory can actually be attributed to the laws
of physics, in particular, to the second law of thermodynamics, and at least
indirectly, also to the law of energy conservation. By the same token, in the
other direction: one can view the second law as stemming from
information-theoretic principles.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 06:51:49 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2009 07:24:52 GMT"
}
]
| 2009-03-29T00:00:00 | [
[
"Merhav",
"Neri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1496 | Youngchul Sung | Youngchul Sung, H. Vincent Poor and Heejung Yu | How Much Information can One Get from a Wireless Ad Hoc Sensor Network
over a Correlated Random Field? | 46 pages and 9 figures. To appear in IEEE Transactions on Information
Theory, June 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New large deviations results that characterize the asymptotic information
rates for general $d$-dimensional ($d$-D) stationary Gaussian fields are
obtained. By applying the general results to sensor nodes on a two-dimensional
(2-D) lattice, the asymptotic behavior of ad hoc sensor networks deployed over
correlated random fields for statistical inference is investigated. Under a 2-D
hidden Gauss-Markov random field model with symmetric first order conditional
autoregression and the assumption of no in-network data fusion, the behavior of
the total obtainable information [nats] and energy efficiency [nats/J] defined
as the ratio of total gathered information to the required energy is obtained
as the coverage area, node density and energy vary. When the sensor node
density is fixed, the energy efficiency decreases to zero with rate
$\Theta({area}^{-1/2})$ and the per-node information under fixed per-node
energy also diminishes to zero with rate $O(N_t^{-1/3})$ as the number $N_t$ of
network nodes increases by increasing the coverage area. As the sensor spacing
$d_n$ increases, the per-node information converges to its limit $D$ with rate
$D-\sqrt{d_n}e^{-\alpha d_n}$ for a given diffusion rate $\alpha$. When the
coverage area is fixed and the node density increases, the per-node information
is inversely proportional to the node density. As the total energy $E_t$
consumed in the network increases, the total information obtainable from the
network is given by $O(\log E_t)$ for the fixed node density and fixed coverage
case and by $\Theta (E_t^{2/3})$ for the fixed per-node sensing energy and
fixed density and increasing coverage case.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 08:23:43 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Sung",
"Youngchul",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Yu",
"Heejung",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1502 | Dieter Duyck | Dieter Duyck, Joseph J. Boutros, Marc Moeneclaey | Low-Density Graph Codes for slow fading Relay Channels | Accepted for publication in IEEE Transactions on Information Theory | IEEE Transactions on Information theory, vol 57, no 7, pp. 4202 -
4218, 2011 | 10.1109/TIT.2011.2145470 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study Low-Density Parity-Check (LDPC) codes with iterative decoding on
block-fading (BF) Relay Channels. We consider two users that employ coded
cooperation, a variant of decode-and-forward with a smaller outage probability
than the latter. An outage probability analysis for discrete constellations
shows that full diversity can be achieved only when the coding rate does not
exceed a maximum value that depends on the level of cooperation. We derive a
new code structure by extending the previously published full-diversity
root-LDPC code, designed for the BF point-to-point channel, to exhibit a
rate-compatibility property which is necessary for coded cooperation. We
estimate the asymptotic performance through a new density evolution analysis
and the word error rate performance is determined for finite length codes. We
show that our code construction exhibits near-outage limit performance for all
block lengths and for a range of coding rates up to 0.5, which is the highest
possible coding rate for two cooperating users.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 09:42:24 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Mar 2011 15:09:18 GMT"
}
]
| 2012-10-05T00:00:00 | [
[
"Duyck",
"Dieter",
""
],
[
"Boutros",
"Joseph J.",
""
],
[
"Moeneclaey",
"Marc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1506 | Sourav Dhar | Rabindranath Bera, Sanjib Sil, Sourav Dhar and Subir K. Sarkar | Wi-Fi, WiMax and WCDMA A comparative study based on Channel Impairments
and Equalization method used | 5 pages, 15 fig.,published in ISM-08, Bangalore, India | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe the channel impairments and equalization methods
currently used in WiFi, WiMax and WCDMA. After a review of channel model for
Intelligent Transportation System (ITS), we proposed an equalization method
which will be useful for the estimation of strong multipath channel at a high
velocity.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 10:00:05 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Bera",
"Rabindranath",
""
],
[
"Sil",
"Sanjib",
""
],
[
"Dhar",
"Sourav",
""
],
[
"Sarkar",
"Subir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.1509 | Sourav Dhar | Rabindranath Bera, Sourav Dhar, Debdatta Kandar | Digital Radar for Collision Avoidance and Automatic Cruise Control in
