id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0903.1953 | Balder ten Cate | Balder ten Cate, Laura Chiticariu, Phokion Kolaitis and Wang-Chiew Tan | Laconic schema mappings: computing core universal solutions by means of
SQL queries | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new method for computing core universal solutions in data
exchange settings specified by source-to-target dependencies, by means of SQL
queries. Unlike previously known algorithms, which are recursive in nature, our
method can be implemented directly on top of any DBMS. Our method is based on
the new notion of a laconic schema mapping. A laconic schema mapping is a
schema mapping for which the canonical universal solution is the core universal
solution. We give a procedure by which every schema mapping specified by FO s-t
tgds can be turned into a laconic schema mapping specified by FO s-t tgds that
may refer to a linear order on the domain of the source instance. We show that
our results are optimal, in the sense that the linear order is necessary and
the method cannot be extended to schema mapping involving target constraints.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 11:34:20 GMT"
}
]
| 2009-03-12T00:00:00 | [
[
"Cate",
"Balder ten",
""
],
[
"Chiticariu",
"Laura",
""
],
[
"Kolaitis",
"Phokion",
""
],
[
"Tan",
"Wang-Chiew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0903.1967 | Krishnan Prasad | K. Prasad, B. Sundar Rajan | Network error correction for unit-delay, memory-free networks using
convolutional codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A single source network is said to be memory-free if all of the internal
nodes (those except the source and the sinks) do not employ memory but merely
send linear combinations of the symbols received at their incoming edges on
their outgoing edges. In this work, we introduce network-error correction for
single source, acyclic, unit-delay, memory-free networks with coherent network
coding for multicast. A convolutional code is designed at the source based on
the network code in order to correct network-errors that correspond to any of a
given set of error patterns, as long as consecutive errors are separated by a
certain interval which depends on the convolutional code selected. Bounds on
this interval and the field size required for constructing the convolutional
code with the required free distance are also obtained. We illustrate the
performance of convolutional network error correcting codes (CNECCs) designed
for the unit-delay networks using simulations of CNECCs on an example network
under a probabilistic error model.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 13:09:22 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Mar 2009 07:06:49 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Sep 2009 06:51:39 GMT"
}
]
| 2009-09-09T00:00:00 | [
[
"Prasad",
"K.",
""
],
[
"Rajan",
"B. Sundar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.1972 | Vojislav Gajic | Vojislav Gajic (1), Jianwei Huang (2), Bixio Rimoldi (1) ((1) EPFL,
(2) CUHK) | On Competing Wireless Service Providers | null | null | null | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a situation where wireless service providers compete for
heterogenous wireless users. The users differ in their willingness to pay as
well as in their individual channel gains. We prove existence and uniqueness of
the Nash equilibrium for the competition of two service providers, for a
generic channel model. Interestingly, the competition of two providers leads to
a globally optimal outcome. We extend some of the results to the case where
more than two providers are competing. Finally, we provide numerical examples
that illustrate the effects of various parameters on the Nash equilibrium.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 13:49:59 GMT"
}
]
| 2009-03-12T00:00:00 | [
[
"Gajic",
"Vojislav",
""
],
[
"Huang",
"Jianwei",
""
],
[
"Rimoldi",
"Bixio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2015 | Kang Ning | Kang Ning | Deposition and Extension Approach to Find Longest Common Subsequence for
Multiple Sequences | 25 pages, 6 figures. Ready to be submitted | null | null | null | cs.DS cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of finding the longest common subsequence (LCS) for a set of
sequences is a very interesting and challenging problem in computer science.
This problem is NP-complete, but because of its importance, many heuristic
algorithms have been proposed, such as Long Run algorithm and Expansion
algorithm.
However, the performance of many current heuristic algorithms deteriorates
fast when the number of sequences and sequence length increase. In this paper,
we have proposed a post process heuristic algorithm for the LCS problem, the
Deposition and Extension algorithm (DEA). This algorithm first generates common
subsequence by the process of sequences deposition, and then extends this
common subsequence. The algorithm is proven to generate Common Subsequences
(CSs) with guaranteed lengths. The experiments show that the results of DEA
algorithm are better than those of Long Run and Expansion algorithm, especially
on many long sequences. The algorithm also has superior efficiency both in time
and space.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 17:18:38 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Jun 2009 20:22:02 GMT"
},
{
"version": "v3",
"created": "Mon, 29 Jun 2009 23:25:56 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Ning",
"Kang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0903.2016 | Fernando Hernando | Fernando Hernando and Gary McGuire | Proof of a Conjecture on the Sequence of Exceptional Numbers,
Classifying Cyclic Codes and APN Functions | null | null | null | null | cs.IT math.AG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove a conjecture that classifies exceptional numbers. This conjecture
arises in two different ways, from cryptography and from coding theory. An odd
integer $t\geq 3$ is said to be exceptional if $f(x)=x^t$ is APN (Almost
Perfect Nonlinear) over $\mathbb{F}_{2^n}$ for infinitely many values of $n$.
Equivalently, $t$ is exceptional if the binary cyclic code of length $2^n-1$
with two zeros $\omega, \omega^t$ has minimum distance 5 for infinitely many
values of $n$. The conjecture we prove states that every exceptional number has
the form $2^i+1$ or $4^i-2^i+1$.
| [
{
"version": "v1",
"created": "Wed, 11 Mar 2009 17:29:11 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jun 2009 10:47:21 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Jul 2009 08:49:52 GMT"
},
{
"version": "v4",
"created": "Fri, 18 Sep 2009 09:25:49 GMT"
}
]
| 2009-09-18T00:00:00 | [
[
"Hernando",
"Fernando",
""
],
[
"McGuire",
"Gary",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2071 | Laszlo Kish | Laszlo B. Kish and Tamas Horvath | Notes on Recent Approaches Concerning the
Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange | Accepted for publication in Physics Letters A on May 29, 2009. In the
present version, DOI and acceptance info is added in the pdf file, too | Physics Letters A 373 (2009) 2858-2868 | 10.1016/j.physleta.2009.05.077 | null | physics.gen-ph cs.CR physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We critically analyze the results and claims in [Physics Letters A 373 (2009)
901-904].
We show that the strong security leak appeared in the simulations is only an
artifact and not caused by "multiple reflections". Since no wave modes exist at
cable length of 5% of the shortest wavelength of the signal, no wave is present
to reflect it.
In the high wave impedance limit, the conditions used in the simulations are
heavily unphysical (requiring cable diameters up to 28000 times greater than
the measured size of the known universe) and the results are modeling artifacts
due to the unphysical values.
At the low cable impedance limit, the observed artifacts are due to violating
the recommended (and tested) conditions by neglecting the cable capacitance
restrictions and using about 100 times longer cable than recommended without
cable capacitance compensation arrangement.
We implement and analyze the general circuitry of Liu's circulator and
confirm that they are conceptually secure against passive attacks. We introduce
an asymmetric, more robust version without feedback loop. Then we crack all
these systems by an active attack: a circulator-based man-in-the middle attack.
Finally, we analyze the proposed method to increase security by dropping only
high-risk bits. We point out the differences between different types of
high-risk bits and show the shortage of this strategy for some simple key
exchange protocols.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 16:55:25 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2009 16:01:25 GMT"
},
{
"version": "v3",
"created": "Sat, 23 May 2009 18:05:25 GMT"
},
{
"version": "v4",
"created": "Fri, 5 Jun 2009 23:41:07 GMT"
},
{
"version": "v5",
"created": "Tue, 30 Jun 2009 02:23:09 GMT"
}
]
| 2014-02-07T00:00:00 | [
[
"Kish",
"Laszlo B.",
""
],
[
"Horvath",
"Tamas",
""
]
]
| [
{
"class": "Physics",
"code": "physics.gen-ph",
"description": "Description coming soon",
"span": "(General Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
]
|
0903.2100 | Frederic Mazoit | Laurent Lyaudet (LIP), Fr\'ed\'eric Mazoit (LaBRI), Stephan Thomasse
(LIRMM) | Partitions versus sets : a case of duality | null | European Journal of Combinatorics (2009) 1-7 | 10.1016/j.ejc.2009.09.004 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a recent paper, Amini et al. introduce a general framework to prove
duality theorems between special decompositions and their dual combinatorial
object. They thus unify all known ad-hoc proofs in one single theorem. While
this unification process is definitely good, their main theorem remains quite
technical and does not give a real insight of why some decompositions admit
dual objects and why others do not. The goal of this paper is both to
generalise a little this framework and to give an enlightening simple proof of
its central theorem.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 06:12:01 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Oct 2009 15:26:23 GMT"
}
]
| 2009-10-20T00:00:00 | [
[
"Lyaudet",
"Laurent",
"",
"LIP"
],
[
"Mazoit",
"Frédéric",
"",
"LaBRI"
],
[
"Thomasse",
"Stephan",
"",
"LIRMM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.2101 | Gerard Henry Edmond Duchamp | G\'erard Henry Edmond Duchamp (LIPN), Christophe Tollu (LIPN), K. A.
Penson (LPTMC), Gleb Koshevoy (CEMI) | Combinatorial Deformations of Algebras: Twisting and Perturbations | null | null | null | null | cs.SC math-ph math.CO math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The framework used to prove the multiplicative law deformation of the algebra
of Feynman-Bender diagrams is a \textit{twisted shifted dual law} (in fact,
twice). We give here a clear interpretation of its two parameters. The crossing
parameter is a deformation of the tensor structure whereas the superposition
parameters is a perturbation of the shuffle coproduct of Hoffman type which, in
turn, can be interpreted as the diagonal restriction of a superproduct. Here,
we systematically detail these constructions.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 06:12:32 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Aug 2010 11:50:37 GMT"
}
]
| 2010-08-30T00:00:00 | [
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
],
[
"Tollu",
"Christophe",
"",
"LIPN"
],
[
"Penson",
"K. A.",
"",
"LPTMC"
],
[
"Koshevoy",
"Gleb",
"",
"CEMI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0903.2108 | Maurice Margenstern | Maurice Margenstern | A new universal cellular automaton on the ternary heptagrid | 35 pages, 33 figures | null | null | null | cs.FL cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we construct a new weakly universal cellular automaton on the
ternary heptagrid. The previous result, obtained by the same author and Y. Song
required six states only. This time, the number of states is four. This is the
best result up to date for cellular automata in the hyperbolic plane.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 15:15:39 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0903.2119 | Martin Ziegler | Matthias Fischer, Claudius J\"ahn and Martin Ziegler | Adaptive Mesh Approach for Predicting Algorithm Behavior with
Application to Visibility Culling in Computer Graphics | null | null | null | null | cs.PF cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a concise approximate description, and a method for efficiently
obtaining this description, via adaptive random sampling of the performance
(running time, memory consumption, or any other profileable numerical quantity)
of a given algorithm on some low-dimensional rectangular grid of inputs. The
formal correctness is proven under reasonable assumptions on the algorithm
under consideration; and the approach's practical benefit is demonstrated by
predicting for which observer positions and viewing directions an occlusion
culling algorithm yields a net performance benefit or loss compared to a simple
brute force renderer.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 10:16:13 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Fischer",
"Matthias",
""
],
[
"Jähn",
"Claudius",
""
],
[
"Ziegler",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0903.2134 | Hanene Mohamed | Yousra Chabchoub, Christine Fricker and Hanene Mohamed | Analysis of a Bloom Filter Algorithm via the Supermarket Model | null | null | null | null | cs.DM cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with the problem of identifying elephants in the Internet
Traffic. The aim is to analyze a new adaptive algorithm based on a Bloom
Filter. This algorithm uses a so-called min-rule which can be described as in
the supermarket model. This model consists of joining the shortest queue among
d queues selected at random in a large number of m queues. In case of equality,
one of the shortest queues is chosen at random. An analysis of a simplified
model gives an insight of the error generated by the algorithm on the
estimation of the number of the elephants. The main conclusion is that, as m
gets large, there is a deterministic limit for the empirical distribution of
the filter counters. Limit theorems are proved and the limit is identified. It
depends on key parameters. The condition for the algorithm to perform well is
discussed. Theoretical results are validated by experiments on a traffic trace
from France Telecom and by simulations.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 10:04:07 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Chabchoub",
"Yousra",
""
],
[
"Fricker",
"Christine",
""
],
[
"Mohamed",
"Hanene",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.2158 | Eberhard H.-A. Gerbracht | Eberhard H.-A. Gerbracht | Supernodal Analysis Revisited | V1: documentclass IEEEtran, 5 pages, 6 figures. Re-release of the
printed version, with some minor typographical errors corrected, abstract
rewritten, and short CV according to IEEE standards added | SMACD'04 Proceedings of the International Workshop on Symbolic
Methods and Applications in Circuit Design, Wroclaw, Poland, 23-24 September
2004; pp. 113-116 | null | null | cs.SC cs.CE cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we show how to extend the known algorithm of nodal analysis in
such a way that, in the case of circuits without nullors and controlled sources
(but allowing for both, independent current and voltage sources), the system of
nodal equations describing the circuit is partitioned into one part, where the
nodal variables are explicitly given as linear combinations of the voltage
sources and the voltages of certain reference nodes, and another, which
contains the node variables of these reference nodes only and which moreover
can be read off directly from the given circuit. Neither do we need
preparational graph transformations, nor do we need to introduce additional
current variables (as in MNA). Thus this algorithm is more accessible to
students, and consequently more suitable for classroom presentations.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 12:25:45 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Gerbracht",
"Eberhard H. -A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.2168 | Damiano Zanardini | Markus Triska and Ulrich Neumerkel and Jan Wielemaker | Better Termination for Prolog with Constraints | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted
by a co-editor of the Workshop proceedings | null | null | WLPE/2008/02 | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Termination properties of actual Prolog systems with constraints are fragile
and difficult to analyse. The lack of the occurs-check, moded and overloaded
arithmetical evaluation via is/2 and the occasional nontermination of finite
domain constraints are all sources for invalidating termination results
obtained by current termination analysers that rely on idealized assumptions.
In this paper, we present solutions to address these problems on the level of
the underlying Prolog system. Improved unification modes meet the requirements
of norm based analysers by offering dynamic occurs-check detection. A
generalized finite domain solver overcomes the shortcomings of conventional
arithmetic without significant runtime overhead. The solver offers unbounded
domains, yet propagation always terminates. Our work improves Prolog's
termination and makes Prolog a more reliable target for termination and type
analysis. It is part of SWI-Prolog since version 5.6.50.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 15:23:38 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Triska",
"Markus",
""
],
[
"Neumerkel",
"Ulrich",
""
],
[
"Wielemaker",
"Jan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.2171 | Rick Kuhn | David F. Ferraiolo and D. Richard Kuhn | Role-Based Access Controls | pp. 554 - 563 | 15th National Computer Security Conference, Baltimore, MD. October
13-16, 1992 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While Mandatory Access Controls (MAC) are appropriate for multilevel secure
military applications, Discretionary Access Controls (DAC) are often perceived
as meeting the security processing needs of industry and civilian government.
