id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0903.1953
Balder ten Cate
Balder ten Cate, Laura Chiticariu, Phokion Kolaitis and Wang-Chiew Tan
Laconic schema mappings: computing core universal solutions by means of SQL queries
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new method for computing core universal solutions in data exchange settings specified by source-to-target dependencies, by means of SQL queries. Unlike previously known algorithms, which are recursive in nature, our method can be implemented directly on top of any DBMS. Our method is based on the new notion of a laconic schema mapping. A laconic schema mapping is a schema mapping for which the canonical universal solution is the core universal solution. We give a procedure by which every schema mapping specified by FO s-t tgds can be turned into a laconic schema mapping specified by FO s-t tgds that may refer to a linear order on the domain of the source instance. We show that our results are optimal, in the sense that the linear order is necessary and the method cannot be extended to schema mapping involving target constraints.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 11:34:20 GMT" } ]
2009-03-12T00:00:00
[ [ "Cate", "Balder ten", "" ], [ "Chiticariu", "Laura", "" ], [ "Kolaitis", "Phokion", "" ], [ "Tan", "Wang-Chiew", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0903.1967
Krishnan Prasad
K. Prasad, B. Sundar Rajan
Network error correction for unit-delay, memory-free networks using convolutional codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A single source network is said to be memory-free if all of the internal nodes (those except the source and the sinks) do not employ memory but merely send linear combinations of the symbols received at their incoming edges on their outgoing edges. In this work, we introduce network-error correction for single source, acyclic, unit-delay, memory-free networks with coherent network coding for multicast. A convolutional code is designed at the source based on the network code in order to correct network-errors that correspond to any of a given set of error patterns, as long as consecutive errors are separated by a certain interval which depends on the convolutional code selected. Bounds on this interval and the field size required for constructing the convolutional code with the required free distance are also obtained. We illustrate the performance of convolutional network error correcting codes (CNECCs) designed for the unit-delay networks using simulations of CNECCs on an example network under a probabilistic error model.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 13:09:22 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2009 07:06:49 GMT" }, { "version": "v3", "created": "Wed, 9 Sep 2009 06:51:39 GMT" } ]
2009-09-09T00:00:00
[ [ "Prasad", "K.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.1972
Vojislav Gajic
Vojislav Gajic (1), Jianwei Huang (2), Bixio Rimoldi (1) ((1) EPFL, (2) CUHK)
On Competing Wireless Service Providers
null
null
null
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a situation where wireless service providers compete for heterogenous wireless users. The users differ in their willingness to pay as well as in their individual channel gains. We prove existence and uniqueness of the Nash equilibrium for the competition of two service providers, for a generic channel model. Interestingly, the competition of two providers leads to a globally optimal outcome. We extend some of the results to the case where more than two providers are competing. Finally, we provide numerical examples that illustrate the effects of various parameters on the Nash equilibrium.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 13:49:59 GMT" } ]
2009-03-12T00:00:00
[ [ "Gajic", "Vojislav", "" ], [ "Huang", "Jianwei", "" ], [ "Rimoldi", "Bixio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2015
Kang Ning
Kang Ning
Deposition and Extension Approach to Find Longest Common Subsequence for Multiple Sequences
25 pages, 6 figures. Ready to be submitted
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of finding the longest common subsequence (LCS) for a set of sequences is a very interesting and challenging problem in computer science. This problem is NP-complete, but because of its importance, many heuristic algorithms have been proposed, such as Long Run algorithm and Expansion algorithm. However, the performance of many current heuristic algorithms deteriorates fast when the number of sequences and sequence length increase. In this paper, we have proposed a post process heuristic algorithm for the LCS problem, the Deposition and Extension algorithm (DEA). This algorithm first generates common subsequence by the process of sequences deposition, and then extends this common subsequence. The algorithm is proven to generate Common Subsequences (CSs) with guaranteed lengths. The experiments show that the results of DEA algorithm are better than those of Long Run and Expansion algorithm, especially on many long sequences. The algorithm also has superior efficiency both in time and space.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 17:18:38 GMT" }, { "version": "v2", "created": "Sun, 28 Jun 2009 20:22:02 GMT" }, { "version": "v3", "created": "Mon, 29 Jun 2009 23:25:56 GMT" } ]
2009-06-30T00:00:00
[ [ "Ning", "Kang", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0903.2016
Fernando Hernando
Fernando Hernando and Gary McGuire
Proof of a Conjecture on the Sequence of Exceptional Numbers, Classifying Cyclic Codes and APN Functions
null
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a conjecture that classifies exceptional numbers. This conjecture arises in two different ways, from cryptography and from coding theory. An odd integer $t\geq 3$ is said to be exceptional if $f(x)=x^t$ is APN (Almost Perfect Nonlinear) over $\mathbb{F}_{2^n}$ for infinitely many values of $n$. Equivalently, $t$ is exceptional if the binary cyclic code of length $2^n-1$ with two zeros $\omega, \omega^t$ has minimum distance 5 for infinitely many values of $n$. The conjecture we prove states that every exceptional number has the form $2^i+1$ or $4^i-2^i+1$.
[ { "version": "v1", "created": "Wed, 11 Mar 2009 17:29:11 GMT" }, { "version": "v2", "created": "Wed, 24 Jun 2009 10:47:21 GMT" }, { "version": "v3", "created": "Mon, 20 Jul 2009 08:49:52 GMT" }, { "version": "v4", "created": "Fri, 18 Sep 2009 09:25:49 GMT" } ]
2009-09-18T00:00:00
[ [ "Hernando", "Fernando", "" ], [ "McGuire", "Gary", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2071
Laszlo Kish
Laszlo B. Kish and Tamas Horvath
Notes on Recent Approaches Concerning the Kirchhoff-Law-Johnson-Noise-based Secure Key Exchange
Accepted for publication in Physics Letters A on May 29, 2009. In the present version, DOI and acceptance info is added in the pdf file, too
Physics Letters A 373 (2009) 2858-2868
10.1016/j.physleta.2009.05.077
null
physics.gen-ph cs.CR physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We critically analyze the results and claims in [Physics Letters A 373 (2009) 901-904]. We show that the strong security leak appeared in the simulations is only an artifact and not caused by "multiple reflections". Since no wave modes exist at cable length of 5% of the shortest wavelength of the signal, no wave is present to reflect it. In the high wave impedance limit, the conditions used in the simulations are heavily unphysical (requiring cable diameters up to 28000 times greater than the measured size of the known universe) and the results are modeling artifacts due to the unphysical values. At the low cable impedance limit, the observed artifacts are due to violating the recommended (and tested) conditions by neglecting the cable capacitance restrictions and using about 100 times longer cable than recommended without cable capacitance compensation arrangement. We implement and analyze the general circuitry of Liu's circulator and confirm that they are conceptually secure against passive attacks. We introduce an asymmetric, more robust version without feedback loop. Then we crack all these systems by an active attack: a circulator-based man-in-the middle attack. Finally, we analyze the proposed method to increase security by dropping only high-risk bits. We point out the differences between different types of high-risk bits and show the shortage of this strategy for some simple key exchange protocols.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 16:55:25 GMT" }, { "version": "v2", "created": "Fri, 13 Mar 2009 16:01:25 GMT" }, { "version": "v3", "created": "Sat, 23 May 2009 18:05:25 GMT" }, { "version": "v4", "created": "Fri, 5 Jun 2009 23:41:07 GMT" }, { "version": "v5", "created": "Tue, 30 Jun 2009 02:23:09 GMT" } ]
2014-02-07T00:00:00
[ [ "Kish", "Laszlo B.", "" ], [ "Horvath", "Tamas", "" ] ]
[ { "class": "Physics", "code": "physics.gen-ph", "description": "Description coming soon", "span": "(General Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0903.2100
Frederic Mazoit
Laurent Lyaudet (LIP), Fr\'ed\'eric Mazoit (LaBRI), Stephan Thomasse (LIRMM)
Partitions versus sets : a case of duality
null
European Journal of Combinatorics (2009) 1-7
10.1016/j.ejc.2009.09.004
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent paper, Amini et al. introduce a general framework to prove duality theorems between special decompositions and their dual combinatorial object. They thus unify all known ad-hoc proofs in one single theorem. While this unification process is definitely good, their main theorem remains quite technical and does not give a real insight of why some decompositions admit dual objects and why others do not. The goal of this paper is both to generalise a little this framework and to give an enlightening simple proof of its central theorem.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 06:12:01 GMT" }, { "version": "v2", "created": "Tue, 20 Oct 2009 15:26:23 GMT" } ]
2009-10-20T00:00:00
[ [ "Lyaudet", "Laurent", "", "LIP" ], [ "Mazoit", "Frédéric", "", "LaBRI" ], [ "Thomasse", "Stephan", "", "LIRMM" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.2101
Gerard Henry Edmond Duchamp
G\'erard Henry Edmond Duchamp (LIPN), Christophe Tollu (LIPN), K. A. Penson (LPTMC), Gleb Koshevoy (CEMI)
Combinatorial Deformations of Algebras: Twisting and Perturbations
null
null
null
null
cs.SC math-ph math.CO math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The framework used to prove the multiplicative law deformation of the algebra of Feynman-Bender diagrams is a \textit{twisted shifted dual law} (in fact, twice). We give here a clear interpretation of its two parameters. The crossing parameter is a deformation of the tensor structure whereas the superposition parameters is a perturbation of the shuffle coproduct of Hoffman type which, in turn, can be interpreted as the diagonal restriction of a superproduct. Here, we systematically detail these constructions.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 06:12:32 GMT" }, { "version": "v2", "created": "Fri, 27 Aug 2010 11:50:37 GMT" } ]
2010-08-30T00:00:00
[ [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ], [ "Tollu", "Christophe", "", "LIPN" ], [ "Penson", "K. A.", "", "LPTMC" ], [ "Koshevoy", "Gleb", "", "CEMI" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0903.2108
Maurice Margenstern
Maurice Margenstern
A new universal cellular automaton on the ternary heptagrid
35 pages, 33 figures
null
null
null
cs.FL cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct a new weakly universal cellular automaton on the ternary heptagrid. The previous result, obtained by the same author and Y. Song required six states only. This time, the number of states is four. This is the best result up to date for cellular automata in the hyperbolic plane.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:15:39 GMT" } ]
2009-03-13T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0903.2119
Martin Ziegler
Matthias Fischer, Claudius J\"ahn and Martin Ziegler
Adaptive Mesh Approach for Predicting Algorithm Behavior with Application to Visibility Culling in Computer Graphics
null
null
null
null
cs.PF cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a concise approximate description, and a method for efficiently obtaining this description, via adaptive random sampling of the performance (running time, memory consumption, or any other profileable numerical quantity) of a given algorithm on some low-dimensional rectangular grid of inputs. The formal correctness is proven under reasonable assumptions on the algorithm under consideration; and the approach's practical benefit is demonstrated by predicting for which observer positions and viewing directions an occlusion culling algorithm yields a net performance benefit or loss compared to a simple brute force renderer.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 10:16:13 GMT" } ]
2009-03-13T00:00:00
[ [ "Fischer", "Matthias", "" ], [ "Jähn", "Claudius", "" ], [ "Ziegler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0903.2134
Hanene Mohamed
Yousra Chabchoub, Christine Fricker and Hanene Mohamed
Analysis of a Bloom Filter Algorithm via the Supermarket Model
null
null
null
null
cs.DM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the problem of identifying elephants in the Internet Traffic. The aim is to analyze a new adaptive algorithm based on a Bloom Filter. This algorithm uses a so-called min-rule which can be described as in the supermarket model. This model consists of joining the shortest queue among d queues selected at random in a large number of m queues. In case of equality, one of the shortest queues is chosen at random. An analysis of a simplified model gives an insight of the error generated by the algorithm on the estimation of the number of the elephants. The main conclusion is that, as m gets large, there is a deterministic limit for the empirical distribution of the filter counters. Limit theorems are proved and the limit is identified. It depends on key parameters. The condition for the algorithm to perform well is discussed. Theoretical results are validated by experiments on a traffic trace from France Telecom and by simulations.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 10:04:07 GMT" } ]
2009-03-13T00:00:00
[ [ "Chabchoub", "Yousra", "" ], [ "Fricker", "Christine", "" ], [ "Mohamed", "Hanene", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.2158
Eberhard H.-A. Gerbracht
Eberhard H.-A. Gerbracht
Supernodal Analysis Revisited
V1: documentclass IEEEtran, 5 pages, 6 figures. Re-release of the printed version, with some minor typographical errors corrected, abstract rewritten, and short CV according to IEEE standards added
SMACD'04 Proceedings of the International Workshop on Symbolic Methods and Applications in Circuit Design, Wroclaw, Poland, 23-24 September 2004; pp. 113-116
null
null
cs.SC cs.CE cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we show how to extend the known algorithm of nodal analysis in such a way that, in the case of circuits without nullors and controlled sources (but allowing for both, independent current and voltage sources), the system of nodal equations describing the circuit is partitioned into one part, where the nodal variables are explicitly given as linear combinations of the voltage sources and the voltages of certain reference nodes, and another, which contains the node variables of these reference nodes only and which moreover can be read off directly from the given circuit. Neither do we need preparational graph transformations, nor do we need to introduce additional current variables (as in MNA). Thus this algorithm is more accessible to students, and consequently more suitable for classroom presentations.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 12:25:45 GMT" } ]
2009-03-13T00:00:00
[ [ "Gerbracht", "Eberhard H. -A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.2168
Damiano Zanardini
Markus Triska and Ulrich Neumerkel and Jan Wielemaker
Better Termination for Prolog with Constraints
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/02
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Termination properties of actual Prolog systems with constraints are fragile and difficult to analyse. The lack of the occurs-check, moded and overloaded arithmetical evaluation via is/2 and the occasional nontermination of finite domain constraints are all sources for invalidating termination results obtained by current termination analysers that rely on idealized assumptions. In this paper, we present solutions to address these problems on the level of the underlying Prolog system. Improved unification modes meet the requirements of norm based analysers by offering dynamic occurs-check detection. A generalized finite domain solver overcomes the shortcomings of conventional arithmetic without significant runtime overhead. The solver offers unbounded domains, yet propagation always terminates. Our work improves Prolog's termination and makes Prolog a more reliable target for termination and type analysis. It is part of SWI-Prolog since version 5.6.50.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:23:38 GMT" } ]
2009-03-13T00:00:00
[ [ "Triska", "Markus", "" ], [ "Neumerkel", "Ulrich", "" ], [ "Wielemaker", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.2171
Rick Kuhn
David F. Ferraiolo and D. Richard Kuhn
Role-Based Access Controls
pp. 554 - 563
15th National Computer Security Conference, Baltimore, MD. October 13-16, 1992
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems than DAC.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 14:00:28 GMT" }, { "version": "v2", "created": "Wed, 3 Jun 2009 13:53:46 GMT" } ]
2009-06-03T00:00:00
[ [ "Ferraiolo", "David F.", "" ], [ "Kuhn", "D. Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0903.2174
Amir Leshem
Amir Leshem and Ephi Zehavi
Game theory and the frequency selective interference channel - A tutorial
null
IEEE Signal Processing Magazine. Special issue on applications of game theory in signal processing and communications. Volume 26, Issue 4, pages 28-40. Sep. 2009
10.1109/MSP.2009.933372
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides a tutorial overview of game theoretic techniques used for communication over frequency selective interference channels. We discuss both competitive and cooperative techniques. Keywords: Game theory, competitive games, cooperative games, Nash Equilibrium, Nash bargaining solution, Generalized Nash games, Spectrum optimization, distributed coordination, interference channel, multiple access channel, iterative water-filling.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 14:42:13 GMT" } ]
2010-08-10T00:00:00
[ [ "Leshem", "Amir", "" ], [ "Zehavi", "Ephi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2177
Arno Pauly
Arno Pauly
On the (semi)lattices induced by continuous reducibilities
this version of the paper is outdated, please consult the journal version
Mathematical Logic Quarterly, 56(5): 488--502, 2010
10.1002/malq.200910104
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Continuous reducibilities are a proven tool in computable analysis, and have applications in other fields such as constructive mathematics or reverse mathematics. We study the order-theoretic properties of several variants of the two most important definitions, and especially introduce suprema for them. The suprema are shown to commutate with several characteristic numbers.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 14:34:47 GMT" }, { "version": "v2", "created": "Thu, 21 Oct 2010 11:18:02 GMT" } ]
2010-10-22T00:00:00
[ [ "Pauly", "Arno", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.2188
Damiano Zanardini
Victor Pablos Ceruelo and Susana Munoz-Hernandez and Hannes Strass
Rfuzzy framework
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/01
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fuzzy reasoning is a very productive research field that during the last years has provided a number of theoretical approaches and practical implementation prototypes. Nevertheless, the classical implementations, like Fril, are not adapted to the latest formal approaches, like multi-adjoint logic semantics. Some promising implementations, like Fuzzy Prolog, are so general that the regular user/programmer does not feel comfortable because either representation of fuzzy concepts is complex or the results difficult to interpret. In this paper we present a modern framework, Rfuzzy, that is modelling multi-adjoint logic. It provides some extensions as default values (to represent missing information, even partial default values) and typed variables. Rfuzzy represents the truth value of predicates through facts, rules and functions. Rfuzzy answers queries with direct results (instead of constraints) and it is easy to use for any person that wants to represent a problem using fuzzy reasoning in a simple way (by using the classical representation with real numbers).