Transportation | 5 pages, 12 figs.,published in ISM-08, Bangalore, India, 3-6 December
2008 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A proper remote sensing device is required for automatic cruise control (ACC)
to avoid collision in transportation system. In this paper we proposed a direct
sequence spread spectrum (DSSS) radar for remote sensing in intelligent
transporation system(ITS). We have successfully detected single target and
through 1D radar imaging we are capable to separate multiple targets. We have
also implemented DSSS radar using software defined radio (SDR) and successfully
detected a single target.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 10:09:40 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Bera",
"Rabindranath",
""
],
[
"Dhar",
"Sourav",
""
],
[
"Kandar",
"Debdatta",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.1511 | Sourav Dhar | D. Kandar, Sourav Dhar, Rabindranath Bera and C.K. Sarkar | MIMO Based Multimedia Communication System | 3 pages, 5 figs., published in ISM-08, Bangalore, India, 3-6 December
2008 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High data rate is required for multimedia communication. But the
communication at high data rate is always challenging. In this work we have
successfully performed data chatting, Voice chatting and high quality video
transmission between two distant units using MIMO adapter, Direct sequence
spread spectrum system and MATLAB/SIMULINK platform.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 10:16:08 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Kandar",
"D.",
""
],
[
"Dhar",
"Sourav",
""
],
[
"Bera",
"Rabindranath",
""
],
[
"Sarkar",
"C. K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.1556 | Tuvi Etzion | Natalia Silberstein and Tuvi Etzion | Enumerative Encoding in the Grassmannian Space | 2009 Informaton Theory Workshop, Taormina | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Codes in the Grassmannian space have found recently application in network
coding. Representation of $k$-dimensional subspaces of $\F_q^n$ has generally
an essential role in solving coding problems in the Grassmannian, and in
particular in encoding subspaces of the Grassmannian. Different representations
of subspaces in the Grassmannian are presented. We use two of these
representations for enumerative encoding of the Grassmannian. One enumerative
encoding is based on Ferrers diagrams representation of subspaces; and another
is based on identifying vector and reduced row echelon form representation of
subspaces. A third method which combine the previous two is more efficient than
the other two enumerative encodings.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 13:39:18 GMT"
}
]
| 2009-03-10T00:00:00 | [
[
"Silberstein",
"Natalia",
""
],
[
"Etzion",
"Tuvi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1588 | Mark Flanagan | Mark F. Flanagan, Enrico Paolini, Marco Chiani and Marc Fossorier | On the Growth Rate of the Weight Distribution of Irregular
Doubly-Generalized LDPC Codes | Revision of the journal paper. 37 pages, 2 figures. Submitted | null | null | UCD-01-01 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, an expression for the asymptotic growth rate of the number of
small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC)
codes is derived. The expression is compact and generalizes existing results
for LDPC and generalized LDPC (GLDPC) codes. Ensembles with check or variable
node minimum distance greater than 2 are shown to be have good growth rate
behavior, while for other ensembles a fundamental parameter is identified which
discriminates between an asymptotically small and an asymptotically large
expected number of small linear-weight codewords. Also, in the latter case it
is shown that the growth rate depends only on the check and variable nodes with
minimum distance 2. An important connection between this new result and the
stability condition of D-GLDPC codes over the BEC is highlighted. Such a
connection, previously observed for LDPC and GLDPC codes, is now extended to
the case of D-GLDPC codes. Finally, it is shown that the analysis may be
extended to include the growth rate of the stopping set size distribution of
irregular D-GLDPC codes.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 16:38:46 GMT"
},
{
"version": "v2",
"created": "Tue, 4 May 2010 15:26:25 GMT"
}
]
| 2010-05-05T00:00:00 | [
[
"Flanagan",
"Mark F.",
""
],
[
"Paolini",
"Enrico",
""
],
[
"Chiani",
"Marco",
""
],
[
"Fossorier",
"Marc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1598 | Damiano Zanardini | Puri Arenas and Damiano Zanardini | 18th Workshop on Logic-based methods in Programming Environments (WLPE
2008) | null | null | null | WLPE/2008 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This volume contains the papers presented at WLPE 2008: the 18th Workshop on
Logic-based Methods in Programming Environments held on 12th December, 2008 in
Udine, Italy. It was held as a satellite workshop of ICLP 2008, the 24th
International Conference on Logic Programming.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 17:26:36 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Mar 2009 14:19:27 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Mar 2009 10:49:16 GMT"
},
{
"version": "v4",
