id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0903.3228
Alberto Accomazzi
Michael J. Kurtz, Alberto Accomazzi, Stephen S. Murray
The Smithsonian/NASA Astrophysics Data System (ADS) Decennial Report
6 pages, whitepaper submitted to the National Research Council Astronomy and Astrophysics Decadal Survey
null
null
null
astro-ph.IM cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Eight years after the ADS first appeared the last decadal survey wrote: "NASA's initiative for the Astrophysics Data System has vastly increased the accessibility of the scientific literature for astronomers. NASA deserves credit for this valuable initiative and is urged to continue it." Here we summarize some of the changes concerning the ADS which have occurred in the past ten years, and we describe the current status of the ADS. We then point out two areas where the ADS is building an improved capability which could benefit from a policy statement of support in the ASTRO2010 report. These are: The Semantic Interlinking of Astronomy Observations and Datasets and The Indexing of the Full Text of Astronomy Research Publications.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 19:36:57 GMT" } ]
2009-03-19T00:00:00
[ [ "Kurtz", "Michael J.", "" ], [ "Accomazzi", "Alberto", "" ], [ "Murray", "Stephen S.", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0903.3257
Marcus Hutter
Ke Zhang and Marcus Hutter and Huidong Jin
A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data
15 LaTeX pages, 7 figures, 2 tables, 1 algorithm, 2 theorems
Proc. 13th Pacific-Asia Conf. on Knowledge Discovery and Data Mining (PAKDD 2009) pages 813-822
null
null
cs.LG cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting outliers which are grossly different from or inconsistent with the remaining dataset is a major challenge in real-world KDD applications. Existing outlier detection methods are ineffective on scattered real-world datasets due to implicit data patterns and parameter setting issues. We define a novel "Local Distance-based Outlier Factor" (LDOF) to measure the {outlier-ness} of objects in scattered datasets which addresses these issues. LDOF uses the relative location of an object to its neighbours to determine the degree to which the object deviates from its neighbourhood. Properties of LDOF are theoretically analysed including LDOF's lower bound and its false-detection probability, as well as parameter settings. In order to facilitate parameter settings in real-world applications, we employ a top-n technique in our outlier detection approach, where only the objects with the highest LDOF values are regarded as outliers. Compared to conventional approaches (such as top-n KNN and top-n LOF), our method top-n LDOF is more effective at detecting outliers in scattered data. It is also easier to set parameters, since its performance is relatively stable over a large range of parameter values, as illustrated by experimental results on both real-world and synthetic datasets.
[ { "version": "v1", "created": "Wed, 18 Mar 2009 23:50:29 GMT" } ]
2009-12-30T00:00:00
[ [ "Zhang", "Ke", "" ], [ "Hutter", "Marcus", "" ], [ "Jin", "Huidong", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0903.3261
Ghadamali Bagherikaram
Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani
The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel
23 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. First we assumed that the channels are degraded and the wire-tapper has the worst channel. We establish the capacity region of this scenario. Our achievability scheme is a combination of the superposition of Gaussian codes and randomization within the layers which we will refer to as Secret Superposition Coding. For the outerbound, we use the notion of enhanced channel to show that the secret superposition of Gaussian codes is optimal. We show that we only need to enhance the channels of the legitimate receivers, and the channel of the eavesdropper remains unchanged. Then we extend the result of the degraded case to non-degraded case. We show that the secret superposition of Gaussian codes along with successive decoding cannot work when the channels are not degraded. we develop a Secret Dirty Paper Coding (SDPC) scheme and show that SDPC is optimal for this channel. Finally, we investigate practical characterizations for the specific scenario in which the transmitter and the eavesdropper have multiple antennas, while both intended receivers have a single antenna. We characterize the secrecy capacity region in terms of generalized eigenvalues of the receivers channel and the eavesdropper channel. We refer to this configuration as the MISOME case. In high SNR we show that the capacity region is a convex closure of two rectangular regions.
[ { "version": "v1", "created": "Thu, 19 Mar 2009 00:51:04 GMT" }, { "version": "v2", "created": "Mon, 19 Oct 2009 19:43:52 GMT" } ]
2009-10-19T00:00:00
[ [ "Bagherikaram", "Ghadamali", "" ], [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3276
Vitaly Shmatikov
Arvind Narayanan, Vitaly Shmatikov
De-anonymizing Social Networks
Published in the 30th IEEE Symposium on Security and Privacy, 2009. The definitive version is available at: http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf Frequently Asked Questions are answered at: http://www.cs.utexas.edu/~shmat/socialnetworks-faq.html
null
10.1109/SP.2009.22
null
cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and data-mining researchers. Privacy is typically protected by anonymization, i.e., removing names, addresses, etc. We present a framework for analyzing privacy and anonymity in social networks and develop a new re-identification algorithm targeting anonymized social-network graphs. To demonstrate its effectiveness on real-world networks, we show that a third of the users who can be verified to have accounts on both Twitter, a popular microblogging service, and Flickr, an online photo-sharing site, can be re-identified in the anonymous Twitter graph with only a 12% error rate. Our de-anonymization algorithm is based purely on the network topology, does not require creation of a large number of dummy "sybil" nodes, is robust to noise and all existing defenses, and works even when the overlap between the target network and the adversary's auxiliary information is small.
[ { "version": "v1", "created": "Thu, 19 Mar 2009 06:55:46 GMT" } ]
2016-11-17T00:00:00
[ [ "Narayanan", "Arvind", "" ], [ "Shmatikov", "Vitaly", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.3278
Yuedong Xu
Yuedong Xu, John C.S. Lui, Dah-Ming Chiu
On Oligopoly Spectrum Allocation Game in Cognitive Radio Networks with Capacity Constraints
40 pages, 22 figures
Elsevier, Computer Networks, 2010
10.1016/j.comnet.2009.11.018
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic spectrum sharing is a promising technology to improve spectrum utilization in the future wireless networks. The flexible spectrum management provides new opportunities for licensed primary user and unlicensed secondary users to reallocate the spectrum resource efficiently. In this paper, we present an oligopoly pricing framework for dynamic spectrum allocation in which the primary users sell excessive spectrum to the secondary users for monetary return. We present two approaches, the strict constraints (type-I) and the QoS penalty (type-II), to model the realistic situation that the primary users have limited capacities. In the oligopoly model with strict constraints, we propose a low-complexity searching method to obtain the Nash Equilibrium and prove its uniqueness. When reduced to a duopoly game, we analytically show the interesting gaps in the leader-follower pricing strategy. In the QoS penalty based oligopoly model, a novel variable transformation method is developed to derive the unique Nash Equilibrium. When the market information is limited, we provide three myopically optimal algorithms "StrictBEST", "StrictBR" and "QoSBEST" that enable price adjustment for duopoly primary users based on the Best Response Function (BRF) and the bounded rationality (BR) principles. Numerical results validate the effectiveness of our analysis and demonstrate the fast convergence of "StrictBEST" as well as "QoSBEST" to the Nash Equilibrium. For the "StrictBR" algorithm, we reveal the chaotic behaviors of dynamic price adaptation in response to the learning rates.
[ { "version": "v1", "created": "Thu, 19 Mar 2009 06:50:36 GMT" }, { "version": "v2", "created": "Tue, 16 Jun 2009 03:58:28 GMT" } ]
2010-09-14T00:00:00
[ [ "Xu", "Yuedong", "" ], [ "Lui", "John C. S.", "" ], [ "Chiu", "Dah-Ming", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0903.3287
Frank Nielsen
Frank Nielsen and Richard Nock
Hyperbolic Voronoi diagrams made easy
null
International Conference on Computational Science and Its Applications. IEEE, 2010
10.1109/ICCSA.2010.37
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple framework to compute hyperbolic Voronoi diagrams of finite point sets as affine diagrams. We prove that bisectors in Klein's non-conformal disk model are hyperplanes that can be interpreted as power bisectors of Euclidean balls. Therefore our method simply consists in computing an equivalent clipped power diagram followed by a mapping transformation depending on the selected representation of the hyperbolic space (e.g., Poincar\'e conformal disk or upper-plane representations). We discuss on extensions of this approach to weighted and $k$-order diagrams, and describe their dual triangulations. Finally, we consider two useful primitives on the hyperbolic Voronoi diagrams for designing tailored user interfaces of an image catalog browsing application in the hyperbolic disk: (1) finding nearest neighbors, and (2) computing smallest enclosing balls.
[ { "version": "v1", "created": "Thu, 19 Mar 2009 08:45:09 GMT" } ]
2021-04-28T00:00:00
[ [ "Nielsen", "Frank", "" ], [ "Nock", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0903.3311
Dominique Duval
Jean-Guillaume Dumas (LJK), Dominique Duval (LJK), Jean-Claude Reynaud (RC)
Cartesian effect categories are Freyd-categories
23 pages
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most often, in a categorical semantics for a programming language, the substitution of terms is expressed by composition and finite products. However this does not deal with the order of evaluation of arguments, which may have major consequences when there are side-effects. In this paper Cartesian effect categories are introduced for solving this issue, and they are compared with strong monads, Freyd-categories and Haskell's Arrows. It is proved that a Cartesian effect category is a Freyd-category where the premonoidal structure is provided by a kind of binary product, called the sequential product. The universal property of the sequential product provides Cartesian effect categories with a powerful tool for constructions and proofs. To our knowledge, both effect categories and sequential products are new notions.
[ { "version": "v1", "created": "Thu, 19 Mar 2009 12:01:21 GMT" }, { "version": "v2", "created": "Tue, 19 May 2009 13:42:19 GMT" }, { "version": "v3", "created": "Fri, 12 Jun 2009 14:18:27 GMT" } ]
2009-06-12T00:00:00
[ [ "Dumas", "Jean-Guillaume", "", "LJK" ], [ "Duval", "Dominique", "", "LJK" ], [ "Reynaud", "Jean-Claude", "", "RC" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0903.3317
Shaoxu Song
Shaoxu Song and Lei Chen
Discovering Matching Dependencies
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of matching dependencies (mds) is recently pro- posed for specifying matching rules for object identification. Similar to the functional dependencies (with conditions), mds can also be applied to various data quality applications such as violation detection. In this paper, we study the problem of discovering matching dependencies from a given database instance. First, we formally define the measures, support and confidence, for evaluating utility of mds in the given database instance. Then, we study the discovery of mds with certain utility requirements of support and confidence. Exact algorithms are developed, together with pruning strategies to improve the time performance. Since the exact algorithm has to traverse all the data during the computation, we propose an approximate solution which only use some of the data. A bound of relative errors introduced by the approximation is also developed. Finally, our experimental evaluation demonstrates the efficiency of the proposed methods.
[ { "version": "v1", "created": "Thu, 19 Mar 2009 12:33:47 GMT" }, { "version": "v2", "created": "Sat, 13 Jun 2009 03:57:09 GMT" } ]
2009-06-13T00:00:00
[ [ "Song", "Shaoxu", "" ], [ "Chen", "Lei", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0903.3329
Emmanuel Duflos
Thomas Br\'ehard (INRIA Futurs), Emmanuel Duflos (INRIA Futurs, LAGIS), Philippe Vanheeghe (LAGIS), Pierre-Arnaud Coquelin (INRIA Futurs)
Optimal Policies Search for Sensor Management
null
null
null
null
cs.LG stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new approach to solve sensor management problems. Classically sensor management problems can be well formalized as Partially-Observed Markov Decision Processes (POMPD). The original approach developped here consists in deriving the optimal parameterized policy based on a stochastic gradient estimation. We assume in this work that it is possible to learn the optimal policy off-line (in simulation) using models of the environement and of the sensor(s). The learned policy can then be used to manage the sensor(s). In order to approximate the gradient in a stochastic context, we introduce a new method to approximate the gradient, based on Infinitesimal Perturbation Approximation (IPA). The effectiveness of this general framework is illustrated by the managing of an Electronically Scanned Array Radar. First simulations results are finally proposed.
[ { "version": "v1", "created": "Thu, 19 Mar 2009 13:44:35 GMT" } ]
2009-03-20T00:00:00
[ [ "Bréhard", "Thomas", "", "INRIA Futurs" ], [ "Duflos", "Emmanuel", "", "INRIA Futurs,\n LAGIS" ], [ "Vanheeghe", "Philippe", "", "LAGIS" ], [ "Coquelin", "Pierre-Arnaud", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0903.3433
Kohtaro Tadaki
Kohtaro Tadaki
Fixed point theorems on partial randomness
19 pages, LaTeX2e, no figures
Ann. Pure Appl. Logic 163 (2012) 763-774
10.1016/j.apal.2011.09.018
null
cs.IT cs.CC math.IT math.LO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In our former work [K. Tadaki, Local Proceedings of CiE 2008, pp.425-434, 2008], we developed a statistical mechanical interpretation of algorithmic information theory by introducing the notion of thermodynamic quantities at temperature T, such as free energy F(T), energy E(T), and statistical mechanical entropy S(T), into the theory. These quantities are real functions of real argument T>0. We then discovered that, in the interpretation, the temperature T equals to the partial randomness of the values of all these thermodynamic quantities, where the notion of partial randomness is a stronger representation of the compression rate by program-size complexity. Furthermore, we showed that this situation holds for the temperature itself as a thermodynamic quantity. Namely, the computability of the value of partition function Z(T) gives a sufficient condition for T in (0,1) to be a fixed point on partial randomness. In this paper, we show that the computability of each of all the thermodynamic quantities above gives the sufficient condition also. Moreover, we show that the computability of F(T) gives completely different fixed points from the computability of Z(T).