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:20:19 GMT" } ]
2009-03-13T00:00:00
[ [ "Ceruelo", "Victor Pablos", "" ], [ "Munoz-Hernandez", "Susana", "" ], [ "Strass", "Hannes", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.2199
Damiano Zanardini
Miguel Gomez-Zamalloa, Elvira Albert, German Puebla
On the Generation of Test Data for Prolog by Partial Evaluation
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/06
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent work, we have proposed an approach to Test Data Generation (TDG) of imperative bytecode by partial evaluation (PE) of CLP which consists in two phases: (1) the bytecode program is first transformed into an equivalent CLP program by means of interpretive compilation by PE, (2) a second PE is performed in order to supervise the generation of test-cases by execution of the CLP decompiled program. The main advantages of TDG by PE include flexibility to handle new coverage criteria, the possibility to obtain test-case generators and its simplicity to be implemented. The approach in principle can be directly applied for TDG of any imperative language. However, when one tries to apply it to a declarative language like Prolog, we have found as a main difficulty the generation of test-cases which cover the more complex control flow of Prolog. Essentially, the problem is that an intrinsic feature of PE is that it only computes non-failing derivations while in TDG for Prolog it is essential to generate test-cases associated to failing computations. Basically, we propose to transform the original Prolog program into an equivalent Prolog program with explicit failure by partially evaluating a Prolog interpreter which captures failing derivations w.r.t. the input program. Another issue that we discuss in the paper is that, while in the case of bytecode the underlying constraint domain only manipulates integers, in Prolog it should properly handle the symbolic data manipulated by the program. The resulting scheme is of interest for bringing the advantages which are inherent in TDG by PE to the field of logic programming.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:51:25 GMT" } ]
2009-03-13T00:00:00
[ [ "Gomez-Zamalloa", "Miguel", "" ], [ "Albert", "Elvira", "" ], [ "Puebla", "German", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.2202
Damiano Zanardini
Michael Leuschel and Salvador Tamarit and German Vidal
Improving Size-Change Analysis in Offline Partial Evaluation
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/07
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some recent approaches for scalable offline partial evaluation of logic programs include a size-change analysis for ensuring both so called local and global termination. In this work|inspired by experimental evaluation|we introduce several improvements that may increase the accuracy of the analysis and, thus, the quality of the associated specialized programs. We aim to achieve this while maintaining the same complexity and scalability of the recent works.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:54:13 GMT" } ]
2009-03-13T00:00:00
[ [ "Leuschel", "Michael", "" ], [ "Tamarit", "Salvador", "" ], [ "Vidal", "German", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0903.2203
Erez Sabbag
Erez Sabbag and Neri Merhav
Achievable Error Exponents for Channel with Side Information - Erasure and List Decoding
Submitted to IEEE Trans. Inform. Theory, March 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a decoder with an erasure option and a variable size list decoder for channels with non-casual side information at the transmitter. First, universally achievable error exponents are offered for decoding with an erasure option using a parameterized decoder in the spirit of Csisz\'{a}r and K\"{o}rner's decoder. Then, the proposed decoding rule is generalized by extending the range of its parameters to allow variable size list decoding. This extension gives a unified treatment for erasure/list decoding. Exponential bounds on the probability of list error and the average number of incorrect messages on the list are given. Relations to Forney's and Csisz\'{a}r and K\"{o}rner's decoders for discrete memoryless channel are discussed. These results are obtained by exploring a random binning code with conditionally constant composition codewords proposed by Moulin and Wang, but with a different decoding rule.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 16:08:09 GMT" } ]
2009-03-13T00:00:00
[ [ "Sabbag", "Erez", "" ], [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2205
Damiano Zanardini
Francisco Javier Lopez-Fraguas and Juan Rodriguez-Hortala and Jaime Sanchez-Hernandez
A Lightweight Combination of Semantics for Non-deterministic Functions
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/08
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of non-deterministic functions is a distinctive feature of modern functional logic languages. The semantics commonly adopted is call-time choice, a notion that at the operational level is related to the sharing mechanism of lazy evaluation in functional languages. However, there are situations where run-time choice, closer to ordinary rewriting, is more appropriate. In this paper we propose an extension of existing call-time choice based languages, to provide support for run-time choice in localized parts of a program. The extension is remarkably simple at three relevant levels: syntax, formal operational calculi and implementation, which is based on the system Toy.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 16:01:49 GMT" } ]
2009-03-13T00:00:00
[ [ "Lopez-Fraguas", "Francisco Javier", "" ], [ "Rodriguez-Hortala", "Juan", "" ], [ "Sanchez-Hernandez", "Jaime", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0903.2207
Damiano Zanardini
Yoshihiro Adachi
Prolog Visualization System Using Logichart Diagrams
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008, arXiv:0903.1598). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/03
cs.PL cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have developed a Prolog visualization system that is intended to support Prolog programming education. The system uses Logichart diagrams to visualize Prolog programs. The Logichart diagram is designed to visualize the Prolog execution flow intelligibly and to enable users to easily correlate the Prolog clauses with its parts. The system has the following functions. (1) It visually traces Prolog execution (goal calling, success, and failure) on the Logichart diagram. (2) Dynamic change in a Prolog program by calling extra-logical predicates, such as `assertz' and `retract', is visualized in real time. (3) Variable substitution processes are displayed in a text widget in real time.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 16:15:08 GMT" } ]
2009-03-25T00:00:00
[ [ "Adachi", "Yoshihiro", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.2226
Cemal Akcaba
Cemal Ak\c{c}aba and Helmut B\"olcskei
On the achievable diversity-multiplexing tradeoff in interference channels
5 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze two-user single-antenna fading interference channels with perfect receive channel state information (CSI) and no transmit CSI. For the case of very strong interference, we prove that decoding interference while treating the intended signal as noise, subtracting the result out, and then decoding the desired signal, a process known as "stripping", achieves the diversity-multiplexing tradeoff (DMT) outer bound derived in Akuiyibo and Leveque, Int. Zurich Seminar on Commun., 2008. The proof is constructive in the sense that it provides corresponding code design criteria for DMT optimality. For general interference levels, we compute the DMT of a fixed-power-split Han and Kobayashi type superposition coding scheme, provide design criteria for the corresponding superposition codes, and find that this scheme is DMT-optimal for certain multiplexing rates.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 17:39:31 GMT" }, { "version": "v2", "created": "Fri, 1 May 2009 23:58:51 GMT" } ]
2009-05-04T00:00:00
[ [ "Akçaba", "Cemal", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2232
Fan Zhang
Fan Zhang and Henry D. Pfister
On the Iterative Decoding of High-Rate LDPC Codes With Applications in Compressed Sensing
accepted by IEEE Trans. on IT
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the performance of $(j,k)$-regular low-density parity-check (LDPC) codes with message-passing (MP) decoding algorithms in the high-rate regime. In particular, we derive the high-rate scaling law for MP decoding of LDPC codes on the binary erasure channel (BEC) and the $q$-ary symmetric channel ($q$-SC). For the BEC, the density evolution (DE) threshold of iterative decoding scales like $\Theta(k^{-1})$ and the critical stopping ratio scales like $\Theta(k^{-j/(j-2)})$. For the $q$-SC, the DE threshold of verification decoding depends on the details of the decoder and scales like $\Theta(k^{-1})$ for one decoder. Using the fact that coding over large finite alphabets is very similar to coding over the real numbers, the analysis of verification decoding is also extended to the the compressed sensing (CS) of strictly-sparse signals. A DE based approach is used to analyze the CS systems with randomized-reconstruction guarantees. This leads to the result that strictly-sparse signals can be reconstructed efficiently with high-probability using a constant oversampling ratio (i.e., when the number of measurements scales linearly with the sparsity of the signal). A stopping-set based approach is also used to get stronger (e.g., uniform-in-probability) reconstruction guarantees.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 18:26:10 GMT" }, { "version": "v2", "created": "Wed, 17 Jun 2009 23:32:31 GMT" }, { "version": "v3", "created": "Thu, 30 Jul 2009 17:19:36 GMT" }, { "version": "v4", "created": "Tue, 31 Jan 2012 04:16:49 GMT" } ]
2012-02-01T00:00:00
[ [ "Zhang", "Fan", "" ], [ "Pfister", "Henry D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2243
Edward D. Weinberger
Edward D. Weinberger
Pragmatic Information Rates, Generalizations of the Kelly Criterion, and Financial Market Efficiency
Revised to clarify the text
null
null
null
cs.IT math.IT q-fin.PM q-fin.TR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is part of an ongoing investigation of "pragmatic information", defined in Weinberger (2002) as "the amount of information actually used in making a decision". Because a study of information rates led to the Noiseless and Noisy Coding Theorems, two of the most important results of Shannon's theory, we begin the paper by defining a pragmatic information rate, showing that all of the relevant limits make sense, and interpreting them as the improvement in compression obtained from using the correct distribution of transmitted symbols. The first of two applications of the theory extends the information theoretic analysis of the Kelly Criterion, and its generalization, the horse race, to a series of races where the stochastic process of winning horses, payoffs, and strategies depend on some stationary process, including, but not limited to the history of previous races. If the bettor is receiving messages (side information) about the probability distribution of winners, the doubling rate of the bettor's winnings is bounded by the pragmatic information of the messages. A second application is to the question of market efficiency. An efficient market is, by definition, a market in which the pragmatic information of the "tradable past" with respect to current prices is zero. Under this definition, markets whose returns are characterized by a GARCH(1,1) process cannot be efficient. Finally, a pragmatic informational analogue to Shannon's Noisy Coding Theorem suggests that a cause of market inefficiency is that the underlying fundamentals are changing so fast that the price discovery mechanism simply cannot keep up. This may happen most readily in the run-up to a financial bubble, where investors' willful ignorance degrade the information processing capabilities of the market.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 18:27:02 GMT" }, { "version": "v2", "created": "Sat, 11 Dec 2010 06:00:35 GMT" }, { "version": "v3", "created": "Mon, 28 Feb 2011 14:55:08 GMT" }, { "version": "v4", "created": "Mon, 22 Sep 2014 23:48:22 GMT" } ]
2014-09-24T00:00:00
[ [ "Weinberger", "Edward D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Finance", "code": "q-fin.PM", "description": "Security selection and optimization, capital allocation, investment strategies and performance measurement", "span": "(Portfolio Management)" }, { "class": "Quantitative Finance", "code": "q-fin.TR", "description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making", "span": "(Trading and Market Microstructure)" } ]
0903.2251
Damiano Zanardini
Adrian Prantl and Jens Knoop and Markus Schordan and Markus Triska
Constraint solving for high-level WCET analysis
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/05
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The safety of our day-to-day life depends crucially on the correct functioning of embedded software systems which control the functioning of more and more technical devices. Many of these software systems are time-critical. Hence, computations performed need not only to be correct, but must also be issued in a timely fashion. Worst case execution time (WCET) analysis is concerned with computing tight upper bounds for the execution time of a system in order to provide formal guarantees for the proper timing behaviour of a system. Central for this is to compute safe and tight bounds for loops and recursion depths. In this paper, we highlight the TuBound approach to this challenge at whose heart is a constraint logic based approach for loop analysis.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:45:50 GMT" } ]
2009-03-13T00:00:00
[ [ "Prantl", "Adrian", "" ], [ "Knoop", "Jens", "" ], [ "Schordan", "Markus", "" ], [ "Triska", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.2252
Damiano Zanardini
Jens Bendisposto and Ian Endrijautzki and Michael Leuschel and David Schneider
A Semantics-Aware Editing Environment for Prolog in Eclipse
Paper presented at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/04
cs.PL cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a Prolog plugin for Eclipse based upon BE4, and providing many features such as semantic-aware syntax highlighting, outline view, error marking, content assist, hover information, documentation generation, and quick fixes. The plugin makes use of a Java parser for full Prolog with an integrated Prolog engine, and can be extended with further semantic analyses, e.g., based on abstract interpretation.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 15:42:24 GMT" } ]
2009-03-13T00:00:00
[ [ "Bendisposto", "Jens", "" ], [ "Endrijautzki", "Ian", "" ], [ "Leuschel", "Michael", "" ], [ "Schneider", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.2265
Rolf Harren
Rolf Harren, Rob van Stee
An Absolute 2-Approximation Algorithm for Two-Dimensional Bin Packing
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of packing rectangles into bins that are unit squares, where the goal is to minimize the number of bins used. All rectangles have to be packed non-overlapping and orthogonal, i.e., axis-parallel. We present an algorithm for this problem with an absolute worst-case ratio of 2, which is optimal provided P != NP.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 11:39:14 GMT" } ]
2009-03-16T00:00:00
[ [ "Harren", "Rolf", "" ], [ "van Stee", "Rob", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.2272
Antonio Ortega
Sang-Yong Lee and Antonio Ortega
A Novel Approach for Compression of Images Captured using Bayer Color Filter Arrays
null
