id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0904.0785 | Richard Clegg | Richard Clegg, Raul Landa, Uli Harder, Miguel Rio | Evaluating and Optimising Models of Network Growth | Submitted conference paper | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a statistically sound method for measuring the accuracy
with which a probabilistic model reflects the growth of a network, and a method
for optimising parameters in such a model. The technique is data-driven, and
can be used for the modeling and simulation of any kind of evolving network.
The overall framework, a Framework for Evolving Topology Analysis (FETA), is
tested on data sets collected from the Internet AS-level topology, social
networking websites and a co-authorship network. Statistical models of the
growth of these networks are produced and tested using a likelihood-based
method. The models are then used to generate artificial topologies with the
same statistical properties as the originals. This work can be used to predict
future growth patterns for a known network, or to generate artificial models of
graph topology evolution for simulation purposes. Particular application
examples include strategic network planning, user profiling in social networks
or infrastructure deployment in managed overlay-based services.
| [
{
"version": "v1",
"created": "Sun, 5 Apr 2009 15:14:17 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Clegg",
"Richard",
""
],
[
"Landa",
"Raul",
""
],
[
"Harder",
"Uli",
""
],
[
"Rio",
"Miguel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.0811 | Shachar Lovett | Shachar Lovett | The density of weights of Generalized Reed--Muller codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the density of the weights of Generalized Reed--Muller codes. Let
$RM_p(r,m)$ denote the code of multivariate polynomials over $\F_p$ in $m$
variables of total degree at most $r$. We consider the case of fixed degree
$r$, when we let the number of variables $m$ tend to infinity. We prove that
the set of relative weights of codewords is quite sparse: for every $\alpha \in
[0,1]$ which is not rational of the form $\frac{\ell}{p^k}$, there exists an
interval around $\alpha$ in which no relative weight exists, for any value of
$m$. This line of research is to the best of our knowledge new, and complements
the traditional lines of research, which focus on the weight distribution and
the divisibility properties of the weights.
Equivalently, we study distributions taking values in a finite field, which
can be approximated by distributions coming from constant degree polynomials,
where we do not bound the number of variables. We give a complete
characterization of all such distributions.
| [
{
"version": "v1",
"created": "Sun, 5 Apr 2009 19:56:31 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Lovett",
"Shachar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.0813 | Azadeh Khaleghi | Azadeh Khaleghi, Frank R. Kschischang | Projective Space Codes for the Injection Metric | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the context of error control in random linear network coding, it is useful
to construct codes that comprise well-separated collections of subspaces of a
vector space over a finite field. In this paper, the metric used is the
so-called "injection distance", introduced by Silva and Kschischang. A
Gilbert-Varshamov bound for such codes is derived. Using the code-construction
framework of Etzion and Silberstein, new non-constant-dimension codes are
constructed; these codes contain more codewords than comparable codes designed
for the subspace metric.
| [
{
"version": "v1",
"created": "Sun, 5 Apr 2009 20:06:33 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Apr 2009 14:24:02 GMT"
}
]
| 2009-04-08T00:00:00 | [
[
"Khaleghi",
"Azadeh",
""
],
[
"Kschischang",
"Frank R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.0814 | Ashish Rastogi | Corinna Cortes, Mehryar Mohri, Dmitry Pechyony, Ashish Rastogi | Stability Analysis and Learning Bounds for Transductive Regression
Algorithms | 26 pages | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper uses the notion of algorithmic stability to derive novel
generalization bounds for several families of transductive regression
algorithms, both by using convexity and closed-form solutions. Our analysis
helps compare the stability of these algorithms. It also shows that a number of
widely used transductive regression algorithms are in fact unstable. Finally,
it reports the results of experiments with local transductive regression
demonstrating the benefit of our stability bounds for model selection, for one
of the algorithms, in particular for determining the radius of the local
neighborhood used by the algorithm.
| [
{
"version": "v1",
"created": "Sun, 5 Apr 2009 20:08:44 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Cortes",
"Corinna",
""
],
[
"Mohri",
"Mehryar",
""
],
[
"Pechyony",
"Dmitry",
""
],
[
"Rastogi",
"Ashish",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.0821 | Ivana Stojanovic | Ivana Stojanovic and William C. Karl | Imaging of moving targets with multi-static SAR using an overcomplete
dictionary | This work has been submitted to IEEE Journal on Selected Topics in
Signal Processing (Special Issue on MIMO Radar and Its Applications) for
possible publication | null | 10.1109/JSTSP.2009.2038982 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a method for imaging of moving targets using multi-static
SAR by treating the problem as one of spatial reflectivity signal inversion
over an overcomplete dictionary of target velocities. Since SAR sensor returns
can be related to the spatial frequency domain projections of the scattering
field, we exploit insights from compressed sensing theory to show that moving
targets can be effectively imaged with transmitters and receivers randomly
dispersed in a multi-static geometry within a narrow forward cone around the
scene of interest. Existing approaches to dealing with moving targets in SAR
solve a coupled non-linear problem of target scattering and motion estimation
typically through matched filtering. In contrast, by using an overcomplete
dictionary approach we effectively linearize the forward model and solve the
moving target problem as a larger, unified regularized inversion problem
subject to sparsity constraints.
| [
{
"version": "v1",
"created": "Sun, 5 Apr 2009 21:48:22 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Stojanovic",
"Ivana",
""
],
[
"Karl",
"William C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.0828 | Anand Muralidhar | M. Anand, P. R. Kumar | On approximating Gaussian relay networks by deterministic networks | Accepted for publication in proceedings of ITW 09, Taormina, Sicily.