[ { "version": "v1", "created": "Thu, 19 Mar 2009 22:04:07 GMT" } ]
2019-09-04T00:00:00
[ [ "Tadaki", "Kohtaro", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0903.3461
Andreas Tielmann
Carole Delporte-Gallet (LIAFA), Hugues Fauconnier (LIAFA), Andreas Tielmann (LIAFA)
Fault-Tolerant Consensus in Unknown and Anonymous Networks
null
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates under which conditions information can be reliably shared and consensus can be solved in unknown and anonymous message-passing networks that suffer from crash-failures. We provide algorithms to emulate registers and solve consensus under different synchrony assumptions. For this, we introduce a novel pseudo leader-election approach which allows a leader-based consensus implementation without breaking symmetry.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 07:50:46 GMT" } ]
2009-03-23T00:00:00
[ [ "Delporte-Gallet", "Carole", "", "LIAFA" ], [ "Fauconnier", "Hugues", "", "LIAFA" ], [ "Tielmann", "Andreas", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0903.3462
Luigi Santocanale
Luigi Santocanale (LIF)
A Nice Labelling for Tree-Like Event Structures of Degree 3 (Extended Version)
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of finding nice labellings for event structures of degree 3. We develop a minimum theory by which we prove that the labelling number of an event structure of degree 3 is bounded by a linear function of the height. The main theorem we present in this paper states that event structures of degree 3 whose causality order is a tree have a nice labelling with 3 colors. Finally, we exemplify how to use this theorem to construct upper bounds for the labelling number of other event structures of degree 3.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 07:54:05 GMT" } ]
2009-03-23T00:00:00
[ [ "Santocanale", "Luigi", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0903.3480
Teddy Furon
Teddy Furon and Luis Perez-Freire
Worst case attacks against binary probabilistic traitor tracing codes
submitted to IEEE Trans. on Information Forensics and Security
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An insightful view into the design of traitor tracing codes should necessarily consider the worst case attacks that the colluders can lead. This paper takes an information-theoretic point of view where the worst case attack is defined as the collusion strategy minimizing the achievable rate of the traitor tracing code. Two different decoders are envisaged, the joint decoder and the simple decoder, as recently defined by P. Moulin \cite{Moulin08universal}. Several classes of colluders are defined with increasing power. The worst case attack is derived for each class and each decoder when applied to Tardos' codes and a probabilistic version of the Boneh-Shaw construction. This contextual study gives the real rates achievable by the binary probabilistic traitor tracing codes. Attacks usually considered in literature, such as majority or minority votes, are indeed largely suboptimal. This article also shows the utmost importance of the time-sharing concept in a probabilistic codes.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 09:44:23 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2009 09:16:06 GMT" } ]
2009-08-18T00:00:00
[ [ "Furon", "Teddy", "" ], [ "Perez-Freire", "Luis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3487
Stephan Tinguely
Amos Lapidoth and Stephan Tinguely
Sending a Bivariate Gaussian Source over a Gaussian MAC with Feedback
submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the power-versus-distortion trade-off for the transmission of a memoryless bivariate Gaussian source over a two-to-one Gaussian multiple-access channel with perfect causal feedback. In this problem, each of two separate transmitters observes a different component of a memoryless bivariate Gaussian source as well as the feedback from the channel output of the previous time-instants. Based on the observed source sequence and the feedback, each transmitter then describes its source component to the common receiver via an average-power constrained Gaussian multiple-access channel. From the resulting channel output, the receiver wishes to reconstruct both source components with the least possible expected squared-error distortion. We study the set of distortion pairs that can be achieved by the receiver on the two source components. We present sufficient conditions and necessary conditions for the achievability of a distortion pair. These conditions are expressed in terms of the source correlation and of the signal-to-noise ratio (SNR) of the channel. In several cases the necessary conditions and sufficient conditions coincide. This allows us to show that if the channel SNR is below a certain threshold, then an uncoded transmission scheme that ignores the feedback is optimal. Thus, below this SNR-threshold feedback is useless. We also derive the precise high-SNR asymptotics of optimal schemes.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 10:32:45 GMT" } ]
2009-03-23T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Tinguely", "Stephan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3513
Apostolos Syropoulos
Apostolos Syropoulos
Fuzzy Chemical Abstract Machines
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fuzzy set theory opens new vistas in computability theory and here I show this by defining a new computational metaphor--the fuzzy chemical metaphor. This metaphor is an extension of the chemical metaphor. In particular, I introduce the idea of a state of a system as a solution of fuzzy molecules, that is molecules that are not just different but rather similar, that react according to a set of fuzzy reaction rules. These notions become precise by introducing fuzzy labeled transition systems. Solutions of fuzzy molecules and fuzzy reaction rules are used to define the general notion of a fuzzy chemical abstract machine, which is a {\em realization} of the fuzzy chemical metaphor. Based on the idea that these machines can be used to describe the operational semantics of process calculi and algebras that include fuzziness as a fundamental property, I present a toy calculus that is a fuzzy equivalent of the $\pi$-calculus.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 13:04:52 GMT" } ]
2009-03-23T00:00:00
[ [ "Syropoulos", "Apostolos", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0903.3524
Jin-San Cheng
Jin-San Cheng, Xiao-Shan Gao and Jia Li
Ambient Isotopic Meshing of Implicit Algebraic Surface with Singularities
34 pages, 17 Postscript figures
null
10.1007/978-3-642-04103-7_9
MM-preprints, vol. 27, 2008
cs.CG cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A complete method is proposed to compute a certified, or ambient isotopic, meshing for an implicit algebraic surface with singularities. By certified, we mean a meshing with correct topology and any given geometric precision. We propose a symbolic-numeric method to compute a certified meshing for the surface inside a box containing singularities and use a modified Plantinga-Vegter marching cube method to compute a certified meshing for the surface inside a box without singularities. Nontrivial examples are given to show the effectiveness of the algorithm. To our knowledge, this is the first method to compute a certified meshing for surfaces with singularities.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 13:53:35 GMT" } ]
2015-05-13T00:00:00
[ [ "Cheng", "Jin-San", "" ], [ "Gao", "Xiao-Shan", "" ], [ "Li", "Jia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0903.3537
Boris Oreshkin N.
Boris N. Oreshkin, Mark J. Coates, Michael G. Rabbat
Optimization and Analysis of Distributed Averaging with Short Node Memory
null
null
10.1109/TSP.2010.2043127
null
cs.DC cs.IT cs.MA math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we demonstrate, both theoretically and by numerical examples, that adding a local prediction component to the update rule can significantly improve the convergence rate of distributed averaging algorithms. We focus on the case where the local predictor is a linear combination of the node's two previous values (i.e., two memory taps), and our update rule computes a combination of the predictor and the usual weighted linear combination of values received from neighbouring nodes. We derive the optimal mixing parameter for combining the predictor with the neighbors' values, and carry out a theoretical analysis of the improvement in convergence rate that can be obtained using this acceleration methodology. For a chain topology on n nodes, this leads to a factor of n improvement over the one-step algorithm, and for a two-dimensional grid, our approach achieves a factor of n^1/2 improvement, in terms of the number of iterations required to reach a prescribed level of accuracy.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 15:12:13 GMT" }, { "version": "v2", "created": "Sat, 4 Jul 2009 14:46:21 GMT" }, { "version": "v3", "created": "Fri, 5 Feb 2010 15:48:12 GMT" }, { "version": "v4", "created": "Fri, 5 Feb 2010 21:35:10 GMT" } ]
2015-05-13T00:00:00
[ [ "Oreshkin", "Boris N.", "" ], [ "Coates", "Mark J.", "" ], [ "Rabbat", "Michael G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3545
Jean Pierre Boon
Jean Pierre Boon
Complexity, time and music
4 pages with 2 figures
null
null
null
physics.soc-ph cs.SD physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of complexity as considered in terms of its algorithmic definition proposed by G.J. Chaitin and A.N. Kolmogorov is revisited for the dynamical complexity of music. When music pieces are cast in the form of time series of pitch variations, concepts of dynamical systems theory can be used to define new quantities such as the {\em dimensionality} as a measure of the {\em global temporal dynamics} of a music piece, and the Shanon {\em entropy} as an evaluation of its {\em local dynamics}. When these quantities are computed explicitly for sequences sampled in the music literature from the 18th to the 20th century, no indication is found of a systematic increase in complexity paralleling historically the evolution of classical western music, but the analysis suggests that the fractional nature of art might have an intrinsic value of more general significance.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 15:32:42 GMT" } ]
2009-03-23T00:00:00
[ [ "Boon", "Jean Pierre", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0903.3562
Andrea Scharnhorst
Katy Boerner, Andrea Scharnhorst
Visual Conceptualizations and Models of Science
Guest Editor's Introduction to the 2009 Journal of Informetrics Special Issue on the Science of Science
null
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This Journal of Informetrics special issue aims to improve our understanding of the structure and dynamics of science by reviewing and advancing existing conceptualizations and models of scholarly activity. Several of these conceptualizations and models have visual manifestations supporting the combination and comparison of theories and approaches developed in different disciplines of science. Subsequently, we discuss challenges towards a theoretically grounded and practically useful science of science and provide a brief chronological review of relevant work. Then, we exemplarily present three conceptualizations of science that attempt to provide frameworks for the comparison and combination of existing approaches, theories, laws, and measurements. Finally, we discuss the contributions of and interlinkages among the eight papers included in this issue. Each paper makes a unique contribution towards conceptualizations and models of science and roots this contribution in a review and comparison with existing work.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 16:35:18 GMT" } ]
2009-03-23T00:00:00
[ [ "Boerner", "Katy", "" ], [ "Scharnhorst", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0903.3579
Peter Krusche
Peter Krusche, Alexander Tiskin
String comparison by transposition networks
Published in London Algorithmics 2008: Theory And Practice, to appear
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing string or sequence alignments is a classical method of comparing strings and has applications in many areas of computing, such as signal processing and bioinformatics. Semi-local string alignment is a recent generalisation of this method, in which the alignment of a given string and all substrings of another string are computed simultaneously at no additional asymptotic cost. In this paper, we show that there is a close connection between semi-local string alignment and a certain class of traditional comparison networks known as transposition networks. The transposition network approach can be used to represent different string comparison algorithms in a unified form, and in some cases provides generalisations or improvements on existing algorithms. This approach allows us to obtain new algorithms for sparse semi-local string comparison and for comparison of highly similar and highly dissimilar strings, as well as of run-length compressed strings. We conclude that the transposition network method is a very general and flexible way of understanding and improving different string comparison algorithms, as well as their efficient implementation.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 17:53:55 GMT" } ]
2009-03-23T00:00:00
[ [ "Krusche", "Peter", "" ], [ "Tiskin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.3622
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Sorin Briciu, Madalina Ecaterina Andreica
Algorithmic Solutions to Some Transportation Optimization Problems with Applications in the Metallurgical Industry
null
Metalurgia International, vol. 14, special issue no. 5, pp. 46-53, 2009. (ISSN: 1582-2214) ; http://www.metalurgia.ro/metalurgia_int.html
null
null
cs.DS cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address several constrained transportation optimization problems (e.g. vehicle routing, shortest Hamiltonian path), for which we present novel algorithmic solutions and extensions, considering several optimization objectives, like minimizing costs and resource usage. All the considered problems are motivated by practical situations arising, for instance, in the mining and metallurgical industry or in data communication. We restrict our attention to transportation networks with path, tree or geometric structures, for which the developed polynomial-time algorithms are optimal or nearly optimal.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 22:21:30 GMT" } ]
2009-03-24T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Briciu", "Sorin", "" ], [ "Andreica", "Madalina Ecaterina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.3623
Paul Slater
Paul B. Slater
Matrix plots of reordered bistochastized transaction flow tables: A United States intercounty migration example
12 pages, 9 figures
null
null
null
physics.soc-ph cs.SI physics.data-an stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a number of variously rearranged matrix plots of the $3, 107 \times 3, 107$ 1995-2000 (asymmetric) intercounty migration table for the United States, principally in its bistochasticized form (all 3,107 row and column sums iteratively proportionally fitted to equal 1). In one set of plots, the counties are seriated on the bases of the subdominant (left and right) eigenvectors of the bistochastic matrix. In another set, we use the ordering of counties in the dendrogram generated by the associated strong component hierarchical clustering. Interesting, diverse features of U. S. intercounty migration emerge--such as a contrast in centralized, hub-like (cosmopolitan/provincial) properties between cosmopolitan "Sunbelt" and provincial "Black Belt" counties. The methodologies employed should also be insightful for the many other diverse forms of interesting transaction flow-type data--interjournal citations being an obvious, much-studied example, where one might expect that the journals Science, Nature and PNAS would display "cosmopolitan" characteristics.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 22:42:24 GMT" } ]
2012-07-03T00:00:00
[ [ "Slater", "Paul B.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0903.3624
Marco Pavone
Marco Pavone, Emilio Frazzoli, Francesco Bullo
Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment
Paper to be submitted to IEEE Transactions on Automatic Control
null
10.1109/TAC.2010.2092850
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present distributed and adaptive algorithms for motion coordination of a group of m autonomous vehicles. The vehicles operate in a convex environment with bounded velocity and must service demands whose time of arrival, location and on-site service are stochastic; the objective is to minimize the expected system time (wait plus service) of the demands. The general problem is known as the m-vehicle Dynamic Traveling Repairman Problem (m-DTRP). The best previously known control algorithms rely on centralized a-priori task assignment and are not robust against changes in the environment, e.g. changes in load conditions; therefore, they are of limited applicability in scenarios involving ad-hoc networks of autonomous vehicles operating in a time-varying environment. First, we present a new class of policies for the 1-DTRP problem that: (i) are provably optimal both in light- and heavy-load condition, and (ii) are adaptive, in particular, they are robust against changes in load conditions. Second, we show that partitioning policies, whereby the environment is partitioned among the vehicles and each vehicle follows a certain set of rules in its own region, are optimal in heavy-load conditions. Finally, by combining the new class of algorithms for the 1-DTRP with suitable partitioning policies, we design distributed algorithms for the m-DTRP problem that (i) are spatially distributed, scalable to large networks, and adaptive to network changes, (ii) are within a constant-factor of optimal in heavy-load conditions and stabilize the system in any load condition. Simulation results are presented and discussed.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 22:48:08 GMT" } ]
2016-11-17T00:00:00
[ [ "Pavone", "Marco", "" ], [ "Frazzoli", "Emilio", "" ], [ "Bullo", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0903.3627
Shamgar Gurevich
Shamgar Gurevich (Berkeley) and Ronny Hadani (Chicago)
Statistical RIP and Semi-Circle Distribution of Incoherent Dictionaries
This version Includes all the proofs. Submitted for publication (2009)
null
null
null
cs.IT cs.DM math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we formulate and prove a statistical version of the Candes-Tao restricted isometry property (SRIP for short) which holds in general for any incoherent dictionary which is a disjoint union of orthonormal bases. In addition, we prove that, under appropriate normalization, the eigenvalues of the associated Gram matrix fluctuate around 1 according to the Wigner semicircle distribution. The result is then applied to various dictionaries that arise naturally in the setting of finite harmonic analysis, giving, in particular, a better understanding on a remark of Applebaum-Howard-Searle-Calderbank concerning RIP for the Heisenberg dictionary of chirp like functions.
