id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0903.0544
Robin Moser
Robin A. Moser, G\'abor Tardos
A constructive proof of the general Lovasz Local Lemma
8 pages
null
null
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lovasz Local Lemma [EL75] is a powerful tool to non-constructively prove the existence of combinatorial objects meeting a prescribed collection of criteria. In his breakthrough paper [Bec91], Beck demonstrated that a constructive variant can be given under certain more restrictive conditions. Simplifications of his procedure and relaxations of its restrictions were subsequently exhibited in several publications [Alo91, MR98, CS00, Mos06, Sri08, Mos08]. In [Mos09], a constructive proof was presented that works under negligible restrictions, formulated in terms of the Bounded Occurrence Satisfiability problem. In the present paper, we reformulate and improve upon these findings so as to directly apply to almost all known applications of the general Local Lemma.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 14:42:01 GMT" }, { "version": "v2", "created": "Tue, 3 Mar 2009 21:10:07 GMT" }, { "version": "v3", "created": "Wed, 20 May 2009 23:30:04 GMT" } ]
2009-05-21T00:00:00
[ [ "Moser", "Robin A.", "" ], [ "Tardos", "Gábor", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.0548
Li Chia Choo
Li-Chia Choo and Kai-Kit Wong
On the 3-Receiver Broadcast Channel with Degraded Message Sets and Confidential Messages
Revised version submiitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, bounds to the rate-equivocation region for the general 3-receiver broadcast channel (BC) with degraded message sets, are presented for confidential messages to be kept secret from one of the receivers. This model is more general than the 2-receiver BCs with confidential messages with an external wiretapper, and the recently studied 3-receiver degraded BCs with confidential messages, since in the model studied in this paper, the conditions on the receivers are general and the wiretapper receives the common message. Wyner's code partitioning combined with double-binning is used to show the achievable rate tuples. Error probability analysis and equivocation calculation are also provided. The secure coding scheme is sufficient to provide security for the 3-receiver BC with 2 or 3 degraded message sets, for the scenarios: (i) 3 degraded message sets, where the first confidential message is sent to receivers 1 and 2 and the second confidential message is sent to receiver 1, (ii) 2 degraded message sets, where one confidential message is sent to receiver 1, and (iii) 2 degraded message sets, where one confidential message is sent to receivers 1 and 2. The proof for the outer bound is shown for the cases where receiver 1 is more capable than the wiretap receiver 3, for the first two scenarios. Under the condition that both receivers 1 and 2 are less noisy than the wiretap receiver 3, the inner and outer bounds coincide, giving the rate-equivocation region for (iii). In addition, a new outer bound for the general 3-receiver BC with 3 degraded messages is obtained.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 14:53:11 GMT" }, { "version": "v2", "created": "Tue, 27 Oct 2009 16:10:28 GMT" } ]
2009-10-27T00:00:00
[ [ "Choo", "Li-Chia", "" ], [ "Wong", "Kai-Kit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.0566
Gilles Z\'emor
Jean-Pierre Tillich and Gilles Zemor
Quantum LDPC codes with positive rate and minimum distance proportional to n^{1/2}
21 pages
IEEE Trans. Inform. Theory. Vol. 60, No 2, pp. 1193--1202. 2014
10.1109/TIT.2013.2292061
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current best asymptotic lower bound on the minimum distance of quantum LDPC codes with fixed non-zero rate is logarithmic in the blocklength. We propose a construction of quantum LDPC codes with fixed non-zero rate and prove that the minimum distance grows proportionally to the square root of the blocklength.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 16:41:00 GMT" }, { "version": "v2", "created": "Fri, 11 Jan 2013 09:25:05 GMT" } ]
2015-03-05T00:00:00
[ [ "Tillich", "Jean-Pierre", "" ], [ "Zemor", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0903.0571
Fortis Alexandra Ms.
Rolf Andreas Rasenack
Adaptation of Black-Box Software Components
16 pages, exposed on 2nd "European Conference on Computer Science & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008),153-168
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The globalization of the software market leads to crucial problems for software companies. More competition between software companies arises and leads to the force on companies to develop ever newer software products in ever shortened time interval. Therefor the time to market for software systems is shortened and obviously the product life cycle is shortened too[...]The approach introduced here presents the novel technique together with a supportive environment that enables developers to cope with the adaptability of black-box software components. A supported environment will be designed that checks the compatibility of black-box software components with the assistance of their specifications.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 17:01:54 GMT" } ]
2009-03-04T00:00:00
[ [ "Rasenack", "Rolf Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.0572
Fortis Alexandra Ms.
Tiberiu Marius Karnyanszky, Corina Musuroi, Carla Amira Karnyanszky
Expert Software for the Determination of Juvenile People's Obesity
8 pages, exposed on 2nd "European Conference on Computer Science and Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 113-120
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Keeping the health condition at the juvenile population is the concern of both the medical staff and the physical education teachers. Considering the steady tendency of the growth of the number of the youth with excessive weight (overweighted or obese) the intervention to combat this phenomenon must be initiated in the early stage when this condition occurs. The screening method for evaluating the body weight presented in this study uses a calculus program through which, based on the input data (age, sex, weight the width of the skin fold) an evaluation regarding each juvenile's weight and the body structure can be done. This program can be used in schools, high schools, universities, to signal the weight excess and to appreciate the intervention results for getting a normal weight.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 17:18:26 GMT" } ]
2009-03-04T00:00:00
[ [ "Karnyanszky", "Tiberiu Marius", "" ], [ "Musuroi", "Corina", "" ], [ "Karnyanszky", "Carla Amira", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0903.0578
Fortis Alexandra Ms.
Tiberiu Marius Karnyanszky, Bogdan Ion Selariu
About Testing the Speed of Calculating the Shortest Route
6 pages, exposed on the 2nd "European Conference on Computer Science & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 121-126
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applied into a various area of domains, the graph theory and its applications allow the determination of the shortest route. The common algorithm to solve this problem is Bellman-Kalaba, based on the matrix multiplying operation. If the graph is very large (e.g., the dimension of the associated incidence matrix is big) one of the main problems is to reduce the calculus time. This paper presents a testing method able to analyze if an acceleration of the Bellman-Kalaba is possible and able to determine the time efficiency.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 17:32:01 GMT" } ]
2009-03-04T00:00:00
[ [ "Karnyanszky", "Tiberiu Marius", "" ], [ "Selariu", "Bogdan Ion", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.0588
Fortis Alexandra Ms.
Catalin Tuican, Tiberiu Marius Karnyanszky, Bogdan Ioan Selariu
Expert System for Quality Assessment in "Tibiscus" University
10 pages, exposed on 2nd "European Conference on Computer Science & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 239-248
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The periodical evaluation of the teaching staff in "Tibiscus" University is based on the specification of the Romanian Agency for Quality Assurance in Higher Education (ARACIS), namely "The quality of teaching and researching staff: The universities must dispose of teaching staff which, as number and functional base must be correctly allocated to the total number of students, depending on the study domain and regarding the qualifications it must depend on the specific of the study program and the proposed quality objectives." This paper presents the implementation of an expert system, offering to the students the possibility to perform the evaluation in a modern way and to the evaluation committee a quick access to all necessary data.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 17:55:47 GMT" } ]
2009-03-04T00:00:00
[ [ "Tuican", "Catalin", "" ], [ "Karnyanszky", "Tiberiu Marius", "" ], [ "Selariu", "Bogdan Ioan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0903.0595
Xiaohu Shang
Xiaohu Shang, Biao Chen, Gerhard Kramer and H. Vincent Poor
Noisy-interference Sum-rate Capacity of Parallel Gaussian Interference Channels
32 pages, 8 figures, submitted to IEEE trans. on Information Theory in Feb
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sum-rate capacity of the parallel Gaussian interference channel is shown to be achieved by independent transmission across sub-channels and treating interference as noise in each sub-channel if the channel coefficients and power constraints satisfy a certain condition. The condition requires the interference to be weak, a situation commonly encountered in, e.g., digital subscriber line transmission. The optimal power allocation is characterized by using the concavity of sum-rate capacity as a function of the power constraints.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 18:40:54 GMT" } ]
2009-03-04T00:00:00
[ [ "Shang", "Xiaohu", "" ], [ "Chen", "Biao", "" ], [ "Kramer", "Gerhard", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.0604
Ben Liang
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
On Stability Region and Delay Performance of Linear-Memory Randomized Scheduling for Time-Varying Networks
Long version of preprint to appear in the IEEE Transactions on Networking
null
10.1109/TNET.2009.2017742
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Throughput optimal scheduling policies in general require the solution of a complex and often NP-hard optimization problem. Related literature has shown that in the context of time-varying channels, randomized scheduling policies can be employed to reduce the complexity of the optimization problem but at the expense of a memory requirement that is exponential in the number of data flows. In this paper, we consider a Linear-Memory Randomized Scheduling Policy (LM-RSP) that is based on a pick-and-compare principle in a time-varying network with $N$ one-hop data flows. For general ergodic channel processes, we study the performance of LM-RSP in terms of its stability region and average delay. Specifically, we show that LM-RSP can stabilize a fraction of the capacity region. Our analysis characterizes this fraction as well as the average delay as a function of channel variations and the efficiency of LM-RSP in choosing an appropriate schedule vector. Applying these results to a class of Markovian channels, we provide explicit results on the stability region and delay performance of LM-RSP.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 19:37:05 GMT" } ]
2016-11-17T00:00:00
[ [ "Lotfinezhad", "Mahdi", "" ], [ "Liang", "Ben", "" ], [ "Sousa", "Elvino S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.0625
Edith Cohen
Edith Cohen, Haim Kaplan
Leveraging Discarded Samples for Tighter Estimation of Multiple-Set Aggregates
16 pages
null
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many datasets such as market basket data, text or hypertext documents, and sensor observations recorded in different locations or time periods, are modeled as a collection of sets over a ground set of keys. We are interested in basic aggregates such as the weight or selectivity of keys that satisfy some selection predicate defined over keys' attributes and membership in particular sets. This general formulation includes basic aggregates such as the Jaccard coefficient, Hamming distance, and association rules. On massive data sets, exact computation can be inefficient or infeasible. Sketches based on coordinated random samples are classic summaries that support approximate query processing. Queries are resolved by generating a sketch (sample) of the union of sets used in the predicate from the sketches these sets and then applying an estimator to this union-sketch. We derive novel tighter (unbiased) estimators that leverage sampled keys that are present in the union of applicable sketches but excluded from the union sketch. We establish analytically that our estimators dominate estimators applied to the union-sketch for {\em all queries and data sets}. Empirical evaluation on synthetic and real data reveals that on typical applications we can expect a 25%-4 fold reduction in estimation error.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 21:21:02 GMT" } ]
2009-03-05T00:00:00
[ [ "Cohen", "Edith", "" ], [ "Kaplan", "Haim", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0903.0650
Mehmet Ak\c{c}akaya
Mehmet Ak\c{c}akaya, Jinsoo Park, Vahid Tarokh
Compressive Sensing Using Low Density Frames
11 pages, 6 figures, Submitted to IEEE Transactions on Signal Processing
null
null
null
cs.IT math.IT stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the compressive sensing of a sparse or compressible signal ${\bf x} \in {\mathbb R}^M$. We explicitly construct a class of measurement matrices, referred to as the low density frames, and develop decoding algorithms that produce an accurate estimate $\hat{\bf x}$ even in the presence of additive noise. Low density frames are sparse matrices and have small storage requirements. Our decoding algorithms for these frames have $O(M)$ complexity. Simulation results are provided, demonstrating that our approach significantly outperforms state-of-the-art recovery algorithms for numerous cases of interest. In particular, for Gaussian sparse signals and Gaussian noise, we are within 2 dB range of the theoretical lower bound in most cases.
[ { "version": "v1", "created": "Tue, 3 Mar 2009 23:05:04 GMT" } ]
2009-03-05T00:00:00
[ [ "Akçakaya", "Mehmet", "" ], [ "Park", "Jinsoo", "" ], [ "Tarokh", "Vahid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" } ]
0903.0666
Matthew Mckay Dr.