This paper argues that reliance on DAC as the principal method of access
control is unfounded and inappropriate for many commercial and civilian
government organizations. The paper describes a type of non-discretionary
access control - role-based access control (RBAC) - that is more central to the
secure processing needs of non-military systems than DAC.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 14:00:28 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 13:53:46 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Ferraiolo",
"David F.",
""
],
[
"Kuhn",
"D. Richard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.2174 | Amir Leshem | Amir Leshem and Ephi Zehavi | Game theory and the frequency selective interference channel - A
tutorial | null | IEEE Signal Processing Magazine. Special issue on applications of
game theory in signal processing and communications. Volume 26, Issue 4,
pages 28-40. Sep. 2009 | 10.1109/MSP.2009.933372 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides a tutorial overview of game theoretic techniques used for
communication over frequency selective interference channels. We discuss both
competitive and cooperative techniques.
Keywords: Game theory, competitive games, cooperative games, Nash
Equilibrium, Nash bargaining solution, Generalized Nash games, Spectrum
optimization, distributed coordination, interference channel, multiple access
channel, iterative water-filling.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 14:42:13 GMT"
}
]
| 2010-08-10T00:00:00 | [
[
"Leshem",
"Amir",
""
],
[
"Zehavi",
"Ephi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2177 | Arno Pauly | Arno Pauly | On the (semi)lattices induced by continuous reducibilities | this version of the paper is outdated, please consult the journal
version | Mathematical Logic Quarterly, 56(5): 488--502, 2010 | 10.1002/malq.200910104 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Continuous reducibilities are a proven tool in computable analysis, and have
applications in other fields such as constructive mathematics or reverse
mathematics. We study the order-theoretic properties of several variants of the
two most important definitions, and especially introduce suprema for them. The
suprema are shown to commutate with several characteristic numbers.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 14:34:47 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Oct 2010 11:18:02 GMT"
}
]
| 2010-10-22T00:00:00 | [
[
"Pauly",
"Arno",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.2188 | Damiano Zanardini | Victor Pablos Ceruelo and Susana Munoz-Hernandez and Hannes Strass | Rfuzzy framework | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted
by a co-editor of the Workshop proceedings | null | null | WLPE/2008/01 | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fuzzy reasoning is a very productive research field that during the last
years has provided a number of theoretical approaches and practical
implementation prototypes. Nevertheless, the classical implementations, like
Fril, are not adapted to the latest formal approaches, like multi-adjoint logic
semantics. Some promising implementations, like Fuzzy Prolog, are so general
that the regular user/programmer does not feel comfortable because either
representation of fuzzy concepts is complex or the results difficult to
interpret. In this paper we present a modern framework, Rfuzzy, that is
modelling multi-adjoint logic. It provides some extensions as default values
(to represent missing information, even partial default values) and typed
variables. Rfuzzy represents the truth value of predicates through facts, rules
and functions. Rfuzzy answers queries with direct results (instead of
constraints) and it is easy to use for any person that wants to represent a
problem using fuzzy reasoning in a simple way (by using the classical
representation with real numbers).
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 15:20:19 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Ceruelo",
"Victor Pablos",
""
],
[
"Munoz-Hernandez",
"Susana",
""
],
[
"Strass",
"Hannes",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.2199 | Damiano Zanardini | Miguel Gomez-Zamalloa, Elvira Albert, German Puebla | On the Generation of Test Data for Prolog by Partial Evaluation | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted
by a co-editor of the Workshop proceedings | null | null | WLPE/2008/06 | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent work, we have proposed an approach to Test Data Generation (TDG) of
imperative bytecode by partial evaluation (PE) of CLP which consists in two
phases: (1) the bytecode program is first transformed into an equivalent CLP
program by means of interpretive compilation by PE, (2) a second PE is
performed in order to supervise the generation of test-cases by execution of
the CLP decompiled program. The main advantages of TDG by PE include
flexibility to handle new coverage criteria, the possibility to obtain
test-case generators and its simplicity to be implemented. The approach in
principle can be directly applied for TDG of any imperative language. However,
when one tries to apply it to a declarative language like Prolog, we have found
as a main difficulty the generation of test-cases which cover the more complex
control flow of Prolog. Essentially, the problem is that an intrinsic feature
of PE is that it only computes non-failing derivations while in TDG for Prolog
it is essential to generate test-cases associated to failing computations.
Basically, we propose to transform the original Prolog program into an
equivalent Prolog program with explicit failure by partially evaluating a
Prolog interpreter which captures failing derivations w.r.t. the input program.
Another issue that we discuss in the paper is that, while in the case of
bytecode the underlying constraint domain only manipulates integers, in Prolog
it should properly handle the symbolic data manipulated by the program. The
resulting scheme is of interest for bringing the advantages which are inherent
in TDG by PE to the field of logic programming.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 15:51:25 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Gomez-Zamalloa",
"Miguel",
""
],
[
"Albert",
"Elvira",
""
],
[
"Puebla",
"German",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.2202 | Damiano Zanardini | Michael Leuschel and Salvador Tamarit and German Vidal | Improving Size-Change Analysis in Offline Partial Evaluation | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted
by a co-editor of the Workshop proceedings | null | null | WLPE/2008/07 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some recent approaches for scalable offline partial evaluation of logic
programs include a size-change analysis for ensuring both so called local and
global termination. In this work|inspired by experimental evaluation|we
introduce several improvements that may increase the accuracy of the analysis
and, thus, the quality of the associated specialized programs. We aim to
achieve this while maintaining the same complexity and scalability of the
recent works.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 15:54:13 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Leuschel",
"Michael",
""
],
[
"Tamarit",
"Salvador",
""
],
[
"Vidal",
"German",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0903.2203 | Erez Sabbag | Erez Sabbag and Neri Merhav | Achievable Error Exponents for Channel with Side Information - Erasure
and List Decoding | Submitted to IEEE Trans. Inform. Theory, March 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a decoder with an erasure option and a variable size list decoder
for channels with non-casual side information at the transmitter. First,
universally achievable error exponents are offered for decoding with an erasure
option using a parameterized decoder in the spirit of Csisz\'{a}r and
K\"{o}rner's decoder. Then, the proposed decoding rule is generalized by
extending the range of its parameters to allow variable size list decoding.
This extension gives a unified treatment for erasure/list decoding. Exponential
bounds on the probability of list error and the average number of incorrect
messages on the list are given. Relations to Forney's and Csisz\'{a}r and
K\"{o}rner's decoders for discrete memoryless channel are discussed. These
results are obtained by exploring a random binning code with conditionally
constant composition codewords proposed by Moulin and Wang, but with a
different decoding rule.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 16:08:09 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Sabbag",
"Erez",
""
],
[
"Merhav",
"Neri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2205 | Damiano Zanardini | Francisco Javier Lopez-Fraguas and Juan Rodriguez-Hortala and Jaime
Sanchez-Hernandez | A Lightweight Combination of Semantics for Non-deterministic Functions | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted
by a co-editor of the Workshop proceedings | null | null | WLPE/2008/08 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The use of non-deterministic functions is a distinctive feature of modern
functional logic languages. The semantics commonly adopted is call-time choice,
a notion that at the operational level is related to the sharing mechanism of
lazy evaluation in functional languages. However, there are situations where
run-time choice, closer to ordinary rewriting, is more appropriate. In this
paper we propose an extension of existing call-time choice based languages, to
provide support for run-time choice in localized parts of a program. The
extension is remarkably simple at three relevant levels: syntax, formal
operational calculi and implementation, which is based on the system Toy.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 16:01:49 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Lopez-Fraguas",
"Francisco Javier",
""
],
[
"Rodriguez-Hortala",
"Juan",
""
],
[
"Sanchez-Hernandez",
"Jaime",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0903.2207 | Damiano Zanardini | Yoshihiro Adachi | Prolog Visualization System Using Logichart Diagrams | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008, arXiv:0903.1598). Paper submitted by a
co-editor of the Workshop proceedings | null | null | WLPE/2008/03 | cs.PL cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have developed a Prolog visualization system that is intended to support
Prolog programming education. The system uses Logichart diagrams to visualize
Prolog programs. The Logichart diagram is designed to visualize the Prolog
execution flow intelligibly and to enable users to easily correlate the Prolog
clauses with its parts. The system has the following functions. (1) It visually
traces Prolog execution (goal calling, success, and failure) on the Logichart
diagram. (2) Dynamic change in a Prolog program by calling extra-logical
predicates, such as `assertz' and `retract', is visualized in real time. (3)
Variable substitution processes are displayed in a text widget in real time.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 16:15:08 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Adachi",
"Yoshihiro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.2226 | Cemal Akcaba | Cemal Ak\c{c}aba and Helmut B\"olcskei | On the achievable diversity-multiplexing tradeoff in interference
channels | 5 pages, 1 figure | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze two-user single-antenna fading interference channels with perfect
receive channel state information (CSI) and no transmit CSI. For the case of
very strong interference, we prove that decoding interference while treating
the intended signal as noise, subtracting the result out, and then decoding the
desired signal, a process known as "stripping", achieves the
diversity-multiplexing tradeoff (DMT) outer bound derived in Akuiyibo and
Leveque, Int. Zurich Seminar on Commun., 2008. The proof is constructive in the
sense that it provides corresponding code design criteria for DMT optimality.
For general interference levels, we compute the DMT of a fixed-power-split Han
and Kobayashi type superposition coding scheme, provide design criteria for the
corresponding superposition codes, and find that this scheme is DMT-optimal for
certain multiplexing rates.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 17:39:31 GMT"
},
{
"version": "v2",
"created": "Fri, 1 May 2009 23:58:51 GMT"
}
]
| 2009-05-04T00:00:00 | [
[
"Akçaba",
"Cemal",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2232 | Fan Zhang | Fan Zhang and Henry D. Pfister | On the Iterative Decoding of High-Rate LDPC Codes With Applications in
Compressed Sensing | accepted by IEEE Trans. on IT | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the performance of $(j,k)$-regular low-density
parity-check (LDPC) codes with message-passing (MP) decoding algorithms in the
high-rate regime. In particular, we derive the high-rate scaling law for MP
decoding of LDPC codes on the binary erasure channel (BEC) and the $q$-ary
symmetric channel ($q$-SC). For the BEC, the density evolution (DE) threshold
of iterative decoding scales like $\Theta(k^{-1})$ and the critical stopping
ratio scales like $\Theta(k^{-j/(j-2)})$. For the $q$-SC, the DE threshold of
verification decoding depends on the details of the decoder and scales like
$\Theta(k^{-1})$ for one decoder.
Using the fact that coding over large finite alphabets is very similar to
coding over the real numbers, the analysis of verification decoding is also
extended to the the compressed sensing (CS) of strictly-sparse signals. A DE
based approach is used to analyze the CS systems with randomized-reconstruction
guarantees. This leads to the result that strictly-sparse signals can be
reconstructed efficiently with high-probability using a constant oversampling
ratio (i.e., when the number of measurements scales linearly with the sparsity
of the signal). A stopping-set based approach is also used to get stronger
(e.g., uniform-in-probability) reconstruction guarantees.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 18:26:10 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jun 2009 23:32:31 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Jul 2009 17:19:36 GMT"
},
{
"version": "v4",
"created": "Tue, 31 Jan 2012 04:16:49 GMT"
}
]
| 2012-02-01T00:00:00 | [
[
"Zhang",
"Fan",
""
],
[
"Pfister",
"Henry D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2243 | Edward D. Weinberger | Edward D. Weinberger | Pragmatic Information Rates, Generalizations of the Kelly Criterion, and
Financial Market Efficiency | Revised to clarify the text | null | null | null | cs.IT math.IT q-fin.PM q-fin.TR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is part of an ongoing investigation of "pragmatic information",
defined in Weinberger (2002) as "the amount of information actually used in
making a decision". Because a study of information rates led to the Noiseless
and Noisy Coding Theorems, two of the most important results of Shannon's
theory, we begin the paper by defining a pragmatic information rate, showing
that all of the relevant limits make sense, and interpreting them as the
improvement in compression obtained from using the correct distribution of
transmitted symbols.
The first of two applications of the theory extends the information theoretic
analysis of the Kelly Criterion, and its generalization, the horse race, to a
series of races where the stochastic process of winning horses, payoffs, and
strategies depend on some stationary process, including, but not limited to the
history of previous races. If the bettor is receiving messages (side
information) about the probability distribution of winners, the doubling rate
of the bettor's winnings is bounded by the pragmatic information of the
messages.
A second application is to the question of market efficiency. An efficient
market is, by definition, a market in which the pragmatic information of the
"tradable past" with respect to current prices is zero. Under this definition,
markets whose returns are characterized by a GARCH(1,1) process cannot be
efficient.
Finally, a pragmatic informational analogue to Shannon's Noisy Coding Theorem
suggests that a cause of market inefficiency is that the underlying
fundamentals are changing so fast that the price discovery mechanism simply
cannot keep up. This may happen most readily in the run-up to a financial
bubble, where investors' willful ignorance degrade the information processing
capabilities of the market.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 18:27:02 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Dec 2010 06:00:35 GMT"
},
{
"version": "v3",
"created": "Mon, 28 Feb 2011 14:55:08 GMT"
},
{
"version": "v4",
"created": "Mon, 22 Sep 2014 23:48:22 GMT"
}
]
| 2014-09-24T00:00:00 | [
[
"Weinberger",
"Edward D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.PM",
"description": "Security selection and optimization, capital allocation, investment strategies and performance measurement",
"span": "(Portfolio Management)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.TR",
"description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making",
"span": "(Trading and Market Microstructure)"
}
]
|
0903.2251 | Damiano Zanardini | Adrian Prantl and Jens Knoop and Markus Schordan and Markus Triska | Constraint solving for high-level WCET analysis | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted
by a co-editor of the Workshop proceedings | null | null | WLPE/2008/05 | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The safety of our day-to-day life depends crucially on the correct
functioning of embedded software systems which control the functioning of more
and more technical devices. Many of these software systems are time-critical.