[ { "version": "v1", "created": "Fri, 20 Mar 2009 23:36:53 GMT" } ]
2009-03-24T00:00:00
[ [ "Gurevich", "Shamgar", "", "Berkeley" ], [ "Hadani", "Ronny", "", "Chicago" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0903.3667
Joel Ratsaby
Joel Ratsaby
How random are a learner's mistakes?
null
null
null
null
cs.LG cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a random binary sequence $X^{(n)}$ of random variables, $X_{t},$ $t=1,2,...,n$, for instance, one that is generated by a Markov source (teacher) of order $k^{*}$ (each state represented by $k^{*}$ bits). Assume that the probability of the event $X_{t}=1$ is constant and denote it by $\beta$. Consider a learner which is based on a parametric model, for instance a Markov model of order $k$, who trains on a sequence $x^{(m)}$ which is randomly drawn by the teacher. Test the learner's performance by giving it a sequence $x^{(n)}$ (generated by the teacher) and check its predictions on every bit of $x^{(n)}.$ An error occurs at time $t$ if the learner's prediction $Y_{t}$ differs from the true bit value $X_{t}$. Denote by $\xi^{(n)}$ the sequence of errors where the error bit $\xi_{t}$ at time $t$ equals 1 or 0 according to whether the event of an error occurs or not, respectively. Consider the subsequence $\xi^{(\nu)}$ of $\xi^{(n)}$ which corresponds to the errors of predicting a 0, i.e., $\xi^{(\nu)}$ consists of the bits of $\xi^{(n)}$ only at times $t$ such that $Y_{t}=0.$ In this paper we compute an estimate on the deviation of the frequency of 1s of $\xi^{(\nu)}$ from $\beta$. The result shows that the level of randomness of $\xi^{(\nu)}$ decreases relative to an increase in the complexity of the learner.
[ { "version": "v1", "created": "Sat, 21 Mar 2009 14:16:05 GMT" }, { "version": "v2", "created": "Sat, 28 Mar 2009 22:01:59 GMT" }, { "version": "v3", "created": "Sat, 4 Apr 2009 20:52:10 GMT" }, { "version": "v4", "created": "Tue, 29 Sep 2009 11:03:00 GMT" }, { "version": "v5", "created": "Sun, 2 Jan 2011 08:43:03 GMT" } ]
2011-01-04T00:00:00
[ [ "Ratsaby", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0903.3669
Xiu-Li Wang
Xiuli Wang
Comment on "Language Trees and Zipping" arXiv:cond-mat/0108530
2 pages comment on arXiv:cond-mat/0108530, arXiv:cond-mat/0203275
null
null
null
cs.AI cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Every encoding has priori information if the encoding represents any semantic information of the unverse or object. Encoding means mapping from the unverse to the string or strings of digits. The semantic here is used in the model-theoretic sense or denotation of the object. If encoding or strings of symbols is the adequate and true mapping of model or object, and the mapping is recursive or computable, the distance between two strings (text) is mapping the distance between models. We then are able to measure the distance by computing the distance between the two strings. Otherwise, we may take a misleading course. "Language tree" may not be a family tree in the sense of historical linguistics. Rather it just means the similarity.
[ { "version": "v1", "created": "Sat, 21 Mar 2009 14:29:11 GMT" } ]
2009-03-24T00:00:00
[ [ "Wang", "Xiuli", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3676
Emil Saucan
Emil Saucan, Eli Appleboilm, Gershon Wolansky, Yehoshua Y. Zeevi
Combinatorial Ricci Curvature and Laplacians for Image Processing
12 pages, 8 figures (some of the these may be of lesser quality than those in the Technical report version)
Proceedings of CISP'09, Vol. 2, 992-997, 2009
null
CCIT Report # 722 March 2009 (EE Pub. No. 1679)
cs.CV cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new Combinatorial Ricci curvature and Laplacian operators for grayscale images are introduced and tested on 2D synthetic, natural and medical images. Analogue formulae for voxels are also obtained. These notions are based upon more general concepts developed by R. Forman. Further applications, in particular a fitting Ricci flow, are discussed.
[ { "version": "v1", "created": "Mon, 23 Mar 2009 17:18:08 GMT" } ]
2010-05-12T00:00:00
[ [ "Saucan", "Emil", "" ], [ "Appleboilm", "Eli", "" ], [ "Wolansky", "Gershon", "" ], [ "Zeevi", "Yehoshua Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0903.3685
Italo Dejter Prof
Italo J. Dejter
Quasiperfect domination in triangular lattices
20 pages, 9 figures, 5 arrays
Discussiones Mathematicae Graph Theory 29(2009) 179-198
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A vertex subset $S$ of a graph $G$ is a perfect (resp. quasiperfect) dominating set in $G$ if each vertex $v$ of $G\setminus S$ is adjacent to only one vertex ($d_v\in\{1,2\}$ vertices) of $S$. Perfect and quasiperfect dominating sets in the regular tessellation graph of Schl\"afli symbol $\{3,6\}$ and in its toroidal quotients are investigated, yielding the classification of their perfect dominating sets and most of their quasiperfect dominating sets $S$ with induced components of the form $K_{\nu}$, where $\nu\in\{1,2,3\}$ depends only on $S$.
[ { "version": "v1", "created": "Sat, 21 Mar 2009 20:20:30 GMT" } ]
2009-04-03T00:00:00
[ [ "Dejter", "Italo J.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3690
Wei Pan
Xin Li and Marc Moreno Maza and Wei Pan
Computations modulo regular chains
27 pages, 8 figures
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The computation of triangular decompositions are based on two fundamental operations: polynomial GCDs modulo regular chains and regularity test modulo saturated ideals. We propose new algorithms for these core operations relying on modular methods and fast polynomial arithmetic. Our strategies take also advantage of the context in which these operations are performed. We report on extensive experimentation, comparing our code to pre-existing Maple implementations, as well as more optimized Magma functions. In most cases, our new code outperforms the other packages by several orders of magnitude.
[ { "version": "v1", "created": "Sat, 21 Mar 2009 20:43:02 GMT" }, { "version": "v2", "created": "Sat, 25 Jul 2009 03:01:00 GMT" } ]
2009-07-25T00:00:00
[ [ "Li", "Xin", "" ], [ "Maza", "Marc Moreno", "" ], [ "Pan", "Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0903.3696
George Bell
George I. Bell
Notes on solving and playing peg solitaire on a computer
25 pages, 11 figures, 8 tables. Some text rewritten, more ancillary material added
null
null
null
math.CO cs.DM math.HO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the one-person game of peg solitaire played on a computer. Two popular board shapes are the 33-hole cross-shaped board, and the 15-hole triangle board---we use them as examples throughout. The basic game begins from a full board with one peg missing and the goal is to finish at a board position with one peg. First, we discuss ways to solve the basic game on a computer. Then we consider the problem of quickly distinguishing board positions where the goal can still be reached ("winning" board positions) from those where it cannot. This enables a computer to alert the player if a jump under consideration leads to a dead end. On the 15-hole triangle board, it is possible to identify all winning board positions (from any single vacancy start) by storing a key set of 437 board positions. For the "central game" on the 33-hole cross-shaped board, we can identify all winning board positions by storing 839,536 board positions. By viewing a successful game as a traversal of a directed graph of winning board positions, we apply a simple algorithm to count the number of ways to traverse this graph, and calculate that the total number of solutions to the central game is 40,861,647,040,079,968. Our analysis can also determine how quickly we can reach a "dead board position", where a one peg finish is no longer possible.
[ { "version": "v1", "created": "Mon, 23 Mar 2009 18:55:32 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2011 05:52:10 GMT" }, { "version": "v3", "created": "Sun, 10 Apr 2011 15:39:26 GMT" }, { "version": "v4", "created": "Thu, 6 Nov 2014 17:19:40 GMT" } ]
2014-11-07T00:00:00
[ [ "Bell", "George I.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" } ]
0903.3715
Jack Raymond
Jack Raymond
Optimal sparse CDMA detection at high load
Submitted to physcomnet09, 6 pages 6 figures, pdflatex
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Balancing efficiency of bandwidth use and complexity of detection involves choosing a suitable load for a multi-access channel. In the case of synchronous CDMA, with random codes, it is possible to demonstrate the existence of a threshold in the load beyond which there is an apparent jump in computational complexity. At small load unit clause propagation can determine a jointly optimal detection of sources on a noiseless channel, but fails at high load. Analysis provides insight into the difference between the standard dense random codes and sparse codes, and the limitations of optimal detection in the sparse case.
[ { "version": "v1", "created": "Sun, 22 Mar 2009 10:53:51 GMT" }, { "version": "v2", "created": "Fri, 22 May 2009 12:52:04 GMT" } ]
2009-05-22T00:00:00
[ [ "Raymond", "Jack", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3741
Alejandro Diaz-Caro
Pablo Arrighi (ENS-Lyon, LIP and Universite de Grenoble, LIG), Alejandro Diaz-Caro (Universite de Grenoble, LIG, and Universite Paris-Nord, Laboratoire LIPN)
A System F accounting for scalars
null
Logical Methods in Computer Science, Volume 8, Issue 1 (February 27, 2012) lmcs:846
10.2168/LMCS-8(1:11)2012
null
cs.LO cs.PL quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Algebraic lambda-calculus and the Linear-Algebraic lambda-calculus extend the lambda-calculus with the possibility of making arbitrary linear combinations of terms. In this paper we provide a fine-grained, System F-like type system for the linear-algebraic lambda-calculus. We show that this "scalar" type system enjoys both the subject-reduction property and the strong-normalisation property, our main technical results. The latter yields a significant simplification of the linear-algebraic lambda-calculus itself, by removing the need for some restrictions in its reduction rules. But the more important, original feature of this scalar type system is that it keeps track of 'the amount of a type' that is present in each term. As an example of its use, we shown that it can serve as a guarantee that the normal form of a term is barycentric, i.e that its scalars are summing to one.
[ { "version": "v1", "created": "Sun, 22 Mar 2009 17:10:09 GMT" }, { "version": "v2", "created": "Fri, 31 Jul 2009 11:19:20 GMT" }, { "version": "v3", "created": "Fri, 9 Apr 2010 17:37:28 GMT" }, { "version": "v4", "created": "Thu, 18 Nov 2010 11:40:41 GMT" }, { "version": "v5", "created": "Sun, 24 Apr 2011 10:36:35 GMT" }, { "version": "v6", "created": "Wed, 1 Feb 2012 14:40:41 GMT" }, { "version": "v7", "created": "Thu, 23 Feb 2012 23:27:05 GMT" }, { "version": "v8", "created": "Tue, 28 Feb 2012 08:59:44 GMT" } ]
2015-07-01T00:00:00
[ [ "Arrighi", "Pablo", "", "ENS-Lyon, LIP and Universite de Grenoble, LIG" ], [ "Diaz-Caro", "Alejandro", "", "Universite de Grenoble, LIG, and Universite Paris-Nord,\n Laboratoire LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0903.3759
Shah Asaduzzaman
Shah Asaduzzaman, Gregor v. Bochmann
GeoP2P: An adaptive peer-to-peer overlay for efficient search and update of spatial information
13 pages, Submitted to VLDB-2009 conference
null
null
null
cs.NI cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a fully decentralized peer-to-peer overlay structure GeoP2P, to facilitate geographic location based search and retrieval of information. Certain limitations of centralized geographic indexes favor peer-to-peer organization of the information, which, in addition to avoiding performance bottleneck, allows autonomy over local information. Peer-to-peer systems for geographic or multidimensional range queries built on existing DHTs suffer from the inaccuracy in linearization of the multidimensional space. Other overlay structures that are based on hierarchical partitioning of the search space are not scalable because they use special super-peers to represent the nodes in the hierarchy. GeoP2P partitions the search space hierarchically, maintains the overlay structure and performs the routing without the need of any super-peers. Although similar fully-decentralized overlays have been previously proposed, they lack the ability to dynamically grow and retract the partition hierarchy when the number of peers change. GeoP2P provides such adaptive features with minimum perturbation of the system state. Such adaptation makes both the routing delay and the state size of each peer logarithmic to the total number of peers, irrespective of the size of the multidimensional space. Our analysis also reveals that the overlay structure and the routing algorithm are generic and independent of several aspects of the partitioning hierarchy, such as the geometric shape of the zones or the dimensionality of the search space.
[ { "version": "v1", "created": "Sun, 22 Mar 2009 21:39:20 GMT" } ]
2009-03-24T00:00:00
[ [ "Asaduzzaman", "Shah", "" ], [ "Bochmann", "Gregor v.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0903.3786
Ruoheng Liu
Ruoheng Liu, Tie Liu, H. Vincent Poor, Shlomo Shamai (Shitz)
Multiple-Input Multiple-Output Gaussian Broadcast Channels with Confidential Messages
Submitted to the IEEE Transactions on Information Theory, March 2009
null
null
null
cs.IT cs.CR math.IT
http://creativecommons.org/licenses/by/3.0/
This paper considers the problem of secret communication over a two-receiver multiple-input multiple-output (MIMO) Gaussian broadcast channel. The transmitter has two independent messages, each of which is intended for one of the receivers but needs to be kept asymptotically perfectly secret from the other. It is shown that, surprisingly, under a matrix power constraint both messages can be simultaneously transmitted at their respective maximal secrecy rates. To prove this result, the MIMO Gaussian wiretap channel is revisited and a new characterization of its secrecy capacity is provided via a new coding scheme that uses artificial noise and random binning.
[ { "version": "v1", "created": "Mon, 23 Mar 2009 04:26:25 GMT" } ]
2009-03-24T00:00:00
[ [ "Liu", "Ruoheng", "", "Shitz" ], [ "Liu", "Tie", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3797
Benoit Combemale
Beno\^it Combemale (IRIT)
Personal report of the 3rd ECMDA-FA'07 conference
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Manuscripts notes taken during the conference ECMDA 2008. I give the full conference program (title of the article and name of the person who introduced) detailing some of the presentations.