Matthew R. McKay, Iain B. Collings, and Antonia M. Tulino
Achievable Sum Rate of MIMO MMSE Recievers: A General Analytic Framework
to appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the achievable sum rate of multiple-input multiple-output (MIMO) wireless systems employing linear minimum mean-squared error (MMSE) receivers. We present a new analytic framework which unveils an interesting connection between the achievable sum rate with MMSE receivers and the ergodic mutual information achieved with optimal receivers. This simple but powerful result enables the vast prior literature on ergodic MIMO mutual information to be directly applied to the analysis of MMSE receivers. The framework is particularized to various Rayleigh and Rician channel scenarios to yield new exact closed-form expressions for the achievable sum rate, as well as simplified expressions in the asymptotic regimes of high and low signal to noise ratios. These expressions lead to the discovery of key insights into the performance of MIMO MMSE receivers under practical channel conditions.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 01:05:41 GMT" } ]
2009-03-05T00:00:00
[ [ "McKay", "Matthew R.", "" ], [ "Collings", "Iain B.", "" ], [ "Tulino", "Antonia M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.0673
Robert McKilliam
Robby G. McKilliam, Warren D. Smith and I. Vaughan L. Clarkson
Linear-time nearest point algorithms for Coxeter lattices
submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2039090
null
cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Coxeter lattices, which we denote $A_{n/m}$, are a family of lattices containing many of the important lattices in low dimensions. This includes $A_n$, $E_7$, $E_8$ and their duals $A_n^*$, $E_7^*$ and $E_8^*$. We consider the problem of finding a nearest point in a Coxeter lattice. We describe two new algorithms, one with worst case arithmetic complexity $O(n\log{n})$ and the other with worst case complexity O(n) where $n$ is the dimension of the lattice. We show that for the particular lattices $A_n$ and $A_n^*$ the algorithms reduce to simple nearest point algorithms that already exist in the literature.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 01:38:50 GMT" } ]
2016-11-17T00:00:00
[ [ "McKilliam", "Robby G.", "" ], [ "Smith", "Warren D.", "" ], [ "Clarkson", "I. Vaughan L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0903.0682
Raymond Chi-Wing Wong
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang and Yabo Xu
Preserving Individual Privacy in Serial Data Publishing
null
null
null
null
cs.DB cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While previous works on privacy-preserving serial data publishing consider the scenario where sensitive values may persist over multiple data releases, we find that no previous work has sufficient protection provided for sensitive values that can change over time, which should be the more common case. In this work we propose to study the privacy guarantee for such transient sensitive values, which we call the global guarantee. We formally define the problem for achieving this guarantee and derive some theoretical properties for this problem. We show that the anonymized group sizes used in the data anonymization is a key factor in protecting individual privacy in serial publication. We propose two strategies for anonymization targeting at minimizing the average group size and the maximum group size. Finally, we conduct experiments on a medical dataset to show that our method is highly efficient and also produces published data of very high utility.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 09:36:29 GMT" } ]
2009-03-05T00:00:00
[ [ "Wong", "Raymond Chi-Wing", "" ], [ "Fu", "Ada Wai-Chee", "" ], [ "Liu", "Jia", "" ], [ "Wang", "Ke", "" ], [ "Xu", "Yabo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0903.0694
Gerard Briscoe Mr
Gerard Briscoe and Alexandros Marinos
Digital Ecosystems in the Clouds: Towards Community Cloud Computing
7 pages, 3 figures, IEEE Digital EcosystemS and Technologies DEST (2009)
null
null
null
cs.NI cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns of privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon, and Microsoft. Community Cloud Computing makes use of the principles of Digital Ecosystems to provide a paradigm for Clouds in the community, offering an alternative architecture for the use cases of Cloud Computing. It is more technically challenging to deal with issues of distributed computing, such as latency, differential resource management, and additional security requirements. However, these are not insurmountable challenges, and with the need to retain control over our digital lives and the potential environmental consequences, it is a challenge we must pursue.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 17:27:34 GMT" }, { "version": "v2", "created": "Thu, 12 Mar 2009 03:12:00 GMT" }, { "version": "v3", "created": "Mon, 5 Oct 2009 01:16:50 GMT" } ]
2009-10-05T00:00:00
[ [ "Briscoe", "Gerard", "" ], [ "Marinos", "Alexandros", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.0695
Shai Haim
Shai Haim and Toby Walsh
Online Estimation of SAT Solving Runtime
6 pages, 3 figures. Proc. of the 11th International Conf. on Theory and Applications of Satisfiability Testing, Guangzhou, China, May 2008
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an online method for estimating the cost of solving SAT problems. Modern SAT solvers present several challenges to estimate search cost including non-chronological backtracking, learning and restarts. Our method uses a linear model trained on data gathered at the start of search. We show the effectiveness of this method using random and structured problems. We demonstrate that predictions made in early restarts can be used to improve later predictions. We also show that we can use such cost estimations to select a solver from a portfolio.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 04:56:07 GMT" } ]
2009-03-05T00:00:00
[ [ "Haim", "Shai", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.0696
Megan Owen
Megan Owen
Computing Geodesic Distances in Tree Space
24 pages, 7 figures; v2: substantially revised for clarity
null
null
null
math.CO cs.CG cs.DM math.MG q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two algorithms for computing the geodesic distance between phylogenetic trees in tree space, as introduced by Billera, Holmes, and Vogtmann (2001). We show that the possible combinatorial types of shortest paths between two trees can be compactly represented by a partially ordered set. We calculate the shortest distance along each candidate path by converting the problem into one of finding the shortest path through a certain region of Euclidean space. In particular, we show there is a linear time algorithm for finding the shortest path between a point in the all positive orthant and a point in the all negative orthant of R^k contained in the subspace of R^k consisting of all orthants with the first i coordinates non-positive and the remaining coordinates non-negative for 0 <= i <= k.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 04:57:00 GMT" }, { "version": "v2", "created": "Tue, 7 Jun 2011 01:14:40 GMT" } ]
2011-06-08T00:00:00
[ [ "Owen", "Megan", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
0903.0710
Veronika Rehn-Sonigo
Anne Benoit (INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme), Henri Casanova, Veronika Rehn-Sonigo (INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme), Yves Robert (INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme)
Resource Allocation for Multiple Concurrent In-Network Stream-Processing Applications
null
null
null
RR-6864
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the operator mapping problem for in-network stream-processing applications. In-network stream-processing amounts to applying one or more trees of operators in steady-state, to multiple data objects that are continuously updated at different locations in the network. The goal is to compute some final data at some desired rate. Different operator trees may share common subtrees. Therefore, it may be possible to reuse some intermediate results in different application trees. The first contribution of this work is to provide complexity results for different instances of the basic problem, as well as integer linear program formulations of various problem instances. The second second contribution is the design of several polynomial-time heuristics. One of the primary objectives of these heuristics is to reuse intermediate results shared by multiple applications. Our quantitative comparisons of these heuristics in simulation demonstrates the importance of choosing appropriate processors for operator mapping. It also allow us to identify a heuristic that achieves good results in practice.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 08:15:00 GMT" } ]
2009-03-05T00:00:00
[ [ "Benoit", "Anne", "", "INRIA Rhône-Alpes / LIP Laboratoire de l'Informatique\n du Parallélisme" ], [ "Casanova", "Henri", "", "INRIA Rhône-Alpes\n / LIP Laboratoire de l'Informatique du Parallélisme" ], [ "Rehn-Sonigo", "Veronika", "", "INRIA Rhône-Alpes\n / LIP Laboratoire de l'Informatique du Parallélisme" ], [ "Robert", "Yves", "", "INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0903.0730
Fortis Alexandra Ms.
Delia Sabina Stinga
Grid Technologies
6 pages, exposed on 2nd "European Conference on Computer Science & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 181-186
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper contains the most important aspects of computing grids. Grid computing allows high performance distributed systems to act as a single computer. An overview of grids structure and techniques is given in order to understand the way grids work.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 11:08:20 GMT" } ]
2009-03-05T00:00:00
[ [ "Stinga", "Delia Sabina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0903.0735
Joost Broekens
Joost Broekens
Modeling the Experience of Emotion
null
null
null
null
cs.AI cs.HC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Affective computing has proven to be a viable field of research comprised of a large number of multidisciplinary researchers resulting in work that is widely published. The majority of this work consists of computational models of emotion recognition, computational modeling of causal factors of emotion and emotion expression through rendered and robotic faces. A smaller part is concerned with modeling the effects of emotion, formal modeling of cognitive appraisal theory and models of emergent emotions. Part of the motivation for affective computing as a field is to better understand emotional processes through computational modeling. One of the four major topics in affective computing is computers that have emotions (the others are recognizing, expressing and understanding emotions). A critical and neglected aspect of having emotions is the experience of emotion (Barrett, Mesquita, Ochsner, and Gross, 2007): what does the content of an emotional episode look like, how does this content change over time and when do we call the episode emotional. Few modeling efforts have these topics as primary focus. The launch of a journal on synthetic emotions should motivate research initiatives in this direction, and this research should have a measurable impact on emotion research in psychology. I show that a good way to do so is to investigate the psychological core of what an emotion is: an experience. I present ideas on how the experience of emotion could be modeled and provide evidence that several computational models of emotion are already addressing the issue.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 11:26:24 GMT" } ]
2009-03-05T00:00:00
[ [ "Broekens", "Joost", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0903.0737
Fortis Alexandra Ms.
Daniela Ilea
C# - Connecting a Mobile Application to Oracle Server via Web Services
6 pages, exposed on 2nd "European Comference on Computer Science and Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 101-106
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article is focused on mobile development using Visual Studio 2005, web services and their connection to Oracle server, willing to help programmers to realize simple and useful mobile applications.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 11:35:22 GMT" } ]
2009-03-05T00:00:00
[ [ "Ilea", "Daniela", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.0742
Amitabha Bagchi
Amitabha Bagchi, Adit Madan, Achal Premi
Hierarchical neighbor graphs: A low stretch connected structure for points in Euclidean space
null
Ad Hoc Sens. Wirel. Ne 26(1-4):171-191, 2015
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce hierarchical neighbor graphs, a new architecture for connecting ad hoc wireless nodes distributed in a plane. The structure has the flavor of hierarchical clustering and requires only local knowledge and minimal computation at each node to be formed and repaired. Hence, it is a suitable interconnection model for an ad hoc wireless sensor network. The structure is able to use energy efficiently by reorganizing dynamically when the battery power of heavily utilized nodes degrades and is able to achieve throughput, energy efficiency and network lifetimes that compare favorably with the leading proposals for data collation in sensor networks such as LEACH (Heinzelman et. al., 2002). Additionally, hierarchical neighbor graphs have low power stretch i.e. the power required to connect nodes through the network is a small factor higher than the power required to connect them directly. Our structure also compares favorably to mathematical structures proposed for connecting points in a plane e.g. nearest-neighbor graphs (Ballister et. al., 2005), $\theta$-graphs (Ruppert and Seidel, 1991), in that it has expected constant degree and does not require any significant computation or global information to be formed.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 12:03:41 GMT" }, { "version": "v2", "created": "Mon, 6 Apr 2009 15:44:38 GMT" }, { "version": "v3", "created": "Sat, 1 Aug 2009 10:44:36 GMT" } ]
2015-09-30T00:00:00
[ [ "Bagchi", "Amitabha", "" ], [ "Madan", "Adit", "" ], [ "Premi", "Achal", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.0748
Agung Trisetyarso
Agung Trisetyarso and Rodney Van Meter
Circuit Design for A Measurement-Based Quantum Carry-Lookahead Adder
28 pages and 14 figures
Int. J. Quantum Inf. 8, 843 (2010)
10.1142/S0219749910006496
null
quant-ph cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the design and evaluation of a quantum carry-lookahead adder (QCLA) using measurement-based quantum computation (MBQC), called MBQCLA. QCLA was originally designed for an abstract, concurrent architecture supporting long-distance communication, but most realistic architectures heavily constrain communication distances. The quantum carry-lookahead adder is faster than a quantum ripple-carry adder; QCLA has logarithmic depth while ripple adders have linear depth. MBQCLA utilizes MBQC's ability to transfer quantum states in unit time to accelerate addition. MBQCLA breaks the latency limit of addition circuits in nearest neighbor-only architectures : compared to the $\Theta(n)$ limit on circuit depth for linear nearest-neighbor architectures, it can reach $\Theta(log n)$ depth. MBQCLA is an order of magnitude faster than a ripple-carry adder when adding registers longer than 100 qubits, but requires a cluster state that is an order of magnitude larger. The cluster state resources can be classified as computation and communication; for the unoptimized form, $\approx$ 88 % of the resources are used for communication. Hand optimization of horizontal communication costs results in a $\approx$ 12% reduction in spatial resources for the in-place MBQCLA circuit. For comparison, a graph state quantum carry-lookahead adder (GSQCLA) uses only $\approx$ 9 % of the spatial resources of the MBQCLA.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 12:32:01 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2009 04:45:05 GMT" } ]
2010-10-04T00:00:00
[ [ "Trisetyarso", "Agung", "" ], [ "Van Meter", "Rodney", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0903.0786
Carlos Loria-Saenz A
Carlos Loria-Saenz
On Requirements for Programming Exercises from an E-learning Perspective
ii + 31 pages
null
null
SEKI Working-Paper SWP-2008-01
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we deal with the question of modeling programming exercises for novices pointing to an e-learning scenario. Our purpose is to identify basic requirements, raise some key questions and propose potential answers from a conceptual perspective. Presented as a general picture, we hypothetically situate our work in a general context where e-learning instructional material needs to be adapted to form part of an introductory Computer Science (CS) e-learning course at the CS1-level. Meant is a potential course which aims at improving novices skills and knowledge on the essentials of programming by using e-learning based approaches in connection (at least conceptually) with a general host framework like Activemath (www.activemath.org). Our elaboration covers contextual and, particularly, cognitive elements preparing the terrain for eventual research stages in a derived project, as indicated. We concentrate our main efforts on reasoning mechanisms about exercise complexity that can eventually offer tool support for the task of exercise authoring. We base our requirements analysis on our own perception of the exercise subsystem provided by Activemath especially within the domain reasoner area. We enrich the analysis by bringing to the discussion several relevant contextual elements from the CS1 courses, its definition and implementation. Concerning cognitive models and exercises, we build upon the principles of Bloom's Taxonomy as a relatively standardized basis and use them as a framework for study and analysis of complexity in basic programming exercises. Our analysis includes requirements for the domain reasoner which are necessary for the exercise analysis. We propose for such a purpose a three-layered conceptual model considering exercise evaluation, programming and metaprogramming.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 15:29:42 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2009 18:50:57 GMT" } ]
2009-03-13T00:00:00
[ [ "Loria-Saenz", "Carlos", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.0802
Tomasz Truderung
Ralf Kuesters, Tomasz Truderung
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols
An extended version of a paper from IEEE Symposium on Security and Privacy (S&P) 2009
null
10.1109/SP.2009.13
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coercion resistance is an important and one of the most intricate security requirements of electronic voting protocols. Several definitions of coercion resistance have been proposed in the literature, including definitions based on symbolic models. However, existing definitions in such models are rather restricted in their scope and quite complex. In this paper, we therefore propose a new definition of coercion resistance in a symbolic setting, based on an epistemic approach. Our definition is relatively simple and intuitive. It allows for a fine-grained formulation of coercion resistance and can be stated independently of a specific, symbolic protocol and adversary model. As a proof of concept, we apply our definition to three voting protocols. In particular, we carry out the first rigorous analysis of the recently proposed Civitas system. We precisely identify those conditions under which this system guarantees coercion resistance or fails to be coercion resistant. We also analyze protocols proposed by Lee et al. and Okamoto.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 16:49:00 GMT" }, { "version": "v2", "created": "Fri, 29 May 2009 10:51:25 GMT" } ]
2016-11-18T00:00:00
[ [ "Kuesters", "Ralf", "" ], [ "Truderung", "Tomasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0903.0829
Marko Horvat
Marko Horvat, Sinisa Popovic, Nikola Bogunovic and Kresimir Cosic
Tagging multimedia stimuli with ontologies
7 pages, 7 figures, 1 table, submitted for publication (MIPRO 2009)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Successful management of emotional stimuli is a pivotal issue concerning Affective Computing (AC) and the related research. As a subfield of Artificial Intelligence, AC is concerned not only with the design of computer systems and the accompanying hardware that can recognize, interpret, and process human emotions, but also with the development of systems that can trigger human emotional response in an ordered and controlled manner. This requires the maximum attainable precision and efficiency in the extraction of data from emotionally annotated databases While these databases do use keywords or tags for description of the semantic content, they do not provide either the necessary flexibility or leverage needed to efficiently extract the pertinent emotional content. Therefore, to this extent we propose an introduction of ontologies as a new paradigm for description of emotionally annotated data. The ability to select and sequence data based on their semantic attributes is vital for any study involving metadata, semantics and ontological sorting like the Semantic Web or the Social Semantic Desktop, and the approach described in the paper facilitates reuse in these areas as well.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 18:13:41 GMT" } ]
2009-03-05T00:00:00
[ [ "Horvat", "Marko", "" ], [ "Popovic", "Sinisa", "" ], [ "Bogunovic", "Nikola", "" ], [ "Cosic", "Kresimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.0843
Jordi Planes
Vasco Manquinho and Joao Marques-Silva and Jordi Planes
Algorithms for Weighted Boolean Optimization
14 pages, 2 algorithms, 3 tables, 1 figure
null
null
null
cs.AI cs.LO
http://creativecommons.org/licenses/by/3.0/
The Pseudo-Boolean Optimization (PBO) and Maximum Satisfiability (MaxSAT) problems are natural optimization extensions of Boolean Satisfiability (SAT). In the recent past, different algorithms have been proposed for PBO and for MaxSAT, despite the existence of straightforward mappings from PBO to MaxSAT and vice-versa. This papers proposes Weighted Boolean Optimization (WBO), a new unified framework that aggregates and extends PBO and MaxSAT. In addition, the paper proposes a new unsatisfiability-based algorithm for WBO, based on recent unsatisfiability-based algorithms for MaxSAT. Besides standard MaxSAT, the new algorithm can also be used to solve weighted MaxSAT and PBO, handling pseudo-Boolean constraints either natively or by translation to clausal form. Experimental results illustrate that unsatisfiability-based algorithms for MaxSAT can be orders of magnitude more efficient than existing dedicated algorithms. Finally, the paper illustrates how other algorithms for either PBO or MaxSAT can be extended to WBO.