Hence, computations performed need not only to be correct, but must also be
issued in a timely fashion. Worst case execution time (WCET) analysis is
concerned with computing tight upper bounds for the execution time of a system
in order to provide formal guarantees for the proper timing behaviour of a
system. Central for this is to compute safe and tight bounds for loops and
recursion depths. In this paper, we highlight the TuBound approach to this
challenge at whose heart is a constraint logic based approach for loop
analysis.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 15:45:50 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Prantl",
"Adrian",
""
],
[
"Knoop",
"Jens",
""
],
[
"Schordan",
"Markus",
""
],
[
"Triska",
"Markus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.2252 | Damiano Zanardini | Jens Bendisposto and Ian Endrijautzki and Michael Leuschel and David
Schneider | A Semantics-Aware Editing Environment for Prolog in Eclipse | Paper presented at the 18th Workshop on Logic-based Methods in
Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted
by a co-editor of the Workshop proceedings | null | null | WLPE/2008/04 | cs.PL cs.HC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a Prolog plugin for Eclipse based upon BE4, and
providing many features such as semantic-aware syntax highlighting, outline
view, error marking, content assist, hover information, documentation
generation, and quick fixes. The plugin makes use of a Java parser for full
Prolog with an integrated Prolog engine, and can be extended with further
semantic analyses, e.g., based on abstract interpretation.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 15:42:24 GMT"
}
]
| 2009-03-13T00:00:00 | [
[
"Bendisposto",
"Jens",
""
],
[
"Endrijautzki",
"Ian",
""
],
[
"Leuschel",
"Michael",
""
],
[
"Schneider",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.2265 | Rolf Harren | Rolf Harren, Rob van Stee | An Absolute 2-Approximation Algorithm for Two-Dimensional Bin Packing | null | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of packing rectangles into bins that are unit
squares, where the goal is to minimize the number of bins used. All rectangles
have to be packed non-overlapping and orthogonal, i.e., axis-parallel. We
present an algorithm for this problem with an absolute worst-case ratio of 2,
which is optimal provided P != NP.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 11:39:14 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"Harren",
"Rolf",
""
],
[
"van Stee",
"Rob",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.2272 | Antonio Ortega | Sang-Yong Lee and Antonio Ortega | A Novel Approach for Compression of Images Captured using Bayer Color
Filter Arrays | null | null | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new approach for image compression in digital cameras, where the
goal is to achieve better quality at a given rate by using the characteristics
of a Bayer color filter array. Most digital cameras produce color images by
using a single CCD plate, so that each pixel in an image has only one color
component and therefore an interpolation method is needed to produce a full
color image. After the image processing stage, in order to reduce the memory
requirements of the camera, a lossless or lossy compression stage often
follows. But in this scheme, before decreasing redundancy through compression,
redundancy is increased in an interpolation stage. In order to avoid increasing
the redundancy before compression, we propose algorithms for image compression
in which the order of the compression and interpolation stages is reversed. We
introduce image transform algorithms, since non interpolated images cannot be
directly compressed with general image coders. The simulation results show that
our algorithm outperforms conventional methods with various color interpolation
methods in a wide range of compression ratios. Our proposed algorithm provides
not only better quality but also lower encoding complexity because the amount
of luminance data used is only half of that in conventional methods.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 07:11:31 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"Lee",
"Sang-Yong",
""
],
[
"Ortega",
"Antonio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0903.2278 | Ian Kash | Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern | Manipulating Scrip Systems: Sybils and Collusion | 20 pages, 5 figures. To appear in the Proceedings of The First
Conference on Auctions, Market Mechanisms and Their Applications (AMMA '09) | null | 10.1007/978-3-642-03821-1_4 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Game-theoretic analyses of distributed and peer-to-peer systems typically use
the Nash equilibrium solution concept, but this explicitly excludes the
possibility of strategic behavior involving more than one agent. We examine the
effects of two types of strategic behavior involving more than one agent,
sybils and collusion, in the context of scrip systems where agents provide each
other with service in exchange for scrip. Sybils make an agent more likely to
be chosen to provide service, which generally makes it harder for agents
without sybils to earn money and decreases social welfare. Surprisingly, in
certain circumstances it is possible for sybils to make all agents better off.
While collusion is generally bad, in the context of scrip systems it actually
tends to make all agents better off, not merely those who collude. These
results also provide insight into the effects of allowing agents to advertise
and loan money. While many extensions of Nash equilibrium have been proposed
that address collusion and other issues relevant to distributed and
peer-to-peer systems, our results show that none of them adequately address the
issues raised by sybils and collusion in scrip systems.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 21:37:29 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Kash",
"Ian A.",
""
],
[
"Friedman",
"Eric J.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.2282 | Ian Kash | Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern | Multiagent Learning in Large Anonymous Games | 8 pages, 2 figures. To Appear in Proceedings of the Eighth
International Conference on Autonomous Agents and Multiagent Systems | null | null | null | cs.MA cs.GT cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In large systems, it is important for agents to learn to act effectively, but
sophisticated multi-agent learning algorithms generally do not scale. An
alternative approach is to find restricted classes of games where simple,
efficient algorithms converge. It is shown that stage learning efficiently
converges to Nash equilibria in large anonymous games if best-reply dynamics
converge. Two features are identified that improve convergence. First, rather
than making learning more difficult, more agents are actually beneficial in
many settings. Second, providing agents with statistical information about the
behavior of others can significantly reduce the number of observations needed.
| [
{
"version": "v1",
"created": "Thu, 12 Mar 2009 21:49:36 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"Kash",
"Ian A.",
""
],
[
"Friedman",
"Eric J.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0903.2299 | David McAllester | David McAllester | Differential Contrastive Divergence | This paper was a rediscovery of known material | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been retracted.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 13:47:03 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Mar 2009 01:33:43 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Jul 2013 15:17:20 GMT"
}
]
| 2013-07-09T00:00:00 | [
[
"McAllester",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0903.2310 | Kang Ning | Kang Ning, Hoong Kee Ng, Hon Wai Leong | Analysis of the Relationships among Longest Common Subsequences,
Shortest Common Supersequences and Patterns and its application on Pattern
Discovery in Biological Sequences | Extended version of paper presented in IEEE BIBE 2006 submitted to
journal for review | null | 10.1504/IJDMB.2011.045413 | null | cs.DS cs.DM cs.IR cs.OH q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a set of mulitple sequences, their patterns,Longest Common Subsequences
(LCS) and Shortest Common Supersequences (SCS) represent different aspects of
these sequences profile, and they can all be used for biological sequence
comparisons and analysis. Revealing the relationship between the patterns and
LCS,SCS might provide us with a deeper view of the patterns of biological
sequences, in turn leading to better understanding of them. However, There is
no careful examinaton about the relationship between patterns, LCS and SCS. In
this paper, we have analyzed their relation, and given some lemmas. Based on
their relations, a set of algorithms called the PALS (PAtterns by Lcs and Scs)
algorithms are propsoed to discover patterns in a set of biological sequences.
These algorithms first generate the results for LCS and SCS of sequences by
heuristic, and consequently derive patterns from these results. Experiments
show that the PALS algorithms perform well (both in efficiency and in accuracy)
on a variety of sequences. The PALS approach also provides us with a solution
for transforming between the heuristic results of SCS and LCS.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 04:45:05 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Ning",
"Kang",
""
],
[
"Ng",
"Hoong Kee",
""
],
[
"Leong",
"Hon Wai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0903.2315 | Cuizhu Shi | Cuizhu Shi and Aditya Ramamoorthy | Design and Analysis of E2RC Codes | To appear in IEEE Journal on Selected Areas in Communications,
special issue on Capacity Approaching Codes, 2009 | null | null | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the design and analysis of the efficiently-encodable
rate-compatible ($E^2RC$) irregular LDPC codes proposed in previous work. In
this work we introduce semi-structured $E^2RC$-like codes and protograph
$E^2RC$ codes. EXIT chart based methods are developed for the design of
semi-structured $E^2RC$-like codes that allow us to determine near-optimal
degree distributions for the systematic part of the code while taking into
account the structure of the deterministic parity part, thus resolving one of
the open issues in the original construction. We develop a fast EXIT function
computation method that does not rely on Monte-Carlo simulations and can be
used in other scenarios as well. Our approach allows us to jointly optimize
code performance across the range of rates under puncturing. We then consider
protograph $E^2RC$ codes (that have a protograph representation) and propose
rules for designing a family of rate-compatible punctured protographs with low
thresholds. For both the semi-structured and protograph $E^2RC$ families we
obtain codes whose gap to capacity is at most 0.3 dB across the range of rates
when the maximum variable node degree is twenty.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 05:35:33 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2009 03:52:45 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Shi",
"Cuizhu",
""
],
[
"Ramamoorthy",
"Aditya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2352 | Nicolas Gast | Nicolas Gast (INRIA Rh\^one-Alpes / LIG laboratoire d'Informatique de
Grenoble), Bruno Gaujal (INRIA Rh\^one-Alpes / LIG laboratoire d'Informatique
de Grenoble) | A Mean Field Approach for Optimization in Particles Systems and
Applications | null | null | null | RR-6877 | math.PR cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the limit behavior of Markov Decision Processes
(MDPs) made of independent particles evolving in a common environment, when the
number of particles goes to infinity. In the finite horizon case or with a
discounted cost and an infinite horizon, we show that when the number of
particles becomes large, the optimal cost of the system converges almost surely
to the optimal cost of a discrete deterministic system (the ``optimal mean
field''). Convergence also holds for optimal policies. We further provide
insights on the speed of convergence by proving several central limits theorems
for the cost and the state of the Markov decision process with explicit
formulas for the variance of the limit Gaussian laws. Then, our framework is
applied to a brokering problem in grid computing. The optimal policy for the
limit deterministic system is computed explicitly. Several simulations with
growing numbers of processors are reported. They compare the performance of the
optimal policy of the limit system used in the finite case with classical
policies (such as Join the Shortest Queue) by measuring its asymptotic gain as
well as the threshold above which it starts outperforming classical policies.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 10:42:34 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jun 2009 14:26:02 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Jun 2009 14:40:59 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Gast",
"Nicolas",
"",
"INRIA Rhône-Alpes / LIG laboratoire d'Informatique de\n Grenoble"
],
[
"Gaujal",
"Bruno",
"",
"INRIA Rhône-Alpes / LIG laboratoire d'Informatique\n de Grenoble"
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0903.2353 | Damiano Zanardini | Andy King | Relations, Constraints and Abstractions: Using the Tools of Logic
Programming in the Security Industry | Paper presented as an invited talk at the 18th Workshop on
Logic-based Methods in Programming Environments (WLPE2008) (Report-No:
WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings | null | null | WLPE/2008/00 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Logic programming is sometimes described as relational programming: a
paradigm in which the programmer specifies and composes n-ary relations using
systems of constraints. An advanced logic programming environment will provide
tools that abstract these relations to transform, optimise, or even verify the
correctness of a logic program. This talk will show that these concepts, namely
relations, constraints and abstractions, turn out to also be important in the
reverse engineer process that underpins the discovery of bugs within the
security industry.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 10:46:39 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"King",
"Andy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0903.2361 | Ivan Yu. Tyukin | Ivan Y. Tyukin, Erik Steur, Henk Nijmeijer, and Cees van Leeuwen | Adaptive Observers and Parameter Estimation for a Class of Systems
Nonlinear in the Parameters | Preliminary version is presented at the 17-th IFAC World Congress,
6-11 Seoul, 2008 | null | 10.1016/j.automatica.2013.05.008 | null | math.OC cs.SY math.DS q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of asymptotic reconstruction of the state and
parameter values in systems of ordinary differential equations. A solution to
this problem is proposed for a class of systems of which the unknowns are
allowed to be nonlinearly parameterized functions of state and time.
Reconstruction of state and parameter values is based on the concepts of weakly
attracting sets and non-uniform convergence and is subjected to persistency of
excitation conditions. In absence of nonlinear parametrization the resulting
observers reduce to standard estimation schemes. In this respect, the proposed
method constitutes a generalization of the conventional canonical adaptive
observer design.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 12:01:17 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Mar 2009 12:55:15 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Jul 2011 06:41:53 GMT"
},
{
"version": "v4",
"created": "Tue, 10 Jul 2012 08:40:28 GMT"
},
{
"version": "v5",
"created": "Thu, 16 May 2013 16:28:14 GMT"
},
{
"version": "v6",
"created": "Mon, 20 May 2013 16:55:02 GMT"
},
{
"version": "v7",
"created": "Fri, 21 Jun 2013 13:47:22 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Tyukin",
"Ivan Y.",
""
],
[
"Steur",
"Erik",
""
],
[
"Nijmeijer",
"Henk",
""
],
[
"van Leeuwen",
"Cees",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0903.2382 | Olivier Carton | Jean Berstel, Luc Boasson, Olivier Carton, Isabelle Fagnot | Infinite words without palindrome | 3 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that there exists an uniformly recurrent infinite word whose set of
factors is closed under reversal and which has only finitely many palindromic
factors.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 13:20:44 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"Berstel",
"Jean",
""
],
[
"Boasson",
"Luc",
""
],
[
"Carton",
"Olivier",
""
],
[
"Fagnot",
"Isabelle",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.2410 | Jean-Yves Marion | Jean-Yves Marion | On tiered small jump operators | null | Logical Methods in Computer Science, Volume 5, Issue 1 (March 31,
2009) lmcs:1146 | 10.2168/LMCS-5(1:7)2009 | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Predicative analysis of recursion schema is a method to characterize
complexity classes like the class FPTIME of polynomial time computable
functions. This analysis comes from the works of Bellantoni and Cook, and
Leivant by data tiering. Here, we refine predicative analysis by using a
ramified Ackermann's construction of a non-primitive recursive function. We
obtain a hierarchy of functions which characterizes exactly functions, which
are computed in O(n^k) time over register machine model of computation. For
this, we introduce a strict ramification principle. Then, we show how to
diagonalize in order to obtain an exponential function and to jump outside
deterministic polynomial time. Lastly, we suggest a dependent typed
lambda-calculus to represent this construction.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 15:36:42 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Mar 2009 00:32:12 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Marion",
"Jean-Yves",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.2426 | Sachin Kadloor | Sachin Kadloor and Raviraj Adve | Relay Selection and Power Allocation in Cooperative Cellular Networks | 20 Pages, 5 Figures, Submitted to IEEE Transactions on Wireless
Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a system with a single base station communicating with multiple
users over orthogonal channels while being assisted by multiple relays. Several
recent works have suggested that, in such a scenario, selection, i.e., a single
relay helping the source, is the best relaying option in terms of the resulting
complexity and overhead. However, in a multiuser setting, optimal relay
assignment is a combinatorial problem. In this paper, we formulate a related
convex optimization problem that provides an extremely tight upper bound on
performance and show that selection is, almost always, inherent in the
solution. We also provide a heuristic to find a close-to-optimal relay
assignment and power allocation across users supported by a single relay.