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new approach for image compression in digital cameras, where the goal is to achieve better quality at a given rate by using the characteristics of a Bayer color filter array. Most digital cameras produce color images by using a single CCD plate, so that each pixel in an image has only one color component and therefore an interpolation method is needed to produce a full color image. After the image processing stage, in order to reduce the memory requirements of the camera, a lossless or lossy compression stage often follows. But in this scheme, before decreasing redundancy through compression, redundancy is increased in an interpolation stage. In order to avoid increasing the redundancy before compression, we propose algorithms for image compression in which the order of the compression and interpolation stages is reversed. We introduce image transform algorithms, since non interpolated images cannot be directly compressed with general image coders. The simulation results show that our algorithm outperforms conventional methods with various color interpolation methods in a wide range of compression ratios. Our proposed algorithm provides not only better quality but also lower encoding complexity because the amount of luminance data used is only half of that in conventional methods.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 07:11:31 GMT" } ]
2009-03-16T00:00:00
[ [ "Lee", "Sang-Yong", "" ], [ "Ortega", "Antonio", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0903.2278
Ian Kash
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern
Manipulating Scrip Systems: Sybils and Collusion
20 pages, 5 figures. To appear in the Proceedings of The First Conference on Auctions, Market Mechanisms and Their Applications (AMMA '09)
null
10.1007/978-3-642-03821-1_4
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Game-theoretic analyses of distributed and peer-to-peer systems typically use the Nash equilibrium solution concept, but this explicitly excludes the possibility of strategic behavior involving more than one agent. We examine the effects of two types of strategic behavior involving more than one agent, sybils and collusion, in the context of scrip systems where agents provide each other with service in exchange for scrip. Sybils make an agent more likely to be chosen to provide service, which generally makes it harder for agents without sybils to earn money and decreases social welfare. Surprisingly, in certain circumstances it is possible for sybils to make all agents better off. While collusion is generally bad, in the context of scrip systems it actually tends to make all agents better off, not merely those who collude. These results also provide insight into the effects of allowing agents to advertise and loan money. While many extensions of Nash equilibrium have been proposed that address collusion and other issues relevant to distributed and peer-to-peer systems, our results show that none of them adequately address the issues raised by sybils and collusion in scrip systems.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 21:37:29 GMT" } ]
2015-05-13T00:00:00
[ [ "Kash", "Ian A.", "" ], [ "Friedman", "Eric J.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0903.2282
Ian Kash
Ian A. Kash, Eric J. Friedman, Joseph Y. Halpern
Multiagent Learning in Large Anonymous Games
8 pages, 2 figures. To Appear in Proceedings of the Eighth International Conference on Autonomous Agents and Multiagent Systems
null
null
null
cs.MA cs.GT cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In large systems, it is important for agents to learn to act effectively, but sophisticated multi-agent learning algorithms generally do not scale. An alternative approach is to find restricted classes of games where simple, efficient algorithms converge. It is shown that stage learning efficiently converges to Nash equilibria in large anonymous games if best-reply dynamics converge. Two features are identified that improve convergence. First, rather than making learning more difficult, more agents are actually beneficial in many settings. Second, providing agents with statistical information about the behavior of others can significantly reduce the number of observations needed.
[ { "version": "v1", "created": "Thu, 12 Mar 2009 21:49:36 GMT" } ]
2009-03-16T00:00:00
[ [ "Kash", "Ian A.", "" ], [ "Friedman", "Eric J.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0903.2299
David McAllester
David McAllester
Differential Contrastive Divergence
This paper was a rediscovery of known material
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been retracted.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 13:47:03 GMT" }, { "version": "v2", "created": "Fri, 20 Mar 2009 01:33:43 GMT" }, { "version": "v3", "created": "Mon, 8 Jul 2013 15:17:20 GMT" } ]
2013-07-09T00:00:00
[ [ "McAllester", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0903.2310
Kang Ning
Kang Ning, Hoong Kee Ng, Hon Wai Leong
Analysis of the Relationships among Longest Common Subsequences, Shortest Common Supersequences and Patterns and its application on Pattern Discovery in Biological Sequences
Extended version of paper presented in IEEE BIBE 2006 submitted to journal for review
null
10.1504/IJDMB.2011.045413
null
cs.DS cs.DM cs.IR cs.OH q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a set of mulitple sequences, their patterns,Longest Common Subsequences (LCS) and Shortest Common Supersequences (SCS) represent different aspects of these sequences profile, and they can all be used for biological sequence comparisons and analysis. Revealing the relationship between the patterns and LCS,SCS might provide us with a deeper view of the patterns of biological sequences, in turn leading to better understanding of them. However, There is no careful examinaton about the relationship between patterns, LCS and SCS. In this paper, we have analyzed their relation, and given some lemmas. Based on their relations, a set of algorithms called the PALS (PAtterns by Lcs and Scs) algorithms are propsoed to discover patterns in a set of biological sequences. These algorithms first generate the results for LCS and SCS of sequences by heuristic, and consequently derive patterns from these results. Experiments show that the PALS algorithms perform well (both in efficiency and in accuracy) on a variety of sequences. The PALS approach also provides us with a solution for transforming between the heuristic results of SCS and LCS.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 04:45:05 GMT" } ]
2016-11-17T00:00:00
[ [ "Ning", "Kang", "" ], [ "Ng", "Hoong Kee", "" ], [ "Leong", "Hon Wai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0903.2315
Cuizhu Shi
Cuizhu Shi and Aditya Ramamoorthy
Design and Analysis of E2RC Codes
To appear in IEEE Journal on Selected Areas in Communications, special issue on Capacity Approaching Codes, 2009
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the design and analysis of the efficiently-encodable rate-compatible ($E^2RC$) irregular LDPC codes proposed in previous work. In this work we introduce semi-structured $E^2RC$-like codes and protograph $E^2RC$ codes. EXIT chart based methods are developed for the design of semi-structured $E^2RC$-like codes that allow us to determine near-optimal degree distributions for the systematic part of the code while taking into account the structure of the deterministic parity part, thus resolving one of the open issues in the original construction. We develop a fast EXIT function computation method that does not rely on Monte-Carlo simulations and can be used in other scenarios as well. Our approach allows us to jointly optimize code performance across the range of rates under puncturing. We then consider protograph $E^2RC$ codes (that have a protograph representation) and propose rules for designing a family of rate-compatible punctured protographs with low thresholds. For both the semi-structured and protograph $E^2RC$ families we obtain codes whose gap to capacity is at most 0.3 dB across the range of rates when the maximum variable node degree is twenty.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 05:35:33 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 03:52:45 GMT" } ]
2009-04-30T00:00:00
[ [ "Shi", "Cuizhu", "" ], [ "Ramamoorthy", "Aditya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2352
Nicolas Gast
Nicolas Gast (INRIA Rh\^one-Alpes / LIG laboratoire d'Informatique de Grenoble), Bruno Gaujal (INRIA Rh\^one-Alpes / LIG laboratoire d'Informatique de Grenoble)
A Mean Field Approach for Optimization in Particles Systems and Applications
null
null
null
RR-6877
math.PR cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the limit behavior of Markov Decision Processes (MDPs) made of independent particles evolving in a common environment, when the number of particles goes to infinity. In the finite horizon case or with a discounted cost and an infinite horizon, we show that when the number of particles becomes large, the optimal cost of the system converges almost surely to the optimal cost of a discrete deterministic system (the ``optimal mean field''). Convergence also holds for optimal policies. We further provide insights on the speed of convergence by proving several central limits theorems for the cost and the state of the Markov decision process with explicit formulas for the variance of the limit Gaussian laws. Then, our framework is applied to a brokering problem in grid computing. The optimal policy for the limit deterministic system is computed explicitly. Several simulations with growing numbers of processors are reported. They compare the performance of the optimal policy of the limit system used in the finite case with classical policies (such as Join the Shortest Queue) by measuring its asymptotic gain as well as the threshold above which it starts outperforming classical policies.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 10:42:34 GMT" }, { "version": "v2", "created": "Tue, 9 Jun 2009 14:26:02 GMT" }, { "version": "v3", "created": "Wed, 10 Jun 2009 14:40:59 GMT" } ]
2009-06-10T00:00:00
[ [ "Gast", "Nicolas", "", "INRIA Rhône-Alpes / LIG laboratoire d'Informatique de\n Grenoble" ], [ "Gaujal", "Bruno", "", "INRIA Rhône-Alpes / LIG laboratoire d'Informatique\n de Grenoble" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0903.2353
Damiano Zanardini
Andy King
Relations, Constraints and Abstractions: Using the Tools of Logic Programming in the Security Industry
Paper presented as an invited talk at the 18th Workshop on Logic-based Methods in Programming Environments (WLPE2008) (Report-No: WLPE/2008). Paper submitted by a co-editor of the Workshop proceedings
null
null
WLPE/2008/00
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logic programming is sometimes described as relational programming: a paradigm in which the programmer specifies and composes n-ary relations using systems of constraints. An advanced logic programming environment will provide tools that abstract these relations to transform, optimise, or even verify the correctness of a logic program. This talk will show that these concepts, namely relations, constraints and abstractions, turn out to also be important in the reverse engineer process that underpins the discovery of bugs within the security industry.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 10:46:39 GMT" } ]
2009-03-16T00:00:00
[ [ "King", "Andy", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0903.2361
Ivan Yu. Tyukin
Ivan Y. Tyukin, Erik Steur, Henk Nijmeijer, and Cees van Leeuwen
Adaptive Observers and Parameter Estimation for a Class of Systems Nonlinear in the Parameters
Preliminary version is presented at the 17-th IFAC World Congress, 6-11 Seoul, 2008
null
10.1016/j.automatica.2013.05.008
null
math.OC cs.SY math.DS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of asymptotic reconstruction of the state and parameter values in systems of ordinary differential equations. A solution to this problem is proposed for a class of systems of which the unknowns are allowed to be nonlinearly parameterized functions of state and time. Reconstruction of state and parameter values is based on the concepts of weakly attracting sets and non-uniform convergence and is subjected to persistency of excitation conditions. In absence of nonlinear parametrization the resulting observers reduce to standard estimation schemes. In this respect, the proposed method constitutes a generalization of the conventional canonical adaptive observer design.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 12:01:17 GMT" }, { "version": "v2", "created": "Mon, 16 Mar 2009 12:55:15 GMT" }, { "version": "v3", "created": "Wed, 13 Jul 2011 06:41:53 GMT" }, { "version": "v4", "created": "Tue, 10 Jul 2012 08:40:28 GMT" }, { "version": "v5", "created": "Thu, 16 May 2013 16:28:14 GMT" }, { "version": "v6", "created": "Mon, 20 May 2013 16:55:02 GMT" }, { "version": "v7", "created": "Fri, 21 Jun 2013 13:47:22 GMT" } ]
2015-03-13T00:00:00
[ [ "Tyukin", "Ivan Y.", "" ], [ "Steur", "Erik", "" ], [ "Nijmeijer", "Henk", "" ], [ "van Leeuwen", "Cees", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0903.2382
Olivier Carton
Jean Berstel, Luc Boasson, Olivier Carton, Isabelle Fagnot
Infinite words without palindrome
3 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that there exists an uniformly recurrent infinite word whose set of factors is closed under reversal and which has only finitely many palindromic factors.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 13:20:44 GMT" } ]
2009-03-16T00:00:00
[ [ "Berstel", "Jean", "" ], [ "Boasson", "Luc", "" ], [ "Carton", "Olivier", "" ], [ "Fagnot", "Isabelle", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.2410
Jean-Yves Marion
Jean-Yves Marion
On tiered small jump operators
null
Logical Methods in Computer Science, Volume 5, Issue 1 (March 31, 2009) lmcs:1146
10.2168/LMCS-5(1:7)2009
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Predicative analysis of recursion schema is a method to characterize complexity classes like the class FPTIME of polynomial time computable functions. This analysis comes from the works of Bellantoni and Cook, and Leivant by data tiering. Here, we refine predicative analysis by using a ramified Ackermann's construction of a non-primitive recursive function. We obtain a hierarchy of functions which characterizes exactly functions, which are computed in O(n^k) time over register machine model of computation. For this, we introduce a strict ramification principle. Then, we show how to diagonalize in order to obtain an exponential function and to jump outside deterministic polynomial time. Lastly, we suggest a dependent typed lambda-calculus to represent this construction.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 15:36:42 GMT" }, { "version": "v2", "created": "Tue, 31 Mar 2009 00:32:12 GMT" } ]
2015-07-01T00:00:00
[ [ "Marion", "Jean-Yves", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.2426
Sachin Kadloor
Sachin Kadloor and Raviraj Adve
Relay Selection and Power Allocation in Cooperative Cellular Networks
20 Pages, 5 Figures, Submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a system with a single base station communicating with multiple users over orthogonal channels while being assisted by multiple relays. Several recent works have suggested that, in such a scenario, selection, i.e., a single relay helping the source, is the best relaying option in terms of the resulting complexity and overhead. However, in a multiuser setting, optimal relay assignment is a combinatorial problem. In this paper, we formulate a related convex optimization problem that provides an extremely tight upper bound on performance and show that selection is, almost always, inherent in the solution. We also provide a heuristic to find a close-to-optimal relay assignment and power allocation across users supported by a single relay. Simulation results using realistic channel models demonstrate the efficacy of the proposed schemes, but also raise the question as to whether the gains from relaying are worth the additional costs.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 16:38:35 GMT" } ]
2009-03-16T00:00:00
[ [ "Kadloor", "Sachin", "" ], [ "Adve", "Raviraj", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2429
Fabrizio Altarelli
F. Altarelli, A. Braunstein, J. Realpe-Gomez, R. Zecchina
Statistical mechanics of budget-constrained auctions
Minor revision
JSTAT 2009;2009:P07002 (27pp)
10.1088/1742-5468/2009/07/P07002
null
cs.GT cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding the optimal assignment in budget-constrained auctions is a combinatorial optimization problem with many important applications, a notable example being the sale of advertisement space by search engines (in this context the problem is often referred to as the off-line AdWords problem). Based on the cavity method of statistical mechanics, we introduce a message passing algorithm that is capable of solving efficiently random instances of the problem extracted from a natural distribution, and we derive from its properties the phase diagram of the problem. As the control parameter (average value of the budgets) is varied, we find two phase transitions delimiting a region in which long-range correlations arise.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 16:53:52 GMT" }, { "version": "v2", "created": "Mon, 27 Apr 2009 15:20:40 GMT" } ]