Corrected typos, added references, changed name of network model | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine the extent to which Gaussian relay networks can be approximated by
deterministic networks, and present two results, one negative and one positive.
The gap between the capacities of a Gaussian relay network and a
corresponding linear deterministic network can be unbounded. The key reasons
are that the linear deterministic model fails to capture the phase of received
signals, and there is a loss in signal strength in the reduction to a linear
deterministic network.
On the positive side, Gaussian relay networks are indeed well approximated by
certain discrete superposition networks, where the inputs and outputs to the
channels are discrete, and channel gains are signed integers.
As a corollary, MIMO channels cannot be approximated by the linear
deterministic model but can be by the discrete superposition model.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 01:15:58 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Aug 2009 21:56:02 GMT"
}
]
| 2009-08-10T00:00:00 | [
[
"Anand",
"M.",
""
],
[
"Kumar",
"P. R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.0859 | David Pritchard | David Pritchard, Deeparnab Chakrabarty | Approximability of Sparse Integer Programs | Version submitted to Algorithmica special issue on ESA 2009. Previous
conference version: http://dx.doi.org/10.1007/978-3-642-04128-0_8 | null | null | null | cs.DS cs.DM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The main focus of this paper is a pair of new approximation algorithms for
certain integer programs. First, for covering integer programs {min cx: Ax >=
b, 0 <= x <= d} where A has at most k nonzeroes per row, we give a
k-approximation algorithm. (We assume A, b, c, d are nonnegative.) For any k >=
2 and eps>0, if P != NP this ratio cannot be improved to k-1-eps, and under the
unique games conjecture this ratio cannot be improved to k-eps. One key idea is
to replace individual constraints by others that have better rounding
properties but the same nonnegative integral solutions; another critical
ingredient is knapsack-cover inequalities. Second, for packing integer programs
{max cx: Ax <= b, 0 <= x <= d} where A has at most k nonzeroes per column, we
give a (2k^2+2)-approximation algorithm. Our approach builds on the iterated LP
relaxation framework. In addition, we obtain improved approximations for the
second problem when k=2, and for both problems when every A_{ij} is small
compared to b_i. Finally, we demonstrate a 17/16-inapproximability for covering
integer programs with at most two nonzeroes per column.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 07:31:43 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Apr 2009 05:21:35 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Jun 2009 23:31:06 GMT"
},
{
"version": "v4",
"created": "Sun, 13 Sep 2009 17:16:39 GMT"
},
{
"version": "v5",
"created": "Tue, 9 Feb 2010 13:08:53 GMT"
}
]
| 2010-02-09T00:00:00 | [
[
"Pritchard",
"David",
""
],
[
"Chakrabarty",
"Deeparnab",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.0879 | Lorenzo Cappellari | Lorenzo Cappellari | On Superposition Coding for the Wyner-Ziv Problem | 5 pages, 1 figure, submitted to IEEE ITW2009 Taormina, Italy | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In problems of lossy source/noisy channel coding with side information, the
theoretical bounds are achieved using "good" source/channel codes that can be
partitioned into "good" channel/source codes. A scheme that achieves optimality
in channel coding with side information at the encoder using independent
channel and source codes was outlined in previous works. In practice, the
original problem is transformed into a multiple-access problem in which the
superposition of the two independent codes can be decoded using successive
interference cancellation. Inspired by this work, we analyze the superposition
approach for source coding with side information at the decoder. We present a
random coding analysis that shows achievability of the Wyner-Ziv bound. Then,
we discuss some issues related to the practical implementation of this method.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 09:39:10 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Cappellari",
"Lorenzo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.0942 | Michael Hay | Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu | Boosting the Accuracy of Differentially-Private Histograms Through
Consistency | 15 pages, 7 figures, minor revisions to previous version | null | null | null | cs.DB cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that it is possible to significantly improve the accuracy of a
general class of histogram queries while satisfying differential privacy. Our
approach carefully chooses a set of queries to evaluate, and then exploits
consistency constraints that should hold over the noisy output. In a
post-processing phase, we compute the consistent input most likely to have
produced the noisy output. The final output is differentially-private and
consistent, but in addition, it is often much more accurate. We show, both