Simulation results using realistic channel models demonstrate the efficacy of
the proposed schemes, but also raise the question as to whether the gains from
relaying are worth the additional costs.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 16:38:35 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"Kadloor",
"Sachin",
""
],
[
"Adve",
"Raviraj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2429 | Fabrizio Altarelli | F. Altarelli, A. Braunstein, J. Realpe-Gomez, R. Zecchina | Statistical mechanics of budget-constrained auctions | Minor revision | JSTAT 2009;2009:P07002 (27pp) | 10.1088/1742-5468/2009/07/P07002 | null | cs.GT cond-mat.stat-mech physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finding the optimal assignment in budget-constrained auctions is a
combinatorial optimization problem with many important applications, a notable
example being the sale of advertisement space by search engines (in this
context the problem is often referred to as the off-line AdWords problem).
Based on the cavity method of statistical mechanics, we introduce a message
passing algorithm that is capable of solving efficiently random instances of
the problem extracted from a natural distribution, and we derive from its
properties the phase diagram of the problem. As the control parameter (average
value of the budgets) is varied, we find two phase transitions delimiting a
region in which long-range correlations arise.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 16:53:52 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2009 15:20:40 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Altarelli",
"F.",
""
],
[
"Braunstein",
"A.",
""
],
[
"Realpe-Gomez",
"J.",
""
],
[
"Zecchina",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0903.2445 | Krishnendu Chatterjee | Krishnendu Chatterjee, Luca de Alfaro, Marco Faella and Axel Legay | Qualitative Logics and Equivalences for Probabilistic Systems | The paper is accepted for LMCS | Logical Methods in Computer Science, Volume 5, Issue 2 (May 4,
2009) lmcs:1082 | 10.2168/LMCS-5(2:7)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate logics and equivalence relations that capture the qualitative
behavior of Markov Decision Processes (MDPs). We present Qualitative Randomized
CTL (QRCTL): formulas of this logic can express the fact that certain temporal
properties hold over all paths, or with probability 0 or 1, but they do not
distinguish among intermediate probability values. We present a symbolic,
polynomial time model-checking algorithm for QRCTL on MDPs.
The logic QRCTL induces an equivalence relation over states of an MDP that we
call qualitative equivalence: informally, two states are qualitatively
equivalent if the sets of formulas that hold with probability 0 or 1 at the two
states are the same. We show that for finite alternating MDPs, where
nondeterministic and probabilistic choices occur in different states,
qualitative equivalence coincides with alternating bisimulation, and can thus
be computed via efficient partition-refinement algorithms. On the other hand,
in non-alternating MDPs the equivalence relations cannot be computed via
partition-refinement algorithms, but rather, they require non-local
computation. Finally, we consider QRCTL*, that extends QRCTL with nested
temporal operators in the same manner in which CTL* extends CTL. We show that
QRCTL and QRCTL* induce the same qualitative equivalence on alternating MDPs,
while on non-alternating MDPs, the equivalence arising from QRCTL* can be
strictly finer. We also provide a full characterization of the relation between
qualitative equivalence, bisimulation, and alternating bisimulation, according
to whether the MDPs are finite, and to whether their transition relations are
finitely-branching.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 17:52:30 GMT"
},
{
"version": "v2",
"created": "Mon, 4 May 2009 16:10:17 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"de Alfaro",
"Luca",
""
],
[
"Faella",
"Marco",
""
],
[
"Legay",
"Axel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.2448 | Mehrnoosh Sadrzadeh | Mehrnoosh Sadrzadeh and Roy Dyckhoff | Positive Logic with Adjoint Modalities: Proof Theory, Semantics and
Reasoning about Information | This paper is the full version of the article that is to appear in
the ENTCS proceedings of the 25th conference on the Mathematical Foundations
of Programming Semantics (MFPS), April 2009, University of Oxford | null | null | null | cs.LO cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a simple modal logic whose non-modal part has conjunction and
disjunction as connectives and whose modalities come in adjoint pairs, but are
not in general closure operators. Despite absence of negation and implication,
and of axioms corresponding to the characteristic axioms of (e.g.) T, S4 and
S5, such logics are useful, as shown in previous work by Baltag, Coecke and the
first author, for encoding and reasoning about information and misinformation
in multi-agent systems. For such a logic we present an algebraic semantics,
using lattices with agent-indexed families of adjoint pairs of operators, and a
cut-free sequent calculus. The calculus exploits operators on sequents, in the
style of "nested" or "tree-sequent" calculi; cut-admissibility is shown by
constructive syntactic methods. The applicability of the logic is illustrated
by reasoning about the muddy children puzzle, for which the calculus is
augmented with extra rules to express the facts of the muddy children scenario.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 18:30:55 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Mar 2009 16:46:40 GMT"
},
{
"version": "v3",
"created": "Mon, 23 Mar 2009 18:42:39 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Sadrzadeh",
"Mehrnoosh",
""
],
[
"Dyckhoff",
"Roy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0903.2471 | Yijia Fan | Yijia (Richard) Fan, Chao Wang, H. Vincent Poor, John S. Thompson | Cooperative Multiplexing: Toward Higher Spectral Efficiency in
Multi-antenna Relay Networks | To appear in IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Previous work on cooperative communications has concentrated primarily on the
diversity benefits of such techniques. This paper, instead, considers the
multiplexing benefits of cooperative communications. First, a new
interpretation on the fundamental tradeoff between the transmission rate and
outage probability in multi-antenna relay networks is given. It follows that
multiplexing gains can be obtained at any finite SNR, in full-duplex
multi-antenna relay networks. Thus relaying can offer not only stronger link
reliability, but also higher spectral efficiency.
Specifically, the decode-and-forward protocol is applied and networks that
have one source, one destination, and multiple relays are considered. A receive
power gain at the relays, which captures the network large scale fading
characteristics, is also considered. It is shown that this power gain can
significantly affect the system diversity-multiplexing tradeoff for any finite
SNR value. Several relaying protocols are proposed and are shown to offer
nearly the same outage probability as if the transmit antennas at the source
and the relay(s) were co-located, given certain SNR and receive power gains at
the relays. Thus a higher multiplexing gain than that of the direct link can be
obtained if the destination has more antennas than the source.
Much of the analysis in the paper is valid for arbitrary channel fading
statistics. These results point to a view of relay networks as a means for
providing higher spectral efficiency, rather than only link reliability.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 19:43:48 GMT"
}
]
| 2009-03-16T00:00:00 | [
[
"Yijia",
"",
"",
"Richard"
],
[
"Fan",
"",
""
],
[
"Wang",
"Chao",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Thompson",
"John S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2499 | Aida Ouangraoua | Aida Ouangraoua, Anne Bergeron | Parking functions, labeled trees and DCJ sorting scenarios | 12 pages, 3 figures | null | 10.1007/978-3-642-04744-2_3 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In genome rearrangement theory, one of the elusive questions raised in recent
years is the enumeration of rearrangement scenarios between two genomes. This
problem is related to the uniform generation of rearrangement scenarios, and
the derivation of tests of statistical significance of the properties of these
scenarios. Here we give an exact formula for the number of double-cut-and-join
(DCJ) rearrangement scenarios of co-tailed genomes. We also construct effective
bijections between the set of scenarios that sort a cycle and well studied
combinatorial objects such as parking functions and labeled trees.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 21:48:20 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Ouangraoua",
"Aida",
""
],
[
"Bergeron",
"Anne",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.2507 | David Eppstein | Sergio Cabello, David Eppstein, and Sandi Klavzar | The Fibonacci dimension of a graph | 20 pages, 6 figures | null | null | IMFM Preprint 1084 | math.CO cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Fibonacci dimension fdim(G) of a graph G is introduced as the smallest
integer f such that G admits an isometric embedding into Gamma_f, the
f-dimensional Fibonacci cube. We give bounds on the Fibonacci dimension of a
graph in terms of the isometric and lattice dimension, provide a combinatorial
characterization of the Fibonacci dimension using properties of an associated
graph, and establish the Fibonacci dimension for certain families of graphs.
From the algorithmic point of view we prove that it is NP-complete to decide
if fdim(G) equals to the isometric dimension of G, and that it is also NP-hard
to approximate fdim(G) within (741/740)-epsilon. We also give a
(3/2)-approximation algorithm for fdim(G) in the general case and a
(1+epsilon)-approximation algorithm for simplex graphs.
| [
{
"version": "v1",
"created": "Fri, 13 Mar 2009 22:24:17 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Cabello",
"Sergio",
""
],
[
"Eppstein",
"David",
""
],
[
"Klavzar",
"Sandi",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.2516 | Susan Khor | Susan Khor | Effect of Degree Distribution on Evolutionary Search | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a method to generate hierarchically modular networks
with prescribed node degree list and proposes a metric to measure network
modularity based on the notion of edge distance. The generated networks are
used as test problems to explore the effect of modularity and degree
distribution on evolutionary algorithm performance. Results from the
experiments (i) confirm a previous finding that modularity increases the
performance advantage of genetic algorithms over hill climbers, and (ii)
support a new conjecture that test problems with modularized constraint
networks having heavy-tailed right-skewed degree distributions are more easily
solved than test problems with modularized constraint networks having
bell-shaped normal degree distributions.
| [
{
"version": "v1",
"created": "Sat, 14 Mar 2009 00:18:08 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Khor",
"Susan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0903.2525 | Rajkumar Buyya | Rodrigo N. Calheiros, Rajiv Ranjan, Cesar A. F. De Rose, and Rajkumar
Buyya | CloudSim: A Novel Framework for Modeling and Simulation of Cloud
Computing Infrastructures and Services | 9 pages, 9 figures | null | null | echnical Report, GRIDS-TR-2009-1, Grid Computing and Distributed
Systems Laboratory, The University of Melbourne, Australia, March 13, 2009 | cs.DC cs.OS cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cloud computing focuses on delivery of reliable, secure, fault-tolerant,
sustainable, and scalable infrastructures for hosting Internet-based
application services. These applications have different composition,
configuration, and deployment requirements. Quantifying the performance of
scheduling and allocation policy on a Cloud infrastructure (hardware, software,
services) for different application and service models under varying load,
energy performance (power consumption, heat dissipation), and system size is an
extremely challenging problem to tackle. To simplify this process, in this
paper we propose CloudSim: a new generalized and extensible simulation
framework that enables seamless modelling, simulation, and experimentation of
emerging Cloud computing infrastructures and management services. The
simulation framework has the following novel features: (i) support for
modelling and instantiation of large scale Cloud computing infrastructure,
including data centers on a single physical computing node and java virtual
machine; (ii) a self-contained platform for modelling data centers, service
brokers, scheduling, and allocations policies; (iii) availability of
virtualization engine, which aids in creation and management of multiple,
independent, and co-hosted virtualized services on a data center node; and (iv)
flexibility to switch between space-shared and time-shared allocation of
processing cores to virtualized services.
| [
{
"version": "v1",
"created": "Sat, 14 Mar 2009 04:28:55 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Calheiros",
"Rodrigo N.",
""
],
[
"Ranjan",
"Rajiv",
""
],
[
"De Rose",
"Cesar A. F.",
""
],
[
"Buyya",
"Rajkumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.2528 | Chendong Li | Chendong Li | Airport Gate Assignment A Hybrid Model and Implementation | 5 pages, 2 figures, submitted to IC-AI 2009 | null | null | null | cs.AI cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the rapid development of airlines, airports today become much busier and
more complicated than previous days. During airlines daily operations,
assigning the available gates to the arriving aircrafts based on the fixed
schedule is a very important issue, which motivates researchers to study and
solve Airport Gate Assignment Problems (AGAP) with all kinds of
state-of-the-art combinatorial optimization techniques. In this paper, we study
the AGAP and propose a novel hybrid mathematical model based on the method of
constraint programming and 0 - 1 mixed-integer programming. With the objective
to minimize the number of gate conflicts of any two adjacent aircrafts assigned
to the same gate, we build a mathematical model with logical constraints and
the binary constraints. For practical considerations, the potential objective
of the model is also to minimize the number of gates that airlines must lease
or purchase in order to run their business smoothly. We implement the model in
the Optimization Programming Language (OPL) and carry out empirical studies
with the data obtained from online timetable of Continental Airlines, Houston
Gorge Bush Intercontinental Airport IAH, which demonstrate that our model can
provide an efficient evaluation criteria for the airline companies to estimate
the efficiency of their current gate assignments.
| [
{
"version": "v1",
"created": "Sat, 14 Mar 2009 05:23:11 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Li",
"Chendong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.2543 | Khaled Khalil | Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M.
Salem | Multi-Agent Crisis Response systems - Design Requirements and Analysis
of Current Systems | 6 pages, 1 figure, accepted at Fourth International Conference on
Intelligent Computing and Information Systems 2009 | null | null | null | cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Crisis response is a critical area of research, with encouraging progress in
the past view yeas. The aim of the research is to contribute to building future
crisis environment where software agents, robots, responders, crisis managers,
and crisis organizations interact to provide advice, protection and aid. This
paper discusses the crisis response domain requirements, and provides analysis
of five crisis response systems namely: DrillSim [2], DEFACTO [15], ALADDIN
[1], RoboCup Rescue [18], and FireGrid [3]. Analysis of systems includes
systems architecture and methodology. In addition, we identified features and
limitations of systems based on crisis response domain requirements.
| [
{
"version": "v1",
"created": "Sat, 14 Mar 2009 12:13:32 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Khalil",
"Khaled M.",
""
],
[
"Abdel-Aziz",
"M.",
""
],
[
"Nazmy",
"Taymour T.",
""
],
[
"Salem",
"Abdel-Badeeh M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0903.2544 | Iraklis Varlamis | N. Zotos, P. Tzekou, G. Tsatsaronis, L. Kozanidis, S. Stamou, I.
Varlamis | To Click or not to Click? The Role of Contextualized and User-Centric
Web Snippets | In proceedings of SIGIR 2007 Workshop on Focused Retrieval. 8 pages | SIGIR 2007 Workshop on Focused Retrieval | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When searching the web, it is often possible that there are too many results
available for ambiguous queries. Text snippets, extracted from the retrieved
pages, are an indicator of the pages' usefulness to the query intention and can
be used to focus the scope of search results. In this paper, we propose a novel
method for automatically extracting web page snippets that are highly relevant
to the query intention and expressive of the pages' entire content. We show
that the usage of semantics, as a basis for focused retrieval, produces high
quality text snippet suggestions. The snippets delivered by our method are
significantly better in terms of retrieval performance compared to those
derived using the pages' statistical content. Furthermore, our study suggests
that semantically-driven snippet generation can also be used to augment
traditional passage retrieval algorithms based on word overlap or statistical
weights, since they typically differ in coverage and produce different results.
