id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0903.3228 | Alberto Accomazzi | Michael J. Kurtz, Alberto Accomazzi, Stephen S. Murray | The Smithsonian/NASA Astrophysics Data System (ADS) Decennial Report | 6 pages, whitepaper submitted to the National Research Council
Astronomy and Astrophysics Decadal Survey | null | null | null | astro-ph.IM cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Eight years after the ADS first appeared the last decadal survey wrote:
"NASA's initiative for the Astrophysics Data System has vastly increased the
accessibility of the scientific literature for astronomers. NASA deserves
credit for this valuable initiative and is urged to continue it." Here we
summarize some of the changes concerning the ADS which have occurred in the
past ten years, and we describe the current status of the ADS. We then point
out two areas where the ADS is building an improved capability which could
benefit from a policy statement of support in the ASTRO2010 report. These are:
The Semantic Interlinking of Astronomy Observations and Datasets and The
Indexing of the Full Text of Astronomy Research Publications.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 19:36:57 GMT"
}
]
| 2009-03-19T00:00:00 | [
[
"Kurtz",
"Michael J.",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Murray",
"Stephen S.",
""
]
]
| [
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0903.3257 | Marcus Hutter | Ke Zhang and Marcus Hutter and Huidong Jin | A New Local Distance-Based Outlier Detection Approach for Scattered
Real-World Data | 15 LaTeX pages, 7 figures, 2 tables, 1 algorithm, 2 theorems | Proc. 13th Pacific-Asia Conf. on Knowledge Discovery and Data
Mining (PAKDD 2009) pages 813-822 | null | null | cs.LG cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Detecting outliers which are grossly different from or inconsistent with the
remaining dataset is a major challenge in real-world KDD applications. Existing
outlier detection methods are ineffective on scattered real-world datasets due
to implicit data patterns and parameter setting issues. We define a novel
"Local Distance-based Outlier Factor" (LDOF) to measure the {outlier-ness} of
objects in scattered datasets which addresses these issues. LDOF uses the
relative location of an object to its neighbours to determine the degree to
which the object deviates from its neighbourhood. Properties of LDOF are
theoretically analysed including LDOF's lower bound and its false-detection
probability, as well as parameter settings. In order to facilitate parameter
settings in real-world applications, we employ a top-n technique in our outlier
detection approach, where only the objects with the highest LDOF values are
regarded as outliers. Compared to conventional approaches (such as top-n KNN
and top-n LOF), our method top-n LDOF is more effective at detecting outliers
in scattered data. It is also easier to set parameters, since its performance
is relatively stable over a large range of parameter values, as illustrated by
experimental results on both real-world and synthetic datasets.
| [
{
"version": "v1",
"created": "Wed, 18 Mar 2009 23:50:29 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Zhang",
"Ke",
""
],
[
"Hutter",
"Marcus",
""
],
[
"Jin",
"Huidong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.3261 | Ghadamali Bagherikaram | Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani | The Secrecy Capacity Region of the Gaussian MIMO Broadcast Channel | 23 pages, 2 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a scenario where a source node wishes to broadcast
two confidential messages for two respective receivers via a Gaussian MIMO
broadcast channel. A wire-tapper also receives the transmitted signal via
another MIMO channel. First we assumed that the channels are degraded and the
wire-tapper has the worst channel. We establish the capacity region of this
scenario. Our achievability scheme is a combination of the superposition of
Gaussian codes and randomization within the layers which we will refer to as
Secret Superposition Coding. For the outerbound, we use the notion of enhanced
channel to show that the secret superposition of Gaussian codes is optimal. We
show that we only need to enhance the channels of the legitimate receivers, and
the channel of the eavesdropper remains unchanged. Then we extend the result of
the degraded case to non-degraded case. We show that the secret superposition
of Gaussian codes along with successive decoding cannot work when the channels
are not degraded. we develop a Secret Dirty Paper Coding (SDPC) scheme and show
that SDPC is optimal for this channel. Finally, we investigate practical
characterizations for the specific scenario in which the transmitter and the
eavesdropper have multiple antennas, while both intended receivers have a
single antenna. We characterize the secrecy capacity region in terms of
generalized eigenvalues of the receivers channel and the eavesdropper channel.
We refer to this configuration as the MISOME case. In high SNR we show that the
capacity region is a convex closure of two rectangular regions.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 00:51:04 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Oct 2009 19:43:52 GMT"
}
]
| 2009-10-19T00:00:00 | [
[
"Bagherikaram",
"Ghadamali",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3276 | Vitaly Shmatikov | Arvind Narayanan, Vitaly Shmatikov | De-anonymizing Social Networks | Published in the 30th IEEE Symposium on Security and Privacy, 2009.
The definitive version is available at:
http://www.cs.utexas.edu/~shmat/shmat_oak09.pdf Frequently Asked Questions
are answered at: http://www.cs.utexas.edu/~shmat/socialnetworks-faq.html | null | 10.1109/SP.2009.22 | null | cs.CR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Operators of online social networks are increasingly sharing potentially
sensitive information about users and their relationships with advertisers,
application developers, and data-mining researchers. Privacy is typically
protected by anonymization, i.e., removing names, addresses, etc.
We present a framework for analyzing privacy and anonymity in social networks
and develop a new re-identification algorithm targeting anonymized
social-network graphs. To demonstrate its effectiveness on real-world networks,
we show that a third of the users who can be verified to have accounts on both
Twitter, a popular microblogging service, and Flickr, an online photo-sharing
site, can be re-identified in the anonymous Twitter graph with only a 12% error
rate.
Our de-anonymization algorithm is based purely on the network topology, does
not require creation of a large number of dummy "sybil" nodes, is robust to
noise and all existing defenses, and works even when the overlap between the
target network and the adversary's auxiliary information is small.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 06:55:46 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Narayanan",
"Arvind",
""
],
[
"Shmatikov",
"Vitaly",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.3278 | Yuedong Xu | Yuedong Xu, John C.S. Lui, Dah-Ming Chiu | On Oligopoly Spectrum Allocation Game in Cognitive Radio Networks with
Capacity Constraints | 40 pages, 22 figures | Elsevier, Computer Networks, 2010 | 10.1016/j.comnet.2009.11.018 | null | cs.NI cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamic spectrum sharing is a promising technology to improve spectrum
utilization in the future wireless networks. The flexible spectrum management
provides new opportunities for licensed primary user and unlicensed secondary
users to reallocate the spectrum resource efficiently. In this paper, we
present an oligopoly pricing framework for dynamic spectrum allocation in which
the primary users sell excessive spectrum to the secondary users for monetary
return. We present two approaches, the strict constraints (type-I) and the QoS
penalty (type-II), to model the realistic situation that the primary users have
limited capacities. In the oligopoly model with strict constraints, we propose
a low-complexity searching method to obtain the Nash Equilibrium and prove its
uniqueness. When reduced to a duopoly game, we analytically show the
interesting gaps in the leader-follower pricing strategy. In the QoS penalty
based oligopoly model, a novel variable transformation method is developed to
derive the unique Nash Equilibrium. When the market information is limited, we
provide three myopically optimal algorithms "StrictBEST", "StrictBR" and
"QoSBEST" that enable price adjustment for duopoly primary users based on the
Best Response Function (BRF) and the bounded rationality (BR) principles.
Numerical results validate the effectiveness of our analysis and demonstrate
the fast convergence of "StrictBEST" as well as "QoSBEST" to the Nash
Equilibrium. For the "StrictBR" algorithm, we reveal the chaotic behaviors of
dynamic price adaptation in response to the learning rates.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 06:50:36 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jun 2009 03:58:28 GMT"
}
]
| 2010-09-14T00:00:00 | [
[
"Xu",
"Yuedong",
""
],
[
"Lui",
"John C. S.",
""
],
[
"Chiu",
"Dah-Ming",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.3287 | Frank Nielsen | Frank Nielsen and Richard Nock | Hyperbolic Voronoi diagrams made easy | null | International Conference on Computational Science and Its
Applications. IEEE, 2010 | 10.1109/ICCSA.2010.37 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a simple framework to compute hyperbolic Voronoi diagrams of
finite point sets as affine diagrams. We prove that bisectors in Klein's
non-conformal disk model are hyperplanes that can be interpreted as power
bisectors of Euclidean balls. Therefore our method simply consists in computing
an equivalent clipped power diagram followed by a mapping transformation
depending on the selected representation of the hyperbolic space (e.g.,
Poincar\'e conformal disk or upper-plane representations). We discuss on
extensions of this approach to weighted and $k$-order diagrams, and describe
their dual triangulations. Finally, we consider two useful primitives on the
hyperbolic Voronoi diagrams for designing tailored user interfaces of an image
catalog browsing application in the hyperbolic disk: (1) finding nearest
neighbors, and (2) computing smallest enclosing balls.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 08:45:09 GMT"
}
]
| 2021-04-28T00:00:00 | [
[
"Nielsen",
"Frank",
""
],
[
"Nock",
"Richard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0903.3311 | Dominique Duval | Jean-Guillaume Dumas (LJK), Dominique Duval (LJK), Jean-Claude Reynaud
(RC) | Cartesian effect categories are Freyd-categories | 23 pages | null | null | null | cs.LO math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most often, in a categorical semantics for a programming language, the
substitution of terms is expressed by composition and finite products. However
this does not deal with the order of evaluation of arguments, which may have
major consequences when there are side-effects. In this paper Cartesian effect
categories are introduced for solving this issue, and they are compared with
strong monads, Freyd-categories and Haskell's Arrows. It is proved that a
Cartesian effect category is a Freyd-category where the premonoidal structure
is provided by a kind of binary product, called the sequential product. The
universal property of the sequential product provides Cartesian effect
categories with a powerful tool for constructions and proofs. To our knowledge,
both effect categories and sequential products are new notions.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 12:01:21 GMT"
},
{
"version": "v2",
"created": "Tue, 19 May 2009 13:42:19 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Jun 2009 14:18:27 GMT"
}
]
| 2009-06-12T00:00:00 | [
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Duval",
"Dominique",
"",
"LJK"
],
[
"Reynaud",
"Jean-Claude",
"",
"RC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
]
|
0903.3317 | Shaoxu Song | Shaoxu Song and Lei Chen | Discovering Matching Dependencies | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The concept of matching dependencies (mds) is recently pro- posed for
specifying matching rules for object identification. Similar to the functional
dependencies (with conditions), mds can also be applied to various data quality
applications such as violation detection. In this paper, we study the problem
of discovering matching dependencies from a given database instance. First, we
formally define the measures, support and confidence, for evaluating utility of
mds in the given database instance. Then, we study the discovery of mds with
certain utility requirements of support and confidence. Exact algorithms are
developed, together with pruning strategies to improve the time performance.
Since the exact algorithm has to traverse all the data during the computation,
we propose an approximate solution which only use some of the data. A bound of
relative errors introduced by the approximation is also developed. Finally, our
experimental evaluation demonstrates the efficiency of the proposed methods.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 12:33:47 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jun 2009 03:57:09 GMT"
}
]
| 2009-06-13T00:00:00 | [
[
"Song",
"Shaoxu",
""
],
[
"Chen",
"Lei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0903.3329 | Emmanuel Duflos | Thomas Br\'ehard (INRIA Futurs), Emmanuel Duflos (INRIA Futurs,
LAGIS), Philippe Vanheeghe (LAGIS), Pierre-Arnaud Coquelin (INRIA Futurs) | Optimal Policies Search for Sensor Management | null | null | null | null | cs.LG stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a new approach to solve sensor management problems.
Classically sensor management problems can be well formalized as
Partially-Observed Markov Decision Processes (POMPD). The original approach
developped here consists in deriving the optimal parameterized policy based on
a stochastic gradient estimation. We assume in this work that it is possible to
learn the optimal policy off-line (in simulation) using models of the
environement and of the sensor(s). The learned policy can then be used to
manage the sensor(s). In order to approximate the gradient in a stochastic
context, we introduce a new method to approximate the gradient, based on
Infinitesimal Perturbation Approximation (IPA). The effectiveness of this
general framework is illustrated by the managing of an Electronically Scanned
Array Radar. First simulations results are finally proposed.
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 13:44:35 GMT"
}
]
| 2009-03-20T00:00:00 | [
[
"Bréhard",
"Thomas",
"",
"INRIA Futurs"
],
[
"Duflos",
"Emmanuel",
"",
"INRIA Futurs,\n LAGIS"
],
[
"Vanheeghe",
"Philippe",
"",
"LAGIS"
],
[
"Coquelin",
"Pierre-Arnaud",
"",
"INRIA Futurs"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0903.3433 | Kohtaro Tadaki | Kohtaro Tadaki | Fixed point theorems on partial randomness | 19 pages, LaTeX2e, no figures | Ann. Pure Appl. Logic 163 (2012) 763-774 | 10.1016/j.apal.2011.09.018 | null | cs.IT cs.CC math.IT math.LO math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In our former work [K. Tadaki, Local Proceedings of CiE 2008, pp.425-434,
2008], we developed a statistical mechanical interpretation of algorithmic
information theory by introducing the notion of thermodynamic quantities at
temperature T, such as free energy F(T), energy E(T), and statistical
mechanical entropy S(T), into the theory. These quantities are real functions
of real argument T>0. We then discovered that, in the interpretation, the
temperature T equals to the partial randomness of the values of all these
thermodynamic quantities, where the notion of partial randomness is a stronger
representation of the compression rate by program-size complexity. Furthermore,
we showed that this situation holds for the temperature itself as a
thermodynamic quantity. Namely, the computability of the value of partition
function Z(T) gives a sufficient condition for T in (0,1) to be a fixed point
on partial randomness. In this paper, we show that the computability of each of
all the thermodynamic quantities above gives the sufficient condition also.