"created": "Mon, 16 Mar 2009 10:39:11 GMT"
},
{
"version": "v5",
"created": "Wed, 18 Mar 2009 14:41:22 GMT"
},
{
"version": "v6",
"created": "Thu, 26 Mar 2009 17:11:37 GMT"
}
]
| 2009-10-02T00:00:00 | [
[
"Arenas",
"Puri",
""
],
[
"Zanardini",
"Damiano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0903.1621 | Saburo Higuchi | Saburo Higuchi and Marc M\'ezard | Susceptibility Propagation for Constraint Satisfaction Problems | 17 pages, 5 figures | J. Phys.: Conf. Ser. 233(2010)012003 | 10.1088/1742-6596/233/1/012003 | null | cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the susceptibility propagation, a message-passing algorithm to
compute correlation functions. It is applied to constraint satisfaction
problems and its accuracy is examined. As a heuristic method to find a
satisfying assignment, we propose susceptibility-guided decimation where
correlations among the variables play an important role. We apply this novel
decimation to locked occupation problems, a class of hard constraint
satisfaction problems exhibited recently. It is shown that the present method
performs better than the standard belief-guided decimation.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 18:38:11 GMT"
}
]
| 2010-07-29T00:00:00 | [
[
"Higuchi",
"Saburo",
""
],
[
"Mézard",
"Marc",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1624 | Shashi Kiran Chilappagari | Shashi Kiran Chilappagari, Michael Chertkov, Mikhail G. Stepanov and
Bane Vasic | Instanton-based Techniques for Analysis and Reduction of Error Floors of
LDPC Codes | To appear in IEEE JSAC On Capacity Approaching Codes. 11 Pages and 6
Figures | null | 10.1109/JSAC.2009.090804 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a family of instanton-based optimization methods developed
recently for the analysis of the error floors of low-density parity-check
(LDPC) codes. Instantons are the most probable configurations of the channel
noise which result in decoding failures. We show that the general idea and the
respective optimization technique are applicable broadly to a variety of
channels, discrete or continuous, and variety of sub-optimal decoders.
Specifically, we consider: iterative belief propagation (BP) decoders, Gallager
type decoders, and linear programming (LP) decoders performing over the
additive white Gaussian noise channel (AWGNC) and the binary symmetric channel
(BSC).
The instanton analysis suggests that the underlying topological structures of
the most probable instanton of the same code but different channels and
decoders are related to each other. Armed with this understanding of the
graphical structure of the instanton and its relation to the decoding failures,
we suggest a method to construct codes whose Tanner graphs are free of these
structures, and thus have less significant error floors.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 19:05:13 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Chilappagari",
"Shashi Kiran",
""
],
[
"Chertkov",
"Michael",
""
],
[
"Stepanov",
"Mikhail G.",
""
],
[
"Vasic",
"Bane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1627 | Fran\c{c}ois Nicolas | Julien Cassaigne and Francois Nicolas | On the Morse-Hedlund complexity gap | 7 pages. Not intended to be submitted. New proof of an old result | null | null | null | cs.FL cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 1938, Morse and Hedlund proved that the subword complexity function of an
infinite word is either bounded or at least linearly growing. In 1982,
Ehrenfeucht and Rozenberg proved that this gap property holds for the subword
complexity function of any language. The aim of the present paper is to present
a self-contained, compact proof of Ehrenfeucht and Rozenberg's result.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 19:15:38 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2009 12:28:47 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Nov 2009 08:48:08 GMT"
},
{
"version": "v4",
"created": "Fri, 4 Dec 2009 17:25:05 GMT"
},
{
"version": "v5",
"created": "Wed, 1 Feb 2012 18:07:36 GMT"
}
]
| 2012-02-02T00:00:00 | [
[
"Cassaigne",
"Julien",
""
],
[
"Nicolas",
"Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.1659 | Zhe Chen | Zhe Chen | Heuristic Reasoning on Graph and Game Complexity of Sudoku | 6 pages, 2 figures | null | null | null | cs.AI cs.GT cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Sudoku puzzle has achieved worldwide popularity recently, and attracted
great attention of the computational intelligence community. Sudoku is always
considered as Satisfiability Problem or Constraint Satisfaction Problem. In
this paper, we propose to focus on the essential graph structure underlying the
Sudoku puzzle. First, we formalize Sudoku as a graph. Then a solving algorithm
based on heuristic reasoning on the graph is proposed. The related r-Reduction
theorem, inference theorem and their properties are proved, providing the
formal basis for developments of Sudoku solving systems. In order to evaluate
the difficulty levels of puzzles, a quantitative measurement of the complexity
level of Sudoku puzzles based on the graph structure and information theory is
proposed. Experimental results show that all the puzzles can be solved fast
using the proposed heuristic reasoning, and that the proposed game complexity
metrics can discriminate difficulty levels of puzzles perfectly.