[ { "version": "v1", "created": "Mon, 23 Mar 2009 06:54:51 GMT" } ]
2009-03-24T00:00:00
[ [ "Combemale", "Benoît", "", "IRIT" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.3850
Yves Bertot
Yves Bertot (INRIA Sophia Antipolis), Ekaterina Komendantskaya (INRIA Sophia Antipolis)
Using Structural Recursion for Corecursion
null
Types 2008 5497 (2008) 220-236
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a (limited) solution to the problem of constructing stream values defined by recursive equations that do not respect the guardedness condition. The guardedness condition is imposed on definitions of corecursive functions in Coq, AGDA, and other higher-order proof assistants. In this paper, we concentrate in particular on those non-guarded equations where recursive calls appear under functions. We use a correspondence between streams and functions over natural numbers to show that some classes of non-guarded definitions can be modelled through the encoding as structural recursive functions. In practice, this work extends the class of stream values that can be defined in a constructive type theory-based theorem prover with inductive and coinductive types, structural recursion and guarded corecursion
[ { "version": "v1", "created": "Mon, 23 Mar 2009 12:35:27 GMT" } ]
2009-03-24T00:00:00
[ [ "Bertot", "Yves", "", "INRIA Sophia Antipolis" ], [ "Komendantskaya", "Ekaterina", "", "INRIA\n Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.3889
Marius Zimand
Marius Zimand
On generating independent random strings
CiE 2009, Heidelberg
null
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that from two strings that are partially random and independent (in the sense of Kolmogorov complexity) it is possible to effectively construct polynomially many strings that are random and pairwise independent. If the two initial strings are random, then the above task can be performed in polynomial time. It is also possible to construct in polynomial time a random string, from two strings that have constant randomness rate.
[ { "version": "v1", "created": "Mon, 23 Mar 2009 16:03:08 GMT" } ]
2009-03-24T00:00:00
[ [ "Zimand", "Marius", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.3900
Osman Ugus
Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, and Sorin A. Huss
Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks
null
null
null
null
cs.CR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When deploying wireless sensor networks (WSNs) in public environments it may become necessary to secure their data storage and transmission against possible attacks such as node-compromise and eavesdropping. The nodes feature only small computational and energy resources, thus requiring efficient algorithms. As a solution for this problem the TinyPEDS approach was proposed in [7], which utilizes the Elliptic Curve ElGamal (EC-ElGamal) cryptosystem for additive homomorphic encryption allowing concealed data aggregation. This work presents an optimized implementation of EC-ElGamal on a MicaZ mote, which is a typical sensor node platform with 8-bit processor for WSNs. Compared to the best previous result, our implementation is at least 44% faster for fixed-point multiplication. Because most parts of the algorithm are similar to standard Elliptic Curve algorithms, the results may be reused in other realizations on constrained devices as well.
[ { "version": "v1", "created": "Mon, 23 Mar 2009 16:43:01 GMT" } ]
2009-03-24T00:00:00
[ [ "Ugus", "Osman", "" ], [ "Westhoff", "Dirk", "" ], [ "Laue", "Ralf", "" ], [ "Shoufan", "Abdulhadi", "" ], [ "Huss", "Sorin A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0903.3926
Andreas Meier
Martin Homik, Andreas Meier
Designing a GUI for Proofs - Evaluation of an HCI Experiment
null
null
null
SEKI Working-Paper SWP-2005-01
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Often user interfaces of theorem proving systems focus on assisting particularly trained and skilled users, i.e., proof experts. As a result, the systems are difficult to use for non-expert users. This paper describes a paper and pencil HCI experiment, in which (non-expert) students were asked to make suggestions for a GUI for an interactive system for mathematical proofs. They had to explain the usage of the GUI by applying it to construct a proof sketch for a given theorem. The evaluation of the experiment provides insights for the interaction design for non-expert users and the needs and wants of this user group.
[ { "version": "v1", "created": "Mon, 23 Mar 2009 18:38:01 GMT" } ]
2009-03-24T00:00:00
[ [ "Homik", "Martin", "" ], [ "Meier", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.3995
Jin Chu
Jinyu Chu, Ju Liu, Jianping Qiao, Xiaoling Wang and Yujun Li
Gradient-based adaptive interpolation in super-resolution image restoration
4pages, 7figures, This paper presents a super-resolution method based on gradient-based adaptive interpolation
null
null
null
cs.MM cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper presents a super-resolution method based on gradient-based adaptive interpolation. In this method, in addition to considering the distance between the interpolated pixel and the neighboring valid pixel, the interpolation coefficients take the local gradient of the original image into account. The smaller the local gradient of a pixel is, the more influence it should have on the interpolated pixel. And the interpolated high resolution image is finally deblurred by the application of wiener filter. Experimental results show that our proposed method not only substantially improves the subjective and objective quality of restored images, especially enhances edges, but also is robust to the registration error and has low computational complexity.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 01:33:15 GMT" } ]
2009-03-25T00:00:00
[ [ "Chu", "Jinyu", "" ], [ "Liu", "Ju", "" ], [ "Qiao", "Jianping", "" ], [ "Wang", "Xiaoling", "" ], [ "Li", "Yujun", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0903.4014
Jun Muramatsu
Jun Muramatsu and Shigeki Miyake
Construction of Codes for Wiretap Channel and Secret Key Agreement from Correlated Source Outputs by Using Sparse Matrices
A part of this paper is presented in part at 2009 IEEE Information Theory Workshop (ITW2009), Taormina, Italy, pp.105-109, 2009. This paper is submitted to IEEE Transactions on Information Theory. 34 pages
IEEE Transactions on Information Theory, vol. 58, no. 2, pp. 671-692, Feb. 2012
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to prove coding theorems for the wiretap channel coding problem and secret key agreement problem based on the the notion of a hash property for an ensemble of functions. These theorems imply that codes using sparse matrices can achieve the optimal rate. Furthermore, fixed-rate universal coding theorems for a wiretap channel and a secret key agreement are also proved.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 05:29:04 GMT" }, { "version": "v2", "created": "Fri, 9 Apr 2010 06:22:59 GMT" } ]
2012-05-22T00:00:00
[ [ "Muramatsu", "Jun", "" ], [ "Miyake", "Shigeki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4035
Iraklis Varlamis
A. Kritikopoulos, M. Sideri, I. Varlamis
BLOGRANK: Ranking Weblogs Based On Connectivity And Similarity Features
9 pages, in 2nd international workshop on Advanced architectures and algorithms for internet delivery and applications
Proceedings of the 2nd international Workshop on Advanced Architectures and Algorithms For internet Delivery and Applications (Pisa, Italy, October 10 - 10, 2006). AAA-IDEA '06
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large part of the hidden web resides in weblog servers. New content is produced in a daily basis and the work of traditional search engines turns to be insufficient due to the nature of weblogs. This work summarizes the structure of the blogosphere and highlights the special features of weblogs. In this paper we present a method for ranking weblogs based on the link graph and on several similarity characteristics between weblogs. First we create an enhanced graph of connected weblogs and add new types of edges and weights utilising many weblog features. Then, we assign a ranking to each weblog using our algorithm, BlogRank, which is a modified version of PageRank. For the validation of our method we run experiments on a weblog dataset, which we process and adapt to our search engine. (http://spiderwave.aueb.gr/Blogwave). The results suggest that the use of the enhanced graph and the BlogRank algorithm is preferred by the users.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 08:36:21 GMT" } ]
2009-03-25T00:00:00
[ [ "Kritikopoulos", "A.", "" ], [ "Sideri", "M.", "" ], [ "Varlamis", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0903.4036
Hassane Alla
Abbas Dideban, Hassane Alla (GIPSA-lab)
Feedback control logic synthesis for non safe Petri nets
null
13th IFAC Symposium on INFORMATION CONTROL PROBLEMS IN MANUFACTURING, Moscou : Russie (2009)
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of forbidden states of non safe Petri Net (PN) modelling discrete events systems. To prevent the forbidden states, it is possible to use conditions or predicates associated with transitions. Generally, there are many forbidden states, thus many complex conditions are associated with the transitions. A new idea for computing predicates in non safe Petri nets will be presented. Using this method, we can construct a maximally permissive controller if it exists.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 08:40:33 GMT" } ]
2009-03-25T00:00:00
[ [ "Dideban", "Abbas", "", "GIPSA-lab" ], [ "Alla", "Hassane", "", "GIPSA-lab" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4046
Baris Baykant Alagoz
B. Baykant Alagoz
Boolean Logic with Fault Tolerant Coding
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Error detectable and error correctable coding in Hamming space was researched to discover possible fault tolerant coding constellations, which can implement Boolean logic with fault tolerant property. Basic logic operators of the Boolean algebra were developed to apply fault tolerant coding in the logic circuits. It was shown that application of three-bit fault tolerant codes have provided the digital system skill of auto-recovery without need for designing additional-fault tolerance mechanisms.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 09:33:40 GMT" }, { "version": "v2", "created": "Tue, 7 Apr 2009 08:53:28 GMT" } ]
2009-04-07T00:00:00
[ [ "Alagoz", "B. Baykant", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.4053
Fortis Alexandra Ms.
Laura Stefan
The generating of Fractal Images Using MathCAD Program
10 pages, exposed on 2nd "European Conference on Computer Science and Applications" - XA2008, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 211 - 220
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the graphic representation in the z-plane of the first three iterations of the algorithm that generates the Sierpinski Gasket. It analyzes the influence of the f(z) map when we represent fractal images.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 10:10:37 GMT" } ]
2009-03-25T00:00:00
[ [ "Stefan", "Laura", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0903.4100
Shah Asaduzzaman
Shah Asaduzzaman, Muthucumaru Maheswaran
Decentralized Management of Bi-modal Network Resources in a Distributed Stream Processing Platform
17 pages, submitted to Journal of Parallel and Distributed Computing
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents resource management techniques for allocating communication and computational resources in a distributed stream processing platform. The platform is designed to exploit the synergy of two classes of network connections -- dedicated and opportunistic. Previous studies we conducted have demonstrated the benefits of such bi-modal resource organization that combines small pools of dedicated computers with a very large pool of opportunistic computing capacities of idle computers to serve high throughput computing applications. This paper extends the idea of bi-modal resource organization into the management of communication resources. Since distributed stream processing applications demand large volume of data transmission between processing sites at a consistent rate, adequate control over the network resources is important to assure a steady flow of processing. The system model used in this paper is a platform where stream processing servers at distributed sites are interconnected with a combination of dedicated and opportunistic communication links. Two pertinent resource allocation problems are analyzed in details and solved using decentralized algorithms. One is the mapping of the stream processing tasks on the processing and the communication resources. The other is the adaptive re-allocation of the opportunistic communication links due to the variations in their capacities. Overall optimization goal is higher task throughput and better utilization of the expensive dedicated links. The evaluation demonstrates that the algorithms are able to exploit the synergy of bi-modal communication links towards achieving the optimization goals.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 15:37:03 GMT" } ]
2009-03-25T00:00:00
[ [ "Asaduzzaman", "Shah", "" ], [ "Maheswaran", "Muthucumaru", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.4101
Evira Mayordomo
Elvira Mayordomo, Philippe Moser, Sylvain Perifel
Polylog space compression, pushdown compression, and Lempel-Ziv are incomparable
null
null
null
null
cs.CC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pressing need for efficient compression schemes for XML documents has recently been focused on stack computation, and in particular calls for a formulation of information-lossless stack or pushdown compressors that allows a formal analysis of their performance and a more ambitious use of the stack in XML compression, where so far it is mainly connected to parsing mechanisms. In this paper we introduce the model of pushdown compressor, based on pushdown transducers that compute a single injective function while keeping the widest generality regarding stack computation. We also consider online compression algorithms that use at most polylogarithmic space (plogon). These algorithms correspond to compressors in the data stream model. We compare the performance of these two families of compressors with each other and with the general purpose Lempel-Ziv algorithm. This comparison is made without any a priori assumption on the data's source and considering the asymptotic compression ratio for infinite sequences. We prove that in all cases they are incomparable.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 15:37:21 GMT" } ]
2009-03-25T00:00:00
[ [ "Mayordomo", "Elvira", "" ], [ "Moser", "Philippe", "" ], [ "Perifel", "Sylvain", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0903.4113
Shah Asaduzzaman
Shah Asaduzzaman, Gregor v. Bochmann
Overlay Structure for Large Scale Content Sharing: Leveraging Geography as the Basis for Routing Locality
5 pages, position paper
null
null
null
cs.NI cs.DC cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we place our arguments on two related issues in the design of generalized structured peer-to-peer overlays. First, we argue that for the large-scale content-sharing applications, lookup and content transport functions need to be treated separately. Second, to create a location-based routing overlay suitable for content sharing and other applications, we argue that off-the-shelf geographic coordinates of Internet-connected hosts can be used as a basis. We then outline the design principles and present a design for the generalized routing overlay based on adaptive hierarchical partitioning of the geographical space.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 16:16:26 GMT" } ]
2009-03-25T00:00:00
[ [ "Asaduzzaman", "Shah", "" ], [ "Bochmann", "Gregor v.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0903.4128
Rohit Aggarwal
Rohit Aggarwal, Philip Schniter, and C. Emre Koksal
Rate Adaptation via Link-Layer Feedback for Goodput Maximization over a Time-Varying Channel
25 pages, 9 figures, submitted to IEEE Transactions on Wireless Communications in August 2008 and revised in March 2009
null
null
null
cs.IT cs.NI math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider adapting the transmission rate to maximize the goodput, i.e., the amount of data transmitted without error, over a continuous Markov flat-fading wireless channel. In particular, we consider schemes in which transmitter channel state is inferred from degraded causal error-rate feedback, such as packet-level ACK/NAKs in an automatic repeat request (ARQ) system. In such schemes, the choice of transmission rate affects not only the subsequent goodput but also the subsequent feedback, implying that the optimal rate schedule is given by a partially observable Markov decision process (POMDP). Because solution of the POMDP is computationally impractical, we consider simple suboptimal greedy rate assignment and show that the optimal scheme would itself be greedy if the error-rate feedback was non-degraded. Furthermore, we show that greedy rate assignment using non-degraded feedback yields a total goodput that upper bounds that of optimal rate assignment using degraded feedback. We then detail the implementation of the greedy scheme and propose a reduced-complexity greedy scheme that adapts the transmission rate only once per block of packets. We also investigate the performance of the schemes numerically, and show that the proposed greedy scheme achieves steady-state goodputs that are reasonably close to the upper bound on goodput calculated using non-degraded feedback. A similar improvement is obtained in steady-state goodput, drop rate, and average buffer occupancy in the presence of data buffers. We also investigate an upper bound on the performance of optimal rate assignment for a discrete approximation of the channel and show that such quantization leads to a significant loss in achievable goodput.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 16:43:40 GMT" } ]
2009-03-25T00:00:00
[ [ "Aggarwal", "Rohit", "" ], [ "Schniter", "Philip", "" ], [ "Koksal", "C. Emre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0903.4130
Amr Elmasry
Amr Elmasry
Pairing Heaps with Costless Meld
10 pages, 2 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Improving the structure and analysis in \cite{elm0}, we give a variation of the pairing heaps that has amortized zero cost per meld (compared to an $O(\log \log{n})$ in \cite{elm0}) and the same amortized bounds for all other operations. More precisely, the new pairing heap requires: no cost per meld, O(1) per find-min and insert, $O(\log{n})$ per delete-min, and $O(\log\log{n})$ per decrease-key. These bounds are the best known for any self-adjusting heap, and match the lower bound proved by Fredman for a family of such heaps. Moreover, the changes we have done make our structure even simpler than that in \cite{elm0}.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 16:49:57 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2009 15:46:42 GMT" } ]
2009-04-09T00:00:00
[ [ "Elmasry", "Amr", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.4132
Bernat Corominas-Murtra BCM
Joaqu\'in Go\~ni, I\~nigo Martincorena, Bernat Corominas-Murtra, Gonzalo Arrondo, Sergio Ardanza-Trevijano, Pablo Villoslada
Switcher-random-walks: a cognitive-inspired mechanism for network exploration
9 pages, 3 figures. Accepted in "International Journal of Bifurcations and Chaos": Special issue on "Modelling and Computation on Complex Networks"
International Journal of Bifurcation and Chaos 20, 913-922 (2010)
10.1142/S0218127410026204
null
cs.AI cond-mat.dis-nn physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Semantic memory is the subsystem of human memory that stores knowledge of concepts or meanings, as opposed to life specific experiences. The organization of concepts within semantic memory can be understood as a semantic network, where the concepts (nodes) are associated (linked) to others depending on perceptions, similarities, etc. Lexical access is the complementary part of this system and allows the retrieval of such organized knowledge. While conceptual information is stored under certain underlying organization (and thus gives rise to a specific topology), it is crucial to have an accurate access to any of the information units, e.g. the concepts, for efficiently retrieving semantic information for real-time needings. An example of an information retrieval process occurs in verbal fluency tasks, and it is known to involve two different mechanisms: -clustering-, or generating words within a subcategory, and, when a subcategory is exhausted, -switching- to a new subcategory. We extended this approach to random-walking on a network (clustering) in combination to jumping (switching) to any node with certain probability and derived its analytical expression based on Markov chains. Results show that this dual mechanism contributes to optimize the exploration of different network models in terms of the mean first passage time. Additionally, this cognitive inspired dual mechanism opens a new framework to better understand and evaluate exploration, propagation and transport phenomena in other complex systems where switching-like phenomena are feasible.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 16:52:18 GMT" } ]
2010-06-18T00:00:00
[ [ "Goñi", "Joaquín", "" ], [ "Martincorena", "Iñigo", "" ], [ "Corominas-Murtra", "Bernat", "" ], [ "Arrondo", "Gonzalo", "" ], [ "Ardanza-Trevijano", "Sergio", "" ], [ "Villoslada", "Pablo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0903.4207
G David Forney Jr.