Moreover, we show that the computability of F(T) gives completely different
fixed points from the computability of Z(T).
| [
{
"version": "v1",
"created": "Thu, 19 Mar 2009 22:04:07 GMT"
}
]
| 2019-09-04T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0903.3461 | Andreas Tielmann | Carole Delporte-Gallet (LIAFA), Hugues Fauconnier (LIAFA), Andreas
Tielmann (LIAFA) | Fault-Tolerant Consensus in Unknown and Anonymous Networks | null | null | null | null | cs.DS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates under which conditions information can be reliably
shared and consensus can be solved in unknown and anonymous message-passing
networks that suffer from crash-failures. We provide algorithms to emulate
registers and solve consensus under different synchrony assumptions. For this,
we introduce a novel pseudo leader-election approach which allows a
leader-based consensus implementation without breaking symmetry.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 07:50:46 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Delporte-Gallet",
"Carole",
"",
"LIAFA"
],
[
"Fauconnier",
"Hugues",
"",
"LIAFA"
],
[
"Tielmann",
"Andreas",
"",
"LIAFA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0903.3462 | Luigi Santocanale | Luigi Santocanale (LIF) | A Nice Labelling for Tree-Like Event Structures of Degree 3 (Extended
Version) | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of finding nice labellings for event structures of
degree 3. We develop a minimum theory by which we prove that the labelling
number of an event structure of degree 3 is bounded by a linear function of the
height. The main theorem we present in this paper states that event structures
of degree 3 whose causality order is a tree have a nice labelling with 3
colors. Finally, we exemplify how to use this theorem to construct upper bounds
for the labelling number of other event structures of degree 3.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 07:54:05 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Santocanale",
"Luigi",
"",
"LIF"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0903.3480 | Teddy Furon | Teddy Furon and Luis Perez-Freire | Worst case attacks against binary probabilistic traitor tracing codes | submitted to IEEE Trans. on Information Forensics and Security | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An insightful view into the design of traitor tracing codes should
necessarily consider the worst case attacks that the colluders can lead. This
paper takes an information-theoretic point of view where the worst case attack
is defined as the collusion strategy minimizing the achievable rate of the
traitor tracing code. Two different decoders are envisaged, the joint decoder
and the simple decoder, as recently defined by P. Moulin
\cite{Moulin08universal}. Several classes of colluders are defined with
increasing power. The worst case attack is derived for each class and each
decoder when applied to Tardos' codes and a probabilistic version of the
Boneh-Shaw construction. This contextual study gives the real rates achievable
by the binary probabilistic traitor tracing codes. Attacks usually considered
in literature, such as majority or minority votes, are indeed largely
suboptimal. This article also shows the utmost importance of the time-sharing
concept in a probabilistic codes.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 09:44:23 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Aug 2009 09:16:06 GMT"
}
]
| 2009-08-18T00:00:00 | [
[
"Furon",
"Teddy",
""
],
[
"Perez-Freire",
"Luis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3487 | Stephan Tinguely | Amos Lapidoth and Stephan Tinguely | Sending a Bivariate Gaussian Source over a Gaussian MAC with Feedback | submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the power-versus-distortion trade-off for the transmission of a
memoryless bivariate Gaussian source over a two-to-one Gaussian multiple-access
channel with perfect causal feedback. In this problem, each of two separate
transmitters observes a different component of a memoryless bivariate Gaussian
source as well as the feedback from the channel output of the previous
time-instants. Based on the observed source sequence and the feedback, each
transmitter then describes its source component to the common receiver via an
average-power constrained Gaussian multiple-access channel. From the resulting
channel output, the receiver wishes to reconstruct both source components with
the least possible expected squared-error distortion. We study the set of
distortion pairs that can be achieved by the receiver on the two source
components.
We present sufficient conditions and necessary conditions for the
achievability of a distortion pair. These conditions are expressed in terms of
the source correlation and of the signal-to-noise ratio (SNR) of the channel.
In several cases the necessary conditions and sufficient conditions coincide.
This allows us to show that if the channel SNR is below a certain threshold,
then an uncoded transmission scheme that ignores the feedback is optimal. Thus,
below this SNR-threshold feedback is useless. We also derive the precise
high-SNR asymptotics of optimal schemes.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 10:32:45 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Lapidoth",
"Amos",
""
],
[
"Tinguely",
"Stephan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3513 | Apostolos Syropoulos | Apostolos Syropoulos | Fuzzy Chemical Abstract Machines | null | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fuzzy set theory opens new vistas in computability theory and here I show
this by defining a new computational metaphor--the fuzzy chemical metaphor.
This metaphor is an extension of the chemical metaphor. In particular, I
introduce the idea of a state of a system as a solution of fuzzy molecules,
that is molecules that are not just different but rather similar, that react
according to a set of fuzzy reaction rules. These notions become precise by
introducing fuzzy labeled transition systems. Solutions of fuzzy molecules and
fuzzy reaction rules are used to define the general notion of a fuzzy chemical
abstract machine, which is a {\em realization} of the fuzzy chemical metaphor.
Based on the idea that these machines can be used to describe the operational
semantics of process calculi and algebras that include fuzziness as a
fundamental property, I present a toy calculus that is a fuzzy equivalent of
the $\pi$-calculus.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 13:04:52 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Syropoulos",
"Apostolos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0903.3524 | Jin-San Cheng | Jin-San Cheng, Xiao-Shan Gao and Jia Li | Ambient Isotopic Meshing of Implicit Algebraic Surface with
Singularities | 34 pages, 17 Postscript figures | null | 10.1007/978-3-642-04103-7_9 | MM-preprints, vol. 27, 2008 | cs.CG cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A complete method is proposed to compute a certified, or ambient isotopic,
meshing for an implicit algebraic surface with singularities. By certified, we
mean a meshing with correct topology and any given geometric precision. We
propose a symbolic-numeric method to compute a certified meshing for the
surface inside a box containing singularities and use a modified
Plantinga-Vegter marching cube method to compute a certified meshing for the
surface inside a box without singularities. Nontrivial examples are given to
show the effectiveness of the algorithm. To our knowledge, this is the first
method to compute a certified meshing for surfaces with singularities.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 13:53:35 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Cheng",
"Jin-San",
""
],
[
"Gao",
"Xiao-Shan",
""
],
[
"Li",
"Jia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0903.3537 | Boris Oreshkin N. | Boris N. Oreshkin, Mark J. Coates, Michael G. Rabbat | Optimization and Analysis of Distributed Averaging with Short Node
Memory | null | null | 10.1109/TSP.2010.2043127 | null | cs.DC cs.IT cs.MA math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we demonstrate, both theoretically and by numerical examples,
that adding a local prediction component to the update rule can significantly
improve the convergence rate of distributed averaging algorithms. We focus on
the case where the local predictor is a linear combination of the node's two
previous values (i.e., two memory taps), and our update rule computes a
combination of the predictor and the usual weighted linear combination of
values received from neighbouring nodes. We derive the optimal mixing parameter
for combining the predictor with the neighbors' values, and carry out a
theoretical analysis of the improvement in convergence rate that can be
obtained using this acceleration methodology. For a chain topology on n nodes,
this leads to a factor of n improvement over the one-step algorithm, and for a
two-dimensional grid, our approach achieves a factor of n^1/2 improvement, in
terms of the number of iterations required to reach a prescribed level of
accuracy.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 15:12:13 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Jul 2009 14:46:21 GMT"
},
{
"version": "v3",
"created": "Fri, 5 Feb 2010 15:48:12 GMT"
},
{
"version": "v4",
"created": "Fri, 5 Feb 2010 21:35:10 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Oreshkin",
"Boris N.",
""
],
[
"Coates",
"Mark J.",
""
],
[
"Rabbat",
"Michael G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3545 | Jean Pierre Boon | Jean Pierre Boon | Complexity, time and music | 4 pages with 2 figures | null | null | null | physics.soc-ph cs.SD physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The concept of complexity as considered in terms of its algorithmic
definition proposed by G.J. Chaitin and A.N. Kolmogorov is revisited for the
dynamical complexity of music. When music pieces are cast in the form of time
series of pitch variations, concepts of dynamical systems theory can be used to
define new quantities such as the {\em dimensionality} as a measure of the {\em
global temporal dynamics} of a music piece, and the Shanon {\em entropy} as an
evaluation of its {\em local dynamics}. When these quantities are computed
explicitly for sequences sampled in the music literature from the 18th to the
20th century, no indication is found of a systematic increase in complexity
paralleling historically the evolution of classical western music, but the
analysis suggests that the fractional nature of art might have an intrinsic
value of more general significance.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 15:32:42 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Boon",
"Jean Pierre",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0903.3562 | Andrea Scharnhorst | Katy Boerner, Andrea Scharnhorst | Visual Conceptualizations and Models of Science | Guest Editor's Introduction to the 2009 Journal of Informetrics
Special Issue on the Science of Science | null | null | null | cs.DL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This Journal of Informetrics special issue aims to improve our understanding
of the structure and dynamics of science by reviewing and advancing existing
conceptualizations and models of scholarly activity. Several of these
conceptualizations and models have visual manifestations supporting the
combination and comparison of theories and approaches developed in different
disciplines of science. Subsequently, we discuss challenges towards a
theoretically grounded and practically useful science of science and provide a
brief chronological review of relevant work. Then, we exemplarily present three
conceptualizations of science that attempt to provide frameworks for the
comparison and combination of existing approaches, theories, laws, and
measurements. Finally, we discuss the contributions of and interlinkages among
the eight papers included in this issue. Each paper makes a unique contribution
towards conceptualizations and models of science and roots this contribution in
a review and comparison with existing work.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 16:35:18 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Boerner",
"Katy",
""
],
[
"Scharnhorst",
"Andrea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0903.3579 | Peter Krusche | Peter Krusche, Alexander Tiskin | String comparison by transposition networks | Published in London Algorithmics 2008: Theory And Practice, to appear | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computing string or sequence alignments is a classical method of comparing
strings and has applications in many areas of computing, such as signal
processing and bioinformatics. Semi-local string alignment is a recent
generalisation of this method, in which the alignment of a given string and all
substrings of another string are computed simultaneously at no additional
asymptotic cost. In this paper, we show that there is a close connection
between semi-local string alignment and a certain class of traditional
comparison networks known as transposition networks. The transposition network
approach can be used to represent different string comparison algorithms in a
unified form, and in some cases provides generalisations or improvements on
existing algorithms. This approach allows us to obtain new algorithms for
sparse semi-local string comparison and for comparison of highly similar and
highly dissimilar strings, as well as of run-length compressed strings. We
conclude that the transposition network method is a very general and flexible
way of understanding and improving different string comparison algorithms, as
well as their efficient implementation.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 17:53:55 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Krusche",
"Peter",
""
],
[
"Tiskin",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.3622 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Sorin Briciu, Madalina Ecaterina Andreica | Algorithmic Solutions to Some Transportation Optimization Problems with
Applications in the Metallurgical Industry | null | Metalurgia International, vol. 14, special issue no. 5, pp. 46-53,
2009. (ISSN: 1582-2214) ; http://www.metalurgia.ro/metalurgia_int.html | null | null | cs.DS cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we address several constrained transportation optimization
problems (e.g. vehicle routing, shortest Hamiltonian path), for which we
present novel algorithmic solutions and extensions, considering several
optimization objectives, like minimizing costs and resource usage. All the
considered problems are motivated by practical situations arising, for
instance, in the mining and metallurgical industry or in data communication. We
restrict our attention to transportation networks with path, tree or geometric
structures, for which the developed polynomial-time algorithms are optimal or
nearly optimal.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 22:21:30 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Briciu",
"Sorin",
""
],
[
"Andreica",
"Madalina Ecaterina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.3623 | Paul Slater | Paul B. Slater | Matrix plots of reordered bistochastized transaction flow tables: A
United States intercounty migration example | 12 pages, 9 figures | null | null | null | physics.soc-ph cs.SI physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a number of variously rearranged matrix plots of the $3, 107
\times 3, 107$ 1995-2000 (asymmetric) intercounty migration table for the
United States, principally in its bistochasticized form (all 3,107 row and
column sums iteratively proportionally fitted to equal 1). In one set of plots,
the counties are seriated on the bases of the subdominant (left and right)
eigenvectors of the bistochastic matrix. In another set, we use the ordering of
counties in the dendrogram generated by the associated strong component
hierarchical clustering. Interesting, diverse features of U. S. intercounty
migration emerge--such as a contrast in centralized, hub-like
(cosmopolitan/provincial) properties between cosmopolitan "Sunbelt" and
provincial "Black Belt" counties. The methodologies employed should also be
insightful for the many other diverse forms of interesting transaction
flow-type data--interjournal citations being an obvious, much-studied example,
where one might expect that the journals Science, Nature and PNAS would display
"cosmopolitan" characteristics.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 22:42:24 GMT"
}
]
| 2012-07-03T00:00:00 | [
[
"Slater",
"Paul B.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0903.3624 | Marco Pavone | Marco Pavone, Emilio Frazzoli, Francesco Bullo | Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic
and Dynamic Environment | Paper to be submitted to IEEE Transactions on Automatic Control | null | 10.1109/TAC.2010.2092850 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present distributed and adaptive algorithms for motion
coordination of a group of m autonomous vehicles. The vehicles operate in a
convex environment with bounded velocity and must service demands whose time of
arrival, location and on-site service are stochastic; the objective is to
minimize the expected system time (wait plus service) of the demands. The
general problem is known as the m-vehicle Dynamic Traveling Repairman Problem
(m-DTRP). The best previously known control algorithms rely on centralized
a-priori task assignment and are not robust against changes in the environment,
e.g. changes in load conditions; therefore, they are of limited applicability
in scenarios involving ad-hoc networks of autonomous vehicles operating in a
time-varying environment. First, we present a new class of policies for the
1-DTRP problem that: (i) are provably optimal both in light- and heavy-load
condition, and (ii) are adaptive, in particular, they are robust against
changes in load conditions. Second, we show that partitioning policies, whereby
the environment is partitioned among the vehicles and each vehicle follows a
certain set of rules in its own region, are optimal in heavy-load conditions.