[ { "version": "v1", "created": "Wed, 4 Mar 2009 20:21:56 GMT" }, { "version": "v2", "created": "Fri, 6 Mar 2009 09:18:32 GMT" } ]
2009-03-06T00:00:00
[ [ "Manquinho", "Vasco", "" ], [ "Marques-Silva", "Joao", "" ], [ "Planes", "Jordi", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.0889
David Doty
David Doty, Matthew J. Patitz
A Domain-Specific Language for Programming in the Tile Assembly Model
null
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a domain-specific language (DSL) for creating sets of tile types for simulations of the abstract Tile Assembly Model. The language defines objects known as tile templates, which represent related groups of tiles, and a small number of basic operations on tile templates that help to eliminate the error-prone drudgery of enumerating such tile types manually or with low-level constructs of general-purpose programming languages. The language is implemented as a class library in Python (a so-called internal DSL), but is presented independently of Python or object-oriented programming, with emphasis on supporting the creation of visual editing tools for programmatically creating large sets of complex tile types without needing to write a program.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 01:19:35 GMT" } ]
2009-03-06T00:00:00
[ [ "Doty", "David", "" ], [ "Patitz", "Matthew J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0903.0914
Freddy Munoz
Freddy Munoz (INRIA - Irisa), Benoit Baudry (INRIA - Irisa)
Artificial table testing dynamically adaptive systems
null
null
null
RR-6866
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamically Adaptive Systems (DAS) are systems that modify their behavior and structure in response to changes in their surrounding environment. Critical mission systems increasingly incorporate adaptation and response to the environment; examples include disaster relief and space exploration systems. These systems can be decomposed in two parts: the adaptation policy that specifies how the system must react according to the environmental changes and the set of possible variants to reconfigure the system. A major challenge for testing these systems is the combinatorial explosions of variants and envi-ronment conditions to which the system must react. In this paper we focus on testing the adaption policy and propose a strategy for the selection of envi-ronmental variations that can reveal faults in the policy. Artificial Shaking Table Testing (ASTT) is a strategy inspired by shaking table testing (STT), a technique widely used in civil engineering to evaluate building's structural re-sistance to seismic events. ASTT makes use of artificial earthquakes that simu-late violent changes in the environmental conditions and stresses the system adaptation capability. We model the generation of artificial earthquakes as a search problem in which the goal is to optimize different types of envi-ronmental variations.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 05:36:22 GMT" } ]
2009-03-06T00:00:00
[ [ "Munoz", "Freddy", "", "INRIA - Irisa" ], [ "Baudry", "Benoit", "", "INRIA - Irisa" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.0938
Gregory Gutin
Nathann Cohen, Fedor V. Fomin, Gregory Gutin, Eun Jung Kim, Saket Saurabh, Anders Yeo
Algorithm for Finding $k$-Vertex Out-trees and its Application to $k$-Internal Out-branching Problem
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An out-tree $T$ is an oriented tree with only one vertex of in-degree zero. A vertex $x$ of $T$ is internal if its out-degree is positive. We design randomized and deterministic algorithms for deciding whether an input digraph contains a given out-tree with $k$ vertices. The algorithms are of runtime $O^*(5.704^k)$ and $O^*(5.704^{k(1+o(1))})$, respectively. We apply the deterministic algorithm to obtain a deterministic algorithm of runtime $O^*(c^k)$, where $c$ is a constant, for deciding whether an input digraph contains a spanning out-tree with at least $k$ internal vertices. This answers in affirmative a question of Gutin, Razgon and Kim (Proc. AAIM'08).
[ { "version": "v1", "created": "Thu, 5 Mar 2009 16:15:16 GMT" } ]
2009-03-06T00:00:00
[ [ "Cohen", "Nathann", "" ], [ "Fomin", "Fedor V.", "" ], [ "Gutin", "Gregory", "" ], [ "Kim", "Eun Jung", "" ], [ "Saurabh", "Saket", "" ], [ "Yeo", "Anders", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.0952
Fortis Alexandra Ms.
V. V. Gotsulenko, L. A. Gaponova, P. I. Kogut
Definition of Strange Attractor in Benard problem for Generalized Couette Cell
6 pages, exposed on 2nd "European Conference on Computer Science and Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 95-100
null
null
nlin.CD cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For movements of the viscous continuous flow in generalized Couette cell the dynamic system describing the central limiting variety is received.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 10:45:51 GMT" } ]
2009-03-06T00:00:00
[ [ "Gotsulenko", "V. V.", "" ], [ "Gaponova", "L. A.", "" ], [ "Kogut", "P. I.", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0903.0960
Fortis Alexandra Ms.
Georgiana Petruta Fintineanu
Directing RF Terminals Using TELNET Applications
8 pages, exposed on 2nd "European Conference on Computer Sicence & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 61-68
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present study aims to emphasize the way in which the TELNET protocol for directing the mobile terminals is used and works. The paper is structured in three parts: the first two parts are a theoretic presentation of the TELNET protocol, respectively of the mobile terminals. The third part contains an application of the way in which a mobile terminal can be programmed using the TELNET protocol.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 11:00:42 GMT" } ]
2009-03-06T00:00:00
[ [ "Fintineanu", "Georgiana Petruta", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.0962
Fortis Alexandra Ms.
Leonard Mada
Hospital Acquired Infections: Advantages of a Computerized Surveillance
10 pages, exposed on 2nd "European Conference on Computer Science & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus, Comp. Sci. Series 6 (2008), 135-144
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To asses the advantages of a computerized surveillance system to detect Healthcare-Associated Infections (HAI). All HAI reported to the Timis County branch of the Romanian National Health Insurance and the Public Health Authority during the year 2007 were collected and assessed for validity
[ { "version": "v1", "created": "Thu, 5 Mar 2009 11:15:23 GMT" } ]
2009-03-06T00:00:00
[ [ "Mada", "Leonard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.0992
Fortis Alexandra Ms.
Diana Sophia Codat
L'entreprise franco-roumaine face au Internet
6 pages, exposed on 2nd "European conference on Computer Science & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 25-30
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main goal of the present work is to analyze the activity of the French companies from Romania related to the increasing use of the information and communication technology in the productive field. The convergent assembly of information and communication technologies and the process of economic globalization have led to a profound transformation of the economic activity. The present paper is part of a series of studies made on the French firms from Romania between 2007 and 2008.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 14:04:07 GMT" }, { "version": "v2", "created": "Tue, 23 Jun 2009 13:12:54 GMT" } ]
2009-06-23T00:00:00
[ [ "Codat", "Diana Sophia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0903.1002
Saquib Razak
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, Khaled A. Harras
How do Wireless Chains Behave? The Impact of MAC Interactions
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in MHWNs whose behavior must be understood to enable building effective protocols. The behavior of chains is determined by a number of complex and interdependent processes that arise as the sources of different chain hops compete to transmit their packets on the shared medium. In this paper, we show that MAC level interactions play the primary role in determining the behavior of chains. We evaluate the types of chains that occur based on the MAC interactions between different links using realistic propagation and packet forwarding models. We discover that the presence of destructive interactions, due to different forms of hidden terminals, does not impact the throughput of an isolated chain significantly. However, due to the increased number of retransmissions required, the amount of bandwidth consumed is significantly higher in chains exhibiting destructive interactions, substantially influencing the overall network performance. These results are validated by testbed experiments. We finally study how different types of chains interfere with each other and discover that well behaved chains in terms of self-interference are more resilient to interference from other chains.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 14:24:28 GMT" } ]
2009-03-06T00:00:00
[ [ "Razak", "Saquib", "" ], [ "Kolar", "Vinay", "" ], [ "Abu-Ghazaleh", "Nael B.", "" ], [ "Harras", "Khaled A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.1017
Fortis Alexandra Ms.
Emil Schwab
On the Category of Partial Bijections
8 pages, exposed on 2nd "European Conference on Computer Science & Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 173-180
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Categories of partial functions have become increasingly important principally because of their applications in theoretical computer science. In this note we prove that the category of partial bijections between sets as an inverse-Baer*-category with closed projections and in which the idempotent split is an exact category. Finally the Noether isomorphism theorems are given for this exact category.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 14:54:42 GMT" } ]
2009-03-06T00:00:00
[ [ "Schwab", "Emil", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.1022
Alyson Fletcher
Alyson K. Fletcher, Sundeep Rangan, and Vivek K Goyal
On-Off Random Access Channels: A Compressed Sensing Framework
18 pages, 5 figures; addition of inadvertently omitted support information and acknowledgments
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a simple on-off random multiple access channel, where n users communicate simultaneously to a single receiver over m degrees of freedom. Each user transmits with probability lambda, where typically lambda n < m << n, and the receiver must detect which users transmitted. We show that when the codebook has i.i.d. Gaussian entries, detecting which users transmitted is mathematically equivalent to a certain sparsity detection problem considered in compressed sensing. Using recent sparsity results, we derive upper and lower bounds on the capacities of these channels. We show that common sparsity detection algorithms, such as lasso and orthogonal matching pursuit (OMP), can be used as tractable multiuser detection schemes and have significantly better performance than single-user detection. These methods do achieve some near-far resistance but--at high signal-to-noise ratios (SNRs)--may achieve capacities far below optimal maximum likelihood detection. We then present a new algorithm, called sequential OMP, that illustrates that iterative detection combined with power ordering or power shaping can significantly improve the high SNR performance. Sequential OMP is analogous to successive interference cancellation in the classic multiple access channel. Our results thereby provide insight into the roles of power control and multiuser detection on random-access signalling.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 15:52:41 GMT" }, { "version": "v2", "created": "Mon, 9 Mar 2009 04:37:30 GMT" } ]
2009-03-09T00:00:00
[ [ "Fletcher", "Alyson K.", "" ], [ "Rangan", "Sundeep", "" ], [ "Goyal", "Vivek K", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1032
Mohammad Raza
Mohammad Raza and Philippa Gardner
Footprints in Local Reasoning
LMCS 2009 (FOSSACS 2008 special issue)
Logical Methods in Computer Science, Volume 5, Issue 2 (April 24, 2009) lmcs:1118
10.2168/LMCS-5(2:4)2009
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Local reasoning about programs exploits the natural local behaviour common in programs by focussing on the footprint - that part of the resource accessed by the program. We address the problem of formally characterising and analysing the footprint notion for abstract local functions introduced by Calcagno, O Hearn and Yang. With our definition, we prove that the footprints are the only essential elements required for a complete specification of a local function. We formalise the notion of small specifications in local reasoning and show that for well-founded resource models, a smallest specification always exists that only includes the footprints, and also present results for the non-well-founded case. Finally, we use this theory of footprints to investigate the conditions under which the footprints correspond to the smallest safe states. We present a new model of RAM in which, unlike the standard model, the footprints of every program correspond to the smallest safe states, and we also identify a general condition on the primitive commands of a programming language which guarantees this property for arbitrary models.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 17:06:05 GMT" }, { "version": "v2", "created": "Fri, 24 Apr 2009 17:59:14 GMT" } ]
2015-07-01T00:00:00
[ [ "Raza", "Mohammad", "" ], [ "Gardner", "Philippa", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.1033
\'Angel del R\'io
Jose Joaquin Bernal, Angel del Rio, Juan Jacobo Simon
Group code structures on affine-invariant codes
7 pages
null
null
null
cs.IT math.GR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A group code structure of a linear code is a description of the code as one-sided or two-sided ideal of a group algebra of a finite group. In these realizations, the group algebra is identified with the ambient space, and the group elements with the coordinates of the ambient space. It is well known that every affine-invariant code of length $p^m$, with $p$ prime, can be realized as an ideal of the group algebra $\F\I$, where $\I$ is the underlying additive group of the field with $p^m$ elements. In this paper we describe all the group code structures of an affine-invariant code of length $p^m$ in terms of a family of maps from $\I$ to the group of automorphisms of $\I$.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 17:08:01 GMT" } ]
2009-03-06T00:00:00
[ [ "Bernal", "Jose Joaquin", "" ], [ "del Rio", "Angel", "" ], [ "Simon", "Juan Jacobo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1059
Tiberiu Marius Karnyanszky
Tiberiu Marius Karnyanszky
Home Heating Systems Design using PHP and MySQL Databases
8 pages (121-128), 5th "Actualities and Perspectives in Hard and Soft", 2007
Ann. Univ. Tibiscus Comp. Sci. Series 5 (2007), 121-128
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the use of a computer application based on a MySQL database, managed by PHP programs, allowing the selection of a heating device using coefficient-based calculus.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 18:33:52 GMT" } ]
2009-03-10T00:00:00
[ [ "Karnyanszky", "Tiberiu Marius", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0903.1061
Tiberiu Marius Karnyanszky
Ovidiu Crista, Tiberiu Marius Karnyanszky
Application for Evaluation of the Professional Competencies of the Teaching Staff
6 pages (71-76), 5th "Actualities and Perspectives in Hard and Soft", 2007
Ann. Univ. Tibiscus Comp. Sci. Series 5 (2007), 71-76
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of the presented application is to offer a full support for universities in retrieving the feedback from their students with regard to their teachers. This is the main reason we described it in this paper. To build this application the following tools have been used: Microsoft Notepad 5.1 (to make the source files), Adobe Photoshop CS3 (to make the background image) and Adobe Flash Media Encoder 8 (to render the video clips).