G. David Forney Jr
MacWilliams Identities for Codes on Graphs
5 pages, 2 figures; final version to be presented at IEEE Information Theory Workshop, Taormina, Sicily, Oct. 11-16, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MacWilliams identity for linear time-invariant convolutional codes that has recently been found by Gluesing-Luerssen and Schneider is proved concisely, and generalized to arbitrary group codes on graphs. A similar development yields a short, transparent proof of the dual sum-product update rule.
[ { "version": "v1", "created": "Tue, 24 Mar 2009 21:56:54 GMT" }, { "version": "v2", "created": "Tue, 4 Aug 2009 15:42:21 GMT" } ]
2009-08-04T00:00:00
[ [ "Forney", "G. David", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4217
John Langford
Alina Beygelzimer, John Langford, Yuri Lifshits, Gregory Sorkin, and Alex Strehl
Conditional Probability Tree Estimation Analysis and Algorithms
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of estimating the conditional probability of a label in time $O(\log n)$, where $n$ is the number of possible labels. We analyze a natural reduction of this problem to a set of binary regression problems organized in a tree structure, proving a regret bound that scales with the depth of the tree. Motivated by this analysis, we propose the first online algorithm which provably constructs a logarithmic depth tree on the set of labels to solve this problem. We test the algorithm empirically, showing that it works succesfully on a dataset with roughly $10^6$ labels.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 00:28:44 GMT" }, { "version": "v2", "created": "Wed, 3 Jun 2009 21:19:34 GMT" } ]
2009-06-04T00:00:00
[ [ "Beygelzimer", "Alina", "" ], [ "Langford", "John", "" ], [ "Lifshits", "Yuri", "" ], [ "Sorkin", "Gregory", "" ], [ "Strehl", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.4237
Joshua Brown Kramer
Josh Brown Kramer and Lucas Sabalka
Projection-Forcing Multisets of Weight Changes
11 Pages
Journal of Combinatorial Theory, Series A, 117(8): 1136-1142, 2010
10.1016/j.jcta.2010.01.005
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $F$ be a finite field. A multiset $S$ of integers is projection-forcing if for every linear function $\phi : F^n \to F^m$ whose multiset of weight changes is $S$, $\phi$ is a coordinate projection up to permutation and scaling of entries. The MacWilliams Extension Theorem from coding theory says that $S = \{0, 0, ..., 0\}$ is projection-forcing. We give a (super-polynomial) algorithm to determine whether or not a given $S$ is projection-forcing. We also give a condition that can be checked in polynomial time that implies that $S$ is projection-forcing. This result is a generalization of the MacWilliams Extension Theorem and work by the first author.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 05:10:36 GMT" }, { "version": "v2", "created": "Wed, 17 Feb 2010 20:40:27 GMT" } ]
2011-10-13T00:00:00
[ [ "Kramer", "Josh Brown", "" ], [ "Sabalka", "Lucas", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4251
Artur Ferreira
Artur Ferreira, Arlindo Oliveira, Mario Figueiredo
On the Use of Suffix Arrays for Memory-Efficient Lempel-Ziv Data Compression
10 pages, submited to IEEE - Data Compression Conference 2009
null
10.1109/DCC.2009.50
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Much research has been devoted to optimizing algorithms of the Lempel-Ziv (LZ) 77 family, both in terms of speed and memory requirements. Binary search trees and suffix trees (ST) are data structures that have been often used for this purpose, as they allow fast searches at the expense of memory usage. In recent years, there has been interest on suffix arrays (SA), due to their simplicity and low memory requirements. One key issue is that an SA can solve the sub-string problem almost as efficiently as an ST, using less memory. This paper proposes two new SA-based algorithms for LZ encoding, which require no modifications on the decoder side. Experimental results on standard benchmarks show that our algorithms, though not faster, use 3 to 5 times less memory than the ST counterparts. Another important feature of our SA-based algorithms is that the amount of memory is independent of the text to search, thus the memory that has to be allocated can be defined a priori. These features of low and predictable memory requirements are of the utmost importance in several scenarios, such as embedded systems, where memory is at a premium and speed is not critical. Finally, we point out that the new algorithms are general, in the sense that they are adequate for applications other than LZ compression, such as text retrieval and forward/backward sub-string search.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 19:25:24 GMT" } ]
2016-11-17T00:00:00
[ [ "Ferreira", "Artur", "" ], [ "Oliveira", "Arlindo", "" ], [ "Figueiredo", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.4258
Martin Burkhart
Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos
SEPIA: Security through Private Information Aggregation
null
null
null
TIK-Report No. 298
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that are practical in terms of computation and communication cost is still a major challenge. In this paper, we investigate the practical usefulness of MPC for multi-domain network security and monitoring. We first optimize MPC comparison operations for processing high volume data in near real-time. We then design privacy-preserving protocols for event correlation and aggregation of network traffic statistics, such as addition of volume metrics, computation of feature entropy, and distinct item count. Optimizing performance of parallel invocations, we implement our protocols along with a complete set of basic operations in a library called SEPIA. We evaluate the running time and bandwidth requirements of our protocols in realistic settings on a local cluster as well as on PlanetLab and show that they work in near real-time for up to 140 input providers and 9 computation nodes. Compared to implementations using existing general-purpose MPC frameworks, our protocols are significantly faster, requiring, for example, 3 minutes for a task that takes 2 days with general-purpose frameworks. This improvement paves the way for new applications of MPC in the area of networking. Finally, we run SEPIA's protocols on real traffic traces of 17 networks and show how they provide new possibilities for distributed troubleshooting and early anomaly detection.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 08:23:07 GMT" }, { "version": "v2", "created": "Wed, 13 May 2009 08:07:39 GMT" }, { "version": "v3", "created": "Fri, 2 Oct 2009 12:55:49 GMT" }, { "version": "v4", "created": "Tue, 16 Feb 2010 16:10:46 GMT" } ]
2010-02-16T00:00:00
[ [ "Burkhart", "Martin", "" ], [ "Strasser", "Mario", "" ], [ "Many", "Dilip", "" ], [ "Dimitropoulos", "Xenofontas", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0903.4261
Florentina Pintea
Florentina Anica Pintea
On-Line Tests
8 pages, exposed on 4th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 77-84
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an interactive implementation which makes the link between a human operator and a system of a administration of a relational databases MySQL. This application conceived as a multimedia presentations is illustrative for the way in which the transfer and the remaking of the information between the human operator, the module of data processing and the database which stores the informations can be solved (with help of the PHP language and the web use).