Finally, by combining the new class of algorithms for the 1-DTRP with suitable
partitioning policies, we design distributed algorithms for the m-DTRP problem
that (i) are spatially distributed, scalable to large networks, and adaptive to
network changes, (ii) are within a constant-factor of optimal in heavy-load
conditions and stabilize the system in any load condition. Simulation results
are presented and discussed.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 22:48:08 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Pavone",
"Marco",
""
],
[
"Frazzoli",
"Emilio",
""
],
[
"Bullo",
"Francesco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0903.3627 | Shamgar Gurevich | Shamgar Gurevich (Berkeley) and Ronny Hadani (Chicago) | Statistical RIP and Semi-Circle Distribution of Incoherent Dictionaries | This version Includes all the proofs. Submitted for publication
(2009) | null | null | null | cs.IT cs.DM math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we formulate and prove a statistical version of the Candes-Tao
restricted isometry property (SRIP for short) which holds in general for any
incoherent dictionary which is a disjoint union of orthonormal bases. In
addition, we prove that, under appropriate normalization, the eigenvalues of
the associated Gram matrix fluctuate around 1 according to the Wigner
semicircle distribution. The result is then applied to various dictionaries
that arise naturally in the setting of finite harmonic analysis, giving, in
particular, a better understanding on a remark of
Applebaum-Howard-Searle-Calderbank concerning RIP for the Heisenberg dictionary
of chirp like functions.
| [
{
"version": "v1",
"created": "Fri, 20 Mar 2009 23:36:53 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Gurevich",
"Shamgar",
"",
"Berkeley"
],
[
"Hadani",
"Ronny",
"",
"Chicago"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0903.3667 | Joel Ratsaby | Joel Ratsaby | How random are a learner's mistakes? | null | null | null | null | cs.LG cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a random binary sequence $X^{(n)}$ of random variables, $X_{t},$
$t=1,2,...,n$, for instance, one that is generated by a Markov source (teacher)
of order $k^{*}$ (each state represented by $k^{*}$ bits). Assume that the
probability of the event $X_{t}=1$ is constant and denote it by $\beta$.
Consider a learner which is based on a parametric model, for instance a Markov
model of order $k$, who trains on a sequence $x^{(m)}$ which is randomly drawn
by the teacher. Test the learner's performance by giving it a sequence
$x^{(n)}$ (generated by the teacher) and check its predictions on every bit of
$x^{(n)}.$ An error occurs at time $t$ if the learner's prediction $Y_{t}$
differs from the true bit value $X_{t}$. Denote by $\xi^{(n)}$ the sequence of
errors where the error bit $\xi_{t}$ at time $t$ equals 1 or 0 according to
whether the event of an error occurs or not, respectively. Consider the
subsequence $\xi^{(\nu)}$ of $\xi^{(n)}$ which corresponds to the errors of
predicting a 0, i.e., $\xi^{(\nu)}$ consists of the bits of $\xi^{(n)}$ only at
times $t$ such that $Y_{t}=0.$ In this paper we compute an estimate on the
deviation of the frequency of 1s of $\xi^{(\nu)}$ from $\beta$. The result
shows that the level of randomness of $\xi^{(\nu)}$ decreases relative to an
increase in the complexity of the learner.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2009 14:16:05 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Mar 2009 22:01:59 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Apr 2009 20:52:10 GMT"
},
{
"version": "v4",
"created": "Tue, 29 Sep 2009 11:03:00 GMT"
},
{
"version": "v5",
"created": "Sun, 2 Jan 2011 08:43:03 GMT"
}
]
| 2011-01-04T00:00:00 | [
[
"Ratsaby",
"Joel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0903.3669 | Xiu-Li Wang | Xiuli Wang | Comment on "Language Trees and Zipping" arXiv:cond-mat/0108530 | 2 pages comment on arXiv:cond-mat/0108530, arXiv:cond-mat/0203275 | null | null | null | cs.AI cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | Every encoding has priori information if the encoding represents any semantic
information of the unverse or object. Encoding means mapping from the unverse
to the string or strings of digits. The semantic here is used in the
model-theoretic sense or denotation of the object. If encoding or strings of
symbols is the adequate and true mapping of model or object, and the mapping is
recursive or computable, the distance between two strings (text) is mapping the
distance between models. We then are able to measure the distance by computing
the distance between the two strings. Otherwise, we may take a misleading
course. "Language tree" may not be a family tree in the sense of historical
linguistics. Rather it just means the similarity.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2009 14:29:11 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Wang",
"Xiuli",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3676 | Emil Saucan | Emil Saucan, Eli Appleboilm, Gershon Wolansky, Yehoshua Y. Zeevi | Combinatorial Ricci Curvature and Laplacians for Image Processing | 12 pages, 8 figures (some of the these may be of lesser quality than
those in the Technical report version) | Proceedings of CISP'09, Vol. 2, 992-997, 2009 | null | CCIT Report # 722 March 2009 (EE Pub. No. 1679) | cs.CV cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new Combinatorial Ricci curvature and Laplacian operators for grayscale
images are introduced and tested on 2D synthetic, natural and medical images.
Analogue formulae for voxels are also obtained. These notions are based upon
more general concepts developed by R. Forman. Further applications, in
particular a fitting Ricci flow, are discussed.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 17:18:08 GMT"
}
]
| 2010-05-12T00:00:00 | [
[
"Saucan",
"Emil",
""
],
[
"Appleboilm",
"Eli",
""
],
[
"Wolansky",
"Gershon",
""
],
[
"Zeevi",
"Yehoshua Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0903.3685 | Italo Dejter Prof | Italo J. Dejter | Quasiperfect domination in triangular lattices | 20 pages, 9 figures, 5 arrays | Discussiones Mathematicae Graph Theory 29(2009) 179-198 | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A vertex subset $S$ of a graph $G$ is a perfect (resp. quasiperfect)
dominating set in $G$ if each vertex $v$ of $G\setminus S$ is adjacent to only
one vertex ($d_v\in\{1,2\}$ vertices) of $S$. Perfect and quasiperfect
dominating sets in the regular tessellation graph of Schl\"afli symbol
$\{3,6\}$ and in its toroidal quotients are investigated, yielding the
classification of their perfect dominating sets and most of their quasiperfect
dominating sets $S$ with induced components of the form $K_{\nu}$, where
$\nu\in\{1,2,3\}$ depends only on $S$.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2009 20:20:30 GMT"
}
]
| 2009-04-03T00:00:00 | [
[
"Dejter",
"Italo J.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3690 | Wei Pan | Xin Li and Marc Moreno Maza and Wei Pan | Computations modulo regular chains | 27 pages, 8 figures | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The computation of triangular decompositions are based on two fundamental
operations: polynomial GCDs modulo regular chains and regularity test modulo
saturated ideals. We propose new algorithms for these core operations relying
on modular methods and fast polynomial arithmetic. Our strategies take also
advantage of the context in which these operations are performed. We report on
extensive experimentation, comparing our code to pre-existing Maple
implementations, as well as more optimized Magma functions. In most cases, our
new code outperforms the other packages by several orders of magnitude.
| [
{
"version": "v1",
"created": "Sat, 21 Mar 2009 20:43:02 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Jul 2009 03:01:00 GMT"
}
]
| 2009-07-25T00:00:00 | [
[
"Li",
"Xin",
""
],
[
"Maza",
"Marc Moreno",
""
],
[
"Pan",
"Wei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0903.3696 | George Bell | George I. Bell | Notes on solving and playing peg solitaire on a computer | 25 pages, 11 figures, 8 tables. Some text rewritten, more ancillary
material added | null | null | null | math.CO cs.DM math.HO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the one-person game of peg solitaire played on a computer. Two
popular board shapes are the 33-hole cross-shaped board, and the 15-hole
triangle board---we use them as examples throughout. The basic game begins from
a full board with one peg missing and the goal is to finish at a board position
with one peg. First, we discuss ways to solve the basic game on a computer.
Then we consider the problem of quickly distinguishing board positions where
the goal can still be reached ("winning" board positions) from those where it
cannot. This enables a computer to alert the player if a jump under
consideration leads to a dead end. On the 15-hole triangle board, it is
possible to identify all winning board positions (from any single vacancy
start) by storing a key set of 437 board positions. For the "central game" on
the 33-hole cross-shaped board, we can identify all winning board positions by
storing 839,536 board positions. By viewing a successful game as a traversal of
a directed graph of winning board positions, we apply a simple algorithm to
count the number of ways to traverse this graph, and calculate that the total
number of solutions to the central game is 40,861,647,040,079,968. Our analysis
can also determine how quickly we can reach a "dead board position", where a
one peg finish is no longer possible.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 18:55:32 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Mar 2011 05:52:10 GMT"
},
{
"version": "v3",
"created": "Sun, 10 Apr 2011 15:39:26 GMT"
},
{
"version": "v4",
"created": "Thu, 6 Nov 2014 17:19:40 GMT"
}
]
| 2014-11-07T00:00:00 | [
[
"Bell",
"George I.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
}
]
|
0903.3715 | Jack Raymond | Jack Raymond | Optimal sparse CDMA detection at high load | Submitted to physcomnet09, 6 pages 6 figures, pdflatex | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Balancing efficiency of bandwidth use and complexity of detection involves
choosing a suitable load for a multi-access channel. In the case of synchronous
CDMA, with random codes, it is possible to demonstrate the existence of a
threshold in the load beyond which there is an apparent jump in computational
complexity. At small load unit clause propagation can determine a jointly
optimal detection of sources on a noiseless channel, but fails at high load.
Analysis provides insight into the difference between the standard dense random
codes and sparse codes, and the limitations of optimal detection in the sparse
case.
| [
{
"version": "v1",
"created": "Sun, 22 Mar 2009 10:53:51 GMT"
},
{
"version": "v2",
"created": "Fri, 22 May 2009 12:52:04 GMT"
}
]
| 2009-05-22T00:00:00 | [
[
"Raymond",
"Jack",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3741 | Alejandro Diaz-Caro | Pablo Arrighi (ENS-Lyon, LIP and Universite de Grenoble, LIG),
Alejandro Diaz-Caro (Universite de Grenoble, LIG, and Universite Paris-Nord,
Laboratoire LIPN) | A System F accounting for scalars | null | Logical Methods in Computer Science, Volume 8, Issue 1 (February
27, 2012) lmcs:846 | 10.2168/LMCS-8(1:11)2012 | null | cs.LO cs.PL quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Algebraic lambda-calculus and the Linear-Algebraic lambda-calculus extend
the lambda-calculus with the possibility of making arbitrary linear
combinations of terms. In this paper we provide a fine-grained, System F-like
type system for the linear-algebraic lambda-calculus. We show that this
"scalar" type system enjoys both the subject-reduction property and the
strong-normalisation property, our main technical results. The latter yields a
significant simplification of the linear-algebraic lambda-calculus itself, by
removing the need for some restrictions in its reduction rules. But the more
important, original feature of this scalar type system is that it keeps track
of 'the amount of a type' that is present in each term. As an example of its
use, we shown that it can serve as a guarantee that the normal form of a term
is barycentric, i.e that its scalars are summing to one.
| [
{
"version": "v1",
"created": "Sun, 22 Mar 2009 17:10:09 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Jul 2009 11:19:20 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Apr 2010 17:37:28 GMT"
},
{
"version": "v4",
"created": "Thu, 18 Nov 2010 11:40:41 GMT"
},
{
"version": "v5",
"created": "Sun, 24 Apr 2011 10:36:35 GMT"
},
{
"version": "v6",
"created": "Wed, 1 Feb 2012 14:40:41 GMT"
},
{
"version": "v7",
"created": "Thu, 23 Feb 2012 23:27:05 GMT"
},
{
"version": "v8",
"created": "Tue, 28 Feb 2012 08:59:44 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Arrighi",
"Pablo",
"",
"ENS-Lyon, LIP and Universite de Grenoble, LIG"
],
[
"Diaz-Caro",
"Alejandro",
"",
"Universite de Grenoble, LIG, and Universite Paris-Nord,\n Laboratoire LIPN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0903.3759 | Shah Asaduzzaman | Shah Asaduzzaman, Gregor v. Bochmann | GeoP2P: An adaptive peer-to-peer overlay for efficient search and update
of spatial information | 13 pages, Submitted to VLDB-2009 conference | null | null | null | cs.NI cs.DB cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a fully decentralized peer-to-peer overlay structure
GeoP2P, to facilitate geographic location based search and retrieval of
information. Certain limitations of centralized geographic indexes favor
peer-to-peer organization of the information, which, in addition to avoiding
performance bottleneck, allows autonomy over local information. Peer-to-peer
systems for geographic or multidimensional range queries built on existing DHTs
suffer from the inaccuracy in linearization of the multidimensional space.
Other overlay structures that are based on hierarchical partitioning of the
search space are not scalable because they use special super-peers to represent
the nodes in the hierarchy. GeoP2P partitions the search space hierarchically,
maintains the overlay structure and performs the routing without the need of
any super-peers. Although similar fully-decentralized overlays have been
previously proposed, they lack the ability to dynamically grow and retract the
partition hierarchy when the number of peers change. GeoP2P provides such
adaptive features with minimum perturbation of the system state. Such
adaptation makes both the routing delay and the state size of each peer
logarithmic to the total number of peers, irrespective of the size of the
multidimensional space. Our analysis also reveals that the overlay structure
and the routing algorithm are generic and independent of several aspects of the
partitioning hierarchy, such as the geometric shape of the zones or the
dimensionality of the search space.
| [
{
"version": "v1",
"created": "Sun, 22 Mar 2009 21:39:20 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Asaduzzaman",
"Shah",
""
],
[
"Bochmann",
"Gregor v.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0903.3786 | Ruoheng Liu | Ruoheng Liu, Tie Liu, H. Vincent Poor, Shlomo Shamai (Shitz) | Multiple-Input Multiple-Output Gaussian Broadcast Channels with
Confidential Messages | Submitted to the IEEE Transactions on Information Theory, March 2009 | null | null | null | cs.IT cs.CR math.IT | http://creativecommons.org/licenses/by/3.0/ | This paper considers the problem of secret communication over a two-receiver
multiple-input multiple-output (MIMO) Gaussian broadcast channel. The
transmitter has two independent messages, each of which is intended for one of
the receivers but needs to be kept asymptotically perfectly secret from the
other. It is shown that, surprisingly, under a matrix power constraint both
messages can be simultaneously transmitted at their respective maximal secrecy
rates. To prove this result, the MIMO Gaussian wiretap channel is revisited and
a new characterization of its secrecy capacity is provided via a new coding
scheme that uses artificial noise and random binning.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 04:26:25 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Liu",
"Ruoheng",
"",
"Shitz"
],
[
"Liu",
"Tie",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3797 | Benoit Combemale | Beno\^it Combemale (IRIT) | Personal report of the 3rd ECMDA-FA'07 conference | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Manuscripts notes taken during the conference ECMDA 2008. I give the full
conference program (title of the article and name of the person who introduced)
detailing some of the presentations.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 06:54:51 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Combemale",
"Benoît",
"",
"IRIT"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.3850 | Yves Bertot | Yves Bertot (INRIA Sophia Antipolis), Ekaterina Komendantskaya (INRIA
Sophia Antipolis) | Using Structural Recursion for Corecursion | null | Types 2008 5497 (2008) 220-236 | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a (limited) solution to the problem of constructing stream values
defined by recursive equations that do not respect the guardedness condition.