2015-05-13T00:00:00
[ [ "Altarelli", "F.", "" ], [ "Braunstein", "A.", "" ], [ "Realpe-Gomez", "J.", "" ], [ "Zecchina", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0903.2445
Krishnendu Chatterjee
Krishnendu Chatterjee, Luca de Alfaro, Marco Faella and Axel Legay
Qualitative Logics and Equivalences for Probabilistic Systems
The paper is accepted for LMCS
Logical Methods in Computer Science, Volume 5, Issue 2 (May 4, 2009) lmcs:1082
10.2168/LMCS-5(2:7)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate logics and equivalence relations that capture the qualitative behavior of Markov Decision Processes (MDPs). We present Qualitative Randomized CTL (QRCTL): formulas of this logic can express the fact that certain temporal properties hold over all paths, or with probability 0 or 1, but they do not distinguish among intermediate probability values. We present a symbolic, polynomial time model-checking algorithm for QRCTL on MDPs. The logic QRCTL induces an equivalence relation over states of an MDP that we call qualitative equivalence: informally, two states are qualitatively equivalent if the sets of formulas that hold with probability 0 or 1 at the two states are the same. We show that for finite alternating MDPs, where nondeterministic and probabilistic choices occur in different states, qualitative equivalence coincides with alternating bisimulation, and can thus be computed via efficient partition-refinement algorithms. On the other hand, in non-alternating MDPs the equivalence relations cannot be computed via partition-refinement algorithms, but rather, they require non-local computation. Finally, we consider QRCTL*, that extends QRCTL with nested temporal operators in the same manner in which CTL* extends CTL. We show that QRCTL and QRCTL* induce the same qualitative equivalence on alternating MDPs, while on non-alternating MDPs, the equivalence arising from QRCTL* can be strictly finer. We also provide a full characterization of the relation between qualitative equivalence, bisimulation, and alternating bisimulation, according to whether the MDPs are finite, and to whether their transition relations are finitely-branching.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 17:52:30 GMT" }, { "version": "v2", "created": "Mon, 4 May 2009 16:10:17 GMT" } ]
2015-07-01T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "de Alfaro", "Luca", "" ], [ "Faella", "Marco", "" ], [ "Legay", "Axel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.2448
Mehrnoosh Sadrzadeh
Mehrnoosh Sadrzadeh and Roy Dyckhoff
Positive Logic with Adjoint Modalities: Proof Theory, Semantics and Reasoning about Information
This paper is the full version of the article that is to appear in the ENTCS proceedings of the 25th conference on the Mathematical Foundations of Programming Semantics (MFPS), April 2009, University of Oxford
null
null
null
cs.LO cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a simple modal logic whose non-modal part has conjunction and disjunction as connectives and whose modalities come in adjoint pairs, but are not in general closure operators. Despite absence of negation and implication, and of axioms corresponding to the characteristic axioms of (e.g.) T, S4 and S5, such logics are useful, as shown in previous work by Baltag, Coecke and the first author, for encoding and reasoning about information and misinformation in multi-agent systems. For such a logic we present an algebraic semantics, using lattices with agent-indexed families of adjoint pairs of operators, and a cut-free sequent calculus. The calculus exploits operators on sequents, in the style of "nested" or "tree-sequent" calculi; cut-admissibility is shown by constructive syntactic methods. The applicability of the logic is illustrated by reasoning about the muddy children puzzle, for which the calculus is augmented with extra rules to express the facts of the muddy children scenario.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 18:30:55 GMT" }, { "version": "v2", "created": "Thu, 19 Mar 2009 16:46:40 GMT" }, { "version": "v3", "created": "Mon, 23 Mar 2009 18:42:39 GMT" } ]
2009-03-23T00:00:00
[ [ "Sadrzadeh", "Mehrnoosh", "" ], [ "Dyckhoff", "Roy", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0903.2471
Yijia Fan
Yijia (Richard) Fan, Chao Wang, H. Vincent Poor, John S. Thompson
Cooperative Multiplexing: Toward Higher Spectral Efficiency in Multi-antenna Relay Networks
To appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous work on cooperative communications has concentrated primarily on the diversity benefits of such techniques. This paper, instead, considers the multiplexing benefits of cooperative communications. First, a new interpretation on the fundamental tradeoff between the transmission rate and outage probability in multi-antenna relay networks is given. It follows that multiplexing gains can be obtained at any finite SNR, in full-duplex multi-antenna relay networks. Thus relaying can offer not only stronger link reliability, but also higher spectral efficiency. Specifically, the decode-and-forward protocol is applied and networks that have one source, one destination, and multiple relays are considered. A receive power gain at the relays, which captures the network large scale fading characteristics, is also considered. It is shown that this power gain can significantly affect the system diversity-multiplexing tradeoff for any finite SNR value. Several relaying protocols are proposed and are shown to offer nearly the same outage probability as if the transmit antennas at the source and the relay(s) were co-located, given certain SNR and receive power gains at the relays. Thus a higher multiplexing gain than that of the direct link can be obtained if the destination has more antennas than the source. Much of the analysis in the paper is valid for arbitrary channel fading statistics. These results point to a view of relay networks as a means for providing higher spectral efficiency, rather than only link reliability.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 19:43:48 GMT" } ]
2009-03-16T00:00:00
[ [ "Yijia", "", "", "Richard" ], [ "Fan", "", "" ], [ "Wang", "Chao", "" ], [ "Poor", "H. Vincent", "" ], [ "Thompson", "John S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2499
Aida Ouangraoua
Aida Ouangraoua, Anne Bergeron
Parking functions, labeled trees and DCJ sorting scenarios
12 pages, 3 figures
null
10.1007/978-3-642-04744-2_3
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In genome rearrangement theory, one of the elusive questions raised in recent years is the enumeration of rearrangement scenarios between two genomes. This problem is related to the uniform generation of rearrangement scenarios, and the derivation of tests of statistical significance of the properties of these scenarios. Here we give an exact formula for the number of double-cut-and-join (DCJ) rearrangement scenarios of co-tailed genomes. We also construct effective bijections between the set of scenarios that sort a cycle and well studied combinatorial objects such as parking functions and labeled trees.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 21:48:20 GMT" } ]
2015-05-13T00:00:00
[ [ "Ouangraoua", "Aida", "" ], [ "Bergeron", "Anne", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.2507
David Eppstein
Sergio Cabello, David Eppstein, and Sandi Klavzar
The Fibonacci dimension of a graph
20 pages, 6 figures
null
null
IMFM Preprint 1084
math.CO cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Fibonacci dimension fdim(G) of a graph G is introduced as the smallest integer f such that G admits an isometric embedding into Gamma_f, the f-dimensional Fibonacci cube. We give bounds on the Fibonacci dimension of a graph in terms of the isometric and lattice dimension, provide a combinatorial characterization of the Fibonacci dimension using properties of an associated graph, and establish the Fibonacci dimension for certain families of graphs. From the algorithmic point of view we prove that it is NP-complete to decide if fdim(G) equals to the isometric dimension of G, and that it is also NP-hard to approximate fdim(G) within (741/740)-epsilon. We also give a (3/2)-approximation algorithm for fdim(G) in the general case and a (1+epsilon)-approximation algorithm for simplex graphs.
[ { "version": "v1", "created": "Fri, 13 Mar 2009 22:24:17 GMT" } ]
2009-03-17T00:00:00
[ [ "Cabello", "Sergio", "" ], [ "Eppstein", "David", "" ], [ "Klavzar", "Sandi", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.2516
Susan Khor
Susan Khor
Effect of Degree Distribution on Evolutionary Search
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a method to generate hierarchically modular networks with prescribed node degree list and proposes a metric to measure network modularity based on the notion of edge distance. The generated networks are used as test problems to explore the effect of modularity and degree distribution on evolutionary algorithm performance. Results from the experiments (i) confirm a previous finding that modularity increases the performance advantage of genetic algorithms over hill climbers, and (ii) support a new conjecture that test problems with modularized constraint networks having heavy-tailed right-skewed degree distributions are more easily solved than test problems with modularized constraint networks having bell-shaped normal degree distributions.
[ { "version": "v1", "created": "Sat, 14 Mar 2009 00:18:08 GMT" } ]
2009-03-17T00:00:00
[ [ "Khor", "Susan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0903.2525
Rajkumar Buyya
Rodrigo N. Calheiros, Rajiv Ranjan, Cesar A. F. De Rose, and Rajkumar Buyya
CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services
9 pages, 9 figures
null
null
echnical Report, GRIDS-TR-2009-1, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, March 13, 2009
cs.DC cs.OS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing focuses on delivery of reliable, secure, fault-tolerant, sustainable, and scalable infrastructures for hosting Internet-based application services. These applications have different composition, configuration, and deployment requirements. Quantifying the performance of scheduling and allocation policy on a Cloud infrastructure (hardware, software, services) for different application and service models under varying load, energy performance (power consumption, heat dissipation), and system size is an extremely challenging problem to tackle. To simplify this process, in this paper we propose CloudSim: a new generalized and extensible simulation framework that enables seamless modelling, simulation, and experimentation of emerging Cloud computing infrastructures and management services. The simulation framework has the following novel features: (i) support for modelling and instantiation of large scale Cloud computing infrastructure, including data centers on a single physical computing node and java virtual machine; (ii) a self-contained platform for modelling data centers, service brokers, scheduling, and allocations policies; (iii) availability of virtualization engine, which aids in creation and management of multiple, independent, and co-hosted virtualized services on a data center node; and (iv) flexibility to switch between space-shared and time-shared allocation of processing cores to virtualized services.
[ { "version": "v1", "created": "Sat, 14 Mar 2009 04:28:55 GMT" } ]
2009-03-17T00:00:00
[ [ "Calheiros", "Rodrigo N.", "" ], [ "Ranjan", "Rajiv", "" ], [ "De Rose", "Cesar A. F.", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.2528
Chendong Li
Chendong Li
Airport Gate Assignment A Hybrid Model and Implementation
5 pages, 2 figures, submitted to IC-AI 2009
null
null
null
cs.AI cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rapid development of airlines, airports today become much busier and more complicated than previous days. During airlines daily operations, assigning the available gates to the arriving aircrafts based on the fixed schedule is a very important issue, which motivates researchers to study and solve Airport Gate Assignment Problems (AGAP) with all kinds of state-of-the-art combinatorial optimization techniques. In this paper, we study the AGAP and propose a novel hybrid mathematical model based on the method of constraint programming and 0 - 1 mixed-integer programming. With the objective to minimize the number of gate conflicts of any two adjacent aircrafts assigned to the same gate, we build a mathematical model with logical constraints and the binary constraints. For practical considerations, the potential objective of the model is also to minimize the number of gates that airlines must lease or purchase in order to run their business smoothly. We implement the model in the Optimization Programming Language (OPL) and carry out empirical studies with the data obtained from online timetable of Continental Airlines, Houston Gorge Bush Intercontinental Airport IAH, which demonstrate that our model can provide an efficient evaluation criteria for the airline companies to estimate the efficiency of their current gate assignments.
[ { "version": "v1", "created": "Sat, 14 Mar 2009 05:23:11 GMT" } ]
2009-03-17T00:00:00
[ [ "Li", "Chendong", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.2543
Khaled Khalil
Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem
Multi-Agent Crisis Response systems - Design Requirements and Analysis of Current Systems
6 pages, 1 figure, accepted at Fourth International Conference on Intelligent Computing and Information Systems 2009
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crisis response is a critical area of research, with encouraging progress in the past view yeas. The aim of the research is to contribute to building future crisis environment where software agents, robots, responders, crisis managers, and crisis organizations interact to provide advice, protection and aid. This paper discusses the crisis response domain requirements, and provides analysis of five crisis response systems namely: DrillSim [2], DEFACTO [15], ALADDIN [1], RoboCup Rescue [18], and FireGrid [3]. Analysis of systems includes systems architecture and methodology. In addition, we identified features and limitations of systems based on crisis response domain requirements.
[ { "version": "v1", "created": "Sat, 14 Mar 2009 12:13:32 GMT" } ]
2009-03-17T00:00:00
[ [ "Khalil", "Khaled M.", "" ], [ "Abdel-Aziz", "M.", "" ], [ "Nazmy", "Taymour T.", "" ], [ "Salem", "Abdel-Badeeh M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0903.2544
Iraklis Varlamis
N. Zotos, P. Tzekou, G. Tsatsaronis, L. Kozanidis, S. Stamou, I. Varlamis
To Click or not to Click? The Role of Contextualized and User-Centric Web Snippets
In proceedings of SIGIR 2007 Workshop on Focused Retrieval. 8 pages
SIGIR 2007 Workshop on Focused Retrieval
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When searching the web, it is often possible that there are too many results available for ambiguous queries. Text snippets, extracted from the retrieved pages, are an indicator of the pages' usefulness to the query intention and can be used to focus the scope of search results. In this paper, we propose a novel method for automatically extracting web page snippets that are highly relevant to the query intention and expressive of the pages' entire content. We show that the usage of semantics, as a basis for focused retrieval, produces high quality text snippet suggestions. The snippets delivered by our method are significantly better in terms of retrieval performance compared to those derived using the pages' statistical content. Furthermore, our study suggests that semantically-driven snippet generation can also be used to augment traditional passage retrieval algorithms based on word overlap or statistical weights, since they typically differ in coverage and produce different results. User clicks on the query relevant snippets can be used to refine the query results and promote the most comprehensive among the relevant documents.