User clicks on the query relevant snippets can be used to refine the query
results and promote the most comprehensive among the relevant documents.
| [
{
"version": "v1",
"created": "Sat, 14 Mar 2009 12:22:27 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Zotos",
"N.",
""
],
[
"Tzekou",
"P.",
""
],
[
"Tsatsaronis",
"G.",
""
],
[
"Kozanidis",
"L.",
""
],
[
"Stamou",
"S.",
""
],
[
"Varlamis",
"I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.2554 | Irene Durand | Irene Durand and Geraud Senizergues | Bottom-up rewriting for words and terms | 86 pages; long version to be cut into pieces for publication | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the whole class of linear term rewriting systems, we define
\emph{bottom-up rewriting} which is a restriction of the usual notion of
rewriting. We show that bottom-up rewriting effectively inverse-preserves
recognizability and analyze the complexity of the underlying construction. The
Bottom-Up class (BU) is, by definition, the set of linear systems for which
every derivation can be replaced by a bottom-up derivation. Membership to BU
turns out to be undecidable, we are thus lead to define more restricted
classes: the classes SBU(k), k in N of Strongly Bottom-Up(k) systems for which
we show that membership is decidable. We define the class of Strongly Bottom-Up
systems by SBU = U_{k in \} SBU(k). We give a polynomial sufficient condition
for a system to be in $\SBU$. The class SBU contains (strictly) several classes
of systems which were already known to inverse preserve recognizability: the
inverse left-basic semi-Thue systems (viewed as unary term rewriting systems),
the linear growing term rewriting systems, the inverse
Linear-Finite-Path-Ordering systems.
| [
{
"version": "v1",
"created": "Sat, 14 Mar 2009 16:14:18 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jul 2013 16:23:22 GMT"
}
]
| 2013-08-01T00:00:00 | [
[
"Durand",
"Irene",
""
],
[
"Senizergues",
"Geraud",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0903.2584 | Dmitri Krioukov | Dmitri Krioukov, Fragkiskos Papadopoulos, Amin Vahdat, Marian Boguna | Curvature and temperature of complex networks | null | Phys. Rev. E 80, 035101(R) (2009) | 10.1103/PhysRevE.80.035101 | null | cond-mat.stat-mech cond-mat.dis-nn cs.NI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that heterogeneous degree distributions in observed scale-free
topologies of complex networks can emerge as a consequence of the exponential
expansion of hidden hyperbolic space. Fermi-Dirac statistics provides a
physical interpretation of hyperbolic distances as energies of links. The
hidden space curvature affects the heterogeneity of the degree distribution,
while clustering is a function of temperature. We embed the Internet into the
hyperbolic plane, and find a remarkable congruency between the embedding and
our hyperbolic model. Besides proving our model realistic, this embedding may
be used for routing with only local information, which holds significant
promise for improving the performance of Internet routing.
| [
{
"version": "v1",
"created": "Sat, 14 Mar 2009 22:33:00 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Sep 2009 00:06:33 GMT"
}
]
| 2009-09-26T00:00:00 | [
[
"Krioukov",
"Dmitri",
""
],
[
"Papadopoulos",
"Fragkiskos",
""
],
[
"Vahdat",
"Amin",
""
],
[
"Boguna",
"Marian",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0903.2598 | Susan Khor | Susan Khor | Generating Hierarchically Modular Networks via Link Switching | Appendix B | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a method to generate hierarchically modular networks
with prescribed node degree list by link switching. Unlike many existing
network generating models, our method does not use link probabilities to
achieve modularity. Instead, it utilizes a user-specified topology to determine
relatedness between pairs of nodes in terms of edge distances and links are
switched to increase edge distances. To measure the modular-ness of a network
as a whole, a new metric called Q2 is proposed. Comparisons are made between
the Q [15] and Q2 measures. We also comment on the effect of our modularization
method on other network characteristics such as clustering, hierarchy, average
path length, small-worldness, degree correlation and centrality. An application
of this method is reported elsewhere [12]. Briefly, the generated networks are
used as test problems to explore the effect of modularity and degree
distribution on evolutionary search algorithms.
| [
{
"version": "v1",
"created": "Sun, 15 Mar 2009 01:44:30 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Apr 2009 18:34:10 GMT"
},
{
"version": "v3",
"created": "Sun, 5 Jul 2009 21:00:23 GMT"
}
]
| 2009-07-05T00:00:00 | [
[
"Khor",
"Susan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.2641 | Constantinos Siettos | Konstantinos G. Spiliotis and Constantinos I. Siettos | Multiscale Computations on Neural Networks: From the Individual Neuron
Interactions to the Macroscopic-Level Analysis | null | Int. J. Bifurcation and Chaos 20 (1) 121-134 (2010) | 10.1142/S0218127410025442 | null | cs.CE cs.NA q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how the Equation-Free approach for multi-scale computations can be
exploited to systematically study the dynamics of neural interactions on a
random regular connected graph under a pairwise representation perspective.
Using an individual-based microscopic simulator as a black box coarse-grained
timestepper and with the aid of simulated annealing we compute the
coarse-grained equilibrium bifurcation diagram and analyze the stability of the
stationary states sidestepping the necessity of obtaining explicit closures at
the macroscopic level. We also exploit the scheme to perform a rare-events
analysis by estimating an effective Fokker-Planck describing the evolving
probability density function of the corresponding coarse-grained observables.
| [
{
"version": "v1",
"created": "Sun, 15 Mar 2009 16:27:55 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Spiliotis",
"Konstantinos G.",
""
],
[
"Siettos",
"Constantinos I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
]
|
0903.2653 | Salman Avestimehr | Salman Avestimehr, Amin Khajehnejad, Aydin Sezgin, Babak Hassibi | Capacity region of the deterministic multi-pair bi-directional relay
network | Will be presented in the 2009 IEEE Information Theory Workshop on
Networking and Information Theory | null | 10.1109/ITWNIT.2009.5158541 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the capacity region of the multi-pair bidirectional
(or two-way) wireless relay network, in which a relay node facilitates the
communication between multiple pairs of users. This network is a generalization
of the well known bidirectional relay channel, where we have only one pair of
users. We examine this problem in the context of the deterministic channel
interaction model, which eliminates the channel noise and allows us to focus on
the interaction between signals. We characterize the capacity region of this
network when the relay is operating at either full-duplex mode or half-duplex
mode (with non adaptive listen-transmit scheduling). In both cases we show that
the cut-set upper bound is tight and, quite interestingly, the capacity region
is achieved by a simple equation-forwarding strategy.
| [
{
"version": "v1",
"created": "Sun, 15 Mar 2009 17:49:53 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Avestimehr",
"Salman",
""
],
[
"Khajehnejad",
"Amin",
""
],
[
"Sezgin",
"Aydin",
""
],
[
"Hassibi",
"Babak",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2675 | Maximilien Gadouleau | Maximilien Gadouleau and Zhiyuan Yan | Construction and Covering Properties of Constant-Dimension Codes | 20 pages, submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constant-dimension codes (CDCs) have been investigated for noncoherent error
correction in random network coding. The maximum cardinality of CDCs with given
minimum distance and how to construct optimal CDCs are both open problems,
although CDCs obtained by lifting Gabidulin codes, referred to as KK codes, are
nearly optimal. In this paper, we first construct a new class of CDCs based on
KK codes, referred to as augmented KK codes, whose cardinalities are greater
than previously proposed CDCs. We then propose a low-complexity decoding
algorithm for our augmented KK codes using that for KK codes. Our decoding
algorithm corrects more errors than a bounded subspace distance decoder by
taking advantage of the structure of our augmented KK codes. In the rest of the
paper we investigate the covering properties of CDCs. We first derive bounds on
the minimum cardinality of a CDC with a given covering radius and then
determine the asymptotic behavior of this quantity. Moreover, we show that
liftings of rank metric codes have the highest possible covering radius, and
hence liftings of rank metric codes are not optimal packing CDCs. Finally, we
construct good covering CDCs by permuting liftings of rank metric codes.
| [
{
"version": "v1",
"created": "Sun, 15 Mar 2009 22:48:36 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2679 | Cliff Joslyn | Chris Orum and Cliff A Joslyn | Valuations and Metrics on Partially Ordered Sets | Submitted | null | null | PNWD-SA-8513 | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend the definitions of upper and lower valuations on partially ordered
sets, and consider the metrics they induce, in particular the metrics available
(or not) based on the logarithms of such valuations. Motivating applications in
computational linguistics and computational biology are indicated.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 00:00:04 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Orum",
"Chris",
""
],
[
"Joslyn",
"Cliff A",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2682 | Abedelaziz Mohaisen | Abedelaziz Mohaisen, Dowon Hong, and DaeHun Nyang | Privacy in Location Based Services: Primitives Toward the Solution | Appeared in proceeding of NCM 2008 | null | 10.1109/NCM.2008.137 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Location based services (LBS) are one of the most promising and innovative
directions of convergence technologies resulting of emergence of several fields
including database systems, mobile communication, Internet technology, and
positioning systems. Although being initiated as early as middle of 1990's, it
is only recently that the LBS received a systematic profound research interest
due to its commercial and technological impact. As the LBS is related to the
user's location which can be used to trace the user's activities, a strong
privacy concern has been raised. To preserve the user's location, several
intelligent works have been introduced though many challenges are still
awaiting solutions. This paper introduces a survey on LBS systems considering
both localization technologies, model and architectures guaranteeing privacy.
We also overview cryptographic primitive to possibly use in preserving LBS's
privacy followed by fruitful research directions basically concerned with the
privacy issue.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 01:31:58 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Mohaisen",
"Abedelaziz",
""
],
[
"Hong",
"Dowon",
""
],
[
"Nyang",
"DaeHun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.2693 | Kang Ning | Kang Ning | A Pseudo DNA Cryptography Method | A small work that quite some people asked about | null | 10.1016/j.compeleceng.2012.02.007 | null | cs.CR cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The DNA cryptography is a new and very promising direction in cryptography
research. DNA can be used in cryptography for storing and transmitting the
information, as well as for computation. Although in its primitive stage, DNA
cryptography is shown to be very effective. Currently, several DNA computing
algorithms are proposed for quite some cryptography, cryptanalysis and
steganography problems, and they are very powerful in these areas. However, the
use of the DNA as a means of cryptography has high tech lab requirements and
computational limitations, as well as the labor intensive extrapolation means
so far. These make the efficient use of DNA cryptography difficult in the
security world now. Therefore, more theoretical analysis should be performed
before its real applications.
In this project, We do not intended to utilize real DNA to perform the
cryptography process; rather, We will introduce a new cryptography method based
on central dogma of molecular biology. Since this method simulates some
critical processes in central dogma, it is a pseudo DNA cryptography method.
The theoretical analysis and experiments show this method to be efficient in
computation, storage and transmission; and it is very powerful against certain
attacks. Thus, this method can be of many uses in cryptography, such as an
enhancement insecurity and speed to the other cryptography methods. There are
also extensions and variations to this method, which have enhanced security,
effectiveness and applicability.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 04:22:45 GMT"
}
]
| 2012-03-07T00:00:00 | [
[
"Ning",
"Kang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.2695 | Marco Pavone | Marco Pavone, Stephen L. Smith, Francesco Bullo, Emilio Frazzoli | Dynamic Multi-Vehicle Routing with Multiple Classes of Demands | Extended version of paper presented in American Control Conference
2009 | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study a dynamic vehicle routing problem in which there are
multiple vehicles and multiple classes of demands. Demands of each class arrive
in the environment randomly over time and require a random amount of on-site
service that is characteristic of the class. To service a demand, one of the
vehicles must travel to the demand location and remain there for the required
on-site service time. The quality of service provided to each class is given by
the expected delay between the arrival of a demand in the class, and that
demand's service completion. The goal is to design a routing policy for the
service vehicles which minimizes a convex combination of the delays for each
class. First, we provide a lower bound on the achievable values of the convex
combination of delays. Then, we propose a novel routing policy and analyze its
performance under heavy load conditions (i.e., when the fraction of time the
service vehicles spend performing on-site service approaches one). The policy
performs within a constant factor of the lower bound (and thus the optimal),
where the constant depends only on the number of classes, and is independent of
the number of vehicles, the arrival rates of demands, the on-site service
times, and the convex combination coefficients.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 04:50:49 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Pavone",
"Marco",
""
],
[
"Smith",
"Stephen L.",
""
],
[
"Bullo",
"Francesco",
""
],
[
"Frazzoli",
"Emilio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0903.2711 | Peter Fertl | Peter Fertl, Joakim Jalden, Gerald Matz | Performance Assessment of MIMO-BICM Demodulators based on System
Capacity | Submitted to IEEE Transactions on Signal Processing, Oct. 20010
(paper was presented in part at IEEE SPAWC 2008, Recife, Brazil, July 2008) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a comprehensive performance comparison of soft-output and
hard-output demodulators in the context of non-iterative multiple-input
multiple-output bit-interleaved coded modulation (MIMO-BICM). Coded bit error
rate (BER), widely used in literature for demodulator comparison, has the
drawback of depending strongly on the error correcting code being used. This
motivates us to propose a code-independent performance measure in terms of
system capacity, i.e., mutual information of the equivalent modulation channel
that comprises modulator, wireless channel, and demodulator. We present
extensive numerical results for ergodic and quasi-static fading channels under
perfect and imperfect channel state information. These results reveal that the
performance ranking of MIMO demodulators is rate-dependent. Furthermore, they
provide new insights regarding MIMO-BICM system design, i.e., the choice of
antenna configuration, symbol constellation, and demodulator for a given target
rate.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 09:35:04 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Dec 2010 22:05:57 GMT"
}
]
| 2010-12-07T00:00:00 | [
[
"Fertl",
"Peter",
""
],
[
"Jalden",
"Joakim",
""
],
[
"Matz",
"Gerald",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2742 | Gabriel Istrate | Gabriel Istrate | On Hadwiger's Number of a graph with partial information | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the possibility of proving upper bounds on Hadwiger's number
of a graph with partial information, mirroring several known upper bounds for
the chromatic number. For each such bound we determine whether the
corresponding bound for Hadwiger's number holds. Our results suggest that the
``locality'' of an inequality accounts for the existence of such an extension.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 12:53:25 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Istrate",
"Gabriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.2749 | Olli Pottonen | Patric R. J. \"Osterg{\aa}rd, Olli Pottonen, Kevin T. Phelps | The Perfect Binary One-Error-Correcting Codes of Length 15: Part
II--Properties | v2: fixed two errors (extension of nonsystematic codes, table of
coordinates fixed by symmetries of codes), added and extended many other
results | IEEE Trans. Inform. Theory vol. 56, pp. 2571-2582, 2010 | 10.1109/TIT.2010.2046197 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A complete classification of the perfect binary one-error-correcting codes of
length 15 as well as their extensions of length 16 was recently carried out in
[P. R. J. \"Osterg{\aa}rd and O. Pottonen, "The perfect binary
one-error-correcting codes of length 15: Part I--Classification," IEEE Trans.