[ { "version": "v1", "created": "Thu, 5 Mar 2009 18:41:47 GMT" } ]
2009-03-10T00:00:00
[ [ "Crista", "Ovidiu", "" ], [ "Karnyanszky", "Tiberiu Marius", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0903.1095
Jakub Mare\v{c}ek
Edmund K. Burke, Jakub Marecek, Andrew J. Parkes, Hana Rudova
Decomposition, Reformulation, and Diving in University Course Timetabling
45 pages, 7 figures. Improved typesetting of figures and tables
Computers and Operations Research (2010) 37(3), 582-597
10.1016/j.cor.2009.02.023
NOTTCS-TR-2008-02
cs.DS cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many real-life optimisation problems, there are multiple interacting components in a solution. For example, different components might specify assignments to different kinds of resource. Often, each component is associated with different sets of soft constraints, and so with different measures of soft constraint violation. The goal is then to minimise a linear combination of such measures. This paper studies an approach to such problems, which can be thought of as multiphase exploitation of multiple objective-/value-restricted submodels. In this approach, only one computationally difficult component of a problem and the associated subset of objectives is considered at first. This produces partial solutions, which define interesting neighbourhoods in the search space of the complete problem. Often, it is possible to pick the initial component so that variable aggregation can be performed at the first stage, and the neighbourhoods to be explored next are guaranteed to contain feasible solutions. Using integer programming, it is then easy to implement heuristics producing solutions with bounds on their quality. Our study is performed on a university course timetabling problem used in the 2007 International Timetabling Competition, also known as the Udine Course Timetabling Problem. In the proposed heuristic, an objective-restricted neighbourhood generator produces assignments of periods to events, with decreasing numbers of violations of two period-related soft constraints. Those are relaxed into assignments of events to days, which define neighbourhoods that are easier to search with respect to all four soft constraints. Integer programming formulations for all subproblems are given and evaluated using ILOG CPLEX 11. The wider applicability of this approach is analysed and discussed.
[ { "version": "v1", "created": "Thu, 5 Mar 2009 20:40:32 GMT" }, { "version": "v2", "created": "Fri, 20 Mar 2009 17:16:13 GMT" } ]
2014-04-10T00:00:00
[ [ "Burke", "Edmund K.", "" ], [ "Marecek", "Jakub", "" ], [ "Parkes", "Andrew J.", "" ], [ "Rudova", "Hana", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.1125
Aharon Bar Hillel
Ran Gilad-Bachrach, Aharon Bar-Hillel, Liat Ein-Dor
Efficient Human Computation
8 pages, 1 figure
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collecting large labeled data sets is a laborious and expensive task, whose scaling up requires division of the labeling workload between many teachers. When the number of classes is large, miscorrespondences between the labels given by the different teachers are likely to occur, which, in the extreme case, may reach total inconsistency. In this paper we describe how globally consistent labels can be obtained, despite the absence of teacher coordination, and discuss the possible efficiency of this process in terms of human labor. We define a notion of label efficiency, measuring the ratio between the number of globally consistent labels obtained and the number of labels provided by distributed teachers. We show that the efficiency depends critically on the ratio alpha between the number of data instances seen by a single teacher, and the number of classes. We suggest several algorithms for the distributed labeling problem, and analyze their efficiency as a function of alpha. In addition, we provide an upper bound on label efficiency for the case of completely uncoordinated teachers, and show that efficiency approaches 0 as the ratio between the number of labels each teacher provides and the number of classes drops (i.e. alpha goes to 0).
[ { "version": "v1", "created": "Thu, 5 Mar 2009 22:39:46 GMT" } ]
2009-03-09T00:00:00
[ [ "Gilad-Bachrach", "Ran", "" ], [ "Bar-Hillel", "Aharon", "" ], [ "Ein-Dor", "Liat", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0903.1136
Toby Walsh
Toby Walsh
Symmetry Breaking Using Value Precedence
17th European Conference on Artificial Intelligence
ECAI 2006, 168-172
10.1088/1126-6708/2009/06/075
null
cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a comprehensive study of the use of value precedence constraints to break value symmetry. We first give a simple encoding of value precedence into ternary constraints that is both efficient and effective at breaking symmetry. We then extend value precedence to deal with a number of generalizations like wreath value and partial interchangeability. We also show that value precedence is closely related to lexicographical ordering. Finally, we consider the interaction between value precedence and symmetry breaking constraints for variable symmetries.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 01:04:50 GMT" } ]
2015-05-13T00:00:00
[ [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.1137
Toby Walsh
Toby Walsh
Complexity of Terminating Preference Elicitation
7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008)
AAMAS 2008: 967-974
null
null
cs.AI cs.CC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complexity theory is a useful tool to study computational issues surrounding the elicitation of preferences, as well as the strategic manipulation of elections aggregating together preferences of multiple agents. We study here the complexity of determining when we can terminate eliciting preferences, and prove that the complexity depends on the elicitation strategy. We show, for instance, that it may be better from a computational perspective to elicit all preferences from one agent at a time than to elicit individual preferences from multiple agents. We also study the connection between the strategic manipulation of an election and preference elicitation. We show that what we can manipulate affects the computational complexity of manipulation. In particular, we prove that there are voting rules which are easy to manipulate if we can change all of an agent's vote, but computationally intractable if we can change only some of their preferences. This suggests that, as with preference elicitation, a fine-grained view of manipulation may be informative. Finally, we study the connection between predicting the winner of an election and preference elicitation. Based on this connection, we identify a voting rule where it is computationally difficult to decide the probability of a candidate winning given a probability distribution over the votes.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 01:14:44 GMT" } ]
2012-04-18T00:00:00
[ [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0903.1139
Toby Walsh
Christian Bessiere and Emmanuel Hebrard and Brahim Hnich and Toby Walsh
The Complexity of Reasoning with Global Constraints
null
Constraints 12(2): 239-259 (2007)
null
null
cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constraint propagation is one of the techniques central to the success of constraint programming. To reduce search, fast algorithms associated with each constraint prune the domains of variables. With global (or non-binary) constraints, the cost of such propagation may be much greater than the quadratic cost for binary constraints. We therefore study the computational complexity of reasoning with global constraints. We first characterise a number of important questions related to constraint propagation. We show that such questions are intractable in general, and identify dependencies between the tractability and intractability of the different questions. We then demonstrate how the tools of computational complexity can be used in the design and analysis of specific global constraints. In particular, we illustrate how computational complexity can be used to determine when a lesser level of local consistency should be enforced, when constraints can be safely generalized, when decomposing constraints will reduce the amount of pruning, and when combining constraints is tractable.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 01:32:14 GMT" } ]
2009-03-09T00:00:00
[ [ "Bessiere", "Christian", "" ], [ "Hebrard", "Emmanuel", "" ], [ "Hnich", "Brahim", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.1146
Toby Walsh
Toby Walsh
Breaking Value Symmetry
Principles and Practice of Constraint Programming - CP 2007, 13th International Conference, CP 2007, Providence, RI, USA, September 23-27, 2007, Proceedings. Lecture Notes in Computer Science 4741 Springer 2007, ISBN 978-3-540-74969-
null
null
COMIC-2007-008
cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One common type of symmetry is when values are symmetric. For example, if we are assigning colours (values) to nodes (variables) in a graph colouring problem then we can uniformly interchange the colours throughout a colouring. For a problem with value symmetries, all symmetric solutions can be eliminated in polynomial time. However, as we show here, both static and dynamic methods to deal with symmetry have computational limitations. With static methods, pruning all symmetric values is NP-hard in general. With dynamic methods, we can take exponential time on problems which static methods solve without search.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 03:50:17 GMT" } ]
2009-03-09T00:00:00
[ [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.1147
Toby Walsh
Yasuhiko Takenaga and Toby Walsh
Tetravex is NP-complete
null
Inf. Process. Lett. 99(5): 171-174 (2006)
null
null
cs.CC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tetravex is a widely played one person computer game in which you are given $n^2$ unit tiles, each edge of which is labelled with a number. The objective is to place each tile within a $n$ by $n$ square such that all neighbouring edges are labelled with an identical number. Unfortunately, playing Tetravex is computationally hard. More precisely, we prove that deciding if there is a tiling of the Tetravex board is NP-complete. Deciding where to place the tiles is therefore NP-hard. This may help to explain why Tetravex is a good puzzle. This result compliments a number of similar results for one person games involving tiling. For example, NP-completeness results have been shown for: the offline version of Tetris, KPlumber (which involves rotating tiles containing drawings of pipes to make a connected network), and shortest sliding puzzle problems. It raises a number of open questions. For example, is the infinite version Turing-complete? How do we generate Tetravex problems which are truly puzzling as random NP-complete problems are often surprising easy to solve? Can we observe phase transition behaviour? What about the complexity of the problem when it is guaranteed to have an unique solution? How do we generate puzzles with unique solutions?