theoretically and experimentally, that these techniques can be used for
estimating the degree sequence of a graph very precisely, and for computing a
histogram that can support arbitrary range queries accurately.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 14:58:20 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Apr 2009 20:45:13 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Jun 2009 14:07:04 GMT"
},
{
"version": "v4",
"created": "Thu, 4 Feb 2010 20:34:17 GMT"
},
{
"version": "v5",
"created": "Fri, 9 Jul 2010 01:34:32 GMT"
}
]
| 2010-07-12T00:00:00 | [
[
"Hay",
"Michael",
""
],
[
"Rastogi",
"Vibhor",
""
],
[
"Miklau",
"Gerome",
""
],
[
"Suciu",
"Dan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.0962 | Amelia Sparavigna | Amelia Sparavigna | Color Dipole Moments for Edge Detection | 8 pages | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dipole and higher moments are physical quantities used to describe a charge
distribution. In analogy with electromagnetism, it is possible to define the
dipole moments for a gray-scale image, according to the single aspect of a
gray-tone map. In this paper we define the color dipole moments for color
images. For color maps in fact, we have three aspects, the three primary
colors, to consider. Associating three color charges to each pixel, color
dipole moments can be easily defined and used for edge detection.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 16:25:08 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Sparavigna",
"Amelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0904.0973 | Kohtaro Tadaki | Kohtaro Tadaki | A statistical mechanical interpretation of algorithmic information
theory III: Composite systems and fixed points | 5 pages, no figures, final manuscript to appear in the Proceedings of
the 2009 IEEE Information Theory Workshop, Taormina, Sicily, Italy, October
11 - 16, 2009 | Mathematical Structures in Computer Science 22 (2012) 752-770 | 10.1017/S096012951100051X | null | cs.IT cs.CC math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The statistical mechanical interpretation of algorithmic information theory
(AIT, for short) was introduced and developed by our former works [K. Tadaki,
Local Proceedings of CiE 2008, pp.425-434, 2008] and [K. Tadaki, Proceedings of
LFCS'09, Springer's LNCS, vol.5407, pp.422-440, 2009], where we introduced the
notion of thermodynamic quantities, such as partition function Z(T), free
energy F(T), energy E(T), and statistical mechanical entropy S(T), into AIT. We
then discovered that, in the interpretation, the temperature T equals to the
partial randomness of the values of all these thermodynamic quantities, where
the notion of partial randomness is a stronger representation of the
compression rate by means of program-size complexity. Furthermore, we showed
that this situation holds for the temperature itself as a thermodynamic
quantity, namely, for each of all the thermodynamic quantities above, the
computability of its value at temperature T gives a sufficient condition for T
in (0,1) to be a fixed point on partial randomness. In this paper, we develop
the statistical mechanical interpretation of AIT further and pursue its formal
correspondence to normal statistical mechanics. The thermodynamic quantities in
AIT are defined based on the halting set of an optimal computer, which is a
universal decoding algorithm used to define the notion of program-size
complexity. We show that there are infinitely many optimal computers which give
completely different sufficient conditions in each of the thermodynamic
quantities in AIT. We do this by introducing the notion of composition of
computers into AIT, which corresponds to the notion of composition of systems
in normal statistical mechanics.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 17:11:50 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Aug 2009 20:59:39 GMT"
}
]
| 2019-09-04T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0904.0981 | Martin Avanzini | Martin Avanzini and Georg Moser | Dependency Pairs and Polynomial Path Orders | 23 pages, conference version accepted at RTA 2009 | null | null | null | cs.LO cs.AI cs.CC cs.SC | http://creativecommons.org/licenses/by/3.0/ | We show how polynomial path orders can be employed efficiently in conjunction
with weak innermost dependency pairs to automatically certify polynomial
runtime complexity of term rewrite systems and the polytime computability of
the functions computed. The established techniques have been implemented and we
provide ample experimental data to assess the new method.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 18:10:53 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 14:44:02 GMT"
},
{
"version": "v3",
"created": "Wed, 8 Jun 2011 07:03:03 GMT"
}
]
| 2011-06-09T00:00:00 | [
[
"Avanzini",
"Martin",
""
],
[
"Moser",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0904.0986 | Sahbi Sidhom | Sahbi Sidhom (LORIA) | Approche conceptuelle par un processus d'annotation pour la
repr\'esentation et la valorisation de contenus informationnels en