[ { "version": "v1", "created": "Wed, 25 Mar 2009 08:43:19 GMT" } ]
2009-03-26T00:00:00
[ [ "Pintea", "Florentina Anica", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0903.4266
Martin Burkhart
Martin Burkhart, Daniela Brauckhoff, Martin May, Elisa Boschi
The Risk-Utility Tradeoff for IP Address Truncation
null
1st ACM Workshop on Network Data Anonymization (NDA), Fairfax, Virginia, USA, October, 2008
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generalizing the latest results in network and security research. Anonymization is a possible solution in this context; however, it is unclear how the sanitization of data preserves characteristics important for traffic analysis. In addition, the privacy-preserving property of state-of-the-art IP address anonymization techniques has come into question by recent attacks that successfully identified a large number of hosts in anonymized traces. In this paper, we examine the tradeoff between data utility for anomaly detection and the risk of host identification for IP address truncation. Specifically, we analyze three weeks of unsampled and non-anonymized network traces from a medium-sized backbone network to assess data utility. The risk of de-anonymizing individual IP addresses is formally evaluated, using a metric based on conditional entropy. Our results indicate that truncation effectively prevents host identification but degrades the utility of data for anomaly detection. However, the degree of degradation depends on the metric used and whether network-internal or external addresses are considered. Entropy metrics are more resistant to truncation than unique counts and the detection quality of anomalies degrades much faster in internal addresses than in external addresses. In particular, the usefulness of internal address counts is lost even for truncation of only 4 bits whereas utility of external address entropy is virtually unchanged even for truncation of 20 bits.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 09:06:32 GMT" } ]
2009-03-26T00:00:00
[ [ "Burkhart", "Martin", "" ], [ "Brauckhoff", "Daniela", "" ], [ "May", "Martin", "" ], [ "Boschi", "Elisa", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.4267
Florentina Pintea
Ioan Despi, Lucian Luca
Delving into Transition to the Semantic Web
10 pages, exposed on 4th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 7-16
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The semantic technologies pose new challenge for the way in which we built and operate systems. They are tools used to represent significances, associations, theories, separated from data and code. Their goal is to create, to discover, to represent, to organize, to process, to manage, to ratiocinate, to represent, to share and use the significances and knowledge to fulfill the business, personal or social goals.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 09:14:39 GMT" } ]
2009-03-26T00:00:00
[ [ "Despi", "Ioan", "" ], [ "Luca", "Lucian", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0903.4270
Florentina Pintea
Alexandra Emilia Fortis
Analysis of some properties for a basic Petri net model
8 pages, exposed on 4th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 17-24
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The formalism of the models with Petri networks provides a sound theoretical base, supported by powerful mathematical methods able to extract information necessary for the formalism and simulation of the real system that provides features of competition and synchronization. The paper presents a model based on a Petri net, in order to extract information relative to the technological producing process of a food additive.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 09:29:27 GMT" } ]
2009-03-26T00:00:00
[ [ "Fortis", "Alexandra Emilia", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.4283
Florentina Pintea
Timur Chis
Pipeline Leak Detection Techniques
10 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 25-34
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Leak detection systems range from simple, visual line walking and checking ones to complex arrangements of hard-ware and software. No one method is universally applicable and operating requirements dictate which method is the most cost effective. The aim of the paper is to review the basic techniques of leak detection that are currently in use. The advantages and disadvantages of each method are discussed and some indications of applicability are outlined.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 09:57:38 GMT" } ]
2009-03-26T00:00:00
[ [ "Chis", "Timur", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.4286
Florentina Pintea
Timur Chis
Computer Systems to Oil Pipeline Transporting
10 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 35-44
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer systems in the pipeline oil transporting that the greatest amount of data can be gathered, analyzed and acted upon in the shortest amount of time. Most operators now have some form of computer based monitoring system employing either commercially available or custom developed software to run the system. This paper presented the SCADA systems to oil pipeline in concordance to the Romanian environmental reglementations.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 10:09:18 GMT" } ]
2009-03-26T00:00:00
[ [ "Chis", "Timur", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.4293
Florentina Pintea
Petre Bucur, Lucian Luca
Non linear system become linear system
8 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 55-62
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper refers to the theory and the practice of the systems regarding non-linear systems and their applications. We aimed the integration of these systems to elaborate their response as well as to highlight some outstanding features.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 10:40:25 GMT" } ]
2009-03-26T00:00:00
[ [ "Bucur", "Petre", "" ], [ "Luca", "Lucian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.4298
Florentina Pintea
Mihai Timis
Design of Log-Map / Max-Log-Map Decoder
8 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 63-70
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The process of turbo-code decoding starts with the formation of a posteriori probabilities (APPs) for each data bit, which is followed by choosing the data-bit value that corresponds to the maximum a posteriori (MAP) probability for that data bit. Upon reception of a corrupted code-bit sequence, the process of decision making with APPs allows the MAP algorithm to determine the most likely information bit to have been transmitted at each bit time.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 11:12:42 GMT" } ]
2009-03-26T00:00:00
[ [ "Timis", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4299
Florentina Pintea
Virgiliu Streian, Adela Ionescu
Token Ring Project
6 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 85-90
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ring topology is a simple configuration used to connect processes that communicate among themselves. A number of network standards such as token ring, token bus, and FDDI are based on the ring connectivity. This article will develop an implementation of a ring of processes that communicate among themselves via pipe links. The processes are nodes in the ring. Each process reads from its standard input and writes in its standard output. N-1 process redirects the its standard output to a standard input of the process through a pipe. When the ring-structure is designed, the project can be extended to simulate networks or to implement algorithms for mutual exclusion.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 11:19:56 GMT" } ]
2009-03-26T00:00:00
[ [ "Streian", "Virgiliu", "" ], [ "Ionescu", "Adela", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.4302
Florentina Pintea
Daniela Ilea, Dan L. Lacrama
ShopList: Programming PDA applications for Windows Mobile using C#
8 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 91-98
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is focused on a C# and Sql Server Mobile 2005 application to keep evidence of a shop list. The purpose of the application is to offer to the user an easier way to manage his shopping options.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 11:26:50 GMT" } ]
2009-03-26T00:00:00
[ [ "Ilea", "Daniela", "" ], [ "Lacrama", "Dan L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0903.4305
Florentina Pintea
Diana Sophia Codat
Evaluation d'une requete en SQL
6 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 99-104
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objective of this paper is to show how the interrogation processor responds to SQL interrogation. The interrogation processor is split into two parts. The first, called the interrogation compiler translates an SQL query into a plan of physical execution. The second, called evaluation query runs the execution plan.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 11:39:31 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2009 14:55:54 GMT" } ]
2009-06-22T00:00:00
[ [ "Codat", "Diana Sophia", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0903.4307
Florentina Pintea
Simona Apostol
FISLAB - the Fuzzy Inference Tool-box for SCILAB
null
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 105-114
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present study represents "The Fislab package of programs meant to develop the fuzzy regulators in the Scilab environment" in which we present some general issues, usage requirements and the working mode of the Fislab environment. In the second part of the article some features of the Scilab functions from the Fislab package are described.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 11:42:46 GMT" } ]
2009-03-26T00:00:00
[ [ "Apostol", "Simona", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0903.4313
Florentina Pintea
Simona Apostol
The development of a fuzzy regulator with an entry and an output in Fislab
6 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 115-120
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present article is a sequel of the article "Fislab the Fuzzy Inference Tool-Box for Scilab" and it represents the practical application of:"The development of the Fuzzy regulator with an input and an output in Fislab". The article contains, besides this application, some functions to be used in the program, namely Scilab functions for the fuzzification of the firm information, functions for the operation of de-fuzzification and functions for the implementation of.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 12:10:32 GMT" } ]
2009-03-26T00:00:00
[ [ "Apostol", "Simona", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0903.4314
Florentina Pintea
Dan L. Lacrama, Dorina Fera
Virtual Reality
8 pages, exposed on 4th International Conferences "Actualities and Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 137-144
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is focused on the presentation of Virtual Reality principles together with the main implementation methods and techniques. An overview of the main development directions is included.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 12:16:29 GMT" } ]
2009-03-26T00:00:00
[ [ "Lacrama", "Dan L.", "" ], [ "Fera", "Dorina", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0903.4358
Mohammad Torabi Dashti
M. Torabi Dashti
Sums of powers via integration
4 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sum of powers 1^p+...+n^p, with n and p being natural numbers and n>=1, can be expressed as a polynomial function of n of degree p+1. Such representations are often called Faulhaber formulae. A simple recursive algorithm for computing coefficients of Faulhaber formulae is presented. The correctness of the algorithm is proved by giving a recurrence relation on Faulhaber formulae.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 14:36:48 GMT" } ]
2009-03-26T00:00:00
[ [ "Dashti", "M. Torabi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.4365
Shah Asaduzzaman
Shah Asaduzzaman, Ying Qiao, Gregor v. Bochmann
CliqueStream: an efficient and fault-resilient live streaming network on a clustered peer-to-peer overlay
10 pages
Proc. 8th IEEE Intl. Conf. on Peer-to-Peer Computing (P2P'08), Sep. 2008, Aachen, Germany
10.1109/P2P.2008.35
null
cs.NI cs.DC cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several overlay-based live multimedia streaming platforms have been proposed in the recent peer-to-peer streaming literature. In most of the cases, the overlay neighbors are chosen randomly for robustness of the overlay. However, this causes nodes that are distant in terms of proximity in the underlying physical network to become neighbors, and thus data travels unnecessary distances before reaching the destination. For efficiency of bulk data transmission like multimedia streaming, the overlay neighborhood should resemble the proximity in the underlying network. In this paper, we exploit the proximity and redundancy properties of a recently proposed clique-based clustered overlay network, named eQuus, to build efficient as well as robust overlays for multimedia stream dissemination. To combine the efficiency of content pushing over tree structured overlays and the robustness of data-driven mesh overlays, higher capacity stable nodes are organized in tree structure to carry the long haul traffic and less stable nodes with intermittent presence are organized in localized meshes. The overlay construction and fault-recovery procedures are explained in details. Simulation study demonstrates the good locality properties of the platform. The outage time and control overhead induced by the failure recovery mechanism are minimal as demonstrated by the analysis.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 15:58:47 GMT" }, { "version": "v2", "created": "Thu, 26 Mar 2009 22:41:42 GMT" } ]
2016-11-17T00:00:00
[ [ "Asaduzzaman", "Shah", "" ], [ "Qiao", "Ying", "" ], [ "Bochmann", "Gregor v.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0903.4366
Dimitri Hendriks
Joerg Endrullis, Clemens Grabmayer, Dimitri Hendriks
Complexity of Fractran and Productivity
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In functional programming languages the use of infinite structures is common practice. For total correctness of programs dealing with infinite structures one must guarantee that every finite part of the result can be evaluated in finitely many steps. This is known as productivity. For programming with infinite structures, productivity is what termination in well-defined results is for programming with finite structures. Fractran is a simple Turing-complete programming language invented by Conway. We prove that the question whether a Fractran program halts on all positive integers is Pi^0_2-complete. In functional programming, productivity typically is a property of individual terms with respect to the inbuilt evaluation strategy. By encoding Fractran programs as specifications of infinite lists, we establish that this notion of productivity is Pi^0_2-complete even for the most simple specifications. Therefore it is harder than termination of individual terms. In addition, we explore possible generalisations of the notion of productivity in the framework of term rewriting, and prove that their computational complexity is Pi^1_1-complete, thus exceeding the expressive power of first-order logic.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 15:14:00 GMT" }, { "version": "v2", "created": "Thu, 4 Jun 2009 10:05:41 GMT" }, { "version": "v3", "created": "Fri, 31 Jul 2009 18:33:42 GMT" } ]
2009-07-31T00:00:00
[ [ "Endrullis", "Joerg", "" ], [ "Grabmayer", "Clemens", "" ], [ "Hendriks", "Dimitri", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.4378
Shah Asaduzzaman
Shah Asaduzzaman, Muthucumaru Maheswaran
Using Dedicated and Opportunistic Networks in Synergy for a Cost-effective Distributed Stream Processing Platform
9 pages
Proc. 14th IEEE Intl. Conf. on Parallel and Distributed Systems (ICPADS), Dec. 2008, Melbourne, Australia
10.1109/ICPADS.2008.116
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a case for exploiting the synergy of dedicated and opportunistic network resources in a distributed hosting platform for data stream processing applications. Our previous studies have demonstrated the benefits of combining dedicated reliable resources with opportunistic resources in case of high-throughput computing applications, where timely allocation of the processing units is the primary concern. Since distributed stream processing applications demand large volume of data transmission between the processing sites at a consistent rate, adequate control over the network resources is important here to assure a steady flow of processing. In this paper, we propose a system model for the hybrid hosting platform where stream processing servers installed at distributed sites are interconnected with a combination of dedicated links and public Internet. Decentralized algorithms have been developed for allocation of the two classes of network resources among the competing tasks with an objective towards higher task throughput and better utilization of expensive dedicated resources. Results from extensive simulation study show that with proper management, systems exploiting the synergy of dedicated and opportunistic resources yield considerably higher task throughput and thus, higher return on investment over the systems solely using expensive dedicated resources.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 16:01:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Asaduzzaman", "Shah", "" ], [ "Maheswaran", "Muthucumaru", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.4382
Amir Ben-Amram
Amir M. Ben-Amram and Chin Soon Lee
Ranking Functions for Size-Change Termination II
29 pages;
Logical Methods in Computer Science, Volume 5, Issue 2 (May 25, 2009) lmcs:1000
10.2168/LMCS-5(2:8)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Size-Change Termination is an increasingly-popular technique for verifying program termination. These termination proofs are deduced from an abstract representation of the program in the form of "size-change graphs". We present algorithms that, for certain classes of size-change graphs, deduce a global ranking function: an expression that ranks program states, and decreases on every transition. A ranking function serves as a witness for a termination proof, and is therefore interesting for program certification. The particular form of the ranking expressions that represent SCT termination proofs sheds light on the scope of the proof method. The complexity of the expressions is also interesting, both practicaly and theoretically. While deducing ranking functions from size-change graphs has already been shown possible, the constructions in this paper are simpler and more transparent than previously known. They improve the upper bound on the size of the ranking expression from triply exponential down to singly exponential (for certain classes of instances). We claim that this result is, in some sense, optimal. To this end, we introduce a framework for lower bounds on the complexity of ranking expressions and prove exponential lower bounds.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 17:47:30 GMT" }, { "version": "v2", "created": "Wed, 6 May 2009 10:51:36 GMT" }, { "version": "v3", "created": "Mon, 11 May 2009 12:05:58 GMT" }, { "version": "v4", "created": "Mon, 25 May 2009 11:29:03 GMT" } ]
2015-07-01T00:00:00
[ [ "Ben-Amram", "Amir M.", "" ], [ "Lee", "Chin Soon", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0903.4386
Bari\c{s} Nakibo\u{g}lu
Baris Nakiboglu and Lizhong Zheng
Error-and-Erasure Decoding for Block Codes with Feedback
33 pages, 1 figures
IEEE Transactions on Information Theory, 58(1):24-49, Jan 2012
10.1109/TIT.2011.2169529 10.1109/ISIT.2008.4595079
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inner and outer bounds are derived on the optimal performance of fixed length block codes on discrete memoryless channels with feedback and errors-and-erasures decoding. First an inner bound is derived using a two phase encoding scheme with communication and control phases together with the optimal decoding rule for the given encoding scheme, among decoding rules that can be represented in terms of pairwise comparisons between the messages. Then an outer bound is derived using a generalization of the straight-line bound to errors-and-erasures decoders and the optimal error exponent trade off of a feedback encoder with two messages. In addition upper and lower bounds are derived, for the optimal erasure exponent of error free block codes in terms of the rate. Finally we present a proof of the fact that the optimal trade off between error exponents of a two message code does not increase with feedback on DMCs.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 16:27:37 GMT" }, { "version": "v2", "created": "Fri, 13 Aug 2010 23:19:47 GMT" }, { "version": "v3", "created": "Mon, 11 Oct 2010 17:33:37 GMT" }, { "version": "v4", "created": "Thu, 1 Sep 2011 23:53:54 GMT" } ]
2020-01-03T00:00:00
[ [ "Nakiboglu", "Baris", "" ], [ "Zheng", "Lizhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4392
Shah Asaduzzaman
Shah Asaduzzaman, Muthucumaru Maheswaran
Towards a decentralized algorithm for mapping network and computational resources for distributed data-flow computations
7 pages
Proc. 21st IEEE Intl. Symp. on High Performance Computing Systems and Applications (HPCS), May 2007, Saskatoon, SK, Canada
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several high-throughput distributed data-processing applications require multi-hop processing of streams of data. These applications include continual processing on data streams originating from a network of sensors, composing a multimedia stream through embedding several component streams originating from different locations, etc. These data-flow computing applications require multiple processing nodes interconnected according to the data-flow topology of the application, for on-stream processing of the data. Since the applications usually sustain for a long period, it is important to optimally map the component computations and communications on the nodes and links in the network, fulfilling the capacity constraints and optimizing some quality metric such as end-to-end latency. The mapping problem is unfortunately NP-complete and heuristics have been previously proposed to compute the approximate solution in a centralized way. However, because of the dynamicity of the network, it is practically impossible to aggregate the correct state of the whole network in a single node. In this paper, we present a distributed algorithm for optimal mapping of the components of the data flow applications. We propose several heuristics to minimize the message complexity of the algorithm while maintaining the quality of the solution.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 16:32:22 GMT" } ]
2009-03-26T00:00:00
[ [ "Asaduzzaman", "Shah", "" ], [ "Maheswaran", "Muthucumaru", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0903.4426
Daniel Lucani
Daniel E. Lucani, Muriel M\'edard, Milica Stojanovic
Capacity Scaling Laws for Underwater Networks
5 pages, 2 figures, to Appear in Proceedings of Asilomar Conference on Signals, Systems, and Computers, 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The underwater acoustic channel is characterized by a path loss that depends not only on the transmission distance, but also on the signal frequency. Signals transmitted from one user to another over a distance $l$ are subject to a power loss of $l^{-\alpha}{a(f)}^{-l}$. Although a terrestrial radio channel can be modeled similarly, the underwater acoustic channel has different characteristics. The spreading factor $\alpha$, related to the geometry of propagation, has values in the range $1 \leq \alpha \leq 2$. The absorption coefficient $a(f)$ is a rapidly increasing function of frequency: it is three orders of magnitude greater at 100 kHz than at a few Hz. Existing results for capacity of wireless networks correspond to scenarios for which $a(f) = 1$, or a constant greater than one, and $\alpha \geq 2$. These results cannot be applied to underwater acoustic networks in which the attenuation varies over the system bandwidth. We use a water-filling argument to assess the minimum transmission power and optimum transmission band as functions of the link distance and desired data rate, and study the capacity scaling laws under this model.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 19:08:51 GMT" } ]
2009-03-26T00:00:00
[ [ "Lucani", "Daniel E.", "" ], [ "Médard", "Muriel", "" ], [ "Stojanovic", "Milica", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4434
Daniel Lucani
Daniel E. Lucani, Muriel M\'edard, Milica Stojanovic
Random Linear Network Coding for Time-Division Duplexing: Queueing Analysis
5 pages, 5 figures, 2 tables, Submitted to ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the performance of random linear network coding for time division duplexing channels with Poisson arrivals. We model the system as a bulk-service queue with variable bulk size. A full characterization for random linear network coding is provided for time division duplexing channels [1] by means of the moment generating function. We present numerical results for the mean number of packets in the queue and consider the effect of the range of allowable bulk sizes. We show that there exists an optimal choice of this range that minimizes the mean number of data packets in the queue.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 19:20:55 GMT" } ]
2009-03-26T00:00:00
[ [ "Lucani", "Daniel E.", "" ], [ "Médard", "Muriel", "" ], [ "Stojanovic", "Milica", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4435
Oleg Shcherbina
O. Shcherbina
Tree decomposition and postoptimality analysis in discrete optimization
19 pages, 5 fugures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many real discrete optimization problems (DOPs) are $NP$-hard and contain a huge number of variables and/or constraints that make the models intractable for currently available solvers. Large DOPs can be solved due to their special tructure using decomposition approaches. An important example of decomposition approaches is tree decomposition with local decomposition algorithms using the special block matrix structure of constraints which can exploit sparsity in the interaction graph of a discrete optimization problem. In this paper, discrete optimization problems with a tree structural graph are solved by local decomposition algorithms. Local decomposition algorithms generate a family of related DO problems which have the same structure but differ in the right-hand sides. Due to this fact, postoptimality techniques in DO are applied.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 21:25:11 GMT" } ]
2009-03-26T00:00:00
[ [ "Shcherbina", "O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.4443
Daniel Lucani
Daniel E. Lucani, Muriel M\'edard, Milica Stojanovic
Broadcasting in Time-Division Duplexing: A Random Linear Network Coding Approach
6 pages, 5 figures, Submitted to Workshop on Network Coding, Theory, and Applications (NetCod 2009)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study random linear network coding for broadcasting in time division duplexing channels. We assume a packet erasure channel with nodes that cannot transmit and receive information simultaneously. The sender transmits coded data packets back-to-back before stopping to wait for the receivers to acknowledge the number of degrees of freedom, if any, that are required to decode correctly the information. We study the mean time to complete the transmission of a block of packets to all receivers. We also present a bound on the number of stops to wait for acknowledgement in order to complete transmission with probability at least $1-\epsilon$, for any $\epsilon>0$. We present analysis and numerical results showing that our scheme outperforms optimal scheduling policies for broadcast, in terms of the mean completion time. We provide a simple heuristic to compute the number of coded packets to be sent before stopping that achieves close to optimal performance with the advantage of a considerable reduction in the search time.