[ { "version": "v1", "created": "Fri, 6 Mar 2009 04:00:47 GMT" } ]
2012-04-18T00:00:00
[ [ "Takenaga", "Yasuhiko", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.1150
Toby Walsh
S. Armagan Tarim and Suresh Manandhar and Toby Walsh
Stochastic Constraint Programming: A Scenario-Based Approach
null
Constraints 11(1): 53-80 (2006)
10.1007/s10601-006-6849-7
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To model combinatorial decision problems involving uncertainty and probability, we introduce scenario based stochastic constraint programming. Stochastic constraint programs contain both decision variables, which we can set, and stochastic variables, which follow a discrete probability distribution. We provide a semantics for stochastic constraint programs based on scenario trees. Using this semantics, we can compile stochastic constraint programs down into conventional (non-stochastic) constraint programs. This allows us to exploit the full power of existing constraint solvers. We have implemented this framework for decision making under uncertainty in stochastic OPL, a language which is based on the OPL constraint modelling language [Hentenryck et al., 1999]. To illustrate the potential of this framework, we model a wide range of problems in areas as diverse as portfolio diversification, agricultural planning and production/inventory management.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 04:12:20 GMT" } ]
2009-03-09T00:00:00
[ [ "Tarim", "S. Armagan", "" ], [ "Manandhar", "Suresh", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.1152
Toby Walsh
Toby Walsh
Stochastic Constraint Programming
Proceedings of the 15th Eureopean Conference on Artificial Intelligence
ECAI 2002: 111-115
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To model combinatorial decision problems involving uncertainty and probability, we introduce stochastic constraint programming. Stochastic constraint programs contain both decision variables (which we can set) and stochastic variables (which follow a probability distribution). They combine together the best features of traditional constraint satisfaction, stochastic integer programming, and stochastic satisfiability. We give a semantics for stochastic constraint programs, and propose a number of complete algorithms and approximation procedures. Finally, we discuss a number of extensions of stochastic constraint programming to relax various assumptions like the independence between stochastic variables, and compare with other approaches for decision making under uncertainty.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 04:20:41 GMT" } ]
2009-03-09T00:00:00
[ [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.1157
Georgios Rodolakis
Philippe Jacquet, Bernard Mans and Georgios Rodolakis
Information Propagation Speed in Mobile and Delay Tolerant Networks
null
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to increase our understanding of the fundamental performance limits of mobile and Delay Tolerant Networks (DTNs), where end-to-end multi-hop paths may not exist and communication routes may only be available through time and mobility. We use analytical tools to derive generic theoretical upper bounds for the information propagation speed in large scale mobile and intermittently connected networks. In other words, we upper-bound the optimal performance, in terms of delay, that can be achieved using any routing algorithm. We then show how our analysis can be applied to specific mobility and graph models to obtain specific analytical estimates. In particular, in two-dimensional networks, when nodes move at a maximum speed $v$ and their density $\nu$ is small (the network is sparse and surely disconnected), we prove that the information propagation speed is upper bounded by ($1+O(\nu^2))v$ in the random way-point model, while it is upper bounded by $O(\sqrt{\nu v} v)$ for other mobility models (random walk, Brownian motion). We also present simulations that confirm the validity of the bounds in these scenarios. Finally, we generalize our results to one-dimensional and three-dimensional networks.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 07:16:03 GMT" } ]
2009-03-09T00:00:00
[ [ "Jacquet", "Philippe", "" ], [ "Mans", "Bernard", "" ], [ "Rodolakis", "Georgios", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1183
Xiaoying Gan
Shan Da (1), Gan Xiaoying (1), Chen Hsiao-Hwa (2), Qian Liang (1) ((1) Shanghai Jiao Tong University, (2) National Cheng Kung University)
Fast Cycle Frequency Domain Feature Detection for Cognitive Radio Systems
4 pages, 3 figures, submitted to Crowncom 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cognitive radio systems, one of the main requirements is to detect the presence of the primary users' transmission, especially in weak signal cases. Cyclostationary detection is always used to solve weak signal detection, however, the computational complexity prevents it from wide usage. In this paper, a fast cycle frequency domain feature detection algorithm has been proposed, in which only feature frequency with significant cyclic signature is considered for a certain modulation mode. Simulation results show that the proposed algorithm has remarkable performance gain than energy detection when supporting real-time detection with low computational complexity.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 10:30:20 GMT" } ]
2009-03-09T00:00:00
[ [ "Da", "Shan", "" ], [ "Xiaoying", "Gan", "" ], [ "Hsiao-Hwa", "Chen", "" ], [ "Liang", "Qian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1196
Inge Bethke
Inge Bethke, Piet Rodenburg and Arjen Sevenster
The structure of finite meadows
12 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A meadow is a commutative ring with a total inverse operator satisfying 0^{-1}=0. We show that the class of finite meadows is the closure of the class of Galois fields under finite products. As a corollary, we obtain a unique representation of minimal finite meadows in terms of finite prime fields.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 12:08:55 GMT" } ]
2009-03-09T00:00:00
[ [ "Bethke", "Inge", "" ], [ "Rodenburg", "Piet", "" ], [ "Sevenster", "Arjen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.1204
Alexander Yu. Vlasov
Alexander Yu. Vlasov
Quantum Information Science and Nanotechnology
LaTeX, 12pt, 6 pages
null
null
null
quant-ph cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note is touched upon an application of quantum information science (QIS) in nanotechnology area. The laws of quantum mechanics may be very important for nano-scale objects. A problem with simulating of quantum systems is well known and quantum computer was initially suggested by R. Feynman just as the way to overcome such difficulties. Mathematical methods developed in QIS also may be applied for description of nano-devices. Few illustrative examples are mentioned and they may be related with so-called fourth generation of nanotechnology products.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 15:49:45 GMT" } ]
2010-05-11T00:00:00
[ [ "Vlasov", "Alexander Yu.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.1291
Andrew M. Childs
Andris Ambainis, Andrew M. Childs, Fran\c{c}ois Le Gall, Seiichiro Tani
The quantum query complexity of certification
8 pages; Updated to reflect changes in final journal version and to point out that the main result only applies for k>1
Quantum Information and Computation 10, 181-188 (2010)
10.26421/QIC10.3-4
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the quantum query complexity of finding a certificate for a d-regular, k-level balanced NAND formula. Up to logarithmic factors, we show that the query complexity is Theta(d^{(k+1)/2}) for 0-certificates, and Theta(d^{k/2}) for 1-certificates. In particular, this shows that the zero-error quantum query complexity of evaluating such formulas is O(d^{(k+1)/2}) (again neglecting a logarithmic factor). Our lower bound relies on the fact that the quantum adversary method obeys a direct sum theorem.
[ { "version": "v1", "created": "Fri, 6 Mar 2009 21:22:18 GMT" }, { "version": "v2", "created": "Mon, 6 Oct 2014 18:40:56 GMT" } ]
2018-12-20T00:00:00
[ [ "Ambainis", "Andris", "" ], [ "Childs", "Andrew M.", "" ], [ "Gall", "François Le", "" ], [ "Tani", "Seiichiro", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.1337
Paolo Frasca
Ruggero Carli, Fabio Fagnani, Paolo Frasca, Sandro Zampieri
Efficient quantization for average consensus
Based on material from the third author's PhD thesis, and on a 2007 conference paper
null
null
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an algorithm which solves exponentially fast the average consensus problem on strongly connected network of digital links. The algorithm is based on an efficient zooming-in/zooming-out quantization scheme.
[ { "version": "v1", "created": "Sat, 7 Mar 2009 11:16:35 GMT" } ]
2011-07-25T00:00:00
[ [ "Carli", "Ruggero", "" ], [ "Fagnani", "Fabio", "" ], [ "Frasca", "Paolo", "" ], [ "Zampieri", "Sandro", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0903.1352
Alban Ponse
Jan A. Bergstra and Alban Ponse
An Instruction Sequence Semigroup with Involutive Anti-Automorphisms
36 pages, 1 table
Scientific Annals of Computer Science, 19:57-92, 2009
null
null
cs.PL math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an algebra of instruction sequences by presenting a semigroup C in which programs can be represented without directional bias: in terms of the next instruction to be executed, C has both forward and backward instructions and a C-expression can be interpreted starting from any instruction. We provide equations for thread extraction, i.e., C's program semantics. Then we consider thread extraction compatible (anti-)homomorphisms and (anti-)automorphisms. Finally we discuss some expressiveness results.
[ { "version": "v1", "created": "Sat, 7 Mar 2009 17:14:44 GMT" }, { "version": "v2", "created": "Sat, 7 Nov 2009 13:19:57 GMT" } ]
2009-11-07T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Ponse", "Alban", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0903.1374
Benedetto Intrigila
Benedetto Intrigila and Richard Statman
The Omega Rule is $\mathbf{\Pi_{1}^{1}}$-Complete in the $\lambda\beta$-Calculus
null
Logical Methods in Computer Science, Volume 5, Issue 2 (April 27, 2009) lmcs:1147
10.2168/LMCS-5(2:6)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a functional calculus, the so called \Omega-rule states that if two terms P and Q applied to any closed term <i>N</i> return the same value (i.e. PN = QN), then they are equal (i.e. P = Q holds). As it is well known, in the \lambda\beta-calculus the \Omega-rule does not hold, even when the \eta-rule (weak extensionality) is added to the calculus. A long-standing problem of H. Barendregt (1975) concerns the determination of the logical power of the \Omega-rule when added to the \lambda\beta-calculus. In this paper we solve the problem, by showing that the resulting theory is \Pi\_{1}^{1}-complete.
[ { "version": "v1", "created": "Sat, 7 Mar 2009 23:20:09 GMT" }, { "version": "v2", "created": "Mon, 27 Apr 2009 15:49:47 GMT" } ]
2019-03-14T00:00:00
[ [ "Intrigila", "Benedetto", "" ], [ "Statman", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.1379
Nihar Jindal
Nihar Jindal and Angel Lozano
Optimum Pilot Overhead in Wireless Communication: A Unified Treatment of Continuous and Block-Fading Channels
Submitted to IEEE Trans. Wireless Communications
null
10.1109/EW.2010.5483526
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The optimization of the pilot overhead in single-user wireless fading channels is investigated, and the dependence of this overhead on various system parameters of interest (e.g., fading rate, signal-to-noise ratio) is quantified. The achievable pilot-based spectral efficiency is expanded with respect to the fading rate about the no-fading point, which leads to an accurate order expansion for the pilot overhead. This expansion identifies that the pilot overhead, as well as the spectral efficiency penalty with respect to a reference system with genie-aided CSI (channel state information) at the receiver, depend on the square root of the normalized Doppler frequency. Furthermore, it is shown that the widely-used block fading model is only a special case of more accurate continuous fading models in terms of the achievable pilot-based spectral efficiency, and that the overhead optimization for multiantenna systems is effectively the same as for single-antenna systems with the normalized Doppler frequency multiplied by the number of transmit antennas.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 00:36:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Jindal", "Nihar", "" ], [ "Lozano", "Angel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1386
Rajkumar Buyya
Christian Vecchiola, Michael Kirley, and Rajkumar Buyya
Multi-Objective Problem Solving With Offspring on Enterprise Clouds
8 pages
Proceedings of the 10th International Conference on High-Performance Computing in Asia-Pacific Region (HPC Asia 2009), March 2~5, 2009, Kaohsiung, Taiwan
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a distributed implementation of a network based multi-objective evolutionary algorithm, called EMO, by using Offspring. Network based evolutionary algorithms have proven to be effective for multi-objective problem solving. They feature a network of connections between individuals that drives the evolution of the algorithm. Unfortunately, they require large populations to be effective and a distributed implementation can leverage the computation time. Most of the existing frameworks are limited to providing solutions that are basic or specific to a given algorithm. Our Offspring framework is a plug-in based software environment that allows rapid deployment and execution of evolutionary algorithms on distributed computing environments such as Enterprise Clouds. Its features and benefits are presented by describing the distributed implementation of EMO.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 04:37:33 GMT" } ]
2009-03-10T00:00:00
[ [ "Vecchiola", "Christian", "" ], [ "Kirley", "Michael", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0903.1388
Rajkumar Buyya
Chao Jin, Jayavardhana Gubbi, Rajkumar Buyya, and Marimuthu Palaniswami
Jeeva: Enterprise Grid-enabled Web Portal for Protein Secondary Structure Prediction
7 pages
Proceedings of the 16th International Conference on Advanced Computing and Communication (ADCOM 2008, IEEE Press, New York, USA), Dec. 14-17, 2008, Chennai, India
10.1109/ADCOM.2008.4760440
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a Grid portal for protein secondary structure prediction developed by using services of Aneka, a .NET-based enterprise Grid technology. The portal is used by research scientists to discover new prediction structures in a parallel manner. An SVM (Support Vector Machine)-based prediction algorithm is used with 64 sample protein sequences as a case study to demonstrate the potential of enterprise Grids.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 04:50:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Jin", "Chao", "" ], [ "Gubbi", "Jayavardhana", "" ], [ "Buyya", "Rajkumar", "" ], [ "Palaniswami", "Marimuthu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0903.1389
Rajkumar Buyya
Saurabh Garg, Pramod Konugurthi, and Rajkumar Buyya
A Linear Programming Driven Genetic Algorithm for Meta-Scheduling on Utility Grids
9 pages
Proceedings of the 16th International Conference on Advanced Computing and Communication (ADCOM 2008, IEEE Press, New York, USA), Dec. 14-17, 2008, Chennai, India
null
null
cs.DC cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The user-level brokers in grids consider individual application QoS requirements and minimize their cost without considering demands from other users. This results in contention for resources and sub-optimal schedules. Meta-scheduling in grids aims to address this scheduling problem, which is NP hard due to its combinatorial nature. Thus, many heuristic-based solutions using Genetic Algorithm (GA) have been proposed, apart from traditional algorithms such as Greedy and FCFS. We propose a Linear Programming/Integer Programming model (LP/IP) for scheduling these applications to multiple resources. We also propose a novel algorithm LPGA (Linear programming driven Genetic Algorithm) which combines the capabilities of LP and GA. The aim of this algorithm is to obtain the best metaschedule for utility grids which minimize combined cost of all users in a coordinated manner. Simulation results show that our proposed integrated algorithm offers the best schedule having the minimum processing cost with negligible time overhead.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 04:53:54 GMT" } ]
2009-03-10T00:00:00
[ [ "Garg", "Saurabh", "" ], [ "Konugurthi", "Pramod", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0903.1407
Ricardo Corr\^ea
Manoel Campelo and Ricardo C. Correa
A Lagrangian Relaxation for the Maximum Stable Set Problem
Submitted to International Transactions on Operations Research
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new integer programming formulation for the problem of finding a maximum stable set of a graph based on representatives of stable sets. In addition, we investigate exact solutions provided by a Lagrangian decomposition of this formulation in which only one constraint is relaxed. Some computational experiments were carried out with an effective multi-threaded implementation of our algorithm in a multi-core system, and their results are presented.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 12:08:33 GMT" } ]
2009-03-10T00:00:00
[ [ "Campelo", "Manoel", "" ], [ "Correa", "Ricardo C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.1443
Muhammad Salman Asif
Muhammad Salman Asif and Justin Romberg
Dynamic Updating for L1 Minimization
Some sections are re-organized
null
10.1109/JSTSP.2009.2039174
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of compressive sensing (CS) suggests that under certain conditions, a sparse signal can be recovered from a small number of linear incoherent measurements. An effective class of reconstruction algorithms involve solving a convex optimization program that balances the L1 norm of the solution against a data fidelity term. Tremendous progress has been made in recent years on algorithms for solving these L1 minimization programs. These algorithms, however, are for the most part static: they focus on finding the solution for a fixed set of measurements. In this paper, we will discuss "dynamic algorithms" for solving L1 minimization programs for streaming sets of measurements. We consider cases where the underlying signal changes slightly between measurements, and where new measurements of a fixed signal are sequentially added to the system. We develop algorithms to quickly update the solution of several different types of L1 optimization problems whenever these changes occur, thus avoiding having to solve a new optimization problem from scratch. Our proposed schemes are based on homotopy continuation, which breaks down the solution update in a systematic and efficient way into a small number of linear steps. Each step consists of a low-rank update and a small number of matrix-vector multiplications -- very much like recursive least squares. Our investigation also includes dynamic updating schemes for L1 decoding problems, where an arbitrary signal is to be recovered from redundant coded measurements which have been corrupted by sparse errors.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 19:27:28 GMT" }, { "version": "v2", "created": "Sun, 28 Jun 2009 21:20:00 GMT" } ]
2015-05-13T00:00:00
[ [ "Asif", "Muhammad Salman", "" ], [ "Romberg", "Justin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1448
Amelia Sparavigna
Amelia Sparavigna
The Digital Restoration of Da Vinci's Sketches
null
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sketch, found in one of Leonardo da Vinci's notebooks and covered by the written notes of this genius, has been recently restored. The restoration reveals a possible self-portrait of the artist, drawn when he was young. Here, we discuss the discovery of this self-portrait and the procedure used for restoration. Actually, this is a restoration performed on the digital image of the sketch, a procedure that can easily extended and applied to ancient documents for studies of art and palaeography.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 08:06:09 GMT" } ]
2009-03-10T00:00:00
[ [ "Sparavigna", "Amelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0903.1450
R Ravi
I. Hafalir, R. Ravi, A. Sayedi
Multi-unit Auctions with Budget Constraints
null
null
null
null
cs.GT
http://creativecommons.org/licenses/by-nc-sa/3.0/
Motivated by sponsored search auctions, we study multi-unit auctions with budget constraints. In the mechanism we propose, Sort-Cut, understating budgets or values is weakly dominated. Since Sort-Cut's revenue is increasing in budgets and values, all kinds of equilibrium deviations from true valuations turn out to be beneficial to the auctioneer. We show that the revenue of Sort-Cut can be an order of magnitude greater than that of the natural Market Clearing Price mechanism, and we discuss the efficiency properties of its ex-post Nash equilibrium.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 20:17:40 GMT" }, { "version": "v2", "created": "Wed, 2 Mar 2011 10:22:12 GMT" } ]
2011-03-03T00:00:00
[ [ "Hafalir", "I.", "" ], [ "Ravi", "R.", "" ], [ "Sayedi", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0903.1451
Frederic Dambreville
Frederic Dambreville (DGA/Cta/DT/Gip)
Definition of evidence fusion rules on the basis of Referee Functions
null
null
null
null
cs.AI math.PR stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This chapter defines a new concept and framework for constructing fusion rules for evidences. This framework is based on a referee function, which does a decisional arbitrament conditionally to basic decisions provided by the several sources of information. A simple sampling method is derived from this framework. The purpose of this sampling approach is to avoid the combinatorics which are inherent to the definition of fusion rules of evidences. This definition of the fusion rule by the means of a sampling process makes possible the construction of several rules on the basis of an algorithmic implementation of the referee function, instead of a mathematical formulation. Incidentally, it is a versatile and intuitive way for defining rules. The framework is implemented for various well known evidence rules. On the basis of this framework, new rules for combining evidences are proposed, which takes into account a consensual evaluation of the sources of information.