[ { "version": "v1", "created": "Sat, 14 Mar 2009 12:22:27 GMT" } ]
2009-03-24T00:00:00
[ [ "Zotos", "N.", "" ], [ "Tzekou", "P.", "" ], [ "Tsatsaronis", "G.", "" ], [ "Kozanidis", "L.", "" ], [ "Stamou", "S.", "" ], [ "Varlamis", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0903.2554
Irene Durand
Irene Durand and Geraud Senizergues
Bottom-up rewriting for words and terms
86 pages; long version to be cut into pieces for publication
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the whole class of linear term rewriting systems, we define \emph{bottom-up rewriting} which is a restriction of the usual notion of rewriting. We show that bottom-up rewriting effectively inverse-preserves recognizability and analyze the complexity of the underlying construction. The Bottom-Up class (BU) is, by definition, the set of linear systems for which every derivation can be replaced by a bottom-up derivation. Membership to BU turns out to be undecidable, we are thus lead to define more restricted classes: the classes SBU(k), k in N of Strongly Bottom-Up(k) systems for which we show that membership is decidable. We define the class of Strongly Bottom-Up systems by SBU = U_{k in \} SBU(k). We give a polynomial sufficient condition for a system to be in $\SBU$. The class SBU contains (strictly) several classes of systems which were already known to inverse preserve recognizability: the inverse left-basic semi-Thue systems (viewed as unary term rewriting systems), the linear growing term rewriting systems, the inverse Linear-Finite-Path-Ordering systems.
[ { "version": "v1", "created": "Sat, 14 Mar 2009 16:14:18 GMT" }, { "version": "v2", "created": "Wed, 31 Jul 2013 16:23:22 GMT" } ]
2013-08-01T00:00:00
[ [ "Durand", "Irene", "" ], [ "Senizergues", "Geraud", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0903.2584
Dmitri Krioukov
Dmitri Krioukov, Fragkiskos Papadopoulos, Amin Vahdat, Marian Boguna
Curvature and temperature of complex networks
null
Phys. Rev. E 80, 035101(R) (2009)
10.1103/PhysRevE.80.035101
null
cond-mat.stat-mech cond-mat.dis-nn cs.NI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that heterogeneous degree distributions in observed scale-free topologies of complex networks can emerge as a consequence of the exponential expansion of hidden hyperbolic space. Fermi-Dirac statistics provides a physical interpretation of hyperbolic distances as energies of links. The hidden space curvature affects the heterogeneity of the degree distribution, while clustering is a function of temperature. We embed the Internet into the hyperbolic plane, and find a remarkable congruency between the embedding and our hyperbolic model. Besides proving our model realistic, this embedding may be used for routing with only local information, which holds significant promise for improving the performance of Internet routing.
[ { "version": "v1", "created": "Sat, 14 Mar 2009 22:33:00 GMT" }, { "version": "v2", "created": "Sat, 26 Sep 2009 00:06:33 GMT" } ]
2009-09-26T00:00:00
[ [ "Krioukov", "Dmitri", "" ], [ "Papadopoulos", "Fragkiskos", "" ], [ "Vahdat", "Amin", "" ], [ "Boguna", "Marian", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0903.2598
Susan Khor
Susan Khor
Generating Hierarchically Modular Networks via Link Switching
Appendix B
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a method to generate hierarchically modular networks with prescribed node degree list by link switching. Unlike many existing network generating models, our method does not use link probabilities to achieve modularity. Instead, it utilizes a user-specified topology to determine relatedness between pairs of nodes in terms of edge distances and links are switched to increase edge distances. To measure the modular-ness of a network as a whole, a new metric called Q2 is proposed. Comparisons are made between the Q [15] and Q2 measures. We also comment on the effect of our modularization method on other network characteristics such as clustering, hierarchy, average path length, small-worldness, degree correlation and centrality. An application of this method is reported elsewhere [12]. Briefly, the generated networks are used as test problems to explore the effect of modularity and degree distribution on evolutionary search algorithms.
[ { "version": "v1", "created": "Sun, 15 Mar 2009 01:44:30 GMT" }, { "version": "v2", "created": "Sun, 26 Apr 2009 18:34:10 GMT" }, { "version": "v3", "created": "Sun, 5 Jul 2009 21:00:23 GMT" } ]
2009-07-05T00:00:00
[ [ "Khor", "Susan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.2641
Constantinos Siettos
Konstantinos G. Spiliotis and Constantinos I. Siettos
Multiscale Computations on Neural Networks: From the Individual Neuron Interactions to the Macroscopic-Level Analysis
null
Int. J. Bifurcation and Chaos 20 (1) 121-134 (2010)
10.1142/S0218127410025442
null
cs.CE cs.NA q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how the Equation-Free approach for multi-scale computations can be exploited to systematically study the dynamics of neural interactions on a random regular connected graph under a pairwise representation perspective. Using an individual-based microscopic simulator as a black box coarse-grained timestepper and with the aid of simulated annealing we compute the coarse-grained equilibrium bifurcation diagram and analyze the stability of the stationary states sidestepping the necessity of obtaining explicit closures at the macroscopic level. We also exploit the scheme to perform a rare-events analysis by estimating an effective Fokker-Planck describing the evolving probability density function of the corresponding coarse-grained observables.
[ { "version": "v1", "created": "Sun, 15 Mar 2009 16:27:55 GMT" } ]
2015-05-13T00:00:00
[ [ "Spiliotis", "Konstantinos G.", "" ], [ "Siettos", "Constantinos I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0903.2653
Salman Avestimehr
Salman Avestimehr, Amin Khajehnejad, Aydin Sezgin, Babak Hassibi
Capacity region of the deterministic multi-pair bi-directional relay network
Will be presented in the 2009 IEEE Information Theory Workshop on Networking and Information Theory
null
10.1109/ITWNIT.2009.5158541
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the capacity region of the multi-pair bidirectional (or two-way) wireless relay network, in which a relay node facilitates the communication between multiple pairs of users. This network is a generalization of the well known bidirectional relay channel, where we have only one pair of users. We examine this problem in the context of the deterministic channel interaction model, which eliminates the channel noise and allows us to focus on the interaction between signals. We characterize the capacity region of this network when the relay is operating at either full-duplex mode or half-duplex mode (with non adaptive listen-transmit scheduling). In both cases we show that the cut-set upper bound is tight and, quite interestingly, the capacity region is achieved by a simple equation-forwarding strategy.
[ { "version": "v1", "created": "Sun, 15 Mar 2009 17:49:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Avestimehr", "Salman", "" ], [ "Khajehnejad", "Amin", "" ], [ "Sezgin", "Aydin", "" ], [ "Hassibi", "Babak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2675
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Construction and Covering Properties of Constant-Dimension Codes
20 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constant-dimension codes (CDCs) have been investigated for noncoherent error correction in random network coding. The maximum cardinality of CDCs with given minimum distance and how to construct optimal CDCs are both open problems, although CDCs obtained by lifting Gabidulin codes, referred to as KK codes, are nearly optimal. In this paper, we first construct a new class of CDCs based on KK codes, referred to as augmented KK codes, whose cardinalities are greater than previously proposed CDCs. We then propose a low-complexity decoding algorithm for our augmented KK codes using that for KK codes. Our decoding algorithm corrects more errors than a bounded subspace distance decoder by taking advantage of the structure of our augmented KK codes. In the rest of the paper we investigate the covering properties of CDCs. We first derive bounds on the minimum cardinality of a CDC with a given covering radius and then determine the asymptotic behavior of this quantity. Moreover, we show that liftings of rank metric codes have the highest possible covering radius, and hence liftings of rank metric codes are not optimal packing CDCs. Finally, we construct good covering CDCs by permuting liftings of rank metric codes.
[ { "version": "v1", "created": "Sun, 15 Mar 2009 22:48:36 GMT" } ]
2009-03-17T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2679
Cliff Joslyn
Chris Orum and Cliff A Joslyn
Valuations and Metrics on Partially Ordered Sets
Submitted
null
null
PNWD-SA-8513
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the definitions of upper and lower valuations on partially ordered sets, and consider the metrics they induce, in particular the metrics available (or not) based on the logarithms of such valuations. Motivating applications in computational linguistics and computational biology are indicated.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 00:00:04 GMT" } ]
2009-03-17T00:00:00
[ [ "Orum", "Chris", "" ], [ "Joslyn", "Cliff A", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2682
Abedelaziz Mohaisen
Abedelaziz Mohaisen, Dowon Hong, and DaeHun Nyang
Privacy in Location Based Services: Primitives Toward the Solution
Appeared in proceeding of NCM 2008
null
10.1109/NCM.2008.137
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Location based services (LBS) are one of the most promising and innovative directions of convergence technologies resulting of emergence of several fields including database systems, mobile communication, Internet technology, and positioning systems. Although being initiated as early as middle of 1990's, it is only recently that the LBS received a systematic profound research interest due to its commercial and technological impact. As the LBS is related to the user's location which can be used to trace the user's activities, a strong privacy concern has been raised. To preserve the user's location, several intelligent works have been introduced though many challenges are still awaiting solutions. This paper introduces a survey on LBS systems considering both localization technologies, model and architectures guaranteeing privacy. We also overview cryptographic primitive to possibly use in preserving LBS's privacy followed by fruitful research directions basically concerned with the privacy issue.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 01:31:58 GMT" } ]
2009-03-17T00:00:00
[ [ "Mohaisen", "Abedelaziz", "" ], [ "Hong", "Dowon", "" ], [ "Nyang", "DaeHun", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0903.2693
Kang Ning
Kang Ning
A Pseudo DNA Cryptography Method
A small work that quite some people asked about
null
10.1016/j.compeleceng.2012.02.007
null
cs.CR cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation. Although in its primitive stage, DNA cryptography is shown to be very effective. Currently, several DNA computing algorithms are proposed for quite some cryptography, cryptanalysis and steganography problems, and they are very powerful in these areas. However, the use of the DNA as a means of cryptography has high tech lab requirements and computational limitations, as well as the labor intensive extrapolation means so far. These make the efficient use of DNA cryptography difficult in the security world now. Therefore, more theoretical analysis should be performed before its real applications. In this project, We do not intended to utilize real DNA to perform the cryptography process; rather, We will introduce a new cryptography method based on central dogma of molecular biology. Since this method simulates some critical processes in central dogma, it is a pseudo DNA cryptography method. The theoretical analysis and experiments show this method to be efficient in computation, storage and transmission; and it is very powerful against certain attacks. Thus, this method can be of many uses in cryptography, such as an enhancement insecurity and speed to the other cryptography methods. There are also extensions and variations to this method, which have enhanced security, effectiveness and applicability.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 04:22:45 GMT" } ]
2012-03-07T00:00:00
[ [ "Ning", "Kang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.2695
Marco Pavone
Marco Pavone, Stephen L. Smith, Francesco Bullo, Emilio Frazzoli
Dynamic Multi-Vehicle Routing with Multiple Classes of Demands
Extended version of paper presented in American Control Conference 2009
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study a dynamic vehicle routing problem in which there are multiple vehicles and multiple classes of demands. Demands of each class arrive in the environment randomly over time and require a random amount of on-site service that is characteristic of the class. To service a demand, one of the vehicles must travel to the demand location and remain there for the required on-site service time. The quality of service provided to each class is given by the expected delay between the arrival of a demand in the class, and that demand's service completion. The goal is to design a routing policy for the service vehicles which minimizes a convex combination of the delays for each class. First, we provide a lower bound on the achievable values of the convex combination of delays. Then, we propose a novel routing policy and analyze its performance under heavy load conditions (i.e., when the fraction of time the service vehicles spend performing on-site service approaches one). The policy performs within a constant factor of the lower bound (and thus the optimal), where the constant depends only on the number of classes, and is independent of the number of vehicles, the arrival rates of demands, the on-site service times, and the convex combination coefficients.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 04:50:49 GMT" } ]
2009-03-17T00:00:00
[ [ "Pavone", "Marco", "" ], [ "Smith", "Stephen L.", "" ], [ "Bullo", "Francesco", "" ], [ "Frazzoli", "Emilio", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0903.2711
Peter Fertl
Peter Fertl, Joakim Jalden, Gerald Matz
Performance Assessment of MIMO-BICM Demodulators based on System Capacity