| [
{
"version": "v1",
"created": "Mon, 9 Mar 2009 22:35:14 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Chen",
"Zhe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0903.1675 | Aravind Kailas | Aravind Kailas, Lakshmi Thanayankizil, Mary Ann Ingram | A Simple Cooperative Transmission Protocol for Energy-Efficient
Broadcasting Over Multi-Hop Wireless Networks | null | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper analyzes a broadcasting technique for wireless multi-hop sensor
networks that uses a form of cooperative diversity called opportunistic large
arrays (OLAs). We propose a method for autonomous scheduling of the nodes,
which limits the nodes that relay and saves as much as 32% of the transmit
energy compared to other broadcast approaches, without requiring Global
Positioning System (GPS), individual node addressing, or inter-node
interaction. This energy-saving is a result of cross-layer interaction, in the
sense that the Medium Access Control (MAC) and routing functions are partially
executed in the Physical (PHY) layer. Our proposed method is called OLA with a
transmission threshold (OLA-T), where a node compares its received power to a
threshold to decide if it should forward. We also investigate OLA with variable
threshold (OLA-VT), which optimizes the thresholds as a function of level.
OLA-T and OLA-VT are compared with OLA broadcasting without a transmission
threshold, each in their minimum energy configuration, using an analytical
method under the orthogonal and continuum assumptions. The trade-off between
the number of OLA levels (or hops) required to achieve successful network
broadcast and transmission energy saved is investigated. The results based on
the analytical assumptions are confirmed with Monte Carlo simulations.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 02:36:30 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Kailas",
"Aravind",
""
],
[
"Thanayankizil",
"Lakshmi",
""
],
[
"Ingram",
"Mary Ann",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1680 | Chao He | H. Zhuge, C. He | Faceted Exploration of Emerging Resource Spaces | 20 pages, 18 figures | null | null | null | cs.DB cs.DL cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Humans have the ability to regcognize the real world from different facets.
Faceted exploration is a mechanism for browsing and understanding large-scale
resources in information network by multiple facets. This paper proposes an
Emerging Resource Space Model, whose schema is a partially ordered set of
concepts with subclassOf relation and each resource is categorized by multiple
concepts. Emering Resource Space (ERS) is a class of resources characterized by
a concept set. ERSes compose a lattice (ERSL) via concept association. A series
of exploration operations is proposed to guide users to explore through ERSL
with more demanding and richer semantics than current faceted navigation. To
fulfill instant response during faceted exploration, we devise an efficient
algorithm for mining and indexing ERSL. The proposed model can effectively
support faceted exploration in various applications from personal information
management to large-scale information sharing.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 04:01:15 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Oct 2010 09:38:02 GMT"
}
]
| 2010-10-06T00:00:00 | [
[
"Zhuge",
"H.",
""
],
[
"He",
"C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0903.1684 | Wei Ren | Wei Ren, Qing Zhao, Ananthram Swami | Connectivity of Heterogeneous Wireless Networks | 46 pages, 19 figures | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the connectivity of large-scale ad hoc heterogeneous wireless
networks, where secondary users exploit channels temporarily unused by primary
users and the existence of a communication link between two secondary users
depends on not only the distance between them but also the transmitting and
receiving activities of nearby primary users. We introduce the concept of
connectivity region defined as the set of density pairs -- the density of
secondary users and the density of primary transmitters -- under which the
secondary network is connected. Using theories and techniques from continuum
percolation, we analytically characterize the connectivity region of the
secondary network and reveal the tradeoff between proximity (the number of
neighbors) and the occurrence of spectrum opportunities. Specifically, we
establish three basic properties of the connectivity region -- contiguity,
monotonicity of the boundary, and uniqueness of the infinite connected
component, where the uniqueness implies the occurrence of a phase transition
phenomenon in terms of the almost sure existence of either zero or one infinite
connected component; we identify and analyze two critical densities which
jointly specify the profile as well as an outer bound on the connectivity
region; we study the impacts of secondary users' transmission power on the
connectivity region and the conditional average degree of a secondary user, and
demonstrate that matching the interference ranges of the primary and the
secondary networks maximizes the tolerance of the secondary network to the
primary traffic load. Furthermore, we establish a necessary condition and a
sufficient condition for connectivity, which lead to an outer bound and an
inner bound on the connectivity region.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 05:37:29 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Mar 2009 06:54:50 GMT"
},
{
"version": "v3",
"created": "Wed, 27 May 2009 23:41:51 GMT"
},
{
"version": "v4",
"created": "Sun, 28 Jun 2009 23:01:25 GMT"
},
{
"version": "v5",
"created": "Sun, 9 Aug 2009 22:42:48 GMT"
}
]
| 2009-08-10T00:00:00 | [
[
"Ren",
"Wei",
""
],
[
"Zhao",
"Qing",
""
],
[
"Swami",
"Ananthram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.1716 | Erez Louidor | Erez Louidor and Brian Marcus | Improved Lower Bounds on Capacities of Symmetric 2-Dimensional
Constraints using Rayleigh Quotients | Submitted to IEEE Trans. Inform. Theory | null | null | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method for computing lower bounds on capacities of 2-dimensional
constraints having a symmetric presentation in either the horizontal or the
vertical direction is presented. The method is a generalization of the method
of Calkin and Wilf (SIAM J. Discrete Math., 1998). Previous best lower bounds
on capacities of certain constraints are improved using the method. It is also
shown how this method, as well as their method for computing upper bounds on
the capacity, can be applied to constraints which are not of finite-type.