Inform. Theory vol. 55, pp. 4657--4660, 2009]. In the current accompanying
work, the classified codes are studied in great detail, and their main
properties are tabulated. The results include the fact that 33 of the 80
Steiner triple systems of order 15 occur in such codes. Further understanding
is gained on full-rank codes via switching, as it turns out that all but two
full-rank codes can be obtained through a series of such transformations from
the Hamming code. Other topics studied include (non)systematic codes, embedded
one-error-correcting codes, and defining sets of codes. A classification of
certain mixed perfect codes is also obtained.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 13:04:36 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Jan 2010 12:53:38 GMT"
}
]
| 2010-10-07T00:00:00 | [
[
"Östergård",
"Patric R. J.",
""
],
[
"Pottonen",
"Olli",
""
],
[
"Phelps",
"Kevin T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2774 | Georg Tauboeck | Georg Tauboeck, Franz Hlawatsch, Daniel Eiwen, Holger Rauhut | Compressive estimation of doubly selective channels in multicarrier
systems: Leakage effects and sparsity-enhancing processing | 18 pages, 6 figures; content is identical to published paper version
(in IEEE Journal of Selected Topics in Signal Processing - Special Issue on
Compressed Sensing), only format is different; this revision contains
substantially new material compared with previous (arXiv) revision, also
title and author list have changed | IEEE J. Sel. Top. Sig. Process., vol. 4, no. 2, pp. 255-271, April
2010 | 10.1109/JSTSP.2010.2042410 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the application of compressed sensing (CS) to the estimation of
doubly selective channels within pulse-shaping multicarrier systems (which
include OFDM systems as a special case). By exploiting sparsity in the
delay-Doppler domain, CS-based channel estimation allows for an increase in
spectral efficiency through a reduction of the number of pilot symbols. For
combating leakage effects that limit the delay-Doppler sparsity, we propose a
sparsity-enhancing basis expansion and a method for optimizing the basis with
or without prior statistical information about the channel. We also present an
alternative CS-based channel estimator for (potentially) strongly
time-frequency dispersive channels, which is capable of estimating the
"off-diagonal" channel coefficients characterizing intersymbol and intercarrier
interference (ISI/ICI). For this estimator, we propose a basis construction
combining Fourier (exponential) and prolate spheroidal sequences. Simulation
results assess the performance gains achieved by the proposed
sparsity-enhancing processing techniques and by explicit estimation of ISI/ICI
channel coefficients.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 15:11:51 GMT"
},
{
"version": "v2",
"created": "Fri, 7 May 2010 12:44:26 GMT"
}
]
| 2010-05-10T00:00:00 | [
[
"Tauboeck",
"Georg",
""
],
[
"Hlawatsch",
"Franz",
""
],
[
"Eiwen",
"Daniel",
""
],
[
"Rauhut",
"Holger",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2791 | Steve Szabo | Sergio Lopez-Permouth and Steve Szabo | On the Hamming weight of Repeated Root Cyclic and Negacyclic Codes over
Galois Rings | Submitted | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Repeated root Cyclic and Negacyclic codes over Galois rings have been studied
much less than their simple root counterparts. This situation is beginning to
change. For example, repeated root codes of length $p^s$, where $p$ is the
characteristic of the alphabet ring, have been studied under some additional
hypotheses. In each one of those cases, the ambient space for the codes has
turned out to be a chain ring. In this paper, all remaining cases of cyclic and
negacyclic codes of length $p^s$ over a Galois ring alphabet are considered. In
these cases the ambient space is a local ring with simple socle but not a chain
ring. Nonetheless, by reducing the problem to one dealing with uniserial
subambients, a method for computing the Hamming distance of these codes is
provided.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 16:25:32 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Lopez-Permouth",
"Sergio",
""
],
[
"Szabo",
"Steve",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2792 | Manuel Cebrian | Kostadin Koroutchev, Jian Shen, Elka Koroutcheva and Manuel Cebrian | Thermodynamics of Information Retrieval | 12 pages, 7 figures | null | null | null | cs.IT cs.CL cs.SI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we suggest a parameterized statistical model (the gamma
distribution) for the frequency of word occurrences in long strings of English
text and use this model to build a corresponding thermodynamic picture by
constructing the partition function. We then use our partition function to
compute thermodynamic quantities such as the free energy and the specific heat.
In this approach, the parameters of the word frequency model vary from word to
word so that each word has a different corresponding thermodynamics and we
suggest that differences in the specific heat reflect differences in how the
words are used in language, differentiating keywords from common and function
words. Finally, we apply our thermodynamic picture to the problem of retrieval
of texts based on keywords and suggest some advantages over traditional
information retrieval methods.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 16:16:42 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Feb 2011 01:07:57 GMT"
},
{
"version": "v3",
"created": "Sun, 27 Feb 2011 10:36:25 GMT"
}
]
| 2011-03-01T00:00:00 | [
[
"Koroutchev",
"Kostadin",
""
],
[
"Shen",
"Jian",
""
],
[
"Koroutcheva",
"Elka",
""
],
[
"Cebrian",
"Manuel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2816 | Daniel A. Spielman | Daniel A Spielman, Jaeoh Woo | A Note on Preconditioning by Low-Stretch Spanning Trees | null | null | null | null | cs.NA cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Boman and Hendrickson observed that one can solve linear systems in Laplacian
matrices in time $\bigO{m^{3/2 + o (1)} \ln (1/\epsilon)}$ by preconditioning
with the Laplacian of a low-stretch spanning tree. By examining the
distribution of eigenvalues of the preconditioned linear system, we prove that
the preconditioned conjugate gradient will actually solve the linear system in
time $\softO{m^{4/3} \ln (1/\epsilon)}$.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 18:04:31 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Spielman",
"Daniel A",
""
],
[
"Woo",
"Jaeoh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.2820 | Debdeep Chatterjee | Debdeep Chatterjee, Tan F. Wong, and Tat M. Lok | Cooperative Transmission in a Wireless Relay Network based on Flow
Management | 31 pages, 10 figures. First version submitted to Transactions on
Communications, Nov. 2007. This is the revised detailed version. Further
updated on Nov. 16, 2009 with minor modifications. To appear | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a cooperative transmission design for a general multi-node
half-duplex wireless relay network is presented. It is assumed that the nodes
operate in half-duplex mode and that channel information is available at the
nodes. The proposed design involves solving a convex flow optimization problem
on a graph that models the relay network. A much simpler generalized-link
selection protocol based on the above design is also presented. Both the
proposed flow-optimized protocol and the generalized-link selection protocol
are shown to achieve the optimal diversity-multiplexing tradeoff (DMT) for the
relay network. Moreover, simulation results are presented to quantify the gap
between the performances of the proposed protocols and that of a
max-flow-min-cut type bound, in terms of outage probability.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 18:22:45 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Nov 2009 23:55:55 GMT"
}
]
| 2009-11-17T00:00:00 | [
[
"Chatterjee",
"Debdeep",
""
],
[
"Wong",
"Tan F.",
""
],
[
"Lok",
"Tat M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2825 | Susmit Jha | Susmit Jha, Sanjit A. Seshia and Rhishikesh Limaye | On the Computational Complexity of Satisfiability Solving for String
Theories | null | null | null | null | cs.CC cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Satisfiability solvers are increasingly playing a key role in software
verification, with particularly effective use in the analysis of security
vulnerabilities. String processing is a key part of many software applications,
such as browsers and web servers. These applications are susceptible to attacks
through malicious data received over network. Automated tools for analyzing the
security of such applications, thus need to reason about strings. For
efficiency reasons, it is desirable to have a solver that treats strings as
first-class types. In this paper, we present some theories of strings that are
useful in a software security context and analyze the computational complexity
of the presented theories. We use this complexity analysis to motivate a
byte-blast approach which employs a Boolean encoding of the string constraints
to a corresponding Boolean satisfiability problem.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 18:25:54 GMT"
}
]
| 2009-03-17T00:00:00 | [
[
"Jha",
"Susmit",
""
],
[
"Seshia",
"Sanjit A.",
""
],
[
"Limaye",
"Rhishikesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0903.2851 | Kamalika Chaudhuri | Kamalika Chaudhuri, Yoav Freund, Daniel Hsu | A parameter-free hedging algorithm | Updated Version | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of decision-theoretic online learning (DTOL). Motivated
by practical applications, we focus on DTOL when the number of actions is very
large. Previous algorithms for learning in this framework have a tunable
learning rate parameter, and a barrier to using online-learning in practical
applications is that it is not understood how to set this parameter optimally,
particularly when the number of actions is large.
In this paper, we offer a clean solution by proposing a novel and completely
parameter-free algorithm for DTOL. We introduce a new notion of regret, which
is more natural for applications with a large number of actions. We show that
our algorithm achieves good performance with respect to this new notion of
regret; in addition, it also achieves performance close to that of the best
bounds achieved by previous algorithms with optimally-tuned parameters,
according to previous notions of regret.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 20:48:33 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Jan 2010 23:58:51 GMT"
}
]
| 2010-01-19T00:00:00 | [
[
"Chaudhuri",
"Kamalika",
""
],
[
"Freund",
"Yoav",
""
],
[
"Hsu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.2862 | Kamalika Chaudhuri | Kamalika Chaudhuri, Yoav Freund, Daniel Hsu | Tracking using explanation-based modeling | null | null | null | null | cs.LG cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the tracking problem, namely, estimating the hidden state of an
object over time, from unreliable and noisy measurements. The standard
framework for the tracking problem is the generative framework, which is the
basis of solutions such as the Bayesian algorithm and its approximation, the
particle filters. However, the problem with these solutions is that they are
very sensitive to model mismatches. In this paper, motivated by online
learning, we introduce a new framework -- an {\em explanatory} framework -- for
tracking. We provide an efficient tracking algorithm for this framework. We
provide experimental results comparing our algorithm to the Bayesian algorithm
on simulated data. Our experiments show that when there are slight model
mismatches, our algorithm vastly outperforms the Bayesian algorithm.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 21:26:55 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Jan 2010 00:15:59 GMT"
}
]
| 2010-01-19T00:00:00 | [
[
"Chaudhuri",
"Kamalika",
""
],
[
"Freund",
"Yoav",
""
],
[
"Hsu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0903.2870 | Patrick Erik Bradley | Patrick Erik Bradley | On $p$-adic Classification | 16 pages, 7 figures, 1 table; added reference, corrected typos, minor
content changes | p-Adic Numbers, Ultrametric Analysis, and Applications, Vol. 1,
No. 4 (2009), 271-285 | 10.1134/S2070046609040013 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A $p$-adic modification of the split-LBG classification method is presented
in which first clusterings and then cluster centers are computed which locally
minimise an energy function. The outcome for a fixed dataset is independent of
the prime number $p$ with finitely many exceptions. The methods are applied to
the construction of $p$-adic classifiers in the context of learning.
| [
{
"version": "v1",
"created": "Mon, 16 Mar 2009 22:52:06 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jun 2009 14:10:45 GMT"
}
]
| 2009-12-01T00:00:00 | [
[
"Bradley",
"Patrick Erik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0903.2890 | Soummya Kar | Soummya Kar, Bruno Sinopoli, and Jose M. F. Moura | Kalman Filtering with Intermittent Observations: Weak Convergence to a
Stationary Distribution | Submitted for publication | null | null | null | cs.IT cs.LG math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper studies the asymptotic behavior of Random Algebraic Riccati
Equations (RARE) arising in Kalman filtering when the arrival of the
observations is described by a Bernoulli i.i.d. process. We model the RARE as
an order-preserving, strongly sublinear random dynamical system (RDS). Under a
sufficient condition, stochastic boundedness, and using a limit-set dichotomy
result for order-preserving, strongly sublinear RDS, we establish the
asymptotic properties of the RARE: the sequence of random prediction error
covariance matrices converges weakly to a unique invariant distribution, whose
support exhibits fractal behavior. In particular, this weak convergence holds
under broad conditions and even when the observations arrival rate is below the
critical probability for mean stability. We apply the weak-Feller property of
the Markov process governing the RARE to characterize the support of the
limiting invariant distribution as the topological closure of a countable set
of points, which, in general, is not dense in the set of positive semi-definite
matrices. We use the explicit characterization of the support of the invariant
distribution and the almost sure ergodicity of the sample paths to easily
compute the moments of the invariant distribution. A one dimensional example
illustrates that the support is a fractured subset of the non-negative reals
with self-similarity properties.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 01:39:01 GMT"
},
{
"version": "v2",
"created": "Fri, 28 May 2010 08:33:21 GMT"
}
]
| 2010-05-31T00:00:00 | [
[
"Kar",
"Soummya",
""
],
[
"Sinopoli",
"Bruno",
""
],
[
"Moura",
"Jose M. F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0903.2904 | Andreas Bauer | Andreas Bauer, Rajeev Gore, Alwen Tiu | A decidable policy language for history-based transaction monitoring | null | null | 10.1007/978-3-642-03466-4_6 | null | cs.LO cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online trading invariably involves dealings between strangers, so it is
important for one party to be able to judge objectively the trustworthiness of
the other. In such a setting, the decision to trust a user may sensibly be
based on that user's past behaviour. We introduce a specification language
based on linear temporal logic for expressing a policy for categorising the
behaviour patterns of a user depending on its transaction history. We also
present an algorithm for checking whether the transaction history obeys the
stated policy. To be useful in a real setting, such a language should allow one
to express realistic policies which may involve parameter quantification and
quantitative or statistical patterns. We introduce several extensions of linear
temporal logic to cater for such needs: a restricted form of universal and
existential quantification; arbitrary computable functions and relations in the
term language; and a "counting" quantifier for counting how many times a
formula holds in the past. We then show that model checking a transaction
history against a policy, which we call the history-based transaction
monitoring problem, is PSPACE-complete in the size of the policy formula and
the length of the history. The problem becomes decidable in polynomial time
when the policies are fixed. We also consider the problem of transaction
monitoring in the case where not all the parameters of actions are observable.