Submitted to IEEE Transactions on Signal Processing, Oct. 20010 (paper was presented in part at IEEE SPAWC 2008, Recife, Brazil, July 2008)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a comprehensive performance comparison of soft-output and hard-output demodulators in the context of non-iterative multiple-input multiple-output bit-interleaved coded modulation (MIMO-BICM). Coded bit error rate (BER), widely used in literature for demodulator comparison, has the drawback of depending strongly on the error correcting code being used. This motivates us to propose a code-independent performance measure in terms of system capacity, i.e., mutual information of the equivalent modulation channel that comprises modulator, wireless channel, and demodulator. We present extensive numerical results for ergodic and quasi-static fading channels under perfect and imperfect channel state information. These results reveal that the performance ranking of MIMO demodulators is rate-dependent. Furthermore, they provide new insights regarding MIMO-BICM system design, i.e., the choice of antenna configuration, symbol constellation, and demodulator for a given target rate.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 09:35:04 GMT" }, { "version": "v2", "created": "Sat, 4 Dec 2010 22:05:57 GMT" } ]
2010-12-07T00:00:00
[ [ "Fertl", "Peter", "" ], [ "Jalden", "Joakim", "" ], [ "Matz", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2742
Gabriel Istrate
Gabriel Istrate
On Hadwiger's Number of a graph with partial information
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the possibility of proving upper bounds on Hadwiger's number of a graph with partial information, mirroring several known upper bounds for the chromatic number. For each such bound we determine whether the corresponding bound for Hadwiger's number holds. Our results suggest that the ``locality'' of an inequality accounts for the existence of such an extension.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 12:53:25 GMT" } ]
2009-03-17T00:00:00
[ [ "Istrate", "Gabriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.2749
Olli Pottonen
Patric R. J. \"Osterg{\aa}rd, Olli Pottonen, Kevin T. Phelps
The Perfect Binary One-Error-Correcting Codes of Length 15: Part II--Properties
v2: fixed two errors (extension of nonsystematic codes, table of coordinates fixed by symmetries of codes), added and extended many other results
IEEE Trans. Inform. Theory vol. 56, pp. 2571-2582, 2010
10.1109/TIT.2010.2046197
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complete classification of the perfect binary one-error-correcting codes of length 15 as well as their extensions of length 16 was recently carried out in [P. R. J. \"Osterg{\aa}rd and O. Pottonen, "The perfect binary one-error-correcting codes of length 15: Part I--Classification," IEEE Trans. Inform. Theory vol. 55, pp. 4657--4660, 2009]. In the current accompanying work, the classified codes are studied in great detail, and their main properties are tabulated. The results include the fact that 33 of the 80 Steiner triple systems of order 15 occur in such codes. Further understanding is gained on full-rank codes via switching, as it turns out that all but two full-rank codes can be obtained through a series of such transformations from the Hamming code. Other topics studied include (non)systematic codes, embedded one-error-correcting codes, and defining sets of codes. A classification of certain mixed perfect codes is also obtained.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 13:04:36 GMT" }, { "version": "v2", "created": "Sun, 10 Jan 2010 12:53:38 GMT" } ]
2010-10-07T00:00:00
[ [ "Östergård", "Patric R. J.", "" ], [ "Pottonen", "Olli", "" ], [ "Phelps", "Kevin T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2774
Georg Tauboeck
Georg Tauboeck, Franz Hlawatsch, Daniel Eiwen, Holger Rauhut
Compressive estimation of doubly selective channels in multicarrier systems: Leakage effects and sparsity-enhancing processing
18 pages, 6 figures; content is identical to published paper version (in IEEE Journal of Selected Topics in Signal Processing - Special Issue on Compressed Sensing), only format is different; this revision contains substantially new material compared with previous (arXiv) revision, also title and author list have changed
IEEE J. Sel. Top. Sig. Process., vol. 4, no. 2, pp. 255-271, April 2010
10.1109/JSTSP.2010.2042410
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the application of compressed sensing (CS) to the estimation of doubly selective channels within pulse-shaping multicarrier systems (which include OFDM systems as a special case). By exploiting sparsity in the delay-Doppler domain, CS-based channel estimation allows for an increase in spectral efficiency through a reduction of the number of pilot symbols. For combating leakage effects that limit the delay-Doppler sparsity, we propose a sparsity-enhancing basis expansion and a method for optimizing the basis with or without prior statistical information about the channel. We also present an alternative CS-based channel estimator for (potentially) strongly time-frequency dispersive channels, which is capable of estimating the "off-diagonal" channel coefficients characterizing intersymbol and intercarrier interference (ISI/ICI). For this estimator, we propose a basis construction combining Fourier (exponential) and prolate spheroidal sequences. Simulation results assess the performance gains achieved by the proposed sparsity-enhancing processing techniques and by explicit estimation of ISI/ICI channel coefficients.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 15:11:51 GMT" }, { "version": "v2", "created": "Fri, 7 May 2010 12:44:26 GMT" } ]
2010-05-10T00:00:00
[ [ "Tauboeck", "Georg", "" ], [ "Hlawatsch", "Franz", "" ], [ "Eiwen", "Daniel", "" ], [ "Rauhut", "Holger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2791
Steve Szabo
Sergio Lopez-Permouth and Steve Szabo
On the Hamming weight of Repeated Root Cyclic and Negacyclic Codes over Galois Rings
Submitted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Repeated root Cyclic and Negacyclic codes over Galois rings have been studied much less than their simple root counterparts. This situation is beginning to change. For example, repeated root codes of length $p^s$, where $p$ is the characteristic of the alphabet ring, have been studied under some additional hypotheses. In each one of those cases, the ambient space for the codes has turned out to be a chain ring. In this paper, all remaining cases of cyclic and negacyclic codes of length $p^s$ over a Galois ring alphabet are considered. In these cases the ambient space is a local ring with simple socle but not a chain ring. Nonetheless, by reducing the problem to one dealing with uniserial subambients, a method for computing the Hamming distance of these codes is provided.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 16:25:32 GMT" } ]
2009-03-17T00:00:00
[ [ "Lopez-Permouth", "Sergio", "" ], [ "Szabo", "Steve", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2792
Manuel Cebrian
Kostadin Koroutchev, Jian Shen, Elka Koroutcheva and Manuel Cebrian
Thermodynamics of Information Retrieval
12 pages, 7 figures
null
null
null
cs.IT cs.CL cs.SI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we suggest a parameterized statistical model (the gamma distribution) for the frequency of word occurrences in long strings of English text and use this model to build a corresponding thermodynamic picture by constructing the partition function. We then use our partition function to compute thermodynamic quantities such as the free energy and the specific heat. In this approach, the parameters of the word frequency model vary from word to word so that each word has a different corresponding thermodynamics and we suggest that differences in the specific heat reflect differences in how the words are used in language, differentiating keywords from common and function words. Finally, we apply our thermodynamic picture to the problem of retrieval of texts based on keywords and suggest some advantages over traditional information retrieval methods.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 16:16:42 GMT" }, { "version": "v2", "created": "Mon, 14 Feb 2011 01:07:57 GMT" }, { "version": "v3", "created": "Sun, 27 Feb 2011 10:36:25 GMT" } ]
2011-03-01T00:00:00
[ [ "Koroutchev", "Kostadin", "" ], [ "Shen", "Jian", "" ], [ "Koroutcheva", "Elka", "" ], [ "Cebrian", "Manuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2816
Daniel A. Spielman
Daniel A Spielman, Jaeoh Woo
A Note on Preconditioning by Low-Stretch Spanning Trees
null
null
null
null
cs.NA cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Boman and Hendrickson observed that one can solve linear systems in Laplacian matrices in time $\bigO{m^{3/2 + o (1)} \ln (1/\epsilon)}$ by preconditioning with the Laplacian of a low-stretch spanning tree. By examining the distribution of eigenvalues of the preconditioned linear system, we prove that the preconditioned conjugate gradient will actually solve the linear system in time $\softO{m^{4/3} \ln (1/\epsilon)}$.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 18:04:31 GMT" } ]
2009-03-17T00:00:00
[ [ "Spielman", "Daniel A", "" ], [ "Woo", "Jaeoh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.2820
Debdeep Chatterjee
Debdeep Chatterjee, Tan F. Wong, and Tat M. Lok
Cooperative Transmission in a Wireless Relay Network based on Flow Management
31 pages, 10 figures. First version submitted to Transactions on Communications, Nov. 2007. This is the revised detailed version. Further updated on Nov. 16, 2009 with minor modifications. To appear
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a cooperative transmission design for a general multi-node half-duplex wireless relay network is presented. It is assumed that the nodes operate in half-duplex mode and that channel information is available at the nodes. The proposed design involves solving a convex flow optimization problem on a graph that models the relay network. A much simpler generalized-link selection protocol based on the above design is also presented. Both the proposed flow-optimized protocol and the generalized-link selection protocol are shown to achieve the optimal diversity-multiplexing tradeoff (DMT) for the relay network. Moreover, simulation results are presented to quantify the gap between the performances of the proposed protocols and that of a max-flow-min-cut type bound, in terms of outage probability.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 18:22:45 GMT" }, { "version": "v2", "created": "Mon, 16 Nov 2009 23:55:55 GMT" } ]
2009-11-17T00:00:00
[ [ "Chatterjee", "Debdeep", "" ], [ "Wong", "Tan F.", "" ], [ "Lok", "Tat M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2825
Susmit Jha
Susmit Jha, Sanjit A. Seshia and Rhishikesh Limaye
On the Computational Complexity of Satisfiability Solving for String Theories
null
null
null
null
cs.CC cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Satisfiability solvers are increasingly playing a key role in software verification, with particularly effective use in the analysis of security vulnerabilities. String processing is a key part of many software applications, such as browsers and web servers. These applications are susceptible to attacks through malicious data received over network. Automated tools for analyzing the security of such applications, thus need to reason about strings. For efficiency reasons, it is desirable to have a solver that treats strings as first-class types. In this paper, we present some theories of strings that are useful in a software security context and analyze the computational complexity of the presented theories. We use this complexity analysis to motivate a byte-blast approach which employs a Boolean encoding of the string constraints to a corresponding Boolean satisfiability problem.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 18:25:54 GMT" } ]
2009-03-17T00:00:00
[ [ "Jha", "Susmit", "" ], [ "Seshia", "Sanjit A.", "" ], [ "Limaye", "Rhishikesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0903.2851
Kamalika Chaudhuri
Kamalika Chaudhuri, Yoav Freund, Daniel Hsu
A parameter-free hedging algorithm
Updated Version
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of decision-theoretic online learning (DTOL). Motivated by practical applications, we focus on DTOL when the number of actions is very large. Previous algorithms for learning in this framework have a tunable learning rate parameter, and a barrier to using online-learning in practical applications is that it is not understood how to set this parameter optimally, particularly when the number of actions is large. In this paper, we offer a clean solution by proposing a novel and completely parameter-free algorithm for DTOL. We introduce a new notion of regret, which is more natural for applications with a large number of actions. We show that our algorithm achieves good performance with respect to this new notion of regret; in addition, it also achieves performance close to that of the best bounds achieved by previous algorithms with optimally-tuned parameters, according to previous notions of regret.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 20:48:33 GMT" }, { "version": "v2", "created": "Mon, 18 Jan 2010 23:58:51 GMT" } ]
2010-01-19T00:00:00
[ [ "Chaudhuri", "Kamalika", "" ], [ "Freund", "Yoav", "" ], [ "Hsu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.2862
Kamalika Chaudhuri
Kamalika Chaudhuri, Yoav Freund, Daniel Hsu
Tracking using explanation-based modeling
null
null
null
null
cs.LG cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the tracking problem, namely, estimating the hidden state of an object over time, from unreliable and noisy measurements. The standard framework for the tracking problem is the generative framework, which is the basis of solutions such as the Bayesian algorithm and its approximation, the particle filters. However, the problem with these solutions is that they are very sensitive to model mismatches. In this paper, motivated by online learning, we introduce a new framework -- an {\em explanatory} framework -- for tracking. We provide an efficient tracking algorithm for this framework. We provide experimental results comparing our algorithm to the Bayesian algorithm on simulated data. Our experiments show that when there are slight model mismatches, our algorithm vastly outperforms the Bayesian algorithm.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 21:26:55 GMT" }, { "version": "v2", "created": "Tue, 19 Jan 2010 00:15:59 GMT" } ]
2010-01-19T00:00:00
[ [ "Chaudhuri", "Kamalika", "" ], [ "Freund", "Yoav", "" ], [ "Hsu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0903.2870
Patrick Erik Bradley
Patrick Erik Bradley
On $p$-adic Classification
16 pages, 7 figures, 1 table; added reference, corrected typos, minor content changes
p-Adic Numbers, Ultrametric Analysis, and Applications, Vol. 1, No. 4 (2009), 271-285
10.1134/S2070046609040013
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A $p$-adic modification of the split-LBG classification method is presented in which first clusterings and then cluster centers are computed which locally minimise an energy function. The outcome for a fixed dataset is independent of the prime number $p$ with finitely many exceptions. The methods are applied to the construction of $p$-adic classifiers in the context of learning.