The guardedness condition is imposed on definitions of corecursive functions in
Coq, AGDA, and other higher-order proof assistants. In this paper, we
concentrate in particular on those non-guarded equations where recursive calls
appear under functions. We use a correspondence between streams and functions
over natural numbers to show that some classes of non-guarded definitions can
be modelled through the encoding as structural recursive functions. In
practice, this work extends the class of stream values that can be defined in a
constructive type theory-based theorem prover with inductive and coinductive
types, structural recursion and guarded corecursion
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 12:35:27 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Bertot",
"Yves",
"",
"INRIA Sophia Antipolis"
],
[
"Komendantskaya",
"Ekaterina",
"",
"INRIA\n Sophia Antipolis"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.3889 | Marius Zimand | Marius Zimand | On generating independent random strings | CiE 2009, Heidelberg | null | null | null | cs.IT cs.CC math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that from two strings that are partially random and independent
(in the sense of Kolmogorov complexity) it is possible to effectively construct
polynomially many strings that are random and pairwise independent. If the two
initial strings are random, then the above task can be performed in polynomial
time. It is also possible to construct in polynomial time a random string, from
two strings that have constant randomness rate.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 16:03:08 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Zimand",
"Marius",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.3900 | Osman Ugus | Osman Ugus, Dirk Westhoff, Ralf Laue, Abdulhadi Shoufan, and Sorin A.
Huss | Optimized Implementation of Elliptic Curve Based Additive Homomorphic
Encryption for Wireless Sensor Networks | null | null | null | null | cs.CR cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When deploying wireless sensor networks (WSNs) in public environments it may
become necessary to secure their data storage and transmission against possible
attacks such as node-compromise and eavesdropping. The nodes feature only small
computational and energy resources, thus requiring efficient algorithms. As a
solution for this problem the TinyPEDS approach was proposed in [7], which
utilizes the Elliptic Curve ElGamal (EC-ElGamal) cryptosystem for additive
homomorphic encryption allowing concealed data aggregation. This work presents
an optimized implementation of EC-ElGamal on a MicaZ mote, which is a typical
sensor node platform with 8-bit processor for WSNs. Compared to the best
previous result, our implementation is at least 44% faster for fixed-point
multiplication. Because most parts of the algorithm are similar to standard
Elliptic Curve algorithms, the results may be reused in other realizations on
constrained devices as well.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 16:43:01 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Ugus",
"Osman",
""
],
[
"Westhoff",
"Dirk",
""
],
[
"Laue",
"Ralf",
""
],
[
"Shoufan",
"Abdulhadi",
""
],
[
"Huss",
"Sorin A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0903.3926 | Andreas Meier | Martin Homik, Andreas Meier | Designing a GUI for Proofs - Evaluation of an HCI Experiment | null | null | null | SEKI Working-Paper SWP-2005-01 | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Often user interfaces of theorem proving systems focus on assisting
particularly trained and skilled users, i.e., proof experts. As a result, the
systems are difficult to use for non-expert users. This paper describes a paper
and pencil HCI experiment, in which (non-expert) students were asked to make
suggestions for a GUI for an interactive system for mathematical proofs. They
had to explain the usage of the GUI by applying it to construct a proof sketch
for a given theorem. The evaluation of the experiment provides insights for the
interaction design for non-expert users and the needs and wants of this user
group.
| [
{
"version": "v1",
"created": "Mon, 23 Mar 2009 18:38:01 GMT"
}
]
| 2009-03-24T00:00:00 | [
[
"Homik",
"Martin",
""
],
[
"Meier",
"Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.3995 | Jin Chu | Jinyu Chu, Ju Liu, Jianping Qiao, Xiaoling Wang and Yujun Li | Gradient-based adaptive interpolation in super-resolution image
restoration | 4pages, 7figures, This paper presents a super-resolution method based
on gradient-based adaptive interpolation | null | null | null | cs.MM cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This paper presents a super-resolution method based on gradient-based
adaptive interpolation. In this method, in addition to considering the distance
between the interpolated pixel and the neighboring valid pixel, the
interpolation coefficients take the local gradient of the original image into
account. The smaller the local gradient of a pixel is, the more influence it
should have on the interpolated pixel. And the interpolated high resolution
image is finally deblurred by the application of wiener filter. Experimental
results show that our proposed method not only substantially improves the
subjective and objective quality of restored images, especially enhances edges,
but also is robust to the registration error and has low computational
complexity.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 01:33:15 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Chu",
"Jinyu",
""
],
[
"Liu",
"Ju",
""
],
[
"Qiao",
"Jianping",
""
],
[
"Wang",
"Xiaoling",
""
],
[
"Li",
"Yujun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0903.4014 | Jun Muramatsu | Jun Muramatsu and Shigeki Miyake | Construction of Codes for Wiretap Channel and Secret Key Agreement from
Correlated Source Outputs by Using Sparse Matrices | A part of this paper is presented in part at 2009 IEEE Information
Theory Workshop (ITW2009), Taormina, Italy, pp.105-109, 2009. This paper is
submitted to IEEE Transactions on Information Theory. 34 pages | IEEE Transactions on Information Theory, vol. 58, no. 2, pp.
671-692, Feb. 2012 | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to prove coding theorems for the wiretap channel
coding problem and secret key agreement problem based on the the notion of a
hash property for an ensemble of functions. These theorems imply that codes
using sparse matrices can achieve the optimal rate. Furthermore, fixed-rate
universal coding theorems for a wiretap channel and a secret key agreement are
also proved.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 05:29:04 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Apr 2010 06:22:59 GMT"
}
]
| 2012-05-22T00:00:00 | [
[
"Muramatsu",
"Jun",
""
],
[
"Miyake",
"Shigeki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4035 | Iraklis Varlamis | A. Kritikopoulos, M. Sideri, I. Varlamis | BLOGRANK: Ranking Weblogs Based On Connectivity And Similarity Features | 9 pages, in 2nd international workshop on Advanced architectures and
algorithms for internet delivery and applications | Proceedings of the 2nd international Workshop on Advanced
Architectures and Algorithms For internet Delivery and Applications (Pisa,
Italy, October 10 - 10, 2006). AAA-IDEA '06 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A large part of the hidden web resides in weblog servers. New content is
produced in a daily basis and the work of traditional search engines turns to
be insufficient due to the nature of weblogs. This work summarizes the
structure of the blogosphere and highlights the special features of weblogs. In
this paper we present a method for ranking weblogs based on the link graph and
on several similarity characteristics between weblogs. First we create an
enhanced graph of connected weblogs and add new types of edges and weights
utilising many weblog features. Then, we assign a ranking to each weblog using
our algorithm, BlogRank, which is a modified version of PageRank. For the
validation of our method we run experiments on a weblog dataset, which we
process and adapt to our search engine. (http://spiderwave.aueb.gr/Blogwave).
The results suggest that the use of the enhanced graph and the BlogRank
algorithm is preferred by the users.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 08:36:21 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Kritikopoulos",
"A.",
""
],
[
"Sideri",
"M.",
""
],
[
"Varlamis",
"I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.4036 | Hassane Alla | Abbas Dideban, Hassane Alla (GIPSA-lab) | Feedback control logic synthesis for non safe Petri nets | null | 13th IFAC Symposium on INFORMATION CONTROL PROBLEMS IN
MANUFACTURING, Moscou : Russie (2009) | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the problem of forbidden states of non safe Petri Net
(PN) modelling discrete events systems. To prevent the forbidden states, it is
possible to use conditions or predicates associated with transitions.
Generally, there are many forbidden states, thus many complex conditions are
associated with the transitions. A new idea for computing predicates in non
safe Petri nets will be presented. Using this method, we can construct a
maximally permissive controller if it exists.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 08:40:33 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Dideban",
"Abbas",
"",
"GIPSA-lab"
],
[
"Alla",
"Hassane",
"",
"GIPSA-lab"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4046 | Baris Baykant Alagoz | B. Baykant Alagoz | Boolean Logic with Fault Tolerant Coding | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Error detectable and error correctable coding in Hamming space was researched
to discover possible fault tolerant coding constellations, which can implement
Boolean logic with fault tolerant property. Basic logic operators of the
Boolean algebra were developed to apply fault tolerant coding in the logic
circuits. It was shown that application of three-bit fault tolerant codes have
provided the digital system skill of auto-recovery without need for designing
additional-fault tolerance mechanisms.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 09:33:40 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Apr 2009 08:53:28 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Alagoz",
"B. Baykant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.4053 | Fortis Alexandra Ms. | Laura Stefan | The generating of Fractal Images Using MathCAD Program | 10 pages, exposed on 2nd "European Conference on Computer Science and
Applications" - XA2008, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series 6 (2008), 211 - 220 | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the graphic representation in the z-plane of the first
three iterations of the algorithm that generates the Sierpinski Gasket. It
analyzes the influence of the f(z) map when we represent fractal images.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 10:10:37 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Stefan",
"Laura",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0903.4100 | Shah Asaduzzaman | Shah Asaduzzaman, Muthucumaru Maheswaran | Decentralized Management of Bi-modal Network Resources in a Distributed
Stream Processing Platform | 17 pages, submitted to Journal of Parallel and Distributed Computing | null | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents resource management techniques for allocating
communication and computational resources in a distributed stream processing
platform. The platform is designed to exploit the synergy of two classes of
network connections -- dedicated and opportunistic. Previous studies we
conducted have demonstrated the benefits of such bi-modal resource organization
that combines small pools of dedicated computers with a very large pool of
opportunistic computing capacities of idle computers to serve high throughput
computing applications. This paper extends the idea of bi-modal resource
organization into the management of communication resources. Since distributed
stream processing applications demand large volume of data transmission between
processing sites at a consistent rate, adequate control over the network
resources is important to assure a steady flow of processing. The system model
used in this paper is a platform where stream processing servers at distributed
sites are interconnected with a combination of dedicated and opportunistic
communication links. Two pertinent resource allocation problems are analyzed in
details and solved using decentralized algorithms. One is the mapping of the
stream processing tasks on the processing and the communication resources. The
other is the adaptive re-allocation of the opportunistic communication links
due to the variations in their capacities. Overall optimization goal is higher
task throughput and better utilization of the expensive dedicated links. The
evaluation demonstrates that the algorithms are able to exploit the synergy of
bi-modal communication links towards achieving the optimization goals.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 15:37:03 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Asaduzzaman",
"Shah",
""
],
[
"Maheswaran",
"Muthucumaru",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.4101 | Evira Mayordomo | Elvira Mayordomo, Philippe Moser, Sylvain Perifel | Polylog space compression, pushdown compression, and Lempel-Ziv are
incomparable | null | null | null | null | cs.CC cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The pressing need for efficient compression schemes for XML documents has
recently been focused on stack computation, and in particular calls for a
formulation of information-lossless stack or pushdown compressors that allows a
formal analysis of their performance and a more ambitious use of the stack in
XML compression, where so far it is mainly connected to parsing mechanisms. In
this paper we introduce the model of pushdown compressor, based on pushdown
transducers that compute a single injective function while keeping the widest
generality regarding stack computation.
We also consider online compression algorithms that use at most
polylogarithmic space (plogon). These algorithms correspond to compressors in
the data stream model.
We compare the performance of these two families of compressors with each
other and with the general purpose Lempel-Ziv algorithm. This comparison is
made without any a priori assumption on the data's source and considering the
asymptotic compression ratio for infinite sequences. We prove that in all cases
they are incomparable.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 15:37:21 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Mayordomo",
"Elvira",
""
],
[
"Moser",
"Philippe",
""
],
[
"Perifel",
"Sylvain",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.4113 | Shah Asaduzzaman | Shah Asaduzzaman, Gregor v. Bochmann | Overlay Structure for Large Scale Content Sharing: Leveraging Geography
as the Basis for Routing Locality | 5 pages, position paper | null | null | null | cs.NI cs.DC cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we place our arguments on two related issues in the design of
generalized structured peer-to-peer overlays. First, we argue that for the
large-scale content-sharing applications, lookup and content transport
functions need to be treated separately. Second, to create a location-based
routing overlay suitable for content sharing and other applications, we argue
that off-the-shelf geographic coordinates of Internet-connected hosts can be
used as a basis. We then outline the design principles and present a design for
the generalized routing overlay based on adaptive hierarchical partitioning of
the geographical space.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 16:16:26 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Asaduzzaman",
"Shah",
""
],
[
"Bochmann",
"Gregor v.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0903.4128 | Rohit Aggarwal | Rohit Aggarwal, Philip Schniter, and C. Emre Koksal | Rate Adaptation via Link-Layer Feedback for Goodput Maximization over a
Time-Varying Channel | 25 pages, 9 figures, submitted to IEEE Transactions on Wireless
Communications in August 2008 and revised in March 2009 | null | null | null | cs.IT cs.NI math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider adapting the transmission rate to maximize the goodput, i.e., the
amount of data transmitted without error, over a continuous Markov flat-fading
wireless channel. In particular, we consider schemes in which transmitter
channel state is inferred from degraded causal error-rate feedback, such as
packet-level ACK/NAKs in an automatic repeat request (ARQ) system. In such
schemes, the choice of transmission rate affects not only the subsequent
goodput but also the subsequent feedback, implying that the optimal rate
schedule is given by a partially observable Markov decision process (POMDP).