[ { "version": "v1", "created": "Sun, 8 Mar 2009 19:59:39 GMT" }, { "version": "v2", "created": "Mon, 30 Mar 2009 11:49:20 GMT" } ]
2009-03-30T00:00:00
[ [ "Dambreville", "Frederic", "", "DGA/Cta/DT/Gip" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0903.1476
Emmanuel Candes
Emmanuel J. Candes and Terence Tao
The Power of Convex Relaxation: Near-Optimal Matrix Completion
51 pages, 12 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with the problem of recovering an unknown matrix from a small fraction of its entries. This is known as the matrix completion problem, and comes up in a great number of applications, including the famous Netflix Prize and other similar questions in collaborative filtering. In general, accurate recovery of a matrix from a small number of entries is impossible; but the knowledge that the unknown matrix has low rank radically changes this premise, making the search for solutions meaningful. This paper presents optimality results quantifying the minimum number of entries needed to recover a matrix of rank r exactly by any method whatsoever (the information theoretic limit). More importantly, the paper shows that, under certain incoherence assumptions on the singular vectors of the matrix, recovery is possible by solving a convenient convex program as soon as the number of entries is on the order of the information theoretic limit (up to logarithmic factors). This convex program simply finds, among all matrices consistent with the observed entries, that with minimum nuclear norm. As an example, we show that on the order of nr log(n) samples are needed to recover a random n x n matrix of rank r by any method, and to be sure, nuclear norm minimization succeeds as soon as the number of entries is of the form nr polylog(n).
[ { "version": "v1", "created": "Mon, 9 Mar 2009 03:52:26 GMT" } ]
2009-03-10T00:00:00
[ [ "Candes", "Emmanuel J.", "" ], [ "Tao", "Terence", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1484
Neri Merhav
Neri Merhav
Physics of the Shannon Limits
9 pages; submitted to IEEE Trans. on Inform. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a simple physical interpretation, in the context of the second law of thermodynamics, to the information inequality (a.k.a. the Gibbs' inequality, which is also equivalent to the log-sum inequality), asserting that the relative entropy between two probability distributions cannot be negative. Since this inequality stands at the basis of the data processing theorem (DPT), and the DPT in turn is at the heart of most, if not all, proofs of converse theorems in Shannon theory, it is observed that conceptually, the roots of fundamental limits of Information Theory can actually be attributed to the laws of physics, in particular, to the second law of thermodynamics, and at least indirectly, also to the law of energy conservation. By the same token, in the other direction: one can view the second law as stemming from information-theoretic principles.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 06:51:49 GMT" }, { "version": "v2", "created": "Sun, 29 Mar 2009 07:24:52 GMT" } ]
2009-03-29T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1496
Youngchul Sung
Youngchul Sung, H. Vincent Poor and Heejung Yu
How Much Information can One Get from a Wireless Ad Hoc Sensor Network over a Correlated Random Field?
46 pages and 9 figures. To appear in IEEE Transactions on Information Theory, June 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New large deviations results that characterize the asymptotic information rates for general $d$-dimensional ($d$-D) stationary Gaussian fields are obtained. By applying the general results to sensor nodes on a two-dimensional (2-D) lattice, the asymptotic behavior of ad hoc sensor networks deployed over correlated random fields for statistical inference is investigated. Under a 2-D hidden Gauss-Markov random field model with symmetric first order conditional autoregression and the assumption of no in-network data fusion, the behavior of the total obtainable information [nats] and energy efficiency [nats/J] defined as the ratio of total gathered information to the required energy is obtained as the coverage area, node density and energy vary. When the sensor node density is fixed, the energy efficiency decreases to zero with rate $\Theta({area}^{-1/2})$ and the per-node information under fixed per-node energy also diminishes to zero with rate $O(N_t^{-1/3})$ as the number $N_t$ of network nodes increases by increasing the coverage area. As the sensor spacing $d_n$ increases, the per-node information converges to its limit $D$ with rate $D-\sqrt{d_n}e^{-\alpha d_n}$ for a given diffusion rate $\alpha$. When the coverage area is fixed and the node density increases, the per-node information is inversely proportional to the node density. As the total energy $E_t$ consumed in the network increases, the total information obtainable from the network is given by $O(\log E_t)$ for the fixed node density and fixed coverage case and by $\Theta (E_t^{2/3})$ for the fixed per-node sensing energy and fixed density and increasing coverage case.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 08:23:43 GMT" } ]
2009-03-10T00:00:00
[ [ "Sung", "Youngchul", "" ], [ "Poor", "H. Vincent", "" ], [ "Yu", "Heejung", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1502
Dieter Duyck
Dieter Duyck, Joseph J. Boutros, Marc Moeneclaey
Low-Density Graph Codes for slow fading Relay Channels
Accepted for publication in IEEE Transactions on Information Theory
IEEE Transactions on Information theory, vol 57, no 7, pp. 4202 - 4218, 2011
10.1109/TIT.2011.2145470
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study Low-Density Parity-Check (LDPC) codes with iterative decoding on block-fading (BF) Relay Channels. We consider two users that employ coded cooperation, a variant of decode-and-forward with a smaller outage probability than the latter. An outage probability analysis for discrete constellations shows that full diversity can be achieved only when the coding rate does not exceed a maximum value that depends on the level of cooperation. We derive a new code structure by extending the previously published full-diversity root-LDPC code, designed for the BF point-to-point channel, to exhibit a rate-compatibility property which is necessary for coded cooperation. We estimate the asymptotic performance through a new density evolution analysis and the word error rate performance is determined for finite length codes. We show that our code construction exhibits near-outage limit performance for all block lengths and for a range of coding rates up to 0.5, which is the highest possible coding rate for two cooperating users.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 09:42:24 GMT" }, { "version": "v2", "created": "Mon, 28 Mar 2011 15:09:18 GMT" } ]
2012-10-05T00:00:00
[ [ "Duyck", "Dieter", "" ], [ "Boutros", "Joseph J.", "" ], [ "Moeneclaey", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1506
Sourav Dhar
Rabindranath Bera, Sanjib Sil, Sourav Dhar and Subir K. Sarkar
Wi-Fi, WiMax and WCDMA A comparative study based on Channel Impairments and Equalization method used
5 pages, 15 fig.,published in ISM-08, Bangalore, India
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe the channel impairments and equalization methods currently used in WiFi, WiMax and WCDMA. After a review of channel model for Intelligent Transportation System (ITS), we proposed an equalization method which will be useful for the estimation of strong multipath channel at a high velocity.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 10:00:05 GMT" } ]
2009-03-10T00:00:00
[ [ "Bera", "Rabindranath", "" ], [ "Sil", "Sanjib", "" ], [ "Dhar", "Sourav", "" ], [ "Sarkar", "Subir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.1509
Sourav Dhar
Rabindranath Bera, Sourav Dhar, Debdatta Kandar
Digital Radar for Collision Avoidance and Automatic Cruise Control in Transportation
5 pages, 12 figs.,published in ISM-08, Bangalore, India, 3-6 December 2008
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A proper remote sensing device is required for automatic cruise control (ACC) to avoid collision in transportation system. In this paper we proposed a direct sequence spread spectrum (DSSS) radar for remote sensing in intelligent transporation system(ITS). We have successfully detected single target and through 1D radar imaging we are capable to separate multiple targets. We have also implemented DSSS radar using software defined radio (SDR) and successfully detected a single target.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 10:09:40 GMT" } ]
2009-03-10T00:00:00
[ [ "Bera", "Rabindranath", "" ], [ "Dhar", "Sourav", "" ], [ "Kandar", "Debdatta", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.1511
Sourav Dhar
D. Kandar, Sourav Dhar, Rabindranath Bera and C.K. Sarkar
MIMO Based Multimedia Communication System
3 pages, 5 figs., published in ISM-08, Bangalore, India, 3-6 December 2008
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High data rate is required for multimedia communication. But the communication at high data rate is always challenging. In this work we have successfully performed data chatting, Voice chatting and high quality video transmission between two distant units using MIMO adapter, Direct sequence spread spectrum system and MATLAB/SIMULINK platform.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 10:16:08 GMT" } ]
2009-03-10T00:00:00
[ [ "Kandar", "D.", "" ], [ "Dhar", "Sourav", "" ], [ "Bera", "Rabindranath", "" ], [ "Sarkar", "C. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.1556
Tuvi Etzion
Natalia Silberstein and Tuvi Etzion
Enumerative Encoding in the Grassmannian Space
2009 Informaton Theory Workshop, Taormina
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Codes in the Grassmannian space have found recently application in network coding. Representation of $k$-dimensional subspaces of $\F_q^n$ has generally an essential role in solving coding problems in the Grassmannian, and in particular in encoding subspaces of the Grassmannian. Different representations of subspaces in the Grassmannian are presented. We use two of these representations for enumerative encoding of the Grassmannian. One enumerative encoding is based on Ferrers diagrams representation of subspaces; and another is based on identifying vector and reduced row echelon form representation of subspaces. A third method which combine the previous two is more efficient than the other two enumerative encodings.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 13:39:18 GMT" } ]
2009-03-10T00:00:00
[ [ "Silberstein", "Natalia", "" ], [ "Etzion", "Tuvi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1588
Mark Flanagan
Mark F. Flanagan, Enrico Paolini, Marco Chiani and Marc Fossorier
On the Growth Rate of the Weight Distribution of Irregular Doubly-Generalized LDPC Codes
Revision of the journal paper. 37 pages, 2 figures. Submitted
null
null
UCD-01-01
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an expression for the asymptotic growth rate of the number of small linear-weight codewords of irregular doubly-generalized LDPC (D-GLDPC) codes is derived. The expression is compact and generalizes existing results for LDPC and generalized LDPC (GLDPC) codes. Ensembles with check or variable node minimum distance greater than 2 are shown to be have good growth rate behavior, while for other ensembles a fundamental parameter is identified which discriminates between an asymptotically small and an asymptotically large expected number of small linear-weight codewords. Also, in the latter case it is shown that the growth rate depends only on the check and variable nodes with minimum distance 2. An important connection between this new result and the stability condition of D-GLDPC codes over the BEC is highlighted. Such a connection, previously observed for LDPC and GLDPC codes, is now extended to the case of D-GLDPC codes. Finally, it is shown that the analysis may be extended to include the growth rate of the stopping set size distribution of irregular D-GLDPC codes.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 16:38:46 GMT" }, { "version": "v2", "created": "Tue, 4 May 2010 15:26:25 GMT" } ]
2010-05-05T00:00:00
[ [ "Flanagan", "Mark F.", "" ], [ "Paolini", "Enrico", "" ], [ "Chiani", "Marco", "" ], [ "Fossorier", "Marc", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1598
Damiano Zanardini
Puri Arenas and Damiano Zanardini
18th Workshop on Logic-based methods in Programming Environments (WLPE 2008)
null
null
null
WLPE/2008
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the papers presented at WLPE 2008: the 18th Workshop on Logic-based Methods in Programming Environments held on 12th December, 2008 in Udine, Italy. It was held as a satellite workshop of ICLP 2008, the 24th International Conference on Logic Programming.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 17:26:36 GMT" }, { "version": "v2", "created": "Thu, 12 Mar 2009 14:19:27 GMT" }, { "version": "v3", "created": "Fri, 13 Mar 2009 10:49:16 GMT" }, { "version": "v4", "created": "Mon, 16 Mar 2009 10:39:11 GMT" }, { "version": "v5", "created": "Wed, 18 Mar 2009 14:41:22 GMT" }, { "version": "v6", "created": "Thu, 26 Mar 2009 17:11:37 GMT" } ]
2009-10-02T00:00:00
[ [ "Arenas", "Puri", "" ], [ "Zanardini", "Damiano", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0903.1621
Saburo Higuchi
Saburo Higuchi and Marc M\'ezard
Susceptibility Propagation for Constraint Satisfaction Problems
17 pages, 5 figures
J. Phys.: Conf. Ser. 233(2010)012003
10.1088/1742-6596/233/1/012003
null
cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the susceptibility propagation, a message-passing algorithm to compute correlation functions. It is applied to constraint satisfaction problems and its accuracy is examined. As a heuristic method to find a satisfying assignment, we propose susceptibility-guided decimation where correlations among the variables play an important role. We apply this novel decimation to locked occupation problems, a class of hard constraint satisfaction problems exhibited recently. It is shown that the present method performs better than the standard belief-guided decimation.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 18:38:11 GMT" } ]
2010-07-29T00:00:00
[ [ "Higuchi", "Saburo", "" ], [ "Mézard", "Marc", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1624
Shashi Kiran Chilappagari
Shashi Kiran Chilappagari, Michael Chertkov, Mikhail G. Stepanov and Bane Vasic
Instanton-based Techniques for Analysis and Reduction of Error Floors of LDPC Codes
To appear in IEEE JSAC On Capacity Approaching Codes. 11 Pages and 6 Figures
null
10.1109/JSAC.2009.090804
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a family of instanton-based optimization methods developed recently for the analysis of the error floors of low-density parity-check (LDPC) codes. Instantons are the most probable configurations of the channel noise which result in decoding failures. We show that the general idea and the respective optimization technique are applicable broadly to a variety of channels, discrete or continuous, and variety of sub-optimal decoders. Specifically, we consider: iterative belief propagation (BP) decoders, Gallager type decoders, and linear programming (LP) decoders performing over the additive white Gaussian noise channel (AWGNC) and the binary symmetric channel (BSC). The instanton analysis suggests that the underlying topological structures of the most probable instanton of the same code but different channels and decoders are related to each other. Armed with this understanding of the graphical structure of the instanton and its relation to the decoding failures, we suggest a method to construct codes whose Tanner graphs are free of these structures, and thus have less significant error floors.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 19:05:13 GMT" } ]
2016-11-17T00:00:00
[ [ "Chilappagari", "Shashi Kiran", "" ], [ "Chertkov", "Michael", "" ], [ "Stepanov", "Mikhail G.", "" ], [ "Vasic", "Bane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1627
Fran\c{c}ois Nicolas
Julien Cassaigne and Francois Nicolas
On the Morse-Hedlund complexity gap
7 pages. Not intended to be submitted. New proof of an old result
null