intelligence \'economique (IE) | null | Syst\`emes d'Information et Intelligence Economique (SIIE) 1 (
ISBN 9978-9973868-19-0) (2008) pp. 172-190 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the era of the information society, the impact of the information systems
on the economy of material and immaterial is certainly perceptible. With
regards to the information resources of an organization, the annotation
involved to enrich informational content, to track the intellectual activities
on a document and to set the added value on information for the benefit of
solving a decision-making problem in the context of economic intelligence. Our
contribution is distinguished by the representation of an annotation process
and its inherent concepts to lead the decisionmaker to an anticipated decision:
the provision of relevant and annotated information. Such information in the
system is made easy by taking into account the diversity of resources and those
that are well annotated so formally and informally by the EI actors. A capital
research framework consist of integrating in the decision-making process the
annotator activity, the software agent (or the reasoning mechanisms) and the
information resources enhancement.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 18:56:12 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Sidhom",
"Sahbi",
"",
"LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0904.0994 | M. Amin Khajehnejad | Weiyu Xu, M. Amin Khajehnejad, Salman Avestimehr, Babak Hassibi | Breaking through the Thresholds: an Analysis for Iterative Reweighted
$\ell_1$ Minimization via the Grassmann Angle Framework | Submitted to ITW 2009 in Sicily | null | null | null | math.PR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is now well understood that $\ell_1$ minimization algorithm is able to
recover sparse signals from incomplete measurements [2], [1], [3] and sharp
recoverable sparsity thresholds have also been obtained for the $\ell_1$
minimization algorithm. However, even though iterative reweighted $\ell_1$
minimization algorithms or related algorithms have been empirically observed to
boost the recoverable sparsity thresholds for certain types of signals, no
rigorous theoretical results have been established to prove this fact. In this
paper, we try to provide a theoretical foundation for analyzing the iterative
reweighted $\ell_1$ algorithms. In particular, we show that for a nontrivial
class of signals, the iterative reweighted $\ell_1$ minimization can indeed
deliver recoverable sparsity thresholds larger than that given in [1], [3]. Our
results are based on a high-dimensional geometrical analysis (Grassmann angle
analysis) of the null-space characterization for $\ell_1$ minimization and
weighted $\ell_1$ minimization algorithms.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 19:45:57 GMT"
}
]
| 2009-04-07T00:00:00 | [
[
"Xu",
"Weiyu",
""
],
[
"Khajehnejad",
"M. Amin",
""
],
[
"Avestimehr",
"Salman",
""
],
[
"Hassibi",
"Babak",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1002 | Wolfgang Bein | Wolfgang Bein, Leah Epstein, Lawrence L. Larmore, John Noga | A Program to Determine the Exact Competitive Ratio of List s-Batching
with Unit Jobs | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the online list s-batch problem, where all the jobs have
processing time 1 and we seek to minimize the sum of the completion times of
the jobs. We give a Java program which is used to verify that the
competitiveness of this problem is 619/583.
| [
{
"version": "v1",
"created": "Mon, 6 Apr 2009 20:08:48 GMT"
}
]
| 2009-04-08T00:00:00 | [
[
"Bein",
"Wolfgang",
""
],
[
"Epstein",
"Leah",
""
],
[
"Larmore",
"Lawrence L.",
""
],
[
"Noga",
"John",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.1083 | Sylvain Lavernhe | Christophe Tournier (LURPA), Sylvain Lavernhe (LURPA), Claire Lartigue
(LURPA) | 5-axis High Speed Milling Optimisation | null | Revue Internationale d Ingenierie Numerique 2, 1-2 (2006) pages
173-184 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Manufacturing of free form parts relies on the calculation of a tool path
based on a CAD model, on a machining strategy and on a given numerically
controlled machine tool. In order to reach the best possible performances, it
is necessary to take into account a maximum of constraints during tool path
calculation. For this purpose, we have developed a surface representation of
the tool paths to manage 5-axis High Speed Milling, which is the most
complicated case. This model allows integrating early in the step of tool path
computation the machine tool geometrical constraints (axis ranges, part holder
orientation), kinematical constraints (speed and acceleration on the axes,
singularities) as well as gouging issues between the tool and the part. The aim
of the paper is to optimize the step of 5-axis HSM tool path calculation with a
bi-parameter surface representation of the tool path. We propose an example of
integration of the digital process for tool path computation, ensuring the
required quality and maximum productivity
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 09:05:00 GMT"
}
]
| 2009-04-08T00:00:00 | [