Because solution of the POMDP is computationally impractical, we consider
simple suboptimal greedy rate assignment and show that the optimal scheme would
itself be greedy if the error-rate feedback was non-degraded. Furthermore, we
show that greedy rate assignment using non-degraded feedback yields a total
goodput that upper bounds that of optimal rate assignment using degraded
feedback. We then detail the implementation of the greedy scheme and propose a
reduced-complexity greedy scheme that adapts the transmission rate only once
per block of packets. We also investigate the performance of the schemes
numerically, and show that the proposed greedy scheme achieves steady-state
goodputs that are reasonably close to the upper bound on goodput calculated
using non-degraded feedback. A similar improvement is obtained in steady-state
goodput, drop rate, and average buffer occupancy in the presence of data
buffers. We also investigate an upper bound on the performance of optimal rate
assignment for a discrete approximation of the channel and show that such
quantization leads to a significant loss in achievable goodput.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 16:43:40 GMT"
}
]
| 2009-03-25T00:00:00 | [
[
"Aggarwal",
"Rohit",
""
],
[
"Schniter",
"Philip",
""
],
[
"Koksal",
"C. Emre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0903.4130 | Amr Elmasry | Amr Elmasry | Pairing Heaps with Costless Meld | 10 pages, 2 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Improving the structure and analysis in \cite{elm0}, we give a variation of
the pairing heaps that has amortized zero cost per meld (compared to an $O(\log
\log{n})$ in \cite{elm0}) and the same amortized bounds for all other
operations. More precisely, the new pairing heap requires: no cost per meld,
O(1) per find-min and insert, $O(\log{n})$ per delete-min, and $O(\log\log{n})$
per decrease-key. These bounds are the best known for any self-adjusting heap,
and match the lower bound proved by Fredman for a family of such heaps.
Moreover, the changes we have done make our structure even simpler than that in
\cite{elm0}.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 16:49:57 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Apr 2009 15:46:42 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Elmasry",
"Amr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.4132 | Bernat Corominas-Murtra BCM | Joaqu\'in Go\~ni, I\~nigo Martincorena, Bernat Corominas-Murtra,
Gonzalo Arrondo, Sergio Ardanza-Trevijano, Pablo Villoslada | Switcher-random-walks: a cognitive-inspired mechanism for network
exploration | 9 pages, 3 figures. Accepted in "International Journal of
Bifurcations and Chaos": Special issue on "Modelling and Computation on
Complex Networks" | International Journal of Bifurcation and Chaos 20, 913-922 (2010) | 10.1142/S0218127410026204 | null | cs.AI cond-mat.dis-nn physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Semantic memory is the subsystem of human memory that stores knowledge of
concepts or meanings, as opposed to life specific experiences. The organization
of concepts within semantic memory can be understood as a semantic network,
where the concepts (nodes) are associated (linked) to others depending on
perceptions, similarities, etc. Lexical access is the complementary part of
this system and allows the retrieval of such organized knowledge. While
conceptual information is stored under certain underlying organization (and
thus gives rise to a specific topology), it is crucial to have an accurate
access to any of the information units, e.g. the concepts, for efficiently
retrieving semantic information for real-time needings. An example of an
information retrieval process occurs in verbal fluency tasks, and it is known
to involve two different mechanisms: -clustering-, or generating words within a
subcategory, and, when a subcategory is exhausted, -switching- to a new
subcategory. We extended this approach to random-walking on a network
(clustering) in combination to jumping (switching) to any node with certain
probability and derived its analytical expression based on Markov chains.
Results show that this dual mechanism contributes to optimize the exploration
of different network models in terms of the mean first passage time.
Additionally, this cognitive inspired dual mechanism opens a new framework to
better understand and evaluate exploration, propagation and transport phenomena
in other complex systems where switching-like phenomena are feasible.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 16:52:18 GMT"
}
]
| 2010-06-18T00:00:00 | [
[
"Goñi",
"Joaquín",
""
],
[
"Martincorena",
"Iñigo",
""
],
[
"Corominas-Murtra",
"Bernat",
""
],
[
"Arrondo",
"Gonzalo",
""
],
[
"Ardanza-Trevijano",
"Sergio",
""
],
[
"Villoslada",
"Pablo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0903.4207 | G David Forney Jr. | G. David Forney Jr | MacWilliams Identities for Codes on Graphs | 5 pages, 2 figures; final version to be presented at IEEE Information
Theory Workshop, Taormina, Sicily, Oct. 11-16, 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The MacWilliams identity for linear time-invariant convolutional codes that
has recently been found by Gluesing-Luerssen and Schneider is proved concisely,
and generalized to arbitrary group codes on graphs. A similar development
yields a short, transparent proof of the dual sum-product update rule.
| [
{
"version": "v1",
"created": "Tue, 24 Mar 2009 21:56:54 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 15:42:21 GMT"
}
]
| 2009-08-04T00:00:00 | [
[
"Forney",
"G. David",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4217 | John Langford | Alina Beygelzimer, John Langford, Yuri Lifshits, Gregory Sorkin, and
Alex Strehl | Conditional Probability Tree Estimation Analysis and Algorithms | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of estimating the conditional probability of a label
in time $O(\log n)$, where $n$ is the number of possible labels. We analyze a
natural reduction of this problem to a set of binary regression problems
organized in a tree structure, proving a regret bound that scales with the
depth of the tree. Motivated by this analysis, we propose the first online
algorithm which provably constructs a logarithmic depth tree on the set of
labels to solve this problem. We test the algorithm empirically, showing that
it works succesfully on a dataset with roughly $10^6$ labels.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 00:28:44 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 21:19:34 GMT"
}
]
| 2009-06-04T00:00:00 | [
[
"Beygelzimer",
"Alina",
""
],
[
"Langford",
"John",
""
],
[
"Lifshits",
"Yuri",
""
],
[
"Sorkin",
"Gregory",
""
],
[
"Strehl",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.4237 | Joshua Brown Kramer | Josh Brown Kramer and Lucas Sabalka | Projection-Forcing Multisets of Weight Changes | 11 Pages | Journal of Combinatorial Theory, Series A, 117(8): 1136-1142, 2010 | 10.1016/j.jcta.2010.01.005 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $F$ be a finite field. A multiset $S$ of integers is projection-forcing
if for every linear function $\phi : F^n \to F^m$ whose multiset of weight
changes is $S$, $\phi$ is a coordinate projection up to permutation and scaling
of entries. The MacWilliams Extension Theorem from coding theory says that $S =
\{0, 0, ..., 0\}$ is projection-forcing. We give a (super-polynomial) algorithm
to determine whether or not a given $S$ is projection-forcing. We also give a
condition that can be checked in polynomial time that implies that $S$ is
projection-forcing. This result is a generalization of the MacWilliams
Extension Theorem and work by the first author.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 05:10:36 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Feb 2010 20:40:27 GMT"
}
]
| 2011-10-13T00:00:00 | [
[
"Kramer",
"Josh Brown",
""
],
[
"Sabalka",
"Lucas",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4251 | Artur Ferreira | Artur Ferreira, Arlindo Oliveira, Mario Figueiredo | On the Use of Suffix Arrays for Memory-Efficient Lempel-Ziv Data
Compression | 10 pages, submited to IEEE - Data Compression Conference 2009 | null | 10.1109/DCC.2009.50 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Much research has been devoted to optimizing algorithms of the Lempel-Ziv
(LZ) 77 family, both in terms of speed and memory requirements. Binary search
trees and suffix trees (ST) are data structures that have been often used for
this purpose, as they allow fast searches at the expense of memory usage.
In recent years, there has been interest on suffix arrays (SA), due to their
simplicity and low memory requirements. One key issue is that an SA can solve
the sub-string problem almost as efficiently as an ST, using less memory. This
paper proposes two new SA-based algorithms for LZ encoding, which require no
modifications on the decoder side. Experimental results on standard benchmarks
show that our algorithms, though not faster, use 3 to 5 times less memory than
the ST counterparts. Another important feature of our SA-based algorithms is
that the amount of memory is independent of the text to search, thus the memory
that has to be allocated can be defined a priori. These features of low and
predictable memory requirements are of the utmost importance in several
scenarios, such as embedded systems, where memory is at a premium and speed is
not critical. Finally, we point out that the new algorithms are general, in the
sense that they are adequate for applications other than LZ compression, such
as text retrieval and forward/backward sub-string search.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 19:25:24 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Ferreira",
"Artur",
""
],
[
"Oliveira",
"Arlindo",
""
],
[
"Figueiredo",
"Mario",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.4258 | Martin Burkhart | Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos | SEPIA: Security through Private Information Aggregation | null | null | null | TIK-Report No. 298 | cs.NI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Secure multiparty computation (MPC) allows joint privacy-preserving
computations on data of multiple parties. Although MPC has been studied
substantially, building solutions that are practical in terms of computation
and communication cost is still a major challenge. In this paper, we
investigate the practical usefulness of MPC for multi-domain network security
and monitoring. We first optimize MPC comparison operations for processing high
volume data in near real-time. We then design privacy-preserving protocols for
event correlation and aggregation of network traffic statistics, such as
addition of volume metrics, computation of feature entropy, and distinct item
count. Optimizing performance of parallel invocations, we implement our
protocols along with a complete set of basic operations in a library called
SEPIA. We evaluate the running time and bandwidth requirements of our protocols
in realistic settings on a local cluster as well as on PlanetLab and show that
they work in near real-time for up to 140 input providers and 9 computation
nodes. Compared to implementations using existing general-purpose MPC
frameworks, our protocols are significantly faster, requiring, for example, 3
minutes for a task that takes 2 days with general-purpose frameworks. This
improvement paves the way for new applications of MPC in the area of
networking. Finally, we run SEPIA's protocols on real traffic traces of 17
networks and show how they provide new possibilities for distributed
troubleshooting and early anomaly detection.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 08:23:07 GMT"
},
{
"version": "v2",
"created": "Wed, 13 May 2009 08:07:39 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Oct 2009 12:55:49 GMT"
},
{
"version": "v4",
"created": "Tue, 16 Feb 2010 16:10:46 GMT"
}
]
| 2010-02-16T00:00:00 | [
[
"Burkhart",
"Martin",
""
],
[
"Strasser",
"Mario",
""
],
[
"Many",
"Dilip",
""
],
[
"Dimitropoulos",
"Xenofontas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0903.4261 | Florentina Pintea | Florentina Anica Pintea | On-Line Tests | 8 pages, exposed on 4th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 77-84 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an interactive implementation which makes the link
between a human operator and a system of a administration of a relational
databases MySQL. This application conceived as a multimedia presentations is
illustrative for the way in which the transfer and the remaking of the
information between the human operator, the module of data processing and the
database which stores the informations can be solved (with help of the PHP
language and the web use).
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 08:43:19 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Pintea",
"Florentina Anica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0903.4266 | Martin Burkhart | Martin Burkhart, Daniela Brauckhoff, Martin May, Elisa Boschi | The Risk-Utility Tradeoff for IP Address Truncation | null | 1st ACM Workshop on Network Data Anonymization (NDA), Fairfax,
Virginia, USA, October, 2008 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Network operators are reluctant to share traffic data due to security and
privacy concerns. Consequently, there is a lack of publicly available traces
for validating and generalizing the latest results in network and security
research. Anonymization is a possible solution in this context; however, it is
unclear how the sanitization of data preserves characteristics important for
traffic analysis. In addition, the privacy-preserving property of
state-of-the-art IP address anonymization techniques has come into question by
recent attacks that successfully identified a large number of hosts in
anonymized traces.
In this paper, we examine the tradeoff between data utility for anomaly
detection and the risk of host identification for IP address truncation.
Specifically, we analyze three weeks of unsampled and non-anonymized network
traces from a medium-sized backbone network to assess data utility. The risk of
de-anonymizing individual IP addresses is formally evaluated, using a metric
based on conditional entropy.
Our results indicate that truncation effectively prevents host identification
but degrades the utility of data for anomaly detection. However, the degree of
degradation depends on the metric used and whether network-internal or external
addresses are considered. Entropy metrics are more resistant to truncation than
unique counts and the detection quality of anomalies degrades much faster in
internal addresses than in external addresses. In particular, the usefulness of
internal address counts is lost even for truncation of only 4 bits whereas
utility of external address entropy is virtually unchanged even for truncation
of 20 bits.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 09:06:32 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Burkhart",
"Martin",
""
],
[
"Brauckhoff",
"Daniela",
""
],
[
"May",
"Martin",
""
],
[
"Boschi",
"Elisa",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.4267 | Florentina Pintea | Ioan Despi, Lucian Luca | Delving into Transition to the Semantic Web | 10 pages, exposed on 4th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 7-16 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The semantic technologies pose new challenge for the way in which we built
and operate systems. They are tools used to represent significances,
associations, theories, separated from data and code. Their goal is to create,
to discover, to represent, to organize, to process, to manage, to ratiocinate,
to represent, to share and use the significances and knowledge to fulfill the
business, personal or social goals.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 09:14:39 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Despi",
"Ioan",
""
],
[
"Luca",
"Lucian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0903.4270 | Florentina Pintea | Alexandra Emilia Fortis | Analysis of some properties for a basic Petri net model | 8 pages, exposed on 4th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 17-24 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The formalism of the models with Petri networks provides a sound theoretical
base, supported by powerful mathematical methods able to extract information
necessary for the formalism and simulation of the real system that provides
features of competition and synchronization. The paper presents a model based
on a Petri net, in order to extract information relative to the technological
producing process of a food additive.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 09:29:27 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Fortis",
"Alexandra Emilia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.4283 | Florentina Pintea | Timur Chis | Pipeline Leak Detection Techniques | 10 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 25-34 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Leak detection systems range from simple, visual line walking and checking
ones to complex arrangements of hard-ware and software. No one method is
universally applicable and operating requirements dictate which method is the
most cost effective. The aim of the paper is to review the basic techniques of
leak detection that are currently in use. The advantages and disadvantages of
each method are discussed and some indications of applicability are outlined.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 09:57:38 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Chis",
"Timur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.4286 | Florentina Pintea | Timur Chis | Computer Systems to Oil Pipeline Transporting | 10 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 35-44 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computer systems in the pipeline oil transporting that the greatest amount of
data can be gathered, analyzed and acted upon in the shortest amount of time.