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1938, Morse and Hedlund proved that the subword complexity function of an infinite word is either bounded or at least linearly growing. In 1982, Ehrenfeucht and Rozenberg proved that this gap property holds for the subword complexity function of any language. The aim of the present paper is to present a self-contained, compact proof of Ehrenfeucht and Rozenberg's result.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 19:15:38 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2009 12:28:47 GMT" }, { "version": "v3", "created": "Thu, 19 Nov 2009 08:48:08 GMT" }, { "version": "v4", "created": "Fri, 4 Dec 2009 17:25:05 GMT" }, { "version": "v5", "created": "Wed, 1 Feb 2012 18:07:36 GMT" } ]
2012-02-02T00:00:00
[ [ "Cassaigne", "Julien", "" ], [ "Nicolas", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.1659
Zhe Chen
Zhe Chen
Heuristic Reasoning on Graph and Game Complexity of Sudoku
6 pages, 2 figures
null
null
null
cs.AI cs.GT cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Sudoku puzzle has achieved worldwide popularity recently, and attracted great attention of the computational intelligence community. Sudoku is always considered as Satisfiability Problem or Constraint Satisfaction Problem. In this paper, we propose to focus on the essential graph structure underlying the Sudoku puzzle. First, we formalize Sudoku as a graph. Then a solving algorithm based on heuristic reasoning on the graph is proposed. The related r-Reduction theorem, inference theorem and their properties are proved, providing the formal basis for developments of Sudoku solving systems. In order to evaluate the difficulty levels of puzzles, a quantitative measurement of the complexity level of Sudoku puzzles based on the graph structure and information theory is proposed. Experimental results show that all the puzzles can be solved fast using the proposed heuristic reasoning, and that the proposed game complexity metrics can discriminate difficulty levels of puzzles perfectly.
[ { "version": "v1", "created": "Mon, 9 Mar 2009 22:35:14 GMT" } ]
2009-03-11T00:00:00
[ [ "Chen", "Zhe", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0903.1675
Aravind Kailas
Aravind Kailas, Lakshmi Thanayankizil, Mary Ann Ingram
A Simple Cooperative Transmission Protocol for Energy-Efficient Broadcasting Over Multi-Hop Wireless Networks
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes a broadcasting technique for wireless multi-hop sensor networks that uses a form of cooperative diversity called opportunistic large arrays (OLAs). We propose a method for autonomous scheduling of the nodes, which limits the nodes that relay and saves as much as 32% of the transmit energy compared to other broadcast approaches, without requiring Global Positioning System (GPS), individual node addressing, or inter-node interaction. This energy-saving is a result of cross-layer interaction, in the sense that the Medium Access Control (MAC) and routing functions are partially executed in the Physical (PHY) layer. Our proposed method is called OLA with a transmission threshold (OLA-T), where a node compares its received power to a threshold to decide if it should forward. We also investigate OLA with variable threshold (OLA-VT), which optimizes the thresholds as a function of level. OLA-T and OLA-VT are compared with OLA broadcasting without a transmission threshold, each in their minimum energy configuration, using an analytical method under the orthogonal and continuum assumptions. The trade-off between the number of OLA levels (or hops) required to achieve successful network broadcast and transmission energy saved is investigated. The results based on the analytical assumptions are confirmed with Monte Carlo simulations.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 02:36:30 GMT" } ]
2009-03-11T00:00:00
[ [ "Kailas", "Aravind", "" ], [ "Thanayankizil", "Lakshmi", "" ], [ "Ingram", "Mary Ann", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1680
Chao He
H. Zhuge, C. He
Faceted Exploration of Emerging Resource Spaces
20 pages, 18 figures
null
null
null
cs.DB cs.DL cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Humans have the ability to regcognize the real world from different facets. Faceted exploration is a mechanism for browsing and understanding large-scale resources in information network by multiple facets. This paper proposes an Emerging Resource Space Model, whose schema is a partially ordered set of concepts with subclassOf relation and each resource is categorized by multiple concepts. Emering Resource Space (ERS) is a class of resources characterized by a concept set. ERSes compose a lattice (ERSL) via concept association. A series of exploration operations is proposed to guide users to explore through ERSL with more demanding and richer semantics than current faceted navigation. To fulfill instant response during faceted exploration, we devise an efficient algorithm for mining and indexing ERSL. The proposed model can effectively support faceted exploration in various applications from personal information management to large-scale information sharing.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 04:01:15 GMT" }, { "version": "v2", "created": "Tue, 5 Oct 2010 09:38:02 GMT" } ]
2010-10-06T00:00:00
[ [ "Zhuge", "H.", "" ], [ "He", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0903.1684
Wei Ren
Wei Ren, Qing Zhao, Ananthram Swami
Connectivity of Heterogeneous Wireless Networks
46 pages, 19 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the connectivity of large-scale ad hoc heterogeneous wireless networks, where secondary users exploit channels temporarily unused by primary users and the existence of a communication link between two secondary users depends on not only the distance between them but also the transmitting and receiving activities of nearby primary users. We introduce the concept of connectivity region defined as the set of density pairs -- the density of secondary users and the density of primary transmitters -- under which the secondary network is connected. Using theories and techniques from continuum percolation, we analytically characterize the connectivity region of the secondary network and reveal the tradeoff between proximity (the number of neighbors) and the occurrence of spectrum opportunities. Specifically, we establish three basic properties of the connectivity region -- contiguity, monotonicity of the boundary, and uniqueness of the infinite connected component, where the uniqueness implies the occurrence of a phase transition phenomenon in terms of the almost sure existence of either zero or one infinite connected component; we identify and analyze two critical densities which jointly specify the profile as well as an outer bound on the connectivity region; we study the impacts of secondary users' transmission power on the connectivity region and the conditional average degree of a secondary user, and demonstrate that matching the interference ranges of the primary and the secondary networks maximizes the tolerance of the secondary network to the primary traffic load. Furthermore, we establish a necessary condition and a sufficient condition for connectivity, which lead to an outer bound and an inner bound on the connectivity region.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 05:37:29 GMT" }, { "version": "v2", "created": "Wed, 11 Mar 2009 06:54:50 GMT" }, { "version": "v3", "created": "Wed, 27 May 2009 23:41:51 GMT" }, { "version": "v4", "created": "Sun, 28 Jun 2009 23:01:25 GMT" }, { "version": "v5", "created": "Sun, 9 Aug 2009 22:42:48 GMT" } ]
2009-08-10T00:00:00
[ [ "Ren", "Wei", "" ], [ "Zhao", "Qing", "" ], [ "Swami", "Ananthram", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.1716
Erez Louidor
Erez Louidor and Brian Marcus
Improved Lower Bounds on Capacities of Symmetric 2-Dimensional Constraints using Rayleigh Quotients
Submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method for computing lower bounds on capacities of 2-dimensional constraints having a symmetric presentation in either the horizontal or the vertical direction is presented. The method is a generalization of the method of Calkin and Wilf (SIAM J. Discrete Math., 1998). Previous best lower bounds on capacities of certain constraints are improved using the method. It is also shown how this method, as well as their method for computing upper bounds on the capacity, can be applied to constraints which are not of finite-type. Additionally, capacities of 2 families of multi-dimensional constraints are given exactly.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 09:29:37 GMT" } ]
2009-03-11T00:00:00
[ [ "Louidor", "Erez", "" ], [ "Marcus", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1724
Tuvi Etzion
Tuvi Etzion
Folding, Tiling, and Multidimensional Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Folding a sequence $S$ into a multidimensional box is a method that is used to construct multidimensional codes. The well known operation of folding is generalized in a way that the sequence $S$ can be folded into various shapes. The new definition of folding is based on lattice tiling and a direction in the $D$-dimensional grid. There are potentially $\frac{3^D-1}{2}$ different folding operations. Necessary and sufficient conditions that a lattice combined with a direction define a folding are given. The immediate and most impressive application is some new lower bounds on the number of dots in two-dimensional synchronization patterns. This can be also generalized for multidimensional synchronization patterns. We show how folding can be used to construct multidimensional error-correcting codes and to generate multidimensional pseudo-random arrays.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 09:59:07 GMT" }, { "version": "v2", "created": "Wed, 29 Jul 2009 20:31:31 GMT" } ]
2009-07-29T00:00:00
[ [ "Etzion", "Tuvi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1734
M Sabu THAMPI
Sabu M. Thampi, K. Chandra Sekaran
Review of Replication Schemes for Unstructured P2P Networks
7 pages
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To improve unstructured P2P system performance, one wants to minimize the number of peers that have to be probed for the shortening of the search time. A solution to the problem is to employ a replication scheme, which provides high hit rate for target files. Replication can also provide load balancing and reduce access latency if the file is accessed by a large population of users. This paper briefly describes various replication schemes that have appeared in the literature and also focuses on a novel replication technique called Q-replication to increase availability of objects in unstructured P2P networks. The Q-replication technique replicates objects autonomously to suitable sites based on object popularity and site selection logic by extensively employing Q-learning concept.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 10:55:26 GMT" }, { "version": "v2", "created": "Tue, 29 Dec 2009 11:46:34 GMT" } ]
2009-12-30T00:00:00
[ [ "Thampi", "Sabu M.", "" ], [ "Sekaran", "K. Chandra", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.1765
Jochen Br\"ocker
Jochen Br\"ocker
A Lower Bound on Arbitrary $f$--Divergences in Terms of the Total Variation
4 pages
null
null
null
math.PR cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important tool to quantify the likeness of two probability measures are f-divergences, which have seen widespread application in statistics and information theory. An example is the total variation, which plays an exceptional role among the f-divergences. It is shown that every f-divergence is bounded from below by a monotonous function of the total variation. Under appropriate regularity conditions, this function is shown to be monotonous. Remark: The proof of the main proposition is relatively easy, whence it is highly likely that the result is known. The author would be very grateful for any information regarding references or related work.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 13:20:48 GMT" } ]
2009-03-11T00:00:00
[ [ "Bröcker", "Jochen", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0903.1788
Dirk Bollen
Dirk Bollen and Harry Halpin
The Role of Tag Suggestions in Folksonomies
null
null
null
null
cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most tagging systems support the user in the tag selection process by providing tag suggestions, or recommendations, based on a popularity measurement of tags other users provided when tagging the same resource. In this paper we investigate the influence of tag suggestions on the emergence of power law distributions as a result of collaborative tag behavior. Although previous research has already shown that power laws emerge in tagging systems, the cause of why power law distributions emerge is not understood empirically. The majority of theories and mathematical models of tagging found in the literature assume that the emergence of power laws in tagging systems is mainly driven by the imitation behavior of users when observing tag suggestions provided by the user interface of the tagging system. This imitation behavior leads to a feedback loop in which some tags are reinforced and get more popular which is also known as the `rich get richer' or a preferential attachment model. We present experimental results that show that the power law distribution forms regardless of whether or not tag suggestions are presented to the users. Furthermore, we show that the real effect of tag suggestions is rather subtle; the resulting power law distribution is `compressed' if tag suggestions are given to the user, resulting in a shorter long tail and a `compressed' top of the power law distribution. The consequences of this experiment show that tag suggestions by themselves do not account for the formation of power law distributions in tagging systems.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 14:48:30 GMT" } ]
2009-03-11T00:00:00
[ [ "Bollen", "Dirk", "" ], [ "Halpin", "Harry", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0903.1817
Chris Stucchio
Leslie Greengard and Chris Stucchio
Reconstructing Curves from Points and Tangents
22 pages, 11 figures
null
null
null
cs.CG
http://creativecommons.org/licenses/by-nc-sa/3.0/
Reconstructing a finite set of curves from an unordered set of sample points is a well studied topic. There has been less effort that considers how much better the reconstruction can be if tangential information is given as well. We show that if curves are separated from each other by a distance D, then the sampling rate need only be O(sqrt(D)) for error-free reconstruction. For the case of point data alone, O(D) sampling is required.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 17:31:34 GMT" } ]
2009-03-11T00:00:00
[ [ "Greengard", "Leslie", "" ], [ "Stucchio", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0903.1818
James Lathrop
James I. Lathrop, Jack H. Lutz and Scott M. Summers
Strict Self-Assembly of Discrete Sierpinski Triangles
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Winfree (1998) showed that discrete Sierpinski triangles can self-assemble in the Tile Assembly Model. A striking molecular realization of this self-assembly, using DNA tiles a few nanometers long and verifying the results by atomic-force microscopy, was achieved by Rothemund, Papadakis, and Winfree (2004). Precisely speaking, the above self-assemblies tile completely filled-in, two-dimensional regions of the plane, with labeled subsets of these tiles representing discrete Sierpinski triangles. This paper addresses the more challenging problem of the strict self-assembly of discrete Sierpinski triangles, i.e., the task of tiling a discrete Sierpinski triangle and nothing else. We first prove that the standard discrete Sierpinski triangle cannot strictly self-assemble in the Tile Assembly Model. We then define the fibered Sierpinski triangle, a discrete Sierpinski triangle with the same fractal dimension as the standard one but with thin fibers that can carry data, and show that the fibered Sierpinski triangle strictly self-assembles in the Tile Assembly Model. In contrast with the simple XOR algorithm of the earlier, non-strict self-assemblies, our strict self-assembly algorithm makes extensive, recursive use of optimal counters, coupled with measured delay and corner-turning operations. We verify our strict self-assembly using the local determinism method of Soloveichik and Winfree (2007).