[
"Tournier",
"Christophe",
"",
"LURPA"
],
[
"Lavernhe",
"Sylvain",
"",
"LURPA"
],
[
"Lartigue",
"Claire",
"",
"LURPA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.1084 | Sylvain Lavernhe | Kwamiwi Mawussi (LURPA), Sylvain Lavernhe (LURPA), Claire Lartigue
(LURPA) | Usinage de poches en UGV - Aide au choix de strat\'egies | null | Revue Internationale de CFAO et d'informatique graphique 18, 3
(2003) 337-349 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper deals with associating the optimal machining strategy to a given
pocket geometry, within the context of High-Speed Machining (HSM) of
aeronautical pockets. First we define different classes of pocket features
according to geometrical criteria. Following, we propose a method allowing to
associate a set of capable tools to the features. Each capable tool defines a
machined zone with a specific geometry. The last part of the paper is thus
dedicated to associate the optimal machining strategy to a given geometry
within the context of HSM. Results highlight that analyses must be conducted in
a dynamical as well as a geometrical viewpoint. In particular, it becomes
necessary to integrate dynamical specifities associated to the behavior of the
couple machine/NC unit in the tool path calculation.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 09:06:39 GMT"
}
]
| 2009-04-08T00:00:00 | [
[
"Mawussi",
"Kwamiwi",
"",
"LURPA"
],
[
"Lavernhe",
"Sylvain",
"",
"LURPA"
],
[
"Lartigue",
"Claire",
"",
"LURPA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.1110 | David Nowak | David Nowak | On formal verification of arithmetic-based cryptographic primitives | 13 pages | In Information Security and Cryptology - ICISC 2008, 11th
International Conference, Seoul, Korea, December 3-5, 2008, Proceedings,
volume 5461 of Lecture Notes in Computer Science, pages 368-382, Springer | 10.1007/978-3-642-00730-9_23 | null | cs.CR cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cryptographic primitives are fundamental for information security: they are
used as basic components for cryptographic protocols or public-key
cryptosystems. In many cases, their security proofs consist in showing that
they are reducible to computationally hard problems. Those reductions can be
subtle and tedious, and thus not easily checkable. On top of the proof
assistant Coq, we had implemented in previous work a toolbox for writing and
checking game-based security proofs of cryptographic primitives. In this paper
we describe its extension with number-theoretic capabilities so that it is now
possible to write and check arithmetic-based cryptographic primitives in our
toolbox. We illustrate our work by machine checking the game-based proofs of
unpredictability of the pseudo-random bit generator of Blum, Blum and Shub, and
semantic security of the public-key cryptographic scheme of Goldwasser and
Micali.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 11:04:39 GMT"
}
]
| 2009-04-08T00:00:00 | [
[
"Nowak",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.1113 | Bodo Manthey | David Arthur and Bodo Manthey and Heiko R\"oglin | k-Means has Polynomial Smoothed Complexity | Full version of FOCS 2009 paper. The argument has been improved and
the restriction to at least three dimensions could be dropped | null | null | null | cs.DS cs.CC cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The k-means method is one of the most widely used clustering algorithms,
drawing its popularity from its speed in practice. Recently, however, it was
shown to have exponential worst-case running time. In order to close the gap
between practical performance and theoretical analysis, the k-means method has
been studied in the model of smoothed analysis. But even the smoothed analyses
so far are unsatisfactory as the bounds are still super-polynomial in the
number n of data points.
In this paper, we settle the smoothed running time of the k-means method. We
show that the smoothed number of iterations is bounded by a polynomial in n and
1/\sigma, where \sigma is the standard deviation of the Gaussian perturbations.
This means that if an arbitrary input data set is randomly perturbed, then the
k-means method will run in expected polynomial time on that input set.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 11:21:23 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Aug 2009 08:53:03 GMT"
}
]
| 2009-08-07T00:00:00 | [
[
"Arthur",
"David",
""
],
[
"Manthey",
"Bodo",
""
],
[
"Röglin",
"Heiko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.1144 | Ricardo Lopez-Ruiz | Jaime Sanudo and Ricardo Lopez-Ruiz | Alternative evaluation of statistical indicators in atoms: the
non-relativistic and relativistic cases | 8 pages, 4 figures | null | 10.1016/j.physleta.2009.05.030 | null | nlin.AO cs.IT math.IT physics.atom-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, the calculation of a statistical measure of complexity and the
Fisher-Shannon information is performed for all the atoms in the periodic
table. Non-relativistic and relativistic cases are considered. We follow the
method suggested in [C.P. Panos, N.S. Nikolaidis, K. Ch. Chatzisavvas, C.C.