Most operators now have some form of computer based monitoring system employing
either commercially available or custom developed software to run the system.
This paper presented the SCADA systems to oil pipeline in concordance to the
Romanian environmental reglementations.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 10:09:18 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Chis",
"Timur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.4293 | Florentina Pintea | Petre Bucur, Lucian Luca | Non linear system become linear system | 8 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 55-62 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present paper refers to the theory and the practice of the systems
regarding non-linear systems and their applications. We aimed the integration
of these systems to elaborate their response as well as to highlight some
outstanding features.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 10:40:25 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Bucur",
"Petre",
""
],
[
"Luca",
"Lucian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.4298 | Florentina Pintea | Mihai Timis | Design of Log-Map / Max-Log-Map Decoder | 8 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 63-70 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The process of turbo-code decoding starts with the formation of a posteriori
probabilities (APPs) for each data bit, which is followed by choosing the
data-bit value that corresponds to the maximum a posteriori (MAP) probability
for that data bit. Upon reception of a corrupted code-bit sequence, the process
of decision making with APPs allows the MAP algorithm to determine the most
likely information bit to have been transmitted at each bit time.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 11:12:42 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Timis",
"Mihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4299 | Florentina Pintea | Virgiliu Streian, Adela Ionescu | Token Ring Project | 6 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 85-90 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ring topology is a simple configuration used to connect processes that
communicate among themselves. A number of network standards such as token ring,
token bus, and FDDI are based on the ring connectivity. This article will
develop an implementation of a ring of processes that communicate among
themselves via pipe links. The processes are nodes in the ring. Each process
reads from its standard input and writes in its standard output. N-1 process
redirects the its standard output to a standard input of the process through a
pipe. When the ring-structure is designed, the project can be extended to
simulate networks or to implement algorithms for mutual exclusion.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 11:19:56 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Streian",
"Virgiliu",
""
],
[
"Ionescu",
"Adela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.4302 | Florentina Pintea | Daniela Ilea, Dan L. Lacrama | ShopList: Programming PDA applications for Windows Mobile using C# | 8 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 91-98 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is focused on a C# and Sql Server Mobile 2005 application to keep
evidence of a shop list. The purpose of the application is to offer to the user
an easier way to manage his shopping options.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 11:26:50 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Ilea",
"Daniela",
""
],
[
"Lacrama",
"Dan L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0903.4305 | Florentina Pintea | Diana Sophia Codat | Evaluation d'une requete en SQL | 6 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 99-104 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The objective of this paper is to show how the interrogation processor
responds to SQL interrogation. The interrogation processor is split into two
parts. The first, called the interrogation compiler translates an SQL query
into a plan of physical execution. The second, called evaluation query runs the
execution plan.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 11:39:31 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 14:55:54 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Codat",
"Diana Sophia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0903.4307 | Florentina Pintea | Simona Apostol | FISLAB - the Fuzzy Inference Tool-box for SCILAB | null | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 105-114 | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present study represents "The Fislab package of programs meant to develop
the fuzzy regulators in the Scilab environment" in which we present some
general issues, usage requirements and the working mode of the Fislab
environment. In the second part of the article some features of the Scilab
functions from the Fislab package are described.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 11:42:46 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Apostol",
"Simona",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0903.4313 | Florentina Pintea | Simona Apostol | The development of a fuzzy regulator with an entry and an output in
Fislab | 6 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 115-120 | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present article is a sequel of the article "Fislab the Fuzzy Inference
Tool-Box for Scilab" and it represents the practical application of:"The
development of the Fuzzy regulator with an input and an output in Fislab". The
article contains, besides this application, some functions to be used in the
program, namely Scilab functions for the fuzzification of the firm information,
functions for the operation of de-fuzzification and functions for the
implementation of.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 12:10:32 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Apostol",
"Simona",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0903.4314 | Florentina Pintea | Dan L. Lacrama, Dorina Fera | Virtual Reality | 8 pages, exposed on 4th International Conferences "Actualities and
Perspectives on Hardware and Software" - APHS2007, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series V (2007), 137-144 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is focused on the presentation of Virtual Reality principles
together with the main implementation methods and techniques. An overview of
the main development directions is included.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 12:16:29 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Lacrama",
"Dan L.",
""
],
[
"Fera",
"Dorina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0903.4358 | Mohammad Torabi Dashti | M. Torabi Dashti | Sums of powers via integration | 4 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sum of powers 1^p+...+n^p, with n and p being natural numbers and n>=1, can
be expressed as a polynomial function of n of degree p+1. Such representations
are often called Faulhaber formulae. A simple recursive algorithm for computing
coefficients of Faulhaber formulae is presented. The correctness of the
algorithm is proved by giving a recurrence relation on Faulhaber formulae.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 14:36:48 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Dashti",
"M. Torabi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.4365 | Shah Asaduzzaman | Shah Asaduzzaman, Ying Qiao, Gregor v. Bochmann | CliqueStream: an efficient and fault-resilient live streaming network on
a clustered peer-to-peer overlay | 10 pages | Proc. 8th IEEE Intl. Conf. on Peer-to-Peer Computing (P2P'08),
Sep. 2008, Aachen, Germany | 10.1109/P2P.2008.35 | null | cs.NI cs.DC cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several overlay-based live multimedia streaming platforms have been proposed
in the recent peer-to-peer streaming literature. In most of the cases, the
overlay neighbors are chosen randomly for robustness of the overlay. However,
this causes nodes that are distant in terms of proximity in the underlying
physical network to become neighbors, and thus data travels unnecessary
distances before reaching the destination. For efficiency of bulk data
transmission like multimedia streaming, the overlay neighborhood should
resemble the proximity in the underlying network. In this paper, we exploit the
proximity and redundancy properties of a recently proposed clique-based
clustered overlay network, named eQuus, to build efficient as well as robust
overlays for multimedia stream dissemination. To combine the efficiency of
content pushing over tree structured overlays and the robustness of data-driven
mesh overlays, higher capacity stable nodes are organized in tree structure to
carry the long haul traffic and less stable nodes with intermittent presence
are organized in localized meshes. The overlay construction and fault-recovery
procedures are explained in details. Simulation study demonstrates the good
locality properties of the platform. The outage time and control overhead
induced by the failure recovery mechanism are minimal as demonstrated by the
analysis.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 15:58:47 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Mar 2009 22:41:42 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Asaduzzaman",
"Shah",
""
],
[
"Qiao",
"Ying",
""
],
[
"Bochmann",
"Gregor v.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0903.4366 | Dimitri Hendriks | Joerg Endrullis, Clemens Grabmayer, Dimitri Hendriks | Complexity of Fractran and Productivity | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In functional programming languages the use of infinite structures is common
practice. For total correctness of programs dealing with infinite structures
one must guarantee that every finite part of the result can be evaluated in
finitely many steps. This is known as productivity. For programming with
infinite structures, productivity is what termination in well-defined results
is for programming with finite structures.
Fractran is a simple Turing-complete programming language invented by Conway.
We prove that the question whether a Fractran program halts on all positive
integers is Pi^0_2-complete. In functional programming, productivity typically
is a property of individual terms with respect to the inbuilt evaluation
strategy. By encoding Fractran programs as specifications of infinite lists, we
establish that this notion of productivity is Pi^0_2-complete even for the most
simple specifications. Therefore it is harder than termination of individual
terms. In addition, we explore possible generalisations of the notion of
productivity in the framework of term rewriting, and prove that their
computational complexity is Pi^1_1-complete, thus exceeding the expressive
power of first-order logic.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 15:14:00 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2009 10:05:41 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Jul 2009 18:33:42 GMT"
}
]
| 2009-07-31T00:00:00 | [
[
"Endrullis",
"Joerg",
""
],
[
"Grabmayer",
"Clemens",
""
],
[
"Hendriks",
"Dimitri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.4378 | Shah Asaduzzaman | Shah Asaduzzaman, Muthucumaru Maheswaran | Using Dedicated and Opportunistic Networks in Synergy for a
Cost-effective Distributed Stream Processing Platform | 9 pages | Proc. 14th IEEE Intl. Conf. on Parallel and Distributed Systems
(ICPADS), Dec. 2008, Melbourne, Australia | 10.1109/ICPADS.2008.116 | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a case for exploiting the synergy of dedicated and
opportunistic network resources in a distributed hosting platform for data
stream processing applications. Our previous studies have demonstrated the
benefits of combining dedicated reliable resources with opportunistic resources
in case of high-throughput computing applications, where timely allocation of
the processing units is the primary concern. Since distributed stream
processing applications demand large volume of data transmission between the
processing sites at a consistent rate, adequate control over the network
resources is important here to assure a steady flow of processing. In this
paper, we propose a system model for the hybrid hosting platform where stream
processing servers installed at distributed sites are interconnected with a
combination of dedicated links and public Internet. Decentralized algorithms
have been developed for allocation of the two classes of network resources
among the competing tasks with an objective towards higher task throughput and
better utilization of expensive dedicated resources. Results from extensive
simulation study show that with proper management, systems exploiting the
synergy of dedicated and opportunistic resources yield considerably higher task
throughput and thus, higher return on investment over the systems solely using
expensive dedicated resources.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 16:01:00 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Asaduzzaman",
"Shah",
""
],
[
"Maheswaran",
"Muthucumaru",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.4382 | Amir Ben-Amram | Amir M. Ben-Amram and Chin Soon Lee | Ranking Functions for Size-Change Termination II | 29 pages; | Logical Methods in Computer Science, Volume 5, Issue 2 (May 25,
2009) lmcs:1000 | 10.2168/LMCS-5(2:8)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Size-Change Termination is an increasingly-popular technique for verifying
program termination. These termination proofs are deduced from an abstract
representation of the program in the form of "size-change graphs".
We present algorithms that, for certain classes of size-change graphs, deduce
a global ranking function: an expression that ranks program states, and
decreases on every transition. A ranking function serves as a witness for a
termination proof, and is therefore interesting for program certification. The
particular form of the ranking expressions that represent SCT termination
proofs sheds light on the scope of the proof method. The complexity of the
expressions is also interesting, both practicaly and theoretically.
While deducing ranking functions from size-change graphs has already been
shown possible, the constructions in this paper are simpler and more
transparent than previously known. They improve the upper bound on the size of
the ranking expression from triply exponential down to singly exponential (for
certain classes of instances). We claim that this result is, in some sense,
optimal. To this end, we introduce a framework for lower bounds on the
complexity of ranking expressions and prove exponential lower bounds.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 17:47:30 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2009 10:51:36 GMT"
},
{
"version": "v3",
"created": "Mon, 11 May 2009 12:05:58 GMT"
},
{
"version": "v4",
"created": "Mon, 25 May 2009 11:29:03 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Ben-Amram",
"Amir M.",
""
],
[
"Lee",
"Chin Soon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0903.4386 | Bari\c{s} Nakibo\u{g}lu | Baris Nakiboglu and Lizhong Zheng | Error-and-Erasure Decoding for Block Codes with Feedback | 33 pages, 1 figures | IEEE Transactions on Information Theory, 58(1):24-49, Jan 2012 | 10.1109/TIT.2011.2169529 10.1109/ISIT.2008.4595079 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inner and outer bounds are derived on the optimal performance of fixed length
block codes on discrete memoryless channels with feedback and
errors-and-erasures decoding. First an inner bound is derived using a two phase
encoding scheme with communication and control phases together with the optimal
decoding rule for the given encoding scheme, among decoding rules that can be
represented in terms of pairwise comparisons between the messages. Then an
outer bound is derived using a generalization of the straight-line bound to
errors-and-erasures decoders and the optimal error exponent trade off of a
feedback encoder with two messages. In addition upper and lower bounds are
derived, for the optimal erasure exponent of error free block codes in terms of
the rate. Finally we present a proof of the fact that the optimal trade off
between error exponents of a two message code does not increase with feedback
on DMCs.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 16:27:37 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Aug 2010 23:19:47 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Oct 2010 17:33:37 GMT"
},
{
"version": "v4",
"created": "Thu, 1 Sep 2011 23:53:54 GMT"
}
]
| 2020-01-03T00:00:00 | [
[
"Nakiboglu",
"Baris",
""
],
[
"Zheng",
"Lizhong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4392 | Shah Asaduzzaman | Shah Asaduzzaman, Muthucumaru Maheswaran | Towards a decentralized algorithm for mapping network and computational
resources for distributed data-flow computations | 7 pages | Proc. 21st IEEE Intl. Symp. on High Performance Computing Systems
and Applications (HPCS), May 2007, Saskatoon, SK, Canada | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several high-throughput distributed data-processing applications require
multi-hop processing of streams of data. These applications include continual
processing on data streams originating from a network of sensors, composing a
multimedia stream through embedding several component streams originating from
different locations, etc. These data-flow computing applications require
multiple processing nodes interconnected according to the data-flow topology of
the application, for on-stream processing of the data. Since the applications
usually sustain for a long period, it is important to optimally map the
component computations and communications on the nodes and links in the
network, fulfilling the capacity constraints and optimizing some quality metric
such as end-to-end latency. The mapping problem is unfortunately NP-complete
and heuristics have been previously proposed to compute the approximate
solution in a centralized way. However, because of the dynamicity of the
network, it is practically impossible to aggregate the correct state of the
whole network in a single node. In this paper, we present a distributed
algorithm for optimal mapping of the components of the data flow applications.
We propose several heuristics to minimize the message complexity of the
algorithm while maintaining the quality of the solution.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 16:32:22 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Asaduzzaman",
"Shah",
""
],
[
"Maheswaran",
"Muthucumaru",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0903.4426 | Daniel Lucani | Daniel E. Lucani, Muriel M\'edard, Milica Stojanovic | Capacity Scaling Laws for Underwater Networks | 5 pages, 2 figures, to Appear in Proceedings of Asilomar Conference
on Signals, Systems, and Computers, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The underwater acoustic channel is characterized by a path loss that depends
not only on the transmission distance, but also on the signal frequency.