Additionally, capacities of 2 families of multi-dimensional constraints are
given exactly.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 09:29:37 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Louidor",
"Erez",
""
],
[
"Marcus",
"Brian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1724 | Tuvi Etzion | Tuvi Etzion | Folding, Tiling, and Multidimensional Coding | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Folding a sequence $S$ into a multidimensional box is a method that is used
to construct multidimensional codes. The well known operation of folding is
generalized in a way that the sequence $S$ can be folded into various shapes.
The new definition of folding is based on lattice tiling and a direction in the
$D$-dimensional grid. There are potentially $\frac{3^D-1}{2}$ different folding
operations. Necessary and sufficient conditions that a lattice combined with a
direction define a folding are given. The immediate and most impressive
application is some new lower bounds on the number of dots in two-dimensional
synchronization patterns. This can be also generalized for multidimensional
synchronization patterns. We show how folding can be used to construct
multidimensional error-correcting codes and to generate multidimensional
pseudo-random arrays.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 09:59:07 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Jul 2009 20:31:31 GMT"
}
]
| 2009-07-29T00:00:00 | [
[
"Etzion",
"Tuvi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1734 | M Sabu THAMPI | Sabu M. Thampi, K. Chandra Sekaran | Review of Replication Schemes for Unstructured P2P Networks | 7 pages | null | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To improve unstructured P2P system performance, one wants to minimize the
number of peers that have to be probed for the shortening of the search time. A
solution to the problem is to employ a replication scheme, which provides high
hit rate for target files. Replication can also provide load balancing and
reduce access latency if the file is accessed by a large population of users.
This paper briefly describes various replication schemes that have appeared in
the literature and also focuses on a novel replication technique called
Q-replication to increase availability of objects in unstructured P2P networks.
The Q-replication technique replicates objects autonomously to suitable sites
based on object popularity and site selection logic by extensively employing
Q-learning concept.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 10:55:26 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Dec 2009 11:46:34 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Thampi",
"Sabu M.",
""
],
[
"Sekaran",
"K. Chandra",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.1765 | Jochen Br\"ocker | Jochen Br\"ocker | A Lower Bound on Arbitrary $f$--Divergences in Terms of the Total
Variation | 4 pages | null | null | null | math.PR cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important tool to quantify the likeness of two probability measures are
f-divergences, which have seen widespread application in statistics and
information theory. An example is the total variation, which plays an
exceptional role among the f-divergences. It is shown that every f-divergence
is bounded from below by a monotonous function of the total variation. Under
appropriate regularity conditions, this function is shown to be monotonous.
Remark: The proof of the main proposition is relatively easy, whence it is
highly likely that the result is known. The author would be very grateful for
any information regarding references or related work.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 13:20:48 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Bröcker",
"Jochen",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0903.1788 | Dirk Bollen | Dirk Bollen and Harry Halpin | The Role of Tag Suggestions in Folksonomies | null | null | null | null | cs.HC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most tagging systems support the user in the tag selection process by
providing tag suggestions, or recommendations, based on a popularity
measurement of tags other users provided when tagging the same resource. In
this paper we investigate the influence of tag suggestions on the emergence of
power law distributions as a result of collaborative tag behavior. Although
previous research has already shown that power laws emerge in tagging systems,
the cause of why power law distributions emerge is not understood empirically.