Tsouros, arXiv:0812.3963v1] that uses the fractional occupation probabilities
of electrons in atomic orbitals, instead of the continuous electronic wave
functions. For the order of shell filling in the relativistic case, we take
into account the effect due to electronic spin-orbit interaction. The
increasing of both magnitudes, the statistical complexity and the
Fisher-Shannon information, with the atomic number $Z$ is observed. The shell
structure and the irregular shell filling is well displayed by the
Fisher-Shannon information in the relativistic case.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 13:49:38 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Sanudo",
"Jaime",
""
],
[
"Lopez-Ruiz",
"Ricardo",
""
]
]
| [
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.atom-ph",
"description": "Atomic and molecular structure, spectra, collisions, and data. Atoms and molecules in external fields. Molecular dynamics and coherent and optical control. Cold atoms and molecules. Cold collisions. Optical lattices.",
"span": "(Atomic Physics)"
}
]
|
0904.1149 | Kohtaro Tadaki | Kohtaro Tadaki | Chaitin \Omega numbers and halting problems | 17 pages, LaTeX2e, no figures. This is an earlier full version of the
paper that will appear in the Proceedings of Computability in Europe 2009,
Heidelberg, Germany, July 19 - 24, 2009 | In: Ambos-Spies K., L\"owe B., Merkle W. (eds) Mathematical Theory
and Computational Practice. CiE 2009. LNCS, vol 5635 (2009) Springer | 10.1007/978-3-642-03073-4_46 | null | math.LO cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Chaitin [G. J. Chaitin, J. Assoc. Comput. Mach., vol.22, pp.329-340, 1975]
introduced \Omega number as a concrete example of random real. The real \Omega
is defined as the probability that an optimal computer halts, where the optimal
computer is a universal decoding algorithm used to define the notion of
program-size complexity. Chaitin showed \Omega to be random by discovering the
property that the first n bits of the base-two expansion of \Omega solve the
halting problem of the optimal computer for all binary inputs of length at most
n. In the present paper we investigate this property from various aspects. We
consider the relative computational power between the base-two expansion of
\Omega and the halting problem by imposing the restriction to finite size on
both the problems. It is known that the base-two expansion of \Omega and the
halting problem are Turing equivalent. We thus consider an elaboration of the
Turing equivalence in a certain manner.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 17:32:55 GMT"
}
]
| 2019-09-04T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1150 | Xiujie Huang | Xiujie Huang, Aleksandar Kavcic and Xiao Ma | Upper Bounds on the Capacities of Noncontrollable Finite-State Channels
with/without Feedback | 15 pages, Two columns, 6 figures; appears in IEEE Transaction on
Information Theory | null | 10.1109/TIT.2012.2201341 | CLN: 9-255 | cs.IT cs.SY math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Noncontrollable finite-state channels (FSCs) are FSCs in which the channel
inputs have no influence on the channel states, i.e., the channel states evolve
freely. Since single-letter formulae for the channel capacities are rarely
available for general noncontrollable FSCs, computable bounds are usually
utilized to numerically bound the capacities. In this paper, we take the
delayed channel state as part of the channel input and then define the {\em
directed information rate} from the new channel input (including the source and
the delayed channel state) sequence to the channel output sequence. With this
technique, we derive a series of upper bounds on the capacities of
noncontrollable FSCs with/without feedback. These upper bounds can be achieved
by conditional Markov sources and computed by solving an average reward per
stage stochastic control problem (ARSCP) with a compact state space and a
compact action space. By showing that the ARSCP has a uniformly continuous
reward function, we transform the original ARSCP into a finite-state and
finite-action ARSCP that can be solved by a value iteration method. Under a
mild assumption, the value iteration algorithm is convergent and delivers a
near-optimal stationary policy and a numerical upper bound.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 14:20:41 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Apr 2009 14:50:52 GMT"
},
{
"version": "v3",
"created": "Wed, 29 Apr 2009 06:54:34 GMT"
},
{
"version": "v4",
"created": "Sun, 1 Aug 2010 02:29:47 GMT"
},
{
"version": "v5",
"created": "Sun, 22 May 2011 13:52:31 GMT"
},
{
"version": "v6",
"created": "Sun, 29 Jul 2012 00:53:07 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Huang",
"Xiujie",
""
],
[
"Kavcic",
"Aleksandar",
""
],
[
"Ma",
"Xiao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0904.1186 | Bjoern Grohmann | Bjoern Grohmann | A New Key-Agreement-Protocol | 4 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new 4-pass Key-Agreement Protocol is presented. The security of the
protocol mainly relies on the existence of a (polynomial-computable)
One-Way-Function and the supposed computational hardness of solving a specific
system of equations.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 17:45:52 GMT"
}
]
| 2009-04-08T00:00:00 | [
[
"Grohmann",
"Bjoern",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.1193 | Arian Maleki | Arian Maleki | Coherence Analysis of Iterative Thresholding Algorithms | 6 pages, o figures, partially submitted to Signale Processing Letter | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a recent surge of interest in developing algorithms for finding
sparse solutions of underdetermined systems of linear equations $y = \Phi x$.
In many applications, extremely large problem sizes are envisioned, with at
least tens of thousands of equations and hundreds of thousands of unknowns. For
such problem sizes, low computational complexity is paramount. The best studied
$\ell_1$ minimization algorithm is not fast enough to fulfill this need.
Iterative thresholding algorithms have been proposed to address this problem.
In this paper we want to analyze two of these algorithms theoretically, and
give sufficient conditions under which they recover the sparsest solution.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 18:49:18 GMT"
}
]
| 2009-04-08T00:00:00 | [
[
"Maleki",
"Arian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1227 | Luis Rademacher | Navin Goyal, Luis Rademacher | Learning convex bodies is hard | null | null | null | null | cs.LG cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that learning a convex body in $\RR^d$, given random samples from the
body, requires $2^{\Omega(\sqrt{d/\eps})}$ samples. By learning a convex body
we mean finding a set having at most $\eps$ relative symmetric difference with
the input body. To prove the lower bound we construct a hard to learn family of
convex bodies. Our construction of this family is very simple and based on
error correcting codes.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 21:15:42 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Goyal",
"Navin",
""
],
[
"Rademacher",
"Luis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.1229 | Oleg Pikhurko | Oleg Pikhurko | Finding an Unknown Acyclic Orientation of a Given Graph | 12 pages | null | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let c(G) be the smallest number of edges we have to test in order to
determine an unknown acyclic orientation of the given graph G in the worst
case. For example, if G is the complete graph on n vertices, then c(G) is the
smallest number of comparisons needed to sort n numbers.