Signals transmitted from one user to another over a distance $l$ are subject to
a power loss of $l^{-\alpha}{a(f)}^{-l}$. Although a terrestrial radio channel
can be modeled similarly, the underwater acoustic channel has different
characteristics. The spreading factor $\alpha$, related to the geometry of
propagation, has values in the range $1 \leq \alpha \leq 2$. The absorption
coefficient $a(f)$ is a rapidly increasing function of frequency: it is three
orders of magnitude greater at 100 kHz than at a few Hz. Existing results for
capacity of wireless networks correspond to scenarios for which $a(f) = 1$, or
a constant greater than one, and $\alpha \geq 2$. These results cannot be
applied to underwater acoustic networks in which the attenuation varies over
the system bandwidth. We use a water-filling argument to assess the minimum
transmission power and optimum transmission band as functions of the link
distance and desired data rate, and study the capacity scaling laws under this
model.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 19:08:51 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Lucani",
"Daniel E.",
""
],
[
"Médard",
"Muriel",
""
],
[
"Stojanovic",
"Milica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4434 | Daniel Lucani | Daniel E. Lucani, Muriel M\'edard, Milica Stojanovic | Random Linear Network Coding for Time-Division Duplexing: Queueing
Analysis | 5 pages, 5 figures, 2 tables, Submitted to ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the performance of random linear network coding for time division
duplexing channels with Poisson arrivals. We model the system as a bulk-service
queue with variable bulk size. A full characterization for random linear
network coding is provided for time division duplexing channels [1] by means of
the moment generating function. We present numerical results for the mean
number of packets in the queue and consider the effect of the range of
allowable bulk sizes. We show that there exists an optimal choice of this range
that minimizes the mean number of data packets in the queue.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 19:20:55 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Lucani",
"Daniel E.",
""
],
[
"Médard",
"Muriel",
""
],
[
"Stojanovic",
"Milica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4435 | Oleg Shcherbina | O. Shcherbina | Tree decomposition and postoptimality analysis in discrete optimization | 19 pages, 5 fugures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real discrete optimization problems (DOPs) are $NP$-hard and contain a
huge number of variables and/or constraints that make the models intractable
for currently available solvers. Large DOPs can be solved due to their special
tructure using decomposition approaches. An important example of decomposition
approaches is tree decomposition with local decomposition algorithms using the
special block matrix structure of constraints which can exploit sparsity in the
interaction graph of a discrete optimization problem. In this paper, discrete
optimization problems with a tree structural graph are solved by local
decomposition algorithms. Local decomposition algorithms generate a family of
related DO problems which have the same structure but differ in the right-hand
sides. Due to this fact, postoptimality techniques in DO are applied.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 21:25:11 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Shcherbina",
"O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.4443 | Daniel Lucani | Daniel E. Lucani, Muriel M\'edard, Milica Stojanovic | Broadcasting in Time-Division Duplexing: A Random Linear Network Coding
Approach | 6 pages, 5 figures, Submitted to Workshop on Network Coding, Theory,
and Applications (NetCod 2009) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study random linear network coding for broadcasting in time division
duplexing channels. We assume a packet erasure channel with nodes that cannot
transmit and receive information simultaneously. The sender transmits coded
data packets back-to-back before stopping to wait for the receivers to
acknowledge the number of degrees of freedom, if any, that are required to
decode correctly the information. We study the mean time to complete the
transmission of a block of packets to all receivers. We also present a bound on
the number of stops to wait for acknowledgement in order to complete
transmission with probability at least $1-\epsilon$, for any $\epsilon>0$. We
present analysis and numerical results showing that our scheme outperforms
optimal scheduling policies for broadcast, in terms of the mean completion
time. We provide a simple heuristic to compute the number of coded packets to
be sent before stopping that achieves close to optimal performance with the
advantage of a considerable reduction in the search time.
| [
{
"version": "v1",
"created": "Wed, 25 Mar 2009 19:41:21 GMT"
}
]
| 2009-03-26T00:00:00 | [
[
"Lucani",
"Daniel E.",
""
],
[
"Médard",
"Muriel",
""
],
[
"Stojanovic",
"Milica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4510 | Kunal Talwar | Anupam Gupta, Katrina Ligett, Frank McSherry, Aaron Roth and Kunal
Talwar | Differentially Private Combinatorial Optimization | 28 pages | null | null | null | cs.DS cs.CR cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider the following problem: given a metric space, some of whose points
are "clients", open a set of at most $k$ facilities to minimize the average
distance from the clients to these facilities. This is just the well-studied
$k$-median problem, for which many approximation algorithms and hardness
results are known. Note that the objective function encourages opening
facilities in areas where there are many clients, and given a solution, it is
often possible to get a good idea of where the clients are located. However,
this poses the following quandary: what if the identity of the clients is
sensitive information that we would like to keep private? Is it even possible
to design good algorithms for this problem that preserve the privacy of the
clients?
In this paper, we initiate a systematic study of algorithms for discrete
optimization problems in the framework of differential privacy (which
formalizes the idea of protecting the privacy of individual input elements). We
show that many such problems indeed have good approximation algorithms that
preserve differential privacy; this is even in cases where it is impossible to
preserve cryptographic definitions of privacy while computing any non-trivial
approximation to even the_value_ of an optimal solution, let alone the entire
solution.
Apart from the $k$-median problem, we study the problems of vertex and set
cover, min-cut, facility location, Steiner tree, and the recently introduced
submodular maximization problem, "Combinatorial Public Projects" (CPP).
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 05:08:46 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 01:19:22 GMT"
}
]
| 2009-11-11T00:00:00 | [
[
"Gupta",
"Anupam",
""
],
[
"Ligett",
"Katrina",
""
],
[
"McSherry",
"Frank",
""
],
[
"Roth",
"Aaron",
""
],
[
"Talwar",
"Kunal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0903.4513 | Elena Wishnevskaya S. | Elena S. Vishnevskaya | Building the information kernel and the problem of recognition | This paper has been withdrawn by the author | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | At this point in time there is a need for a new representation of different
information, to identify and organize descending its characteristics. Today,
science is a powerful tool for the description of reality - the numbers. Why
the most important property of numbers. Suppose we have a number 0.2351734, it
is clear that the figures are there in order of importance. If necessary, we
can round the number up to some value, eg 0.235. Arguably, the 0,235 - the most
important information of 0.2351734. Thus, we can reduce the size of numbers is
not losing much with the accuracy. Clearly, if learning to provide a graphical
or audio information kernel, we can provide the most relevant information,
discarding the rest. Introduction of various kinds of information in an
information kernel, is an important task, to solve many problems in artificial
intelligence and information theory.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 10:05:29 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Mar 2009 09:48:51 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Apr 2009 13:26:01 GMT"
},
{
"version": "v4",
"created": "Wed, 15 Apr 2009 06:37:09 GMT"
},
{
"version": "v5",
"created": "Mon, 16 May 2011 08:12:10 GMT"
},
{
"version": "v6",
"created": "Wed, 12 Oct 2011 03:02:51 GMT"
},
{
"version": "v7",
"created": "Thu, 13 Oct 2011 08:13:25 GMT"
}
]
| 2011-10-14T00:00:00 | [
[
"Vishnevskaya",
"Elena S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0903.4521 | Geevarghese Philip | Geevarghese Philip, Venkatesh Raman, Somnath Sikdar | Solving Dominating Set in Larger Classes of Graphs: FPT Algorithms and
Polynomial Kernels | 12 pages, 1 figure, 1 table | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that the k-Dominating Set problem is fixed parameter tractable (FPT)
and has a polynomial kernel for any class of graphs that exclude K_{i,j} as a
subgraph, for any fixed i, j >= 1. This strictly includes every class of graphs
for which this problem has been previously shown to have FPT algorithms and/or
polynomial kernels. In particular, our result implies that the problem
restricted to bounded- degenerate graphs has a polynomial kernel, solving an
open problem posed by Alon and Gutner.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 06:23:58 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2009 13:41:18 GMT"
},
{
"version": "v3",
"created": "Fri, 15 May 2009 07:33:23 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Philip",
"Geevarghese",
""
],
[
"Raman",
"Venkatesh",
""
],
[
"Sikdar",
"Somnath",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.4526 | Chinmay Vaze | Chinmay S. Vaze and Mahesh K. Varanasi | On the Achievable Rate of the Fading Dirty Paper Channel with Imperfect
CSIT | Presented at the 43rd Annual Conference on Information Sciences and
Systems, John Hopkins University, March 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of dirty paper coding (DPC) over the (multi-antenna) fading dirty
paper channel (FDPC) Y = H(X + S) + Z is considered when there is imperfect
knowledge of the channel state information H at the transmitter (CSIT). The
case of FDPC with positive definite (p.d.) input covariance matrix was studied
by the authors in a recent paper, and here the more general case of positive
semi-definite (p.s.d.) input covariance is dealt with. Towards this end, the
choice of auxiliary random variable is modified. The algorithms for
determination of inflation factor proposed in the p.d. case are then
generalized to the case of p.s.d. input covariance. Subsequently, the largest
DPC-achievable high-SNR (signal-to-noise ratio) scaling factor over the no-CSIT
FDPC with p.s.d. input covariance matrix is derived. This scaling factor is
seen to be a non-trivial generalization of the one achieved for the p.d. case.
Next, in the limit of low SNR, it is proved that the choice of all-zero
inflation factor (thus treating interference as noise) is optimal in the
'ratio' sense, regardless of the covariance matrix used. Further, in the p.d.
covariance case, the inflation factor optimal at high SNR is obtained when the
number of transmit antennas is greater than the number of receive antennas,
with the other case having been already considered in the earlier paper.
Finally, the problem of joint optimization of the input covariance matrix and
the inflation factor is dealt with, and an iterative numerical algorithm is
developed.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 07:55:12 GMT"
}
]
| 2009-03-27T00:00:00 | [
[
"Vaze",
"Chinmay S.",
""
],
[
"Varanasi",
"Mahesh K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4527 | Yusuke Watanabe | Yusuke Watanabe, Kenji Fukumizu | Graph polynomials and approximation of partition functions with Loopy
Belief Propagation | 7 pages. The 9th conference of Japanese Society for Artificial
Intelligence, Special Interest Group on Data Mining and Statistical
Mathematics (JSAI SIG-DMSM) in Kyoto 2009, March 3,4 Minor typos corrected | null | null | null | cs.DM cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Bethe approximation, or loopy belief propagation algorithm is a
successful method for approximating partition functions of probabilistic models
associated with a graph. Chertkov and Chernyak derived an interesting formula
called Loop Series Expansion, which is an expansion of the partition function.
The main term of the series is the Bethe approximation while other terms are
labeled by subgraphs called generalized loops. In our recent paper, we derive
the loop series expansion in form of a polynomial with coefficients positive
integers, and extend the result to the expansion of marginals. In this paper,
we give more clear derivation for the results and discuss the properties of the
polynomial which is introduced in the paper.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 08:32:33 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Nov 2009 05:41:45 GMT"
}
]
| 2009-11-14T00:00:00 | [
[
"Watanabe",
"Yusuke",
""
],
[
"Fukumizu",
"Kenji",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0903.4530 | Lek-Heng Lim | Lek-Heng Lim, Pierre Comon | Nonnegative approximations of nonnegative tensors | 14 pages | null | null | null | cs.NA cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the decomposition of a nonnegative tensor into a minimal sum of
outer product of nonnegative vectors and the associated parsimonious naive
Bayes probabilistic model. We show that the corresponding approximation
problem, which is central to nonnegative PARAFAC, will always have optimal
solutions. The result holds for any choice of norms and, under a mild
assumption, even Bregman divergences.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 08:39:45 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Apr 2009 05:12:19 GMT"
}
]
| 2009-04-12T00:00:00 | [
[
"Lim",
"Lek-Heng",
""
],
[
"Comon",
"Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0903.4545 | Jocelyne Troccaz | Jocelyne Troccaz (TIMC) | Computer- and robot-assisted Medical Intervention | Handbook of Automation, Shimon Nof (Ed.) (2009) 000-000 | Handbook of Automation, Shimon Nof (Ed.) (2009) 1451-1466 | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Medical robotics includes assistive devices used by the physician in order to
make his/her diagnostic or therapeutic practices easier and more efficient.
This chapter focuses on such systems. It introduces the general field of
Computer-Assisted Medical Interventions, its aims, its different components and
describes the place of robots in that context. The evolutions in terms of
general design and control paradigms in the development of medical robots are
presented and issues specific to that application domain are discussed. A view
of existing systems, on-going developments and future trends is given. A
case-study is detailed. Other types of robotic help in the medical environment
(such as for assisting a handicapped person, for rehabilitation of a patient or
for replacement of some damaged/suppressed limbs or organs) are out of the
scope of this chapter.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 10:36:02 GMT"
}
]
| 2009-08-25T00:00:00 | [
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0903.4554 | Mikko Malinen | Mikko Malinen | Fountain Codes and Invertible Matrices | 3 pages, 2 figures, submitted to the IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with Fountain codes, and especially with their encoding
matrices, which are required here to be invertible. A result is stated that an
encoding matrix induces a permutation. Also, a result is that encoding matrices
form a group with multiplication operation. An encoding is a transformation,
which reduces the entropy of an initially high-entropy input vector. A special
encoding matrix, with which the entropy reduction is more effective than with
matrices created by the Ideal Soliton distribution is formed. Experimental
results with entropy reduction are shown.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 11:15:05 GMT"
}
]
| 2009-03-27T00:00:00 | [
[
"Malinen",
"Mikko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4582 | Xiao Juan Zhang | Xiao Juan Zhang and Yi Gong | On the Achievable Diversity-Multiplexing Tradeoff in MIMO Fading
Channels with Imperfect CSIT | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we analyze the fundamental tradeoff of diversity and
multiplexing in multi-input multi-output (MIMO) channels with imperfect channel
state information at the transmitter (CSIT). We show that with imperfect CSIT,
a higher diversity gain as well as a more efficient diversity-multiplexing
tradeoff (DMT) can be achieved. In the case of multi-input single-output
(MISO)/single-input multi-output (SIMO) channels with K transmit/receive
antennas, one can achieve a diversity gain of d(r)=K(1-r+K\alpha) at spatial
multiplexing gain r, where \alpha is the CSIT quality defined in this paper.