[ { "version": "v1", "created": "Wed, 25 Mar 2009 19:41:21 GMT" } ]
2009-03-26T00:00:00
[ [ "Lucani", "Daniel E.", "" ], [ "Médard", "Muriel", "" ], [ "Stojanovic", "Milica", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4510
Kunal Talwar
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaron Roth and Kunal Talwar
Differentially Private Combinatorial Optimization
28 pages
null
null
null
cs.DS cs.CR cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the following problem: given a metric space, some of whose points are "clients", open a set of at most $k$ facilities to minimize the average distance from the clients to these facilities. This is just the well-studied $k$-median problem, for which many approximation algorithms and hardness results are known. Note that the objective function encourages opening facilities in areas where there are many clients, and given a solution, it is often possible to get a good idea of where the clients are located. However, this poses the following quandary: what if the identity of the clients is sensitive information that we would like to keep private? Is it even possible to design good algorithms for this problem that preserve the privacy of the clients? In this paper, we initiate a systematic study of algorithms for discrete optimization problems in the framework of differential privacy (which formalizes the idea of protecting the privacy of individual input elements). We show that many such problems indeed have good approximation algorithms that preserve differential privacy; this is even in cases where it is impossible to preserve cryptographic definitions of privacy while computing any non-trivial approximation to even the_value_ of an optimal solution, let alone the entire solution. Apart from the $k$-median problem, we study the problems of vertex and set cover, min-cut, facility location, Steiner tree, and the recently introduced submodular maximization problem, "Combinatorial Public Projects" (CPP).
[ { "version": "v1", "created": "Thu, 26 Mar 2009 05:08:46 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 01:19:22 GMT" } ]
2009-11-11T00:00:00
[ [ "Gupta", "Anupam", "" ], [ "Ligett", "Katrina", "" ], [ "McSherry", "Frank", "" ], [ "Roth", "Aaron", "" ], [ "Talwar", "Kunal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0903.4513
Elena Wishnevskaya S.
Elena S. Vishnevskaya
Building the information kernel and the problem of recognition
This paper has been withdrawn by the author
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At this point in time there is a need for a new representation of different information, to identify and organize descending its characteristics. Today, science is a powerful tool for the description of reality - the numbers. Why the most important property of numbers. Suppose we have a number 0.2351734, it is clear that the figures are there in order of importance. If necessary, we can round the number up to some value, eg 0.235. Arguably, the 0,235 - the most important information of 0.2351734. Thus, we can reduce the size of numbers is not losing much with the accuracy. Clearly, if learning to provide a graphical or audio information kernel, we can provide the most relevant information, discarding the rest. Introduction of various kinds of information in an information kernel, is an important task, to solve many problems in artificial intelligence and information theory.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 10:05:29 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2009 09:48:51 GMT" }, { "version": "v3", "created": "Tue, 14 Apr 2009 13:26:01 GMT" }, { "version": "v4", "created": "Wed, 15 Apr 2009 06:37:09 GMT" }, { "version": "v5", "created": "Mon, 16 May 2011 08:12:10 GMT" }, { "version": "v6", "created": "Wed, 12 Oct 2011 03:02:51 GMT" }, { "version": "v7", "created": "Thu, 13 Oct 2011 08:13:25 GMT" } ]
2011-10-14T00:00:00
[ [ "Vishnevskaya", "Elena S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0903.4521
Geevarghese Philip
Geevarghese Philip, Venkatesh Raman, Somnath Sikdar
Solving Dominating Set in Larger Classes of Graphs: FPT Algorithms and Polynomial Kernels
12 pages, 1 figure, 1 table
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the k-Dominating Set problem is fixed parameter tractable (FPT) and has a polynomial kernel for any class of graphs that exclude K_{i,j} as a subgraph, for any fixed i, j >= 1. This strictly includes every class of graphs for which this problem has been previously shown to have FPT algorithms and/or polynomial kernels. In particular, our result implies that the problem restricted to bounded- degenerate graphs has a polynomial kernel, solving an open problem posed by Alon and Gutner.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 06:23:58 GMT" }, { "version": "v2", "created": "Sun, 29 Mar 2009 13:41:18 GMT" }, { "version": "v3", "created": "Fri, 15 May 2009 07:33:23 GMT" } ]
2009-05-15T00:00:00
[ [ "Philip", "Geevarghese", "" ], [ "Raman", "Venkatesh", "" ], [ "Sikdar", "Somnath", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.4526
Chinmay Vaze
Chinmay S. Vaze and Mahesh K. Varanasi
On the Achievable Rate of the Fading Dirty Paper Channel with Imperfect CSIT
Presented at the 43rd Annual Conference on Information Sciences and Systems, John Hopkins University, March 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of dirty paper coding (DPC) over the (multi-antenna) fading dirty paper channel (FDPC) Y = H(X + S) + Z is considered when there is imperfect knowledge of the channel state information H at the transmitter (CSIT). The case of FDPC with positive definite (p.d.) input covariance matrix was studied by the authors in a recent paper, and here the more general case of positive semi-definite (p.s.d.) input covariance is dealt with. Towards this end, the choice of auxiliary random variable is modified. The algorithms for determination of inflation factor proposed in the p.d. case are then generalized to the case of p.s.d. input covariance. Subsequently, the largest DPC-achievable high-SNR (signal-to-noise ratio) scaling factor over the no-CSIT FDPC with p.s.d. input covariance matrix is derived. This scaling factor is seen to be a non-trivial generalization of the one achieved for the p.d. case. Next, in the limit of low SNR, it is proved that the choice of all-zero inflation factor (thus treating interference as noise) is optimal in the 'ratio' sense, regardless of the covariance matrix used. Further, in the p.d. covariance case, the inflation factor optimal at high SNR is obtained when the number of transmit antennas is greater than the number of receive antennas, with the other case having been already considered in the earlier paper. Finally, the problem of joint optimization of the input covariance matrix and the inflation factor is dealt with, and an iterative numerical algorithm is developed.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 07:55:12 GMT" } ]
2009-03-27T00:00:00
[ [ "Vaze", "Chinmay S.", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4527
Yusuke Watanabe
Yusuke Watanabe, Kenji Fukumizu
Graph polynomials and approximation of partition functions with Loopy Belief Propagation
7 pages. The 9th conference of Japanese Society for Artificial Intelligence, Special Interest Group on Data Mining and Statistical Mathematics (JSAI SIG-DMSM) in Kyoto 2009, March 3,4 Minor typos corrected
null
null
null
cs.DM cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Bethe approximation, or loopy belief propagation algorithm is a successful method for approximating partition functions of probabilistic models associated with a graph. Chertkov and Chernyak derived an interesting formula called Loop Series Expansion, which is an expansion of the partition function. The main term of the series is the Bethe approximation while other terms are labeled by subgraphs called generalized loops. In our recent paper, we derive the loop series expansion in form of a polynomial with coefficients positive integers, and extend the result to the expansion of marginals. In this paper, we give more clear derivation for the results and discuss the properties of the polynomial which is introduced in the paper.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 08:32:33 GMT" }, { "version": "v2", "created": "Sat, 14 Nov 2009 05:41:45 GMT" } ]
2009-11-14T00:00:00
[ [ "Watanabe", "Yusuke", "" ], [ "Fukumizu", "Kenji", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0903.4530
Lek-Heng Lim
Lek-Heng Lim, Pierre Comon
Nonnegative approximations of nonnegative tensors
14 pages
null
null
null
cs.NA cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the decomposition of a nonnegative tensor into a minimal sum of outer product of nonnegative vectors and the associated parsimonious naive Bayes probabilistic model. We show that the corresponding approximation problem, which is central to nonnegative PARAFAC, will always have optimal solutions. The result holds for any choice of norms and, under a mild assumption, even Bregman divergences.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 08:39:45 GMT" }, { "version": "v2", "created": "Sun, 12 Apr 2009 05:12:19 GMT" } ]
2009-04-12T00:00:00
[ [ "Lim", "Lek-Heng", "" ], [ "Comon", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0903.4545
Jocelyne Troccaz
Jocelyne Troccaz (TIMC)
Computer- and robot-assisted Medical Intervention
Handbook of Automation, Shimon Nof (Ed.) (2009) 000-000
Handbook of Automation, Shimon Nof (Ed.) (2009) 1451-1466
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Medical robotics includes assistive devices used by the physician in order to make his/her diagnostic or therapeutic practices easier and more efficient. This chapter focuses on such systems. It introduces the general field of Computer-Assisted Medical Interventions, its aims, its different components and describes the place of robots in that context. The evolutions in terms of general design and control paradigms in the development of medical robots are presented and issues specific to that application domain are discussed. A view of existing systems, on-going developments and future trends is given. A case-study is detailed. Other types of robotic help in the medical environment (such as for assisting a handicapped person, for rehabilitation of a patient or for replacement of some damaged/suppressed limbs or organs) are out of the scope of this chapter.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 10:36:02 GMT" } ]
2009-08-25T00:00:00
[ [ "Troccaz", "Jocelyne", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0903.4554
Mikko Malinen
Mikko Malinen
Fountain Codes and Invertible Matrices
3 pages, 2 figures, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with Fountain codes, and especially with their encoding matrices, which are required here to be invertible. A result is stated that an encoding matrix induces a permutation. Also, a result is that encoding matrices form a group with multiplication operation. An encoding is a transformation, which reduces the entropy of an initially high-entropy input vector. A special encoding matrix, with which the entropy reduction is more effective than with matrices created by the Ideal Soliton distribution is formed. Experimental results with entropy reduction are shown.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 11:15:05 GMT" } ]
2009-03-27T00:00:00
[ [ "Malinen", "Mikko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4582
Xiao Juan Zhang
Xiao Juan Zhang and Yi Gong
On the Achievable Diversity-Multiplexing Tradeoff in MIMO Fading Channels with Imperfect CSIT
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze the fundamental tradeoff of diversity and multiplexing in multi-input multi-output (MIMO) channels with imperfect channel state information at the transmitter (CSIT). We show that with imperfect CSIT, a higher diversity gain as well as a more efficient diversity-multiplexing tradeoff (DMT) can be achieved. In the case of multi-input single-output (MISO)/single-input multi-output (SIMO) channels with K transmit/receive antennas, one can achieve a diversity gain of d(r)=K(1-r+K\alpha) at spatial multiplexing gain r, where \alpha is the CSIT quality defined in this paper. For general MIMO channels with M (M>1) transmit and N (N>1) receive antennas, we show that depending on the value of \alpha, different DMT can be derived and the value of \alpha has a great impact on the achievable diversity, especially at high multiplexing gains. Specifically, when \alpha is above a certain threshold, one can achieve a diversity gain of d(r)=MN(1+MN\alpha)-(M+N-1)r; otherwise, the achievable DMT is much lower and can be described as a collection of discontinuous line segments depending on M, N, r and \alpha. Our analysis reveals that imperfect CSIT significantly improves the achievable diversity gain while enjoying high spatial multiplexing gains.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 13:42:09 GMT" }, { "version": "v2", "created": "Sun, 16 Aug 2009 11:08:03 GMT" } ]
2009-08-16T00:00:00
[ [ "Zhang", "Xiao Juan", "" ], [ "Gong", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4594
Ben Liang
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
Dynamic Control of Tunable Sub-optimal Algorithms for Scheduling of Time-varying Wireless Networks
Submitted for journal consideration. A shorter version was presented in IEEE IWQoS 2008
null
10.1109/IWQOS.2008.22