We prove that c(G)\le (1/4+o(1))n^2 for any graph G on n vertices, answering
in the affirmative a question of Aigner, Triesch, and Tuza [Discrete
Mathematics, 144 (1995) 3-10]. Also, we show that, for every e>0, it is NP-hard
to approximate the parameter c(G) within a multiplicative factor 74/73-e.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 21:28:59 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Pikhurko",
"Oleg",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1234 | Mark Herrera | Mark Herrera, David C. Roberts, Natali Gulbahce | Mapping the evolution of scientific fields | v3: re-ran analysis with new noise parameter choice; 10 pages for
main paper; 11 pages for suppl. info | PLoS ONE 5(5): e10355. 2010 | 10.1371/journal.pone.0010355 | null | physics.soc-ph cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite the apparent cross-disciplinary interactions among scientific fields,
a formal description of their evolution is lacking. Here we describe a novel
approach to study the dynamics and evolution of scientific fields using a
network-based analysis. We build an idea network consisting of American
Physical Society Physics and Astronomy Classification Scheme (PACS) numbers as
nodes representing scientific concepts. Two PACS numbers are linked if there
exist publications that reference them simultaneously. We locate scientific
fields using a community finding algorithm, and describe the time evolution of
these fields over the course of 1985-2006. The communities we identify map to
known scientific fields, and their age depends on their size and activity. We
expect our approach to quantifying the evolution of ideas to be relevant for
making predictions about the future of science and thus help to guide its
development.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 22:24:11 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Sep 2009 20:58:03 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Apr 2010 02:53:29 GMT"
}
]
| 2011-02-03T00:00:00 | [
[
"Herrera",
"Mark",
""
],
[
"Roberts",
"David C.",
""
],
[
"Gulbahce",
"Natali",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0904.1242 | Kang Ning | Kang Ning and Hon Wai Leong | The Distribution and Deposition Algorithm for Multiple Sequences Sets | 15 pages, 7 figures, extended version of conference paper presented
on GIW 2006, revised version accepted by Journal of Combinatorial
Optimization. | null | null | null | cs.DS cs.DC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sequences set is a mathematical model used in many applications. As the
number of the sequences becomes larger, single sequence set model is not
appropriate for the rapidly increasing problem sizes. For example, more and
more text processing applications separate a single big text file into multiple
files before processing. For these applications, the underline mathematical
model is multiple sequences sets (MSS). Though there is increasing use of MSS,
there is little research on how to process MSS efficiently. To process multiple
sequences sets, sequences are first distributed to different sets, and then
sequences for each set are processed. Deriving effective algorithm for MSS
processing is both interesting and challenging. In this paper, we have defined
the cost functions and performance ratio for analysis of the quality of
synthesis sequences. Based on these, the problem of Process of Multiple
Sequences Sets (PMSS) is formulated. We have first proposed two greedy
algorithms for the PMSS problem, which are based on generalization of
algorithms for single sequences set. Then based on the analysis of the
characteristics of multiple sequences sets, we have proposed the Distribution
and Deposition (DDA) algorithm and DDA* algorithm for PMSS problem. In DDA
algorithm, the sequences are first distributed to multiple sets according to
their alphabet contents; then sequences in each set are deposited by the
deposition algorithm. The DDA* algorithm differs from the DDA algorithm in that
the DDA* algorithm distributes sequences by clustering based on sequence
profiles. Experiments show that DDA and DDA* always output results with smaller
costs than other algorithms, and DDA* outperforms DDA in most instances. The
DDA and DDA* algorithms are also efficient both in time and space.
| [
{
"version": "v1",
"created": "Tue, 7 Apr 2009 23:14:06 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Apr 2009 03:28:21 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Apr 2010 23:02:08 GMT"
},
{
"version": "v4",
"created": "Fri, 30 Apr 2010 02:29:55 GMT"
}
]
| 2010-05-03T00:00:00 | [
[
"Ning",
"Kang",
""
],
[
"Leong",
"Hon Wai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.1243 | Vania Conan | Raffaele Bruno, Vania Conan, Stephane Rousseau | Maximizing the number of accepted flows in TDMA-based wireless ad hoc
networks is APX-complete | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Full exploitation of the bandwidth resources of Wireless Networks is
challenging because of the sharing of the radio medium among neighboring nodes.
Practical algorithms and distributed schemes that tries to optimising the use
of the network radio resources. In this technical report we present the proof
that maximising the network capacity is is an APX Complete problem (not
approximable within 1/(1 - 2^(-k)) - eps for eps > 0).