The majority of theories and mathematical models of tagging found in the
literature assume that the emergence of power laws in tagging systems is mainly
driven by the imitation behavior of users when observing tag suggestions
provided by the user interface of the tagging system. This imitation behavior
leads to a feedback loop in which some tags are reinforced and get more popular
which is also known as the `rich get richer' or a preferential attachment
model. We present experimental results that show that the power law
distribution forms regardless of whether or not tag suggestions are presented
to the users. Furthermore, we show that the real effect of tag suggestions is
rather subtle; the resulting power law distribution is `compressed' if tag
suggestions are given to the user, resulting in a shorter long tail and a
`compressed' top of the power law distribution. The consequences of this
experiment show that tag suggestions by themselves do not account for the
formation of power law distributions in tagging systems.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 14:48:30 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Bollen",
"Dirk",
""
],
[
"Halpin",
"Harry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.1817 | Chris Stucchio | Leslie Greengard and Chris Stucchio | Reconstructing Curves from Points and Tangents | 22 pages, 11 figures | null | null | null | cs.CG | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Reconstructing a finite set of curves from an unordered set of sample points
is a well studied topic. There has been less effort that considers how much
better the reconstruction can be if tangential information is given as well. We
show that if curves are separated from each other by a distance D, then the
sampling rate need only be O(sqrt(D)) for error-free reconstruction. For the
case of point data alone, O(D) sampling is required.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 17:31:34 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Greengard",
"Leslie",
""
],
[
"Stucchio",
"Chris",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0903.1818 | James Lathrop | James I. Lathrop, Jack H. Lutz and Scott M. Summers | Strict Self-Assembly of Discrete Sierpinski Triangles | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Winfree (1998) showed that discrete Sierpinski triangles can self-assemble in
the Tile Assembly Model. A striking molecular realization of this
self-assembly, using DNA tiles a few nanometers long and verifying the results
by atomic-force microscopy, was achieved by Rothemund, Papadakis, and Winfree
(2004). Precisely speaking, the above self-assemblies tile completely
filled-in, two-dimensional regions of the plane, with labeled subsets of these
tiles representing discrete Sierpinski triangles. This paper addresses the more
challenging problem of the strict self-assembly of discrete Sierpinski
triangles, i.e., the task of tiling a discrete Sierpinski triangle and nothing
else. We first prove that the standard discrete Sierpinski triangle cannot
strictly self-assemble in the Tile Assembly Model. We then define the fibered
Sierpinski triangle, a discrete Sierpinski triangle with the same fractal
dimension as the standard one but with thin fibers that can carry data, and
show that the fibered Sierpinski triangle strictly self-assembles in the Tile
Assembly Model. In contrast with the simple XOR algorithm of the earlier,
non-strict self-assemblies, our strict self-assembly algorithm makes extensive,
recursive use of optimal counters, coupled with measured delay and
corner-turning operations. We verify our strict self-assembly using the local
determinism method of Soloveichik and Winfree (2007).
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 19:28:06 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Lathrop",
"James I.",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Summers",
"Scott M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.1820 | Michele Wigger | Amos Lapidoth, Stefan M. Moser, Michele A. Wigger | On the Capacity of Free-Space Optical Intensity Channels | Transmitted to IEEE Transactions on Information Theory. Presented at
ISIT 2008 in Toronto | null | null | 13454533334 | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New upper and lower bounds are presented on the capacity of the free-space
optical intensity channel. This channel is characterized by inputs that are
nonnegative (representing the transmitted optical intensity) and by outputs
that are corrupted by additive white Gaussian noise (because in free space the
disturbances arise from many independent sources). Due to battery and safety
reasons the inputs are simultaneously constrained in both their average and
peak power. For a fixed ratio of the average power to the peak power the
difference between the upper and the lower bounds tends to zero as the average
power tends to infinity, and the ratio of the upper and lower bounds tends to
one as the average power tends to zero. The case where only an average-power
constraint is imposed on the input is treated separately. In this case, the
difference of the upper and lower bound tends to 0 as the average power tends
to infinity, and their ratio tends to a constant as the power tends to zero.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 17:46:32 GMT"
}
]
| 2009-03-11T00:00:00 | [
[
"Lapidoth",
"Amos",
""
],
[
"Moser",
"Stefan M.",
""
],
[
"Wigger",
"Michele A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1822 | Jose Espirito Santo | Jose Espirito Santo, Ralph Matthes, Luis Pinto | Continuation-Passing Style and Strong Normalisation for Intuitionistic
Sequent Calculi | null | Logical Methods in Computer Science, Volume 5, Issue 2 (May 25,
2009) lmcs:1149 | 10.2168/LMCS-5(2:11)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The intuitionistic fragment of the call-by-name version of Curien and
Herbelin's \lambda\_mu\_{\~mu}-calculus is isolated and proved strongly
normalising by means of an embedding into the simply-typed lambda-calculus. Our
embedding is a continuation-and-garbage-passing style translation, the
inspiring idea coming from Ikeda and Nakazawa's translation of Parigot's
\lambda\_mu-calculus. The embedding strictly simulates reductions while usual
continuation-passing-style transformations erase permutative reduction steps.