[ { "version": "v1", "created": "Mon, 16 Mar 2009 22:52:06 GMT" }, { "version": "v2", "created": "Wed, 24 Jun 2009 14:10:45 GMT" } ]
2009-12-01T00:00:00
[ [ "Bradley", "Patrick Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0903.2890
Soummya Kar
Soummya Kar, Bruno Sinopoli, and Jose M. F. Moura
Kalman Filtering with Intermittent Observations: Weak Convergence to a Stationary Distribution
Submitted for publication
null
null
null
cs.IT cs.LG math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper studies the asymptotic behavior of Random Algebraic Riccati Equations (RARE) arising in Kalman filtering when the arrival of the observations is described by a Bernoulli i.i.d. process. We model the RARE as an order-preserving, strongly sublinear random dynamical system (RDS). Under a sufficient condition, stochastic boundedness, and using a limit-set dichotomy result for order-preserving, strongly sublinear RDS, we establish the asymptotic properties of the RARE: the sequence of random prediction error covariance matrices converges weakly to a unique invariant distribution, whose support exhibits fractal behavior. In particular, this weak convergence holds under broad conditions and even when the observations arrival rate is below the critical probability for mean stability. We apply the weak-Feller property of the Markov process governing the RARE to characterize the support of the limiting invariant distribution as the topological closure of a countable set of points, which, in general, is not dense in the set of positive semi-definite matrices. We use the explicit characterization of the support of the invariant distribution and the almost sure ergodicity of the sample paths to easily compute the moments of the invariant distribution. A one dimensional example illustrates that the support is a fractured subset of the non-negative reals with self-similarity properties.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 01:39:01 GMT" }, { "version": "v2", "created": "Fri, 28 May 2010 08:33:21 GMT" } ]
2010-05-31T00:00:00
[ [ "Kar", "Soummya", "" ], [ "Sinopoli", "Bruno", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0903.2904
Andreas Bauer
Andreas Bauer, Rajeev Gore, Alwen Tiu
A decidable policy language for history-based transaction monitoring
null
null
10.1007/978-3-642-03466-4_6
null
cs.LO cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online trading invariably involves dealings between strangers, so it is important for one party to be able to judge objectively the trustworthiness of the other. In such a setting, the decision to trust a user may sensibly be based on that user's past behaviour. We introduce a specification language based on linear temporal logic for expressing a policy for categorising the behaviour patterns of a user depending on its transaction history. We also present an algorithm for checking whether the transaction history obeys the stated policy. To be useful in a real setting, such a language should allow one to express realistic policies which may involve parameter quantification and quantitative or statistical patterns. We introduce several extensions of linear temporal logic to cater for such needs: a restricted form of universal and existential quantification; arbitrary computable functions and relations in the term language; and a "counting" quantifier for counting how many times a formula holds in the past. We then show that model checking a transaction history against a policy, which we call the history-based transaction monitoring problem, is PSPACE-complete in the size of the policy formula and the length of the history. The problem becomes decidable in polynomial time when the policies are fixed. We also consider the problem of transaction monitoring in the case where not all the parameters of actions are observable. We formulate two such "partial observability" monitoring problems, and show their decidability under certain restrictions.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 06:23:44 GMT" } ]
2015-05-13T00:00:00
[ [ "Bauer", "Andreas", "" ], [ "Gore", "Rajeev", "" ], [ "Tiu", "Alwen", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0903.2908
Haijun Zhou
Haijun Zhou and Hui Ma
Communities of solutions in single solution clusters of a random K-Satisfiability formula
Extensively revised and expanded into 15 pages with 10 figures. New mean-field calculations and simulation results added
Phys. Rev. E 80, 066108 (2009)
10.1103/PhysRevE.80.066108
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The solution space of a K-satisfiability (K-SAT) formula is a collection of solution clusters, each of which contains all the solutions that are mutually reachable through a sequence of single-spin flips. Knowledge of the statistical property of solution clusters is valuable for a complete understanding of the solution space structure and the computational complexity of the random K-SAT problem. This paper explores single solution clusters of random 3- and 4-SAT formulas through unbiased and biased random walk processes and the replica-symmetric cavity method of statistical physics. We find that the giant connected component of the solution space has already formed many different communities when the constraint density of the formula is still lower than the solution space clustering transition point. Solutions of the same community are more similar with each other and more densely connected with each other than with the other solutions. The entropy density of a solution community is calculated using belief propagation and is found to be different for different communities of the same cluster. When the constraint density is beyond the clustering transition point, the same behavior is observed for the solution clusters reached by several stochastic search algorithms. Taking together, the results of this work suggests a refined picture on the evolution of the solution space structure of the random K-SAT problem; they may also be helpful for designing new heuristic algorithms.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 06:48:28 GMT" }, { "version": "v2", "created": "Thu, 21 May 2009 06:33:14 GMT" }, { "version": "v3", "created": "Thu, 24 Sep 2009 01:15:05 GMT" } ]
2009-12-20T00:00:00
[ [ "Zhou", "Haijun", "" ], [ "Ma", "Hui", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.2914
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
A process calculus with finitary comprehended terms
25 pages, combined with arXiv:0901.3012 [math.RA]; presentation improved, mistakes in Table 5 corrected
Theory of Computing Systems, 53(4):645--668, 2013
10.1007/s00224-013-9468-x
null
cs.LO math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of an ACP process algebra and the notion of a meadow enriched ACP process algebra. The former notion originates from the models of the axiom system ACP. The latter notion is a simple generalization of the former notion to processes in which data are involved, the mathematical structure of data being a meadow. Moreover, for all associative operators from the signature of meadow enriched ACP process algebras that are not of an auxiliary nature, we introduce variable-binding operators as generalizations. These variable-binding operators, which give rise to comprehended terms, have the property that they can always be eliminated. Thus, we obtain a process calculus whose terms can be interpreted in all meadow enriched ACP process algebras. Use of the variable-binding operators can have a major impact on the size of terms.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 07:19:00 GMT" }, { "version": "v2", "created": "Tue, 29 Mar 2011 10:46:34 GMT" }, { "version": "v3", "created": "Thu, 28 Mar 2013 11:55:20 GMT" } ]
2013-08-07T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0903.2923
Philippe Jaming
Saifallah Ghobber (MAPMO), Philippe Jaming (MAPMO, IMB)
On uncertainty principles in the finite dimensional setting
null
Linear Algebra and its Applications 435(4) (2011), 751--768
10.1016/j.laa.2011.01.038
null
math.CA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to prove an uncertainty principle for the representation of a vector in two bases. Our result extends previously known qualitative uncertainty principles into quantitative estimates. We then show how to transfer this result to the discrete version of the Short Time Fourier Transform. An application to trigonometric polynomials is also given.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 08:56:10 GMT" }, { "version": "v2", "created": "Thu, 9 Sep 2010 08:26:38 GMT" } ]
2018-08-27T00:00:00
[ [ "Ghobber", "Saifallah", "", "MAPMO" ], [ "Jaming", "Philippe", "", "MAPMO, IMB" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.2966
Samson Lasaulce
S. Lasaulce, Y. Hayel, R. El Azouzi, and M. Debbah
Introducing Hierarchy in Energy Games
Accepted for publication in IEEE Trans. on Wireless Communications
null
10.1109/TWC.2009.081443
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we introduce hierarchy in wireless networks that can be modeled by a decentralized multiple access channel and for which energy-efficiency is the main performance index. In these networks users are free to choose their power control strategy to selfishly maximize their energy-efficiency. Specifically, we introduce hierarchy in two different ways: 1. Assuming single-user decoding at the receiver, we investigate a Stackelberg formulation of the game where one user is the leader whereas the other users are assumed to be able to react to the leader's decisions; 2. Assuming neither leader nor followers among the users, we introduce hierarchy by assuming successive interference cancellation at the receiver. It is shown that introducing a certain degree of hierarchy in non-cooperative power control games not only improves the individual energy efficiency of all the users but can also be a way of insuring the existence of a non-saturated equilibrium and reaching a desired trade-off between the global network performance at the equilibrium and the requested amount of signaling. In this respect, the way of measuring the global performance of an energy-efficient network is shown to be a critical issue.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 13:53:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Lasaulce", "S.", "" ], [ "Hayel", "Y.", "" ], [ "Azouzi", "R. El", "" ], [ "Debbah", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0903.2972
Ivo Danihelka
Ivo Danihelka
Optimistic Simulated Exploration as an Incentive for Real Exploration
accepted, noted that the initial path was 217 steps long
POSTER 2009
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many reinforcement learning exploration techniques are overly optimistic and try to explore every state. Such exploration is impossible in environments with the unlimited number of states. I propose to use simulated exploration with an optimistic model to discover promising paths for real exploration. This reduces the needs for the real exploration.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 14:24:13 GMT" }, { "version": "v2", "created": "Thu, 19 Mar 2009 13:31:55 GMT" }, { "version": "v3", "created": "Wed, 20 May 2009 18:44:07 GMT" } ]
2009-05-20T00:00:00
[ [ "Danihelka", "Ivo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.2999
Filippo Radicchi
Filippo Radicchi
Human Activity in the Web
10 pages, 9 figures. Final version accepted for publication in Physical Review E
Phys. Rev. E 80, 026118 (2009)
10.1103/PhysRevE.80.026118
null
physics.soc-ph cond-mat.stat-mech cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent information technology revolution has enabled the analysis and processing of large-scale datasets describing human activities. The main source of data is represented by the Web, where humans generally use to spend a relevant part of their day. Here we study three large datasets containing the information about Web human activities in different contexts. We study in details inter-event and waiting time statistics. In both cases, the number of subsequent operations which differ by tau units of time decays power-like as tau increases. We use non-parametric statistical tests in order to estimate the significance level of reliability of global distributions to describe activity patterns of single users. Global inter-event time probability distributions are not representative for the behavior of single users: the shape of single users'inter-event distributions is strongly influenced by the total number of operations performed by the users and distributions of the total number of operations performed by users are heterogeneous. A universal behavior can be anyway found by suppressing the intrinsic dependence of the global probability distribution on the activity of the users. This suppression can be performed by simply dividing the inter-event times with their average values. Differently, waiting time probability distributions seem to be independent of the activity of users and global probability distributions are able to significantly represent the replying activity patterns of single users.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 16:24:02 GMT" }, { "version": "v2", "created": "Mon, 27 Jul 2009 15:21:41 GMT" } ]
2009-08-20T00:00:00
[ [ "Radicchi", "Filippo", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0903.3000
Luca Sanguinetti
Michele Morelli, Luca Sanguinetti, H. Vincent Poor
A Robust Ranging Scheme for OFDMA-Based Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Uplink synchronization in orthogonal frequency-division multiple-access (OFDMA) systems is a challenging task. In IEEE 802.16-based networks, users that intend to establish a communication link with the base station must go through a synchronization procedure called Initial Ranging (IR). Existing IR schemes aim at estimating the timing offsets and power levels of ranging subscriber stations (RSSs) without considering possible frequency misalignments between the received uplink signals and the base station local reference. In this work, we present a novel IR scheme for OFDMA systems where carrier frequency offsets, timing errors and power levels are estimated for all RSSs in a decoupled fashion. The proposed frequency estimator is based on a subspace decomposition approach, while timing recovery is accomplished by measuring the phase shift between the users'channel responses over adjacent subcarriers. Computer simulations are employed to assess the effectiveness of the proposed solution and to make comparisons with existing alternatives.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 16:26:00 GMT" } ]
2009-03-18T00:00:00
[ [ "Morelli", "Michele", "" ], [ "Sanguinetti", "Luca", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3004
Virtudes Tom\'as
Virtudes Tom\'as, Joachim Rosenthal and Roxana Smarandache
Decoding of MDP Convolutional Codes over the Erasure Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the decoding capabilities of maximum distance profile (MDP) convolutional codes over the erasure channel and compares them with the decoding capabilities of MDS block codes over the same channel. The erasure channel involving large alphabets is an important practical channel model when studying packet transmissions over a network, e.g, the Internet.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 16:54:35 GMT" } ]
2009-03-18T00:00:00
[ [ "Tomás", "Virtudes", "" ], [ "Rosenthal", "Joachim", "" ], [ "Smarandache", "Roxana", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3024
Ruoheng Liu
Ruoheng Liu, Tie Liu, H. Vincent Poor and Shlomo Shamai (Shitz)
A Vector Generalization of Costa's Entropy-Power Inequality with Applications
Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
This paper considers an entropy-power inequality (EPI) of Costa and presents a natural vector generalization with a real positive semidefinite matrix parameter. This new inequality is proved using a perturbation approach via a fundamental relationship between the derivative of mutual information and the minimum mean-square error (MMSE) estimate in linear vector Gaussian channels. As an application, a new extremal entropy inequality is derived from the generalized Costa EPI and then used to establish the secrecy capacity regions of the degraded vector Gaussian broadcast channel with layered confidential messages.
[ { "version": "v1", "created": "Tue, 17 Mar 2009 19:05:55 GMT" } ]
2009-03-18T00:00:00
[ [ "Liu", "Ruoheng", "", "Shitz" ], [ "Liu", "Tie", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3072
Mu-Woong Lee
Wanbin Son, Mu-Woong Lee, Hee-Kap Ahn, Seung-won Hwang
Spatial Skyline Queries: An Efficient Geometric Algorithm
18 pages, uses LNCS format
null
null
null
cs.DB cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As more data-intensive applications emerge, advanced retrieval semantics, such as ranking or skylines, have attracted attention. Geographic information systems are such an application with massive spatial data. Our goal is to efficiently support skyline queries over massive spatial data. To achieve this goal, we first observe that the best known algorithm VS2, despite its claim, may fail to deliver correct results. In contrast, we present a simple and efficient algorithm that computes the correct results. To validate the effectiveness and efficiency of our algorithm, we provide an extensive empirical comparison of our algorithm and VS2 in several aspects.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 04:54:54 GMT" } ]
2009-03-19T00:00:00
[ [ "Son", "Wanbin", "" ], [ "Lee", "Mu-Woong", "" ], [ "Ahn", "Hee-Kap", "" ], [ "Hwang", "Seung-won", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0903.3080
Kelly Fitz
Kelly R. Fitz and Sean A. Fulop
A Unified Theory of Time-Frequency Reassignment
38 pages, 13 figures, draft of paper submitted to Digital Signal Processing (Elsevier) in 2005, still in review
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-frequency representations such as the spectrogram are commonly used to analyze signals having a time-varying distribution of spectral energy, but the spectrogram is constrained by an unfortunate tradeoff between resolution in time and frequency. A method of achieving high-resolution spectral representations has been independently introduced by several parties. The technique has been variously named reassignment and remapping, but while the implementations have differed in details, they are all based on the same theoretical and mathematical foundation. In this work, we present a brief history of work on the method we will call the method of time-frequency reassignment, and present a unified mathematical description of the technique and its derivation. We will focus on the development of time-frequency reassignment in the context of the spectrogram, and conclude with a discussion of some current applications of the reassigned spectrogram.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 03:33:48 GMT" } ]
2009-03-19T00:00:00
[ [ "Fitz", "Kelly R.", "" ], [ "Fulop", "Sean A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0903.3096
Ersen Ekrem
Ersen Ekrem and Sennur Ulukus
The Secrecy Capacity Region of the Gaussian MIMO Multi-receiver Wiretap Channel