We formulate two such "partial observability" monitoring problems, and show
their decidability under certain restrictions.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 06:23:44 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Bauer",
"Andreas",
""
],
[
"Gore",
"Rajeev",
""
],
[
"Tiu",
"Alwen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.2908 | Haijun Zhou | Haijun Zhou and Hui Ma | Communities of solutions in single solution clusters of a random
K-Satisfiability formula | Extensively revised and expanded into 15 pages with 10 figures. New
mean-field calculations and simulation results added | Phys. Rev. E 80, 066108 (2009) | 10.1103/PhysRevE.80.066108 | null | cond-mat.dis-nn cond-mat.stat-mech cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The solution space of a K-satisfiability (K-SAT) formula is a collection of
solution clusters, each of which contains all the solutions that are mutually
reachable through a sequence of single-spin flips. Knowledge of the statistical
property of solution clusters is valuable for a complete understanding of the
solution space structure and the computational complexity of the random K-SAT
problem. This paper explores single solution clusters of random 3- and 4-SAT
formulas through unbiased and biased random walk processes and the
replica-symmetric cavity method of statistical physics. We find that the giant
connected component of the solution space has already formed many different
communities when the constraint density of the formula is still lower than the
solution space clustering transition point. Solutions of the same community are
more similar with each other and more densely connected with each other than
with the other solutions. The entropy density of a solution community is
calculated using belief propagation and is found to be different for different
communities of the same cluster. When the constraint density is beyond the
clustering transition point, the same behavior is observed for the solution
clusters reached by several stochastic search algorithms. Taking together, the
results of this work suggests a refined picture on the evolution of the
solution space structure of the random K-SAT problem; they may also be helpful
for designing new heuristic algorithms.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 06:48:28 GMT"
},
{
"version": "v2",
"created": "Thu, 21 May 2009 06:33:14 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Sep 2009 01:15:05 GMT"
}
]
| 2009-12-20T00:00:00 | [
[
"Zhou",
"Haijun",
""
],
[
"Ma",
"Hui",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.2914 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | A process calculus with finitary comprehended terms | 25 pages, combined with arXiv:0901.3012 [math.RA]; presentation
improved, mistakes in Table 5 corrected | Theory of Computing Systems, 53(4):645--668, 2013 | 10.1007/s00224-013-9468-x | null | cs.LO math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the notion of an ACP process algebra and the notion of a meadow
enriched ACP process algebra. The former notion originates from the models of
the axiom system ACP. The latter notion is a simple generalization of the
former notion to processes in which data are involved, the mathematical
structure of data being a meadow. Moreover, for all associative operators from
the signature of meadow enriched ACP process algebras that are not of an
auxiliary nature, we introduce variable-binding operators as generalizations.
These variable-binding operators, which give rise to comprehended terms, have
the property that they can always be eliminated. Thus, we obtain a process
calculus whose terms can be interpreted in all meadow enriched ACP process
algebras. Use of the variable-binding operators can have a major impact on the
size of terms.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 07:19:00 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Mar 2011 10:46:34 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Mar 2013 11:55:20 GMT"
}
]
| 2013-08-07T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
]
|
0903.2923 | Philippe Jaming | Saifallah Ghobber (MAPMO), Philippe Jaming (MAPMO, IMB) | On uncertainty principles in the finite dimensional setting | null | Linear Algebra and its Applications 435(4) (2011), 751--768 | 10.1016/j.laa.2011.01.038 | null | math.CA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to prove an uncertainty principle for the
representation of a vector in two bases. Our result extends previously known
qualitative uncertainty principles into quantitative estimates. We then show
how to transfer this result to the discrete version of the Short Time Fourier
Transform. An application to trigonometric polynomials is also given.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 08:56:10 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Sep 2010 08:26:38 GMT"
}
]
| 2018-08-27T00:00:00 | [
[
"Ghobber",
"Saifallah",
"",
"MAPMO"
],
[
"Jaming",
"Philippe",
"",
"MAPMO, IMB"
]
]
| [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.2966 | Samson Lasaulce | S. Lasaulce, Y. Hayel, R. El Azouzi, and M. Debbah | Introducing Hierarchy in Energy Games | Accepted for publication in IEEE Trans. on Wireless Communications | null | 10.1109/TWC.2009.081443 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we introduce hierarchy in wireless networks that can be modeled
by a decentralized multiple access channel and for which energy-efficiency is
the main performance index. In these networks users are free to choose their
power control strategy to selfishly maximize their energy-efficiency.
Specifically, we introduce hierarchy in two different ways: 1. Assuming
single-user decoding at the receiver, we investigate a Stackelberg formulation
of the game where one user is the leader whereas the other users are assumed to
be able to react to the leader's decisions; 2. Assuming neither leader nor
followers among the users, we introduce hierarchy by assuming successive
interference cancellation at the receiver. It is shown that introducing a
certain degree of hierarchy in non-cooperative power control games not only
improves the individual energy efficiency of all the users but can also be a
way of insuring the existence of a non-saturated equilibrium and reaching a
desired trade-off between the global network performance at the equilibrium and
the requested amount of signaling. In this respect, the way of measuring the
global performance of an energy-efficient network is shown to be a critical
issue.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 13:53:23 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Lasaulce",
"S.",
""
],
[
"Hayel",
"Y.",
""
],
[
"Azouzi",
"R. El",
""
],
[
"Debbah",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.2972 | Ivo Danihelka | Ivo Danihelka | Optimistic Simulated Exploration as an Incentive for Real Exploration | accepted, noted that the initial path was 217 steps long | POSTER 2009 | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many reinforcement learning exploration techniques are overly optimistic and
try to explore every state. Such exploration is impossible in environments with
the unlimited number of states. I propose to use simulated exploration with an
optimistic model to discover promising paths for real exploration. This reduces
the needs for the real exploration.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 14:24:13 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Mar 2009 13:31:55 GMT"
},
{
"version": "v3",
"created": "Wed, 20 May 2009 18:44:07 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Danihelka",
"Ivo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.2999 | Filippo Radicchi | Filippo Radicchi | Human Activity in the Web | 10 pages, 9 figures. Final version accepted for publication in
Physical Review E | Phys. Rev. E 80, 026118 (2009) | 10.1103/PhysRevE.80.026118 | null | physics.soc-ph cond-mat.stat-mech cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The recent information technology revolution has enabled the analysis and
processing of large-scale datasets describing human activities. The main source
of data is represented by the Web, where humans generally use to spend a
relevant part of their day. Here we study three large datasets containing the
information about Web human activities in different contexts. We study in
details inter-event and waiting time statistics. In both cases, the number of
subsequent operations which differ by tau units of time decays power-like as
tau increases. We use non-parametric statistical tests in order to estimate the
significance level of reliability of global distributions to describe activity
patterns of single users. Global inter-event time probability distributions are
not representative for the behavior of single users: the shape of single
users'inter-event distributions is strongly influenced by the total number of
operations performed by the users and distributions of the total number of
operations performed by users are heterogeneous. A universal behavior can be
anyway found by suppressing the intrinsic dependence of the global probability
distribution on the activity of the users. This suppression can be performed by
simply dividing the inter-event times with their average values. Differently,
waiting time probability distributions seem to be independent of the activity
of users and global probability distributions are able to significantly
represent the replying activity patterns of single users.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 16:24:02 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jul 2009 15:21:41 GMT"
}
]
| 2009-08-20T00:00:00 | [
[
"Radicchi",
"Filippo",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0903.3000 | Luca Sanguinetti | Michele Morelli, Luca Sanguinetti, H. Vincent Poor | A Robust Ranging Scheme for OFDMA-Based Networks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Uplink synchronization in orthogonal frequency-division multiple-access
(OFDMA) systems is a challenging task. In IEEE 802.16-based networks, users
that intend to establish a communication link with the base station must go
through a synchronization procedure called Initial Ranging (IR). Existing IR
schemes aim at estimating the timing offsets and power levels of ranging
subscriber stations (RSSs) without considering possible frequency misalignments
between the received uplink signals and the base station local reference. In
this work, we present a novel IR scheme for OFDMA systems where carrier
frequency offsets, timing errors and power levels are estimated for all RSSs in
a decoupled fashion. The proposed frequency estimator is based on a subspace
decomposition approach, while timing recovery is accomplished by measuring the
phase shift between the users'channel responses over adjacent subcarriers.
Computer simulations are employed to assess the effectiveness of the proposed
solution and to make comparisons with existing alternatives.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 16:26:00 GMT"
}
]
| 2009-03-18T00:00:00 | [
[
"Morelli",
"Michele",
""
],
[
"Sanguinetti",
"Luca",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3004 | Virtudes Tom\'as | Virtudes Tom\'as, Joachim Rosenthal and Roxana Smarandache | Decoding of MDP Convolutional Codes over the Erasure Channel | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the decoding capabilities of maximum distance profile
(MDP) convolutional codes over the erasure channel and compares them with the
decoding capabilities of MDS block codes over the same channel. The erasure
channel involving large alphabets is an important practical channel model when
studying packet transmissions over a network, e.g, the Internet.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 16:54:35 GMT"
}
]
| 2009-03-18T00:00:00 | [
[
"Tomás",
"Virtudes",
""
],
[
"Rosenthal",
"Joachim",
""
],
[
"Smarandache",
"Roxana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3024 | Ruoheng Liu | Ruoheng Liu, Tie Liu, H. Vincent Poor and Shlomo Shamai (Shitz) | A Vector Generalization of Costa's Entropy-Power Inequality with
Applications | Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | This paper considers an entropy-power inequality (EPI) of Costa and presents
a natural vector generalization with a real positive semidefinite matrix
parameter. This new inequality is proved using a perturbation approach via a
fundamental relationship between the derivative of mutual information and the
minimum mean-square error (MMSE) estimate in linear vector Gaussian channels.
As an application, a new extremal entropy inequality is derived from the
generalized Costa EPI and then used to establish the secrecy capacity regions
of the degraded vector Gaussian broadcast channel with layered confidential
messages.
| [
{
"version": "v1",
"created": "Tue, 17 Mar 2009 19:05:55 GMT"
}
]
| 2009-03-18T00:00:00 | [
[
"Liu",
"Ruoheng",
"",
"Shitz"
],
[
"Liu",
"Tie",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3072 | Mu-Woong Lee | Wanbin Son, Mu-Woong Lee, Hee-Kap Ahn, Seung-won Hwang | Spatial Skyline Queries: An Efficient Geometric Algorithm | 18 pages, uses LNCS format | null | null | null | cs.DB cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As more data-intensive applications emerge, advanced retrieval semantics,
such as ranking or skylines, have attracted attention. Geographic information
systems are such an application with massive spatial data. Our goal is to
efficiently support skyline queries over massive spatial data. To achieve this
goal, we first observe that the best known algorithm VS2, despite its claim,
may fail to deliver correct results. In contrast, we present a simple and
efficient algorithm that computes the correct results. To validate the
effectiveness and efficiency of our algorithm, we provide an extensive
empirical comparison of our algorithm and VS2 in several aspects.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 04:54:54 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Son",
"Wanbin",
""
],
[
"Lee",
"Mu-Woong",
""
],
[
"Ahn",
"Hee-Kap",
""
],
[
"Hwang",
"Seung-won",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0903.3080 | Kelly Fitz | Kelly R. Fitz and Sean A. Fulop | A Unified Theory of Time-Frequency Reassignment | 38 pages, 13 figures, draft of paper submitted to Digital Signal
Processing (Elsevier) in 2005, still in review | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time-frequency representations such as the spectrogram are commonly used to
analyze signals having a time-varying distribution of spectral energy, but the
spectrogram is constrained by an unfortunate tradeoff between resolution in
time and frequency. A method of achieving high-resolution spectral
representations has been independently introduced by several parties. The
technique has been variously named reassignment and remapping, but while the
implementations have differed in details, they are all based on the same
theoretical and mathematical foundation. In this work, we present a brief
history of work on the method we will call the method of time-frequency
reassignment, and present a unified mathematical description of the technique
and its derivation. We will focus on the development of time-frequency
reassignment in the context of the spectrogram, and conclude with a discussion
of some current applications of the reassigned spectrogram.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 03:33:48 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Fitz",
"Kelly R.",
""
],
[
"Fulop",
"Sean A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
]
|
0903.3096 | Ersen Ekrem | Ersen Ekrem and Sennur Ulukus | The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap
Channel | Submitted to IEEE Transactions on Information Theory, March 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the Gaussian multiple-input multiple-output (MIMO)
multi-receiver wiretap channel in which a transmitter wants to have
confidential communication with an arbitrary number of users in the presence of
an external eavesdropper. We derive the secrecy capacity region of this channel
for the most general case. We first show that even for the single-input
single-output (SISO) case, existing converse techniques for the Gaussian scalar
broadcast channel cannot be extended to this secrecy context, to emphasize the
need for a new proof technique. Our new proof technique makes use of the
relationships between the minimum-mean-square-error and the mutual information,
and equivalently, the relationships between the Fisher information and the
differential entropy. Using the intuition gained from the converse proof of the
SISO channel, we first prove the secrecy capacity region of the degraded MIMO
channel, in which all receivers have the same number of antennas, and the noise
covariance matrices can be arranged according to a positive semi-definite
order. We then generalize this result to the aligned case, in which all
receivers have the same number of antennas, however there is no order among the
noise covariance matrices. We accomplish this task by using the channel
enhancement technique. Finally, we find the secrecy capacity region of the
general MIMO channel by using some limiting arguments on the secrecy capacity
region of the aligned MIMO channel. We show that the capacity achieving coding
scheme is a variant of dirty-paper coding with Gaussian signals.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 06:19:17 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Ekrem",
"Ersen",
""
],
[
"Ulukus",
"Sennur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3100 | Emmanuel Duflos | Emmanuel Duflos (INRIA Futurs), Marie De Vilmorin (LGI2A), Philippe
Vanheeghe (INRIA Futurs) | Time Allocation of a Set of Radars in a Multitarget Environment | null | FUSION 2007 (2007) | null | null | math.OC cs.NI math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The question tackled here is the time allocation of radars in a multitarget
environment. At a given time radars can only observe a limited part of the
space; it is therefore necessary to move their axis with respect to time, in
order to be able to explore the overall space facing them. Such sensors are
used to detect, to locate and to identify targets which are in their
surrounding aerial space. In this paper we focus on the detection schema when
several targets need to be detected by a set of delocalized radars. This work
is based on the modelling of the radar detection performances in terms of
probability of detection and on the optimization of a criterion based on
detection probabilities. This optimization leads to the derivation of
allocation strategies and is made for several contexts and several hypotheses
about the targets locations.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 07:47:28 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Duflos",
"Emmanuel",
"",
"INRIA Futurs"
],
[
"De Vilmorin",
"Marie",
"",
"LGI2A"
],
[
"Vanheeghe",
"Philippe",
"",
"INRIA Futurs"
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0903.3103 | Chunhua Shen | Chunhua Shen, Sakrapee Paisitkriangkrai, and Jian Zhang | Efficiently Learning a Detection Cascade with Sparse Eigenvectors | 12 pages, conference version published in CVPR2009 | null | null | null | cs.MM cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we first show that feature selection methods other than
boosting can also be used for training an efficient object detector. In
particular, we introduce Greedy Sparse Linear Discriminant Analysis (GSLDA)
\cite{Moghaddam2007Fast} for its conceptual simplicity and computational
efficiency; and slightly better detection performance is achieved compared with
\cite{Viola2004Robust}. Moreover, we propose a new technique, termed Boosted
Greedy Sparse Linear Discriminant Analysis (BGSLDA), to efficiently train a
detection cascade. BGSLDA exploits the sample re-weighting property of boosting
and the class-separability criterion of GSLDA.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 08:17:05 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Shen",
"Chunhua",
""
],
[
"Paisitkriangkrai",
"Sakrapee",
""
],
[
"Zhang",
"Jian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0903.3106 | Sebastien Tixeuil | Toshimitsu Masuzawa, S\'ebastien Tixeuil (LIP6) | Stabilizing Maximal Independent Set in Unidirectional Networks is Hard | null | null | null | RR-6880 | cs.DS cs.CC cs.DC cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A distributed algorithm is self-stabilizing if after faults and attacks hit
the system and place it in some arbitrary global state, the system recovers
from this catastrophic situation without external intervention in finite time.