For our intuitionistic sequent calculus, we even only need "units of garbage"
to be passed. We apply the same method to other calculi, namely successive
extensions of the simply-typed λ-calculus leading to our intuitionistic
system, and already for the simplest extension we consider (λ-calculus
with generalised application), this yields the first proof of strong
normalisation through a reduction-preserving embedding. The results obtained
extend to second and higher-order calculi.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 18:10:52 GMT"
},
{
"version": "v2",
"created": "Mon, 25 May 2009 12:35:06 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Santo",
"Jose Espirito",
""
],
[
"Matthes",
"Ralph",
""
],
[
"Pinto",
"Luis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.1842 | Shrinivas Kudekar Mr. | Shrinivas Kudekar and Nicolas Macris | Decay of Correlations for Sparse Graph Error Correcting Codes | 40 pages, Submitted to SIAM Journal of Discrete Mathematics | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The subject of this paper is transmission over a general class of
binary-input memoryless symmetric channels using error correcting codes based
on sparse graphs, namely low-density generator-matrix and low-density
parity-check codes. The optimal (or ideal) decoder based on the posterior
measure over the code bits, and its relationship to the sub-optimal belief
propagation decoder, are investigated. We consider the correlation (or
covariance) between two codebits, averaged over the noise realizations, as a
function of the graph distance, for the optimal decoder. Our main result is
that this correlation decays exponentially fast for fixed general low-density
generator-matrix codes and high enough noise parameter, and also for fixed
general low-density parity-check codes and low enough noise parameter. This has
many consequences. Appropriate performance curves - called GEXIT functions - of
the belief propagation and optimal decoders match in high/low noise regimes.
This means that in high/low noise regimes the performance curves of the optimal
decoder can be computed by density evolution. Another interpretation is that
the replica predictions of spin-glass theory are exact. Our methods are rather
general and use cluster expansions first developed in the context of
mathematical statistical mechanics.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 20:11:58 GMT"
}
]
| 2009-03-12T00:00:00 | [
[
"Kudekar",
"Shrinivas",
""
],
[
"Macris",
"Nicolas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1850 | Burzin Bhavnagri | Burzin Bhavnagri | Free actions and Grassmanian variety | fixed matrices lost in latex and numbered equations | null | null | null | math.AG cs.CV q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An algebraic notion of representational consistency is defined. A theorem
relating it to free actions is proved. A metrizability problem of the quotient
(a shape space) is discussed. This leads to a new algebraic variety with a
metrizability result. A concrete example is given from stereo vision.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 06:52:53 GMT"
}
]
| 2009-03-18T00:00:00 | [
[
"Bhavnagri",
"Burzin",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
]
|
0903.1857 | Matthew Patitz | David Doty, Matthew J Patitz, Scott M Summers | Limitations of Self-Assembly at Temperature 1 | 10 page conference submission with additional technical appendix
containing proofs | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that if a set $X \subseteq \Z^2$ weakly self-assembles at
temperature 1 in a deterministic tile assembly system satisfying a natural
condition known as \emph{pumpability}, then $X$ is a finite union of
semi-doubly periodic sets. This shows that only the most simple of infinite
shapes and patterns can be constructed using pumpable temperature 1 tile
assembly systems, and gives evidence for the thesis that temperature 2 or
higher is required to carry out general-purpose computation in a tile assembly
system. Finally, we show that general-purpose computation \emph{is} possible at
temperature 1 if negative glue strengths are allowed in the tile assembly
model.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 21:06:35 GMT"
}
]
| 2009-03-12T00:00:00 | [
[
"Doty",
"David",
""
],
[
"Patitz",
"Matthew J",
""
],
[
"Summers",
"Scott M",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.1878 | Denis Mindolin | Denis Mindolin, Jan Chomicki | Contracting preference relations for database applications | 44 pages, 15 figures, submitted to the Special Issue of AIJ on
Preferences | null | null | null | cs.AI cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The binary relation framework has been shown to be applicable to many
real-life preference handling scenarios. Here we study preference contraction:
the problem of discarding selected preferences. We argue that the property of
minimality and the preservation of strict partial orders are crucial for
contractions. Contractions can be further constrained by specifying which
preferences should be protected. We consider two classes of preference
relations: finite and finitely representable. We present algorithms for
computing minimal and preference-protecting minimal contractions for finite as
well as finitely representable preference relations. We study relationships
between preference change in the binary relation framework and belief change in
the belief revision theory. We also introduce some preference query
optimization techniques which can be used in the presence of contraction. We
evaluate the proposed algorithms experimentally and present the results.