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that for ergodic channel processes the Generalized Max-Weight Matching (GMWM) scheduling policy stabilizes the network for any supportable arrival rate vector within the network capacity region. This policy, however, often requires the solution of an NP-hard optimization problem. This has motivated many researchers to develop sub-optimal algorithms that approximate the GMWM policy in selecting schedule vectors. One implicit assumption commonly shared in this context is that during the algorithm runtime, the channel states remain effectively unchanged. This assumption may not hold as the time needed to select near-optimal schedule vectors usually increases quickly with the network size. In this paper, we incorporate channel variations and the time-efficiency of sub-optimal algorithms into the scheduler design, to dynamically tune the algorithm runtime considering the tradeoff between algorithm efficiency and its robustness to changing channel states. Specifically, we propose a Dynamic Control Policy (DCP) that operates on top of a given sub-optimal algorithm, and dynamically but in a large time-scale adjusts the time given to the algorithm according to queue backlog and channel correlations. This policy does not require knowledge of the structure of the given sub-optimal algorithm, and with low overhead can be implemented in a distributed manner. Using a novel Lyapunov analysis, we characterize the throughput stability region induced by DCP and show that our characterization can be tight. We also show that the throughput stability region of DCP is at least as large as that of any other static policy. Finally, we provide two case studies to gain further intuition into the performance of DCP.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 14:19:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Lotfinezhad", "Mahdi", "" ], [ "Liang", "Ben", "" ], [ "Sousa", "Elvino S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4615
Olivier Finkel
Olivier Finkel (ELM, Lip)
On Decidability Properties of One-Dimensional Cellular Automata
Final version; to appear in the Journal of Cellular Automata
Journal of Cellular Automata 6, 2-3 (2011) 181-193
null
null
cs.LO cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent paper Sutner proved that the first-order theory of the phase-space $\mathcal{S}_\mathcal{A}=(Q^\mathbb{Z}, \longrightarrow)$ of a one-dimensional cellular automaton $\mathcal{A}$ whose configurations are elements of $Q^\mathbb{Z}$, for a finite set of states $Q$, and where $\longrightarrow$ is the "next configuration relation", is decidable. He asked whether this result could be extended to a more expressive logic. We prove in this paper that this is actuallly the case. We first show that, for each one-dimensional cellular automaton $\mathcal{A}$, the phase-space $\mathcal{S}_\mathcal{A}$ is an omega-automatic structure. Then, applying recent results of Kuske and Lohrey on omega-automatic structures, it follows that the first-order theory, extended with some counting and cardinality quantifiers, of the structure $\mathcal{S}_\mathcal{A}$, is decidable. We give some examples of new decidable properties for one-dimensional cellular automata. In the case of surjective cellular automata, some more efficient algorithms can be deduced from results of Kuske and Lohrey on structures of bounded degree. On the other hand we show that the case of cellular automata give new results on automatic graphs.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 15:39:35 GMT" }, { "version": "v2", "created": "Mon, 1 Jun 2009 19:14:13 GMT" } ]
2010-10-01T00:00:00
[ [ "Finkel", "Olivier", "", "ELM, Lip" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0903.4616
Alexander Stroeer
Alexander Stroeer, John K. Cannizzo, Jordan B. Camp, Nicolas Gagarin
Methods for detection and characterization of signals in noisy data with the Hilbert-Huang Transform
submitted to PRD, 10 pages, 9 figures in color
Phys.Rev.D79:124022,2009
10.1103/PhysRevD.79.124022
null
physics.data-an cs.NA gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Hilbert-Huang Transform is a novel, adaptive approach to time series analysis that does not make assumptions about the data form. Its adaptive, local character allows the decomposition of non-stationary signals with hightime-frequency resolution but also renders it susceptible to degradation from noise. We show that complementing the HHT with techniques such as zero-phase filtering, kernel density estimation and Fourier analysis allows it to be used effectively to detect and characterize signals with low signal to noise ratio.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 15:41:05 GMT" } ]
2010-04-22T00:00:00
[ [ "Stroeer", "Alexander", "" ], [ "Cannizzo", "John K.", "" ], [ "Camp", "Jordan B.", "" ], [ "Gagarin", "Nicolas", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" } ]
0903.4696
Lucas Sabalka
Joshua Brown Kramer, Lucas Sabalka
Multidimensional Online Robot Motion
26 pages, 5 figures
International Journal of Computational Geometry and Applications, 20(6):653-684, 2010
10.1142/S0218195910003475
null
cs.CG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider three related problems of robot movement in arbitrary dimensions: coverage, search, and navigation. For each problem, a spherical robot is asked to accomplish a motion-related task in an unknown environment whose geometry is learned by the robot during navigation. The robot is assumed to have tactile and global positioning sensors. We view these problems from the perspective of (non-linear) competitiveness as defined by Gabriely and Rimon. We first show that in 3 dimensions and higher, there is no upper bound on competitiveness: every online algorithm can do arbitrarily badly compared to the optimal. We then modify the problems by assuming a fixed clearance parameter. We are able to give optimally competitive algorithms under this assumption.
[ { "version": "v1", "created": "Thu, 26 Mar 2009 20:39:55 GMT" } ]
2011-10-13T00:00:00
[ [ "Kramer", "Joshua Brown", "" ], [ "Sabalka", "Lucas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0903.4726
Travis Gagie
Travis Gagie, Simon J. Puglisi, Andrew Turpin
Range Quantile Queries: Another Virtue of Wavelet Trees
Added note about generalization to any constant number of dimensions.
null
10.1007/978-3-642-03784-9_1
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how to use a balanced wavelet tree as a data structure that stores a list of numbers and supports efficient {\em range quantile queries}. A range quantile query takes a rank and the endpoints of a sublist and returns the number with that rank in that sublist. For example, if the rank is half the sublist's length, then the query returns the sublist's median. We also show how these queries can be used to support space-efficient {\em coloured range reporting} and {\em document listing}.
[ { "version": "v1", "created": "Fri, 27 Mar 2009 02:29:01 GMT" }, { "version": "v2", "created": "Sun, 29 Mar 2009 15:54:35 GMT" }, { "version": "v3", "created": "Wed, 22 Apr 2009 09:44:31 GMT" }, { "version": "v4", "created": "Wed, 20 May 2009 12:43:47 GMT" }, { "version": "v5", "created": "Thu, 21 May 2009 08:09:09 GMT" }, { "version": "v6", "created": "Wed, 7 Apr 2010 12:48:51 GMT" } ]
2015-05-13T00:00:00
[ [ "Gagie", "Travis", "" ], [ "Puglisi", "Simon J.", "" ], [ "Turpin", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0903.4728
Xi Chen
Jin-Yi Cai, Xi Chen, and Pinyan Lu
Graph Homomorphisms with Complex Values: A Dichotomy Theorem
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph homomorphism has been studied intensively. Given an m x m symmetric matrix A, the graph homomorphism function is defined as \[Z_A (G) = \sum_{f:V->[m]} \prod_{(u,v)\in E} A_{f(u),f(v)}, \] where G = (V,E) is any undirected graph. The function Z_A can encode many interesting graph properties, including counting vertex covers and k-colorings. We study the computational complexity of Z_A for arbitrary symmetric matrices A with algebraic complex values. Building on work by Dyer and Greenhill, Bulatov and Grohe, and especially the recent beautiful work by Goldberg, Grohe, Jerrum and Thurley, we prove a complete dichotomy theorem for this problem. We show that Z_A is either computable in polynomial-time or #P-hard, depending explicitly on the matrix A. We further prove that the tractability criterion on A is polynomial-time decidable.
[ { "version": "v1", "created": "Fri, 27 Mar 2009 02:57:32 GMT" }, { "version": "v2", "created": "Fri, 7 Oct 2011 00:29:18 GMT" } ]
2011-10-10T00:00:00
[ [ "Cai", "Jin-Yi", "" ], [ "Chen", "Xi", "" ], [ "Lu", "Pinyan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0903.4738
Hong Ju Park
Hong Ju Park and Ender Ayanoglu
Constellation Precoded Beamforming
submitted to conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present and analyze the performance of constellation precoded beamforming. This multi-input multi-output transmission technique is based on the singular value decomposition of a channel matrix. In this work, the beamformer is precoded to improve its diversity performance. It was shown previously that while single beamforming achieves full diversity without channel coding, multiple beamforming results in diversity loss. In this paper, we show that a properly designed constellation precoder makes uncoded multiple beamforming achieve full diversity order. We also show that partially precoded multiple beamforming gets better diversity order than multiple beamforming without constellation precoder if the subchannels to be precoded are properly chosen. We propose several criteria to design the constellation precoder. Simulation results match the analysis, and show that precoded multiple beamforming actually outperforms single beamforming without precoding at the same system data rate while achieving full diversity order.
[ { "version": "v1", "created": "Fri, 27 Mar 2009 06:01:39 GMT" } ]
2009-03-30T00:00:00
[ [ "Park", "Hong Ju", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4742
Kiryung Lee
Kiryung Lee and Yoram Bresler
Guaranteed Minimum Rank Approximation from Linear Observations by Nuclear Norm Minimization with an Ellipsoidal Constraint
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rank minimization problem is to find the lowest-rank matrix in a given set. Nuclear norm minimization has been proposed as an convex relaxation of rank minimization. Recht, Fazel, and Parrilo have shown that nuclear norm minimization subject to an affine constraint is equivalent to rank minimization under a certain condition given in terms of the rank-restricted isometry property. However, in the presence of measurement noise, or with only approximately low rank generative model, the appropriate constraint set is an ellipsoid rather than an affine space. There exist polynomial-time algorithms to solve the nuclear norm minimization with an ellipsoidal constraint, but no performance guarantee has been shown for these algorithms. In this paper, we derive such an explicit performance guarantee, bounding the error in the approximate solution provided by nuclear norm minimization with an ellipsoidal constraint.
[ { "version": "v1", "created": "Fri, 27 Mar 2009 07:52:06 GMT" } ]
2009-03-30T00:00:00
[ [ "Lee", "Kiryung", "" ], [ "Bresler", "Yoram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0903.4770
Sk Sarif Hassan s
Pal Choudhury Pabitra, Sahoo Sudhakar, Nayak Birendra Kumar, and Hassan Sk. Sarif
Act of CVT and EVT In The Formation of Number-Theoretic Fractals
15 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have defined two functions that have been used to construct different fractals having fractal dimensions between 1 and 2. More precisely, we can say that one of our defined functions produce the fractals whose fractal dimension lies in [1.58, 2) and rest function produce the fractals whose fractal dimension lies in (1, 1.58]. Also we tried to calculate the amount of increment of fractal dimension in accordance with base of the number systems. And in switching of fractals from one base to another, the increment of fractal dimension is constant, which is 1.58, its quite surprising!
[ { "version": "v1", "created": "Fri, 27 Mar 2009 10:38:32 GMT" } ]
2009-03-30T00:00:00
[ [ "Pabitra", "Pal Choudhury", "" ], [ "Sudhakar", "Sahoo", "" ], [ "Kumar", "Nayak Birendra", "" ], [ "Sarif", "Hassan Sk.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0903.4796
Martin Vatshelle
B.-M. Bui-Xuan and J. A. Telle and M. Vatshelle (Department of Informatics, University of Bergen, Norway)
Fast FPT algorithms for vertex subset and vertex partitioning problems using neighborhood unions
The new version has runtimes expressed by number of equivalence classes, but no other changes
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the graph parameter boolean-width, related to the number of different unions of neighborhoods across a cut of a graph. Boolean-width is similar to rank-width, which is related to the number of $GF[2]$-sums (1+1=0) of neighborhoods instead of the boolean-sums (1+1=1) used for boolean-width. We give algorithms for a large class of NP-hard vertex subset and vertex partitioning problems that are FPT when parameterized by either boolean-width, rank-width or clique-width, with runtime single exponential in either parameter if given the pertinent optimal decomposition. To compare boolean-width versus rank-width or clique-width, we first show that for any graph, the square root of its boolean-width is never more than its rank-width. Next, we exhibit a class of graphs, the Hsu-grids, for which we can solve NP-hard problems in polynomial time, if we use the right parameter. An $n \times \frac{n}{10}$ Hsu-grid on ${1/10}n^2$ vertices has boolean-width $\Theta(\log n)$ and rank-width $\Theta(n)$. Moreover, any optimal rank-decomposition of such a graph will have boolean-width $\Theta(n)$, i.e. exponential in the optimal boolean-width. A main open problem is to approximate the boolean-width better than what is given by the algorithm for rank-width [Hlin\v{e}n\'y and Oum, 2008]
[ { "version": "v1", "created": "Fri, 27 Mar 2009 13:34:08 GMT" }, { "version": "v2", "created": "Fri, 3 Apr 2009 07:24:30 GMT" }, { "version": "v3", "created": "Wed, 9 Mar 2011 15:17:52 GMT" } ]
2011-03-10T00:00:00
[ [ "Bui-Xuan", "B. -M.", "", "Department of\n Informatics, University of Bergen, Norway" ], [ "Telle", "J. A.", "", "Department of\n Informatics, University of Bergen, Norway" ], [ "Vatshelle", "M.", "", "Department of\n Informatics, University of Bergen, Norway" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]