Submitted to IEEE Transactions on Information Theory, March 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the Gaussian multiple-input multiple-output (MIMO) multi-receiver wiretap channel in which a transmitter wants to have confidential communication with an arbitrary number of users in the presence of an external eavesdropper. We derive the secrecy capacity region of this channel for the most general case. We first show that even for the single-input single-output (SISO) case, existing converse techniques for the Gaussian scalar broadcast channel cannot be extended to this secrecy context, to emphasize the need for a new proof technique. Our new proof technique makes use of the relationships between the minimum-mean-square-error and the mutual information, and equivalently, the relationships between the Fisher information and the differential entropy. Using the intuition gained from the converse proof of the SISO channel, we first prove the secrecy capacity region of the degraded MIMO channel, in which all receivers have the same number of antennas, and the noise covariance matrices can be arranged according to a positive semi-definite order. We then generalize this result to the aligned case, in which all receivers have the same number of antennas, however there is no order among the noise covariance matrices. We accomplish this task by using the channel enhancement technique. Finally, we find the secrecy capacity region of the general MIMO channel by using some limiting arguments on the secrecy capacity region of the aligned MIMO channel. We show that the capacity achieving coding scheme is a variant of dirty-paper coding with Gaussian signals.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 06:19:17 GMT" } ]
2009-03-19T00:00:00
[ [ "Ekrem", "Ersen", "" ], [ "Ulukus", "Sennur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3100
Emmanuel Duflos
Emmanuel Duflos (INRIA Futurs), Marie De Vilmorin (LGI2A), Philippe Vanheeghe (INRIA Futurs)
Time Allocation of a Set of Radars in a Multitarget Environment
null
FUSION 2007 (2007)
null
null
math.OC cs.NI math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The question tackled here is the time allocation of radars in a multitarget environment. At a given time radars can only observe a limited part of the space; it is therefore necessary to move their axis with respect to time, in order to be able to explore the overall space facing them. Such sensors are used to detect, to locate and to identify targets which are in their surrounding aerial space. In this paper we focus on the detection schema when several targets need to be detected by a set of delocalized radars. This work is based on the modelling of the radar detection performances in terms of probability of detection and on the optimization of a criterion based on detection probabilities. This optimization leads to the derivation of allocation strategies and is made for several contexts and several hypotheses about the targets locations.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 07:47:28 GMT" } ]
2009-03-19T00:00:00
[ [ "Duflos", "Emmanuel", "", "INRIA Futurs" ], [ "De Vilmorin", "Marie", "", "LGI2A" ], [ "Vanheeghe", "Philippe", "", "INRIA Futurs" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0903.3103
Chunhua Shen
Chunhua Shen, Sakrapee Paisitkriangkrai, and Jian Zhang
Efficiently Learning a Detection Cascade with Sparse Eigenvectors
12 pages, conference version published in CVPR2009
null
null
null
cs.MM cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we first show that feature selection methods other than boosting can also be used for training an efficient object detector. In particular, we introduce Greedy Sparse Linear Discriminant Analysis (GSLDA) \cite{Moghaddam2007Fast} for its conceptual simplicity and computational efficiency; and slightly better detection performance is achieved compared with \cite{Viola2004Robust}. Moreover, we propose a new technique, termed Boosted Greedy Sparse Linear Discriminant Analysis (BGSLDA), to efficiently train a detection cascade. BGSLDA exploits the sample re-weighting property of boosting and the class-separability criterion of GSLDA.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 08:17:05 GMT" } ]
2009-03-19T00:00:00
[ [ "Shen", "Chunhua", "" ], [ "Paisitkriangkrai", "Sakrapee", "" ], [ "Zhang", "Jian", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0903.3106
Sebastien Tixeuil
Toshimitsu Masuzawa, S\'ebastien Tixeuil (LIP6)
Stabilizing Maximal Independent Set in Unidirectional Networks is Hard
null
null
null
RR-6880
cs.DS cs.CC cs.DC cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed algorithm is self-stabilizing if after faults and attacks hit the system and place it in some arbitrary global state, the system recovers from this catastrophic situation without external intervention in finite time. In this paper, we consider the problem of constructing self-stabilizingly a \emph{maximal independent set} in uniform unidirectional networks of arbitrary shape. On the negative side, we present evidence that in uniform networks, \emph{deterministic} self-stabilization of this problem is \emph{impossible}. Also, the \emph{silence} property (\emph{i.e.} having communication fixed from some point in every execution) is impossible to guarantee, either for deterministic or for probabilistic variants of protocols. On the positive side, we present a deterministic protocol for networks with arbitrary unidirectional networks with unique identifiers that exhibits polynomial space and time complexity in asynchronous scheduling. We complement the study with probabilistic protocols for the uniform case: the first probabilistic protocol requires infinite memory but copes with asynchronous scheduling, while the second probabilistic protocol has polynomial space complexity but can only handle synchronous scheduling. Both probabilistic solutions have expected polynomial time complexity.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 08:42:02 GMT" } ]
2009-04-20T00:00:00
[ [ "Masuzawa", "Toshimitsu", "", "LIP6" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0903.3114
Karsten Held
Karsten Held, Elena Rota Kops, Bernd J. Krause, William M. Wells III, Ron Kikinis, Hans-Wilhelm Mueller-Gaertner
Markov Random Field Segmentation of Brain MR Images
34 pages, 10 figures; the paper (published in 1997) has introduced the concept of Markov random field to the segmentation of medical MR images. For the published version see http://dx.doi.org/10.1109/42.650883
IEEE Trans. Med. Imag. vol. 16, p. 878 (1997)
10.1109/42.650883
null
cs.CV cond-mat.stat-mech physics.data-an physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a fully-automatic 3D-segmentation technique for brain MR images. Using Markov random fields the segmentation algorithm captures three important MR features, i.e. non-parametric distributions of tissue intensities, neighborhood correlations and signal inhomogeneities. Detailed simulations and real MR images demonstrate the performance of the segmentation algorithm. The impact of noise, inhomogeneity, smoothing and structure thickness is analyzed quantitatively. Even single echo MR images are well classified into gray matter, white matter, cerebrospinal fluid, scalp-bone and background. A simulated annealing and an iterated conditional modes implementation are presented. Keywords: Magnetic Resonance Imaging, Segmentation, Markov Random Fields
[ { "version": "v1", "created": "Wed, 18 Mar 2009 09:38:29 GMT" } ]
2009-03-20T00:00:00
[ [ "Held", "Karsten", "" ], [ "Kops", "Elena Rota", "" ], [ "Krause", "Bernd J.", "" ], [ "Wells", "William M.", "III" ], [ "Kikinis", "Ron", "" ], [ "Mueller-Gaertner", "Hans-Wilhelm", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.med-ph", "description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.", "span": "(Medical Physics)" } ]
0903.3126
Mihaela Sighireanu
Ahmed Bouajjani, Cezara Dragoi, Constantin Enea, Yan Jurski, Mihaela Sighireanu
A Generic Framework for Reasoning about Dynamic Networks of Infinite-State Processes
29 pages, 5 tables, 1 figure, extended version of the paper published in the the Proceedings of TACAS 2007, LNCS 4424
Logical Methods in Computer Science, Volume 5, Issue 2 (April 22, 2009) lmcs:991
10.2168/LMCS-5(2:3)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a framework for reasoning about unbounded dynamic networks of infinite-state processes. We propose Constrained Petri Nets (CPN) as generic models for these networks. They can be seen as Petri nets where tokens (representing occurrences of processes) are colored by values over some potentially infinite data domain such as integers, reals, etc. Furthermore, we define a logic, called CML (colored markings logic), for the description of CPN configurations. CML is a first-order logic over tokens allowing to reason about their locations and their colors. Both CPNs and CML are parametrized by a color logic allowing to express constraints on the colors (data) associated with tokens. We investigate the decidability of the satisfiability problem of CML and its applications in the verification of CPNs. We identify a fragment of CML for which the satisfiability problem is decidable (whenever it is the case for the underlying color logic), and which is closed under the computations of post and pre images for CPNs. These results can be used for several kinds of analysis such as invariance checking, pre-post condition reasoning, and bounded reachability analysis.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 10:56:11 GMT" }, { "version": "v2", "created": "Wed, 22 Apr 2009 15:38:23 GMT" } ]
2015-07-01T00:00:00
[ [ "Bouajjani", "Ahmed", "" ], [ "Dragoi", "Cezara", "" ], [ "Enea", "Constantin", "" ], [ "Jurski", "Yan", "" ], [ "Sighireanu", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.3127
Tamir Hazan
Tamir Hazan and Amnon Shashua
Norm-Product Belief Propagation: Primal-Dual Message-Passing for Approximate Inference
null
null
null
null
cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we treat both forms of probabilistic inference, estimating marginal probabilities of the joint distribution and finding the most probable assignment, through a unified message-passing algorithm architecture. We generalize the Belief Propagation (BP) algorithms of sum-product and max-product and tree-rewaighted (TRW) sum and max product algorithms (TRBP) and introduce a new set of convergent algorithms based on "convex-free-energy" and Linear-Programming (LP) relaxation as a zero-temprature of a convex-free-energy. The main idea of this work arises from taking a general perspective on the existing BP and TRBP algorithms while observing that they all are reductions from the basic optimization formula of $f + \sum_i h_i$ where the function $f$ is an extended-valued, strictly convex but non-smooth and the functions $h_i$ are extended-valued functions (not necessarily convex). We use tools from convex duality to present the "primal-dual ascent" algorithm which is an extension of the Bregman successive projection scheme and is designed to handle optimization of the general type $f + \sum_i h_i$. Mapping the fractional-free-energy variational principle to this framework introduces the "norm-product" message-passing. Special cases include sum-product and max-product (BP algorithms) and the TRBP algorithms. When the fractional-free-energy is set to be convex (convex-free-energy) the norm-product is globally convergent for estimating of marginal probabilities and for approximating the LP-relaxation. We also introduce another branch of the norm-product, the "convex-max-product". The convex-max-product is convergent (unlike max-product) and aims at solving the LP-relaxation.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 10:33:31 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 10:07:09 GMT" }, { "version": "v3", "created": "Tue, 16 Jun 2009 12:07:38 GMT" }, { "version": "v4", "created": "Mon, 28 Jun 2010 15:37:57 GMT" } ]
2010-06-29T00:00:00
[ [ "Hazan", "Tamir", "" ], [ "Shashua", "Amnon", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3131
Emmanuel Candes
Emmanuel J. Candes, Yaniv Plan
Matrix Completion With Noise
11 pages, 4 figures, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On the heels of compressed sensing, a remarkable new field has very recently emerged. This field addresses a broad range of problems of significant practical interest, namely, the recovery of a data matrix from what appears to be incomplete, and perhaps even corrupted, information. In its simplest form, the problem is to recover a matrix from a small sample of its entries, and comes up in many areas of science and engineering including collaborative filtering, machine learning, control, remote sensing, and computer vision to name a few. This paper surveys the novel literature on matrix completion, which shows that under some suitable conditions, one can recover an unknown low-rank matrix from a nearly minimal set of entries by solving a simple convex optimization problem, namely, nuclear-norm minimization subject to data constraints. Further, this paper introduces novel results showing that matrix completion is provably accurate even when the few observed entries are corrupted with a small amount of noise. A typical result is that one can recover an unknown n x n matrix of low rank r from just about nr log^2 n noisy samples with an error which is proportional to the noise level. We present numerical results which complement our quantitative analysis and show that, in practice, nuclear norm minimization accurately fills in the many missing entries of large low-rank matrices from just a few noisy samples. Some analogies between matrix completion and compressed sensing are discussed throughout.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 10:59:52 GMT" } ]
2009-03-19T00:00:00
[ [ "Candes", "Emmanuel J.", "" ], [ "Plan", "Yaniv", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3163
Sourav Dhar
Sourav Dhar, Debdattta Kandar, Tanushree Bose and Rabindranath Bera
Smart Antenna Based Broadband communication in Intelligent Transportation system
4 pages, 2 figs., published in NCEEERE 2008, 23-24 December 2008, sikkim, INDIA
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a review for the development of Intelligent Transportation System (ITS) world wide and the use of Smart Antennas in ITS. This review work also discusses the usual problems in ITS and proposes the solution of such problems using smart antennas.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 13:44:58 GMT" } ]
2009-03-19T00:00:00
[ [ "Dhar", "Sourav", "" ], [ "Kandar", "Debdattta", "" ], [ "Bose", "Tanushree", "" ], [ "Bera", "Rabindranath", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.3165
Sourav Dhar
Victor Dutta, R. Bera, Sourav Dhar, Jaydeep Chakravorty, Nishant Bagehel
Automated Vehicle Location (AVL) Using Global Positioning System (GPS)
6 pages,10figs.,published in NCEEERE 2008,23-24 December 2008, sikkim, INDIA
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
this is a review paper. this describes how DGPS is helpful for lane detection and to avoid collission.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 13:59:02 GMT" } ]
2009-03-19T00:00:00
[ [ "Dutta", "Victor", "" ], [ "Bera", "R.", "" ], [ "Dhar", "Sourav", "" ], [ "Chakravorty", "Jaydeep", "" ], [ "Bagehel", "Nishant", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.3182
Elena Dubrova
Elena Dubrova
Finding matching initial states for equivalent NLFSRs in the fibonacci and the galois configurations
4 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a mapping between initial states of the Fibonacci and the Galois configurations of NLFSRs is established. We show how to choose initial states for two configurations so that the resulting output sequences are equivalent.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 15:29:31 GMT" } ]
2009-03-19T00:00:00
[ [ "Dubrova", "Elena", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0903.3198
Jort Gemmeke
J. F. Gemmeke and B. Cranen
TR02: State dependent oracle masks for improved dynamical features
null
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using the AURORA-2 digit recognition task, we show that recognition accuracies obtained with classical, SNR based oracle masks can be substantially improved by using a state-dependent mask estimation technique.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 16:51:25 GMT" } ]
2009-03-19T00:00:00
[ [ "Gemmeke", "J. F.", "" ], [ "Cranen", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0903.3204
Christian Senger
Christian Senger, Vladimir Sidorenko, Victor Zyablov
On Generalized Minimum Distance Decoding Thresholds for the AWGN Channel
Accepted for the XII International Symposium on Problems of Redundancy in Information and Control Systems, St. Petersburg, Russia, May 26 - 30, 2009. 5 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the Additive White Gaussian Noise channel with Binary Phase Shift Keying modulation. Our aim is to enable an algebraic hard decision Bounded Minimum Distance decoder for a binary block code to exploit soft information obtained from the demodulator. This idea goes back to Forney and is based on treating received symbols with low reliability as erasures. This erasing at the decoder is done using a threshold, each received symbol with reliability falling below the threshold is erased. Depending on the target overall complexity of the decoder this pseudo-soft decision decoding can be extended from one threshold T to z>1 thresholds T_1<...<T_z for erasing received symbols with lowest reliability. The resulting technique is widely known as Generalized Minimum Distance decoding. In this paper we provide a means for explicit determination of the optimal threshold locations in terms of minimal decoding error probability. We do this for the one and the general z>1 thresholds case, starting with a geometric interpretation of the optimal threshold location problem and using an approach from Zyablov.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 17:14:27 GMT" }, { "version": "v2", "created": "Tue, 21 Apr 2009 09:29:17 GMT" }, { "version": "v3", "created": "Mon, 18 May 2009 13:50:58 GMT" } ]
2009-05-18T00:00:00
[ [ "Senger", "Christian", "" ], [ "Sidorenko", "Vladimir", "" ], [ "Zyablov", "Victor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3218
Josh Karlin
Josh Karlin (University of New Mexico), Stephanie Forrest (University of New Mexico and the Santa Fe Institute), Jennifer Rexford (Princeton University)
Nation-State Routing: Censorship, Wiretapping, and BGP
null
null
null
null
cs.NI cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The treatment of Internet traffic is increasingly affected by national policies that require the ISPs in a country to adopt common protocols or practices. Examples include government enforced censorship, wiretapping, and protocol deployment mandates for IPv6 and DNSSEC. If an entire nation's worth of ISPs apply common policies to Internet traffic, the global implications could be significant. For instance, how many countries rely on China or Great Britain (known traffic censors) to transit their traffic? These kinds of questions are surprisingly difficult to answer, as they require combining information collected at the prefix, Autonomous System, and country level, and grappling with incomplete knowledge about the AS-level topology and routing policies. In this paper we develop the first framework for country-level routing analysis, which allows us to answer questions about the influence of each country on the flow of international traffic. Our results show that some countries known for their national policies, such as Iran and China, have relatively little effect on interdomain routing, while three countries (the United States, Great Britain, and Germany) are central to international reachability, and their policies thus have huge potential impact.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 18:38:30 GMT" } ]
2009-03-19T00:00:00
[ [ "Karlin", "Josh", "", "University of New Mexico" ], [ "Forrest", "Stephanie", "", "University\n of New Mexico and the Santa Fe Institute" ], [ "Rexford", "Jennifer", "", "Princeton\n University" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]