| [
{
"version": "v1",
"created": "Tue, 10 Mar 2009 22:34:46 GMT"
}
]
| 2009-03-12T00:00:00 | [
[
"Mindolin",
"Denis",
""
],
[
"Chomicki",
"Jan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0903.1904 | Christopher Laumann | C.R. Laumann, R. Moessner, A. Scardicchio, S.L. Sondhi | Phase transitions and random quantum satisfiability | 9 pages, 3 figures | Quant. Inf. and Comp. (2010) vol. 10 (1) 1 pp. 0001-0015 | null | null | quant-ph cond-mat.dis-nn cond-mat.stat-mech cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Alongside the effort underway to build quantum computers, it is important to
better understand which classes of problems they will find easy and which
others even they will find intractable. We study random ensembles of the
QMA$_1$-complete quantum satisfiability (QSAT) problem introduced by Bravyi.
QSAT appropriately generalizes the NP-complete classical satisfiability (SAT)
problem. We show that, as the density of clauses/projectors is varied, the
ensembles exhibit quantum phase transitions between phases that are satisfiable
and unsatisfiable. Remarkably, almost all instances of QSAT for any hypergraph
exhibit the same dimension of the satisfying manifold. This establishes the
QSAT decision problem as equivalent to a, potentially new, graph theoretic
problem and that the hardest typical instances are likely to be localized in a
bounded range of clause density.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 04:16:16 GMT"
}
]
| 2010-04-29T00:00:00 | [
[
"Laumann",
"C. R.",
""
],
[
"Moessner",
"R.",
""
],
[
"Scardicchio",
"A.",
""
],
[
"Sondhi",
"S. L.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.1945 | Miquel Payar\'o | M. Payar\'o and D. P. Palomar | Hessian and concavity of mutual information, differential entropy, and
entropy power in linear vector Gaussian channels | 33 pages, 2 figures. A shorter version of this paper is to appear in
IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Within the framework of linear vector Gaussian channels with arbitrary
signaling, closed-form expressions for the Jacobian of the minimum mean square
error and Fisher information matrices with respect to arbitrary parameters of
the system are calculated in this paper. Capitalizing on prior research where
the minimum mean square error and Fisher information matrices were linked to
information-theoretic quantities through differentiation, closed-form
expressions for the Hessian of the mutual information and the differential
entropy are derived. These expressions are then used to assess the concavity
properties of mutual information and differential entropy under different
channel conditions and also to derive a multivariate version of the entropy
power inequality due to Costa.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 10:33:37 GMT"
}
]
| 2009-03-12T00:00:00 | [
[
"Payaró",
"M.",
""
],
[
"Palomar",
"D. P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1952 | Bin Jiang | Xiqi Gao, Bin Jiang, Xiao Li, Alex B. Gershman, Matthew R. McKay | Statistical Eigenmode Transmission over Jointly-Correlated MIMO Channels | 32 pages, 6 figures, to appear in IEEE Transactions on Information
Theory | null | 10.1109/TIT.2009.2023737 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate MIMO eigenmode transmission using statistical channel state
information at the transmitter. We consider a general jointly-correlated MIMO
channel model, which does not require separable spatial correlations at the
transmitter and receiver. For this model, we first derive a closed-form tight
upper bound for the ergodic capacity, which reveals a simple and interesting
relationship in terms of the matrix permanent of the eigenmode channel coupling
matrix and embraces many existing results in the literature as special cases.
Based on this closed-form and tractable upper bound expression, we then employ
convex optimization techniques to develop low-complexity power allocation
solutions involving only the channel statistics. Necessary and sufficient
optimality conditions are derived, from which we develop an iterative
water-filling algorithm with guaranteed convergence. Simulations demonstrate
the tightness of the capacity upper bound and the near-optimal performance of
the proposed low-complexity transmitter optimization approach.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 13:50:48 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Gao",
"Xiqi",
""
],
[
"Jiang",
"Bin",
""
],
[
"Li",
"Xiao",
""
],
[
"Gershman",
"Alex B.",
""
],
[
"McKay",
"Matthew R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.