In this paper, we consider the problem of constructing self-stabilizingly a
\emph{maximal independent set} in uniform unidirectional networks of arbitrary
shape. On the negative side, we present evidence that in uniform networks,
\emph{deterministic} self-stabilization of this problem is \emph{impossible}.
Also, the \emph{silence} property (\emph{i.e.} having communication fixed from
some point in every execution) is impossible to guarantee, either for
deterministic or for probabilistic variants of protocols. On the positive side,
we present a deterministic protocol for networks with arbitrary unidirectional
networks with unique identifiers that exhibits polynomial space and time
complexity in asynchronous scheduling. We complement the study with
probabilistic protocols for the uniform case: the first probabilistic protocol
requires infinite memory but copes with asynchronous scheduling, while the
second probabilistic protocol has polynomial space complexity but can only
handle synchronous scheduling. Both probabilistic solutions have expected
polynomial time complexity.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 08:42:02 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Masuzawa",
"Toshimitsu",
"",
"LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0903.3114 | Karsten Held | Karsten Held, Elena Rota Kops, Bernd J. Krause, William M. Wells III,
Ron Kikinis, Hans-Wilhelm Mueller-Gaertner | Markov Random Field Segmentation of Brain MR Images | 34 pages, 10 figures; the paper (published in 1997) has introduced
the concept of Markov random field to the segmentation of medical MR images.
For the published version see http://dx.doi.org/10.1109/42.650883 | IEEE Trans. Med. Imag. vol. 16, p. 878 (1997) | 10.1109/42.650883 | null | cs.CV cond-mat.stat-mech physics.data-an physics.med-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a fully-automatic 3D-segmentation technique for brain MR images.
Using Markov random fields the segmentation algorithm captures three important
MR features, i.e. non-parametric distributions of tissue intensities,
neighborhood correlations and signal inhomogeneities. Detailed simulations and
real MR images demonstrate the performance of the segmentation algorithm. The
impact of noise, inhomogeneity, smoothing and structure thickness is analyzed
quantitatively. Even single echo MR images are well classified into gray
matter, white matter, cerebrospinal fluid, scalp-bone and background. A
simulated annealing and an iterated conditional modes implementation are
presented.
Keywords: Magnetic Resonance Imaging, Segmentation, Markov Random Fields
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 09:38:29 GMT"
}
]
| 2009-03-20T00:00:00 | [
[
"Held",
"Karsten",
""
],
[
"Kops",
"Elena Rota",
""
],
[
"Krause",
"Bernd J.",
""
],
[
"Wells",
"William M.",
"III"
],
[
"Kikinis",
"Ron",
""
],
[
"Mueller-Gaertner",
"Hans-Wilhelm",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.med-ph",
"description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.",
"span": "(Medical Physics)"
}
]
|
0903.3126 | Mihaela Sighireanu | Ahmed Bouajjani, Cezara Dragoi, Constantin Enea, Yan Jurski, Mihaela
Sighireanu | A Generic Framework for Reasoning about Dynamic Networks of
Infinite-State Processes | 29 pages, 5 tables, 1 figure, extended version of the paper published
in the the Proceedings of TACAS 2007, LNCS 4424 | Logical Methods in Computer Science, Volume 5, Issue 2 (April 22,
2009) lmcs:991 | 10.2168/LMCS-5(2:3)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a framework for reasoning about unbounded dynamic networks of
infinite-state processes. We propose Constrained Petri Nets (CPN) as generic
models for these networks. They can be seen as Petri nets where tokens
(representing occurrences of processes) are colored by values over some
potentially infinite data domain such as integers, reals, etc. Furthermore, we
define a logic, called CML (colored markings logic), for the description of CPN
configurations. CML is a first-order logic over tokens allowing to reason about
their locations and their colors. Both CPNs and CML are parametrized by a color
logic allowing to express constraints on the colors (data) associated with
tokens. We investigate the decidability of the satisfiability problem of CML
and its applications in the verification of CPNs. We identify a fragment of CML
for which the satisfiability problem is decidable (whenever it is the case for
the underlying color logic), and which is closed under the computations of post
and pre images for CPNs. These results can be used for several kinds of
analysis such as invariance checking, pre-post condition reasoning, and bounded
reachability analysis.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 10:56:11 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Apr 2009 15:38:23 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Bouajjani",
"Ahmed",
""
],
[
"Dragoi",
"Cezara",
""
],
[
"Enea",
"Constantin",
""
],
[
"Jurski",
"Yan",
""
],
[
"Sighireanu",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.3127 | Tamir Hazan | Tamir Hazan and Amnon Shashua | Norm-Product Belief Propagation: Primal-Dual Message-Passing for
Approximate Inference | null | null | null | null | cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we treat both forms of probabilistic inference, estimating
marginal probabilities of the joint distribution and finding the most probable
assignment, through a unified message-passing algorithm architecture. We
generalize the Belief Propagation (BP) algorithms of sum-product and
max-product and tree-rewaighted (TRW) sum and max product algorithms (TRBP) and
introduce a new set of convergent algorithms based on "convex-free-energy" and
Linear-Programming (LP) relaxation as a zero-temprature of a
convex-free-energy. The main idea of this work arises from taking a general
perspective on the existing BP and TRBP algorithms while observing that they
all are reductions from the basic optimization formula of $f + \sum_i h_i$
where the function $f$ is an extended-valued, strictly convex but non-smooth
and the functions $h_i$ are extended-valued functions (not necessarily convex).
We use tools from convex duality to present the "primal-dual ascent" algorithm
which is an extension of the Bregman successive projection scheme and is
designed to handle optimization of the general type $f + \sum_i h_i$. Mapping
the fractional-free-energy variational principle to this framework introduces
the "norm-product" message-passing. Special cases include sum-product and
max-product (BP algorithms) and the TRBP algorithms. When the
fractional-free-energy is set to be convex (convex-free-energy) the
norm-product is globally convergent for estimating of marginal probabilities
and for approximating the LP-relaxation. We also introduce another branch of
the norm-product, the "convex-max-product". The convex-max-product is
convergent (unlike max-product) and aims at solving the LP-relaxation.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 10:33:31 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2009 10:07:09 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jun 2009 12:07:38 GMT"
},
{
"version": "v4",
"created": "Mon, 28 Jun 2010 15:37:57 GMT"
}
]
| 2010-06-29T00:00:00 | [
[
"Hazan",
"Tamir",
""
],
[
"Shashua",
"Amnon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3131 | Emmanuel Candes | Emmanuel J. Candes, Yaniv Plan | Matrix Completion With Noise | 11 pages, 4 figures, 1 table | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | On the heels of compressed sensing, a remarkable new field has very recently
emerged. This field addresses a broad range of problems of significant
practical interest, namely, the recovery of a data matrix from what appears to
be incomplete, and perhaps even corrupted, information. In its simplest form,
the problem is to recover a matrix from a small sample of its entries, and
comes up in many areas of science and engineering including collaborative
filtering, machine learning, control, remote sensing, and computer vision to
name a few.
This paper surveys the novel literature on matrix completion, which shows
that under some suitable conditions, one can recover an unknown low-rank matrix
from a nearly minimal set of entries by solving a simple convex optimization
problem, namely, nuclear-norm minimization subject to data constraints.
Further, this paper introduces novel results showing that matrix completion is
provably accurate even when the few observed entries are corrupted with a small
amount of noise. A typical result is that one can recover an unknown n x n
matrix of low rank r from just about nr log^2 n noisy samples with an error
which is proportional to the noise level. We present numerical results which
complement our quantitative analysis and show that, in practice, nuclear norm
minimization accurately fills in the many missing entries of large low-rank
matrices from just a few noisy samples. Some analogies between matrix
completion and compressed sensing are discussed throughout.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 10:59:52 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Candes",
"Emmanuel J.",
""
],
[
"Plan",
"Yaniv",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3163 | Sourav Dhar | Sourav Dhar, Debdattta Kandar, Tanushree Bose and Rabindranath Bera | Smart Antenna Based Broadband communication in Intelligent
Transportation system | 4 pages, 2 figs., published in NCEEERE 2008, 23-24 December 2008,
sikkim, INDIA | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a review for the development of Intelligent
Transportation System (ITS) world wide and the use of Smart Antennas in ITS.
This review work also discusses the usual problems in ITS and proposes the
solution of such problems using smart antennas.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 13:44:58 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Dhar",
"Sourav",
""
],
[
"Kandar",
"Debdattta",
""
],
[
"Bose",
"Tanushree",
""
],
[
"Bera",
"Rabindranath",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.3165 | Sourav Dhar | Victor Dutta, R. Bera, Sourav Dhar, Jaydeep Chakravorty, Nishant
Bagehel | Automated Vehicle Location (AVL) Using Global Positioning System (GPS) | 6 pages,10figs.,published in NCEEERE 2008,23-24 December 2008,
sikkim, INDIA | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | this is a review paper. this describes how DGPS is helpful for lane detection
and to avoid collission.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 13:59:02 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Dutta",
"Victor",
""
],
[
"Bera",
"R.",
""
],
[
"Dhar",
"Sourav",
""
],
[
"Chakravorty",
"Jaydeep",
""
],
[
"Bagehel",
"Nishant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.3182 | Elena Dubrova | Elena Dubrova | Finding matching initial states for equivalent NLFSRs in the fibonacci
and the galois configurations | 4 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a mapping between initial states of the Fibonacci and the
Galois configurations of NLFSRs is established. We show how to choose initial
states for two configurations so that the resulting output sequences are
equivalent.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 15:29:31 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Dubrova",
"Elena",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.3198 | Jort Gemmeke | J. F. Gemmeke and B. Cranen | TR02: State dependent oracle masks for improved dynamical features | null | null | null | null | cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using the AURORA-2 digit recognition task, we show that recognition
accuracies obtained with classical, SNR based oracle masks can be substantially
improved by using a state-dependent mask estimation technique.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 16:51:25 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Gemmeke",
"J. F.",
""
],
[
"Cranen",
"B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
]
|
0903.3204 | Christian Senger | Christian Senger, Vladimir Sidorenko, Victor Zyablov | On Generalized Minimum Distance Decoding Thresholds for the AWGN Channel | Accepted for the XII International Symposium on Problems of
Redundancy in Information and Control Systems, St. Petersburg, Russia, May 26
- 30, 2009. 5 pages, 3 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the Additive White Gaussian Noise channel with Binary Phase Shift
Keying modulation. Our aim is to enable an algebraic hard decision Bounded
Minimum Distance decoder for a binary block code to exploit soft information
obtained from the demodulator. This idea goes back to Forney and is based on
treating received symbols with low reliability as erasures. This erasing at the
decoder is done using a threshold, each received symbol with reliability
falling below the threshold is erased. Depending on the target overall
complexity of the decoder this pseudo-soft decision decoding can be extended
from one threshold T to z>1 thresholds T_1<...<T_z for erasing received symbols
with lowest reliability. The resulting technique is widely known as Generalized
Minimum Distance decoding. In this paper we provide a means for explicit
determination of the optimal threshold locations in terms of minimal decoding
error probability. We do this for the one and the general z>1 thresholds case,
starting with a geometric interpretation of the optimal threshold location
problem and using an approach from Zyablov.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 17:14:27 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2009 09:29:17 GMT"
},
{
"version": "v3",
"created": "Mon, 18 May 2009 13:50:58 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Senger",
"Christian",
""
],
[
"Sidorenko",
"Vladimir",
""
],
[
"Zyablov",
"Victor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3218 | Josh Karlin | Josh Karlin (University of New Mexico), Stephanie Forrest (University
of New Mexico and the Santa Fe Institute), Jennifer Rexford (Princeton
University) | Nation-State Routing: Censorship, Wiretapping, and BGP | null | null | null | null | cs.NI cs.CR cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The treatment of Internet traffic is increasingly affected by national
policies that require the ISPs in a country to adopt common protocols or
practices. Examples include government enforced censorship, wiretapping, and
protocol deployment mandates for IPv6 and DNSSEC. If an entire nation's worth
of ISPs apply common policies to Internet traffic, the global implications
could be significant. For instance, how many countries rely on China or Great
Britain (known traffic censors) to transit their traffic? These kinds of
questions are surprisingly difficult to answer, as they require combining
information collected at the prefix, Autonomous System, and country level, and
grappling with incomplete knowledge about the AS-level topology and routing
policies. In this paper we develop the first framework for country-level
routing analysis, which allows us to answer questions about the influence of
each country on the flow of international traffic. Our results show that some
countries known for their national policies, such as Iran and China, have
relatively little effect on interdomain routing, while three countries (the
United States, Great Britain, and Germany) are central to international
reachability, and their policies thus have huge potential impact.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 18:38:30 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Karlin",
"Josh",
"",
"University of New Mexico"
],
[
"Forrest",
"Stephanie",
"",
"University\n of New Mexico and the Santa Fe Institute"
],
[
"Rexford",
"Jennifer",
"",
"Princeton\n University"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.