For general MIMO channels with M (M>1) transmit and N (N>1) receive antennas,
we show that depending on the value of \alpha, different DMT can be derived and
the value of \alpha has a great impact on the achievable diversity, especially
at high multiplexing gains. Specifically, when \alpha is above a certain
threshold, one can achieve a diversity gain of d(r)=MN(1+MN\alpha)-(M+N-1)r;
otherwise, the achievable DMT is much lower and can be described as a
collection of discontinuous line segments depending on M, N, r and \alpha. Our
analysis reveals that imperfect CSIT significantly improves the achievable
diversity gain while enjoying high spatial multiplexing gains.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 13:42:09 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Aug 2009 11:08:03 GMT"
}
]
| 2009-08-16T00:00:00 | [
[
"Zhang",
"Xiao Juan",
""
],
[
"Gong",
"Yi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4594 | Ben Liang | Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa | Dynamic Control of Tunable Sub-optimal Algorithms for Scheduling of
Time-varying Wireless Networks | Submitted for journal consideration. A shorter version was presented
in IEEE IWQoS 2008 | null | 10.1109/IWQOS.2008.22 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that for ergodic channel processes the Generalized
Max-Weight Matching (GMWM) scheduling policy stabilizes the network for any
supportable arrival rate vector within the network capacity region. This
policy, however, often requires the solution of an NP-hard optimization
problem. This has motivated many researchers to develop sub-optimal algorithms
that approximate the GMWM policy in selecting schedule vectors. One implicit
assumption commonly shared in this context is that during the algorithm
runtime, the channel states remain effectively unchanged. This assumption may
not hold as the time needed to select near-optimal schedule vectors usually
increases quickly with the network size. In this paper, we incorporate channel
variations and the time-efficiency of sub-optimal algorithms into the scheduler
design, to dynamically tune the algorithm runtime considering the tradeoff
between algorithm efficiency and its robustness to changing channel states.
Specifically, we propose a Dynamic Control Policy (DCP) that operates on top of
a given sub-optimal algorithm, and dynamically but in a large time-scale
adjusts the time given to the algorithm according to queue backlog and channel
correlations. This policy does not require knowledge of the structure of the
given sub-optimal algorithm, and with low overhead can be implemented in a
distributed manner. Using a novel Lyapunov analysis, we characterize the
throughput stability region induced by DCP and show that our characterization
can be tight. We also show that the throughput stability region of DCP is at
least as large as that of any other static policy. Finally, we provide two case
studies to gain further intuition into the performance of DCP.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 14:19:11 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Lotfinezhad",
"Mahdi",
""
],
[
"Liang",
"Ben",
""
],
[
"Sousa",
"Elvino S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4615 | Olivier Finkel | Olivier Finkel (ELM, Lip) | On Decidability Properties of One-Dimensional Cellular Automata | Final version; to appear in the Journal of Cellular Automata | Journal of Cellular Automata 6, 2-3 (2011) 181-193 | null | null | cs.LO cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a recent paper Sutner proved that the first-order theory of the
phase-space $\mathcal{S}_\mathcal{A}=(Q^\mathbb{Z}, \longrightarrow)$ of a
one-dimensional cellular automaton $\mathcal{A}$ whose configurations are
elements of $Q^\mathbb{Z}$, for a finite set of states $Q$, and where
$\longrightarrow$ is the "next configuration relation", is decidable. He asked
whether this result could be extended to a more expressive logic. We prove in
this paper that this is actuallly the case. We first show that, for each
one-dimensional cellular automaton $\mathcal{A}$, the phase-space
$\mathcal{S}_\mathcal{A}$ is an omega-automatic structure. Then, applying
recent results of Kuske and Lohrey on omega-automatic structures, it follows
that the first-order theory, extended with some counting and cardinality
quantifiers, of the structure $\mathcal{S}_\mathcal{A}$, is decidable. We give
some examples of new decidable properties for one-dimensional cellular
automata. In the case of surjective cellular automata, some more efficient
algorithms can be deduced from results of Kuske and Lohrey on structures of
bounded degree. On the other hand we show that the case of cellular automata
give new results on automatic graphs.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 15:39:35 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Jun 2009 19:14:13 GMT"
}
]
| 2010-10-01T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM, Lip"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0903.4616 | Alexander Stroeer | Alexander Stroeer, John K. Cannizzo, Jordan B. Camp, Nicolas Gagarin | Methods for detection and characterization of signals in noisy data with
the Hilbert-Huang Transform | submitted to PRD, 10 pages, 9 figures in color | Phys.Rev.D79:124022,2009 | 10.1103/PhysRevD.79.124022 | null | physics.data-an cs.NA gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Hilbert-Huang Transform is a novel, adaptive approach to time series
analysis that does not make assumptions about the data form. Its adaptive,
local character allows the decomposition of non-stationary signals with
hightime-frequency resolution but also renders it susceptible to degradation
from noise. We show that complementing the HHT with techniques such as
zero-phase filtering, kernel density estimation and Fourier analysis allows it
to be used effectively to detect and characterize signals with low signal to
noise ratio.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 15:41:05 GMT"
}
]
| 2010-04-22T00:00:00 | [
[
"Stroeer",
"Alexander",
""
],
[
"Cannizzo",
"John K.",
""
],
[
"Camp",
"Jordan B.",
""
],
[
"Gagarin",
"Nicolas",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
}
]
|
0903.4696 | Lucas Sabalka | Joshua Brown Kramer, Lucas Sabalka | Multidimensional Online Robot Motion | 26 pages, 5 figures | International Journal of Computational Geometry and Applications,
20(6):653-684, 2010 | 10.1142/S0218195910003475 | null | cs.CG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider three related problems of robot movement in arbitrary dimensions:
coverage, search, and navigation. For each problem, a spherical robot is asked
to accomplish a motion-related task in an unknown environment whose geometry is
learned by the robot during navigation. The robot is assumed to have tactile
and global positioning sensors. We view these problems from the perspective of
(non-linear) competitiveness as defined by Gabriely and Rimon. We first show
that in 3 dimensions and higher, there is no upper bound on competitiveness:
every online algorithm can do arbitrarily badly compared to the optimal. We
then modify the problems by assuming a fixed clearance parameter. We are able
to give optimally competitive algorithms under this assumption.
| [
{
"version": "v1",
"created": "Thu, 26 Mar 2009 20:39:55 GMT"
}
]
| 2011-10-13T00:00:00 | [
[
"Kramer",
"Joshua Brown",
""
],
[
"Sabalka",
"Lucas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0903.4726 | Travis Gagie | Travis Gagie, Simon J. Puglisi, Andrew Turpin | Range Quantile Queries: Another Virtue of Wavelet Trees | Added note about generalization to any constant number of dimensions. | null | 10.1007/978-3-642-03784-9_1 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how to use a balanced wavelet tree as a data structure that stores a
list of numbers and supports efficient {\em range quantile queries}. A range
quantile query takes a rank and the endpoints of a sublist and returns the
number with that rank in that sublist. For example, if the rank is half the
sublist's length, then the query returns the sublist's median. We also show how
these queries can be used to support space-efficient {\em coloured range
reporting} and {\em document listing}.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2009 02:29:01 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Mar 2009 15:54:35 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Apr 2009 09:44:31 GMT"
},
{
"version": "v4",
"created": "Wed, 20 May 2009 12:43:47 GMT"
},
{
"version": "v5",
"created": "Thu, 21 May 2009 08:09:09 GMT"
},
{
"version": "v6",
"created": "Wed, 7 Apr 2010 12:48:51 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Gagie",
"Travis",
""
],
[
"Puglisi",
"Simon J.",
""
],
[
"Turpin",
"Andrew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0903.4728 | Xi Chen | Jin-Yi Cai, Xi Chen, and Pinyan Lu | Graph Homomorphisms with Complex Values: A Dichotomy Theorem | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph homomorphism has been studied intensively. Given an m x m symmetric
matrix A, the graph homomorphism function is defined as \[Z_A (G) =
\sum_{f:V->[m]} \prod_{(u,v)\in E} A_{f(u),f(v)}, \] where G = (V,E) is any
undirected graph. The function Z_A can encode many interesting graph
properties, including counting vertex covers and k-colorings. We study the
computational complexity of Z_A for arbitrary symmetric matrices A with
algebraic complex values. Building on work by Dyer and Greenhill, Bulatov and
Grohe, and especially the recent beautiful work by Goldberg, Grohe, Jerrum and
Thurley, we prove a complete dichotomy theorem for this problem. We show that
Z_A is either computable in polynomial-time or #P-hard, depending explicitly on
the matrix A. We further prove that the tractability criterion on A is
polynomial-time decidable.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2009 02:57:32 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Oct 2011 00:29:18 GMT"
}
]
| 2011-10-10T00:00:00 | [
[
"Cai",
"Jin-Yi",
""
],
[
"Chen",
"Xi",
""
],
[
"Lu",
"Pinyan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0903.4738 | Hong Ju Park | Hong Ju Park and Ender Ayanoglu | Constellation Precoded Beamforming | submitted to conference | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present and analyze the performance of constellation precoded beamforming.
This multi-input multi-output transmission technique is based on the singular
value decomposition of a channel matrix. In this work, the beamformer is
precoded to improve its diversity performance. It was shown previously that
while single beamforming achieves full diversity without channel coding,
multiple beamforming results in diversity loss. In this paper, we show that a
properly designed constellation precoder makes uncoded multiple beamforming
achieve full diversity order. We also show that partially precoded multiple
beamforming gets better diversity order than multiple beamforming without
constellation precoder if the subchannels to be precoded are properly chosen.
We propose several criteria to design the constellation precoder. Simulation
results match the analysis, and show that precoded multiple beamforming
actually outperforms single beamforming without precoding at the same system
data rate while achieving full diversity order.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2009 06:01:39 GMT"
}
]
| 2009-03-30T00:00:00 | [
[
"Park",
"Hong Ju",
""
],
[
"Ayanoglu",
"Ender",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4742 | Kiryung Lee | Kiryung Lee and Yoram Bresler | Guaranteed Minimum Rank Approximation from Linear Observations by
Nuclear Norm Minimization with an Ellipsoidal Constraint | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rank minimization problem is to find the lowest-rank matrix in a given
set. Nuclear norm minimization has been proposed as an convex relaxation of
rank minimization. Recht, Fazel, and Parrilo have shown that nuclear norm
minimization subject to an affine constraint is equivalent to rank minimization
under a certain condition given in terms of the rank-restricted isometry
property. However, in the presence of measurement noise, or with only
approximately low rank generative model, the appropriate constraint set is an
ellipsoid rather than an affine space. There exist polynomial-time algorithms
to solve the nuclear norm minimization with an ellipsoidal constraint, but no
performance guarantee has been shown for these algorithms. In this paper, we
derive such an explicit performance guarantee, bounding the error in the
approximate solution provided by nuclear norm minimization with an ellipsoidal
constraint.
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2009 07:52:06 GMT"
}
]
| 2009-03-30T00:00:00 | [
[
"Lee",
"Kiryung",
""
],
[
"Bresler",
"Yoram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0903.4770 | Sk Sarif Hassan s | Pal Choudhury Pabitra, Sahoo Sudhakar, Nayak Birendra Kumar, and
Hassan Sk. Sarif | Act of CVT and EVT In The Formation of Number-Theoretic Fractals | 15 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we have defined two functions that have been used to construct
different fractals having fractal dimensions between 1 and 2. More precisely,
we can say that one of our defined functions produce the fractals whose fractal
dimension lies in [1.58, 2) and rest function produce the fractals whose
fractal dimension lies in (1, 1.58]. Also we tried to calculate the amount of
increment of fractal dimension in accordance with base of the number systems.
And in switching of fractals from one base to another, the increment of fractal
dimension is constant, which is 1.58, its quite surprising!
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2009 10:38:32 GMT"
}
]
| 2009-03-30T00:00:00 | [
[
"Pabitra",
"Pal Choudhury",
""
],
[
"Sudhakar",
"Sahoo",
""
],
[
"Kumar",
"Nayak Birendra",
""
],
[
"Sarif",
"Hassan Sk.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0903.4796 | Martin Vatshelle | B.-M. Bui-Xuan and J. A. Telle and M. Vatshelle (Department of
Informatics, University of Bergen, Norway) | Fast FPT algorithms for vertex subset and vertex partitioning problems
using neighborhood unions | The new version has runtimes expressed by number of equivalence
classes, but no other changes | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the graph parameter boolean-width, related to the number of
different unions of neighborhoods across a cut of a graph. Boolean-width is
similar to rank-width, which is related to the number of $GF[2]$-sums (1+1=0)
of neighborhoods instead of the boolean-sums (1+1=1) used for boolean-width. We
give algorithms for a large class of NP-hard vertex subset and vertex
partitioning problems that are FPT when parameterized by either boolean-width,
rank-width or clique-width, with runtime single exponential in either parameter
if given the pertinent optimal decomposition. To compare boolean-width versus
rank-width or clique-width, we first show that for any graph, the square root
of its boolean-width is never more than its rank-width. Next, we exhibit a
class of graphs, the Hsu-grids, for which we can solve NP-hard problems in
polynomial time, if we use the right parameter. An $n \times \frac{n}{10}$
Hsu-grid on ${1/10}n^2$ vertices has boolean-width $\Theta(\log n)$ and
rank-width $\Theta(n)$. Moreover, any optimal rank-decomposition of such a
graph will have boolean-width $\Theta(n)$, i.e. exponential in the optimal
boolean-width. A main open problem is to approximate the boolean-width better
than what is given by the algorithm for rank-width [Hlin\v{e}n\'y and Oum,
2008]
| [
{
"version": "v1",
"created": "Fri, 27 Mar 2009 13:34:08 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Apr 2009 07:24:30 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Mar 2011 15:17:52 GMT"
}
]
| 2011-03-10T00:00:00 | [
[
"Bui-Xuan",
"B. -M.",
"",
"Department of\n Informatics, University of Bergen, Norway"
],
[
"Telle",
"J. A.",
"",
"Department of\n Informatics, University of Bergen, Norway"
],
[
"Vatshelle",
"M.",
"",
"Department of\n Informatics, University of Bergen, Norway"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.