[ { "version": "v1", "created": "Tue, 10 Mar 2009 19:28:06 GMT" } ]
2009-03-11T00:00:00
[ [ "Lathrop", "James I.", "" ], [ "Lutz", "Jack H.", "" ], [ "Summers", "Scott M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.1820
Michele Wigger
Amos Lapidoth, Stefan M. Moser, Michele A. Wigger
On the Capacity of Free-Space Optical Intensity Channels
Transmitted to IEEE Transactions on Information Theory. Presented at ISIT 2008 in Toronto
null
null
13454533334
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
New upper and lower bounds are presented on the capacity of the free-space optical intensity channel. This channel is characterized by inputs that are nonnegative (representing the transmitted optical intensity) and by outputs that are corrupted by additive white Gaussian noise (because in free space the disturbances arise from many independent sources). Due to battery and safety reasons the inputs are simultaneously constrained in both their average and peak power. For a fixed ratio of the average power to the peak power the difference between the upper and the lower bounds tends to zero as the average power tends to infinity, and the ratio of the upper and lower bounds tends to one as the average power tends to zero. The case where only an average-power constraint is imposed on the input is treated separately. In this case, the difference of the upper and lower bound tends to 0 as the average power tends to infinity, and their ratio tends to a constant as the power tends to zero.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 17:46:32 GMT" } ]
2009-03-11T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Moser", "Stefan M.", "" ], [ "Wigger", "Michele A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1822
Jose Espirito Santo
Jose Espirito Santo, Ralph Matthes, Luis Pinto
Continuation-Passing Style and Strong Normalisation for Intuitionistic Sequent Calculi
null
Logical Methods in Computer Science, Volume 5, Issue 2 (May 25, 2009) lmcs:1149
10.2168/LMCS-5(2:11)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The intuitionistic fragment of the call-by-name version of Curien and Herbelin's \lambda\_mu\_{\~mu}-calculus is isolated and proved strongly normalising by means of an embedding into the simply-typed lambda-calculus. Our embedding is a continuation-and-garbage-passing style translation, the inspiring idea coming from Ikeda and Nakazawa's translation of Parigot's \lambda\_mu-calculus. The embedding strictly simulates reductions while usual continuation-passing-style transformations erase permutative reduction steps. For our intuitionistic sequent calculus, we even only need "units of garbage" to be passed. We apply the same method to other calculi, namely successive extensions of the simply-typed &lambda;-calculus leading to our intuitionistic system, and already for the simplest extension we consider (&lambda;-calculus with generalised application), this yields the first proof of strong normalisation through a reduction-preserving embedding. The results obtained extend to second and higher-order calculi.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 18:10:52 GMT" }, { "version": "v2", "created": "Mon, 25 May 2009 12:35:06 GMT" } ]
2015-07-01T00:00:00
[ [ "Santo", "Jose Espirito", "" ], [ "Matthes", "Ralph", "" ], [ "Pinto", "Luis", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.1842
Shrinivas Kudekar Mr.
Shrinivas Kudekar and Nicolas Macris
Decay of Correlations for Sparse Graph Error Correcting Codes
40 pages, Submitted to SIAM Journal of Discrete Mathematics
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The subject of this paper is transmission over a general class of binary-input memoryless symmetric channels using error correcting codes based on sparse graphs, namely low-density generator-matrix and low-density parity-check codes. The optimal (or ideal) decoder based on the posterior measure over the code bits, and its relationship to the sub-optimal belief propagation decoder, are investigated. We consider the correlation (or covariance) between two codebits, averaged over the noise realizations, as a function of the graph distance, for the optimal decoder. Our main result is that this correlation decays exponentially fast for fixed general low-density generator-matrix codes and high enough noise parameter, and also for fixed general low-density parity-check codes and low enough noise parameter. This has many consequences. Appropriate performance curves - called GEXIT functions - of the belief propagation and optimal decoders match in high/low noise regimes. This means that in high/low noise regimes the performance curves of the optimal decoder can be computed by density evolution. Another interpretation is that the replica predictions of spin-glass theory are exact. Our methods are rather general and use cluster expansions first developed in the context of mathematical statistical mechanics.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 20:11:58 GMT" } ]
2009-03-12T00:00:00
[ [ "Kudekar", "Shrinivas", "" ], [ "Macris", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1850
Burzin Bhavnagri
Burzin Bhavnagri
Free actions and Grassmanian variety
fixed matrices lost in latex and numbered equations
null
null
null
math.AG cs.CV q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An algebraic notion of representational consistency is defined. A theorem relating it to free actions is proved. A metrizability problem of the quotient (a shape space) is discussed. This leads to a new algebraic variety with a metrizability result. A concrete example is given from stereo vision.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 06:52:53 GMT" } ]
2009-03-18T00:00:00
[ [ "Bhavnagri", "Burzin", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0903.1857
Matthew Patitz
David Doty, Matthew J Patitz, Scott M Summers
Limitations of Self-Assembly at Temperature 1
10 page conference submission with additional technical appendix containing proofs
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that if a set $X \subseteq \Z^2$ weakly self-assembles at temperature 1 in a deterministic tile assembly system satisfying a natural condition known as \emph{pumpability}, then $X$ is a finite union of semi-doubly periodic sets. This shows that only the most simple of infinite shapes and patterns can be constructed using pumpable temperature 1 tile assembly systems, and gives evidence for the thesis that temperature 2 or higher is required to carry out general-purpose computation in a tile assembly system. Finally, we show that general-purpose computation \emph{is} possible at temperature 1 if negative glue strengths are allowed in the tile assembly model.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 21:06:35 GMT" } ]
2009-03-12T00:00:00
[ [ "Doty", "David", "" ], [ "Patitz", "Matthew J", "" ], [ "Summers", "Scott M", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.1878
Denis Mindolin
Denis Mindolin, Jan Chomicki
Contracting preference relations for database applications
44 pages, 15 figures, submitted to the Special Issue of AIJ on Preferences
null
null
null
cs.AI cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The binary relation framework has been shown to be applicable to many real-life preference handling scenarios. Here we study preference contraction: the problem of discarding selected preferences. We argue that the property of minimality and the preservation of strict partial orders are crucial for contractions. Contractions can be further constrained by specifying which preferences should be protected. We consider two classes of preference relations: finite and finitely representable. We present algorithms for computing minimal and preference-protecting minimal contractions for finite as well as finitely representable preference relations. We study relationships between preference change in the binary relation framework and belief change in the belief revision theory. We also introduce some preference query optimization techniques which can be used in the presence of contraction. We evaluate the proposed algorithms experimentally and present the results.
[ { "version": "v1", "created": "Tue, 10 Mar 2009 22:34:46 GMT" } ]
2009-03-12T00:00:00
[ [ "Mindolin", "Denis", "" ], [ "Chomicki", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0903.1904
Christopher Laumann
C.R. Laumann, R. Moessner, A. Scardicchio, S.L. Sondhi
Phase transitions and random quantum satisfiability
9 pages, 3 figures
Quant. Inf. and Comp. (2010) vol. 10 (1) 1 pp. 0001-0015
null
null
quant-ph cond-mat.dis-nn cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alongside the effort underway to build quantum computers, it is important to better understand which classes of problems they will find easy and which others even they will find intractable. We study random ensembles of the QMA$_1$-complete quantum satisfiability (QSAT) problem introduced by Bravyi. QSAT appropriately generalizes the NP-complete classical satisfiability (SAT) problem. We show that, as the density of clauses/projectors is varied, the ensembles exhibit quantum phase transitions between phases that are satisfiable and unsatisfiable. Remarkably, almost all instances of QSAT for any hypergraph exhibit the same dimension of the satisfying manifold. This establishes the QSAT decision problem as equivalent to a, potentially new, graph theoretic problem and that the hardest typical instances are likely to be localized in a bounded range of clause density.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 04:16:16 GMT" } ]
2010-04-29T00:00:00
[ [ "Laumann", "C. R.", "" ], [ "Moessner", "R.", "" ], [ "Scardicchio", "A.", "" ], [ "Sondhi", "S. L.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.1945
Miquel Payar\'o
M. Payar\'o and D. P. Palomar
Hessian and concavity of mutual information, differential entropy, and entropy power in linear vector Gaussian channels
33 pages, 2 figures. A shorter version of this paper is to appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within the framework of linear vector Gaussian channels with arbitrary signaling, closed-form expressions for the Jacobian of the minimum mean square error and Fisher information matrices with respect to arbitrary parameters of the system are calculated in this paper. Capitalizing on prior research where the minimum mean square error and Fisher information matrices were linked to information-theoretic quantities through differentiation, closed-form expressions for the Hessian of the mutual information and the differential entropy are derived. These expressions are then used to assess the concavity properties of mutual information and differential entropy under different channel conditions and also to derive a multivariate version of the entropy power inequality due to Costa.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 10:33:37 GMT" } ]
2009-03-12T00:00:00
[ [ "Payaró", "M.", "" ], [ "Palomar", "D. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1952
Bin Jiang
Xiqi Gao, Bin Jiang, Xiao Li, Alex B. Gershman, Matthew R. McKay
Statistical Eigenmode Transmission over Jointly-Correlated MIMO Channels
32 pages, 6 figures, to appear in IEEE Transactions on Information Theory
null
10.1109/TIT.2009.2023737
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate MIMO eigenmode transmission using statistical channel state information at the transmitter. We consider a general jointly-correlated MIMO channel model, which does not require separable spatial correlations at the transmitter and receiver. For this model, we first derive a closed-form tight upper bound for the ergodic capacity, which reveals a simple and interesting relationship in terms of the matrix permanent of the eigenmode channel coupling matrix and embraces many existing results in the literature as special cases. Based on this closed-form and tractable upper bound expression, we then employ convex optimization techniques to develop low-complexity power allocation solutions involving only the channel statistics. Necessary and sufficient optimality conditions are derived, from which we develop an iterative water-filling algorithm with guaranteed convergence. Simulations demonstrate the tightness of the capacity upper bound and the near-optimal performance of the proposed low-complexity transmitter optimization approach.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 13:50:48 GMT" } ]
2016-11-17T00:00:00
[ [ "Gao", "Xiqi", "" ], [ "Jiang", "Bin", "" ], [ "Li", "Xiao", "" ], [ "Gershman", "Alex B.", "" ], [ "McKay", "Matthew R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]