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 13:21:25 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Bruno",
"Raffaele",
""
],
[
"Conan",
"Vania",
""
],
[
"Rousseau",
"Stephane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.1258 | Jinzhong Niu | Jinzhong Niu, Simon Parsons | An Investigation Report on Auction Mechanism Design | null | null | null | null | cs.AI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Auctions are markets with strict regulations governing the information
available to traders in the market and the possible actions they can take.
Since well designed auctions achieve desirable economic outcomes, they have
been widely used in solving real-world optimization problems, and in
structuring stock or futures exchanges. Auctions also provide a very valuable
testing-ground for economic theory, and they play an important role in
computer-based control systems.
Auction mechanism design aims to manipulate the rules of an auction in order
to achieve specific goals. Economists traditionally use mathematical methods,
mainly game theory, to analyze auctions and design new auction forms. However,
due to the high complexity of auctions, the mathematical models are typically
simplified to obtain results, and this makes it difficult to apply results
derived from such models to market environments in the real world. As a result,
researchers are turning to empirical approaches.
This report aims to survey the theoretical and empirical approaches to
designing auction mechanisms and trading strategies with more weights on
empirical ones, and build the foundation for further research in the field.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 03:41:39 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2009 00:14:53 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Niu",
"Jinzhong",
""
],
[
"Parsons",
"Simon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0904.1281 | Marius Kleiner | Marius Kleiner, Bixio Rimoldi | Asymptotically Optimal Joint Source-Channel Coding with Minimal Delay | 5 pages, 1 figure, final version accepted at IEEE Globecom 2009
(Communication Theory Symposium) | null | 10.1109/GLOCOM.2009.5425427 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present and analyze a joint source-channel coding strategy for the
transmission of a Gaussian source across a Gaussian channel in n channel uses
per source symbol. Among all such strategies, our scheme has the following
properties: i) the resulting mean-squared error scales optimally with the
signal-to-noise ratio, and ii) the scheme is easy to implement and the incurred
delay is minimal, in the sense that a single source symbol is encoded at a
time.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 08:34:12 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Sep 2009 11:22:30 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Kleiner",
"Marius",
""
],
[
"Rimoldi",
"Bixio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1284 | Manabu Inuma | Manabu Inuma, Akira Otsuka, Hideki Imai | Theoretical framework for constructing matching algorithms in biometric
authentication systems | null | null | null | null | cs.CR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a theoretical framework to construct matching
algorithms for any biometric authentication systems. Conventional matching
algorithms are not necessarily secure against strong intentional impersonation
attacks such as wolf attacks. The wolf attack is an attempt to impersonate a
genuine user by presenting a "wolf" to a biometric authentication system
without the knowledge of a genuine user's biometric sample. A wolf is a sample
which can be accepted as a match with multiple templates. The wolf attack
probability (WAP) is the maximum success probability of the wolf attack, which
was proposed by Une, Otsuka, Imai as a measure for evaluating security of
biometric authentication systems. We present a principle for construction of
secure matching algorithms against the wolf attack for any biometric
authentication systems. The ideal matching algorithm determines a threshold for
each input value depending on the entropy of the probability distribution of
the (Hamming) distances. Then we show that if the information about the
probability distribution for each input value is perfectly given, then our
matching algorithm is secure against the wolf attack. Our generalized matching
algorithm gives a theoretical framework to construct secure matching
algorithms. How lower WAP is achievable depends on how accurately the entropy
is estimated. Then there is a trade-off between the efficiency and the
achievable WAP. Almost every conventional matching algorithm employs a fixed
threshold and hence it can be regarded as an efficient but insecure instance of
our theoretical framework. Daugman's IrisCode recognition algorithm proposed
can also be regarded as a non-optimal instance of our framework.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 08:48:30 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Inuma",
"Manabu",
""
],
[
"Otsuka",
"Akira",
""
],
[
"Imai",
"Hideki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.1289 | Animesh Mukherjee | Monojit Choudhury, Animesh Mukherjee, Anupam Basu, Niloy Ganguly,
Ashish Garg, Vaibhav Jalan | Language Diversity across the Consonant Inventories: A Study in the
Framework of Complex Networks | In EACL 2009 Workshop on Cognitive Aspects of Computational Language
Acquisition | null | null | null | cs.CL physics.comp-ph physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | n this paper, we attempt to explain the emergence of the linguistic diversity
that exists across the consonant inventories of some of the major language
families of the world through a complex network based growth model. There is
only a single parameter for this model that is meant to introduce a small
amount of randomness in the otherwise preferential attachment based growth
process. The experiments with this model parameter indicates that the choice of
consonants among the languages within a family are far more preferential than
it is across the families. The implications of this result are twofold -- (a)
there is an innate preference of the speakers towards acquiring certain
linguistic structures over others and (b) shared ancestry propels the stronger
preferential connection between the languages within a family than across them.
Furthermore, our observations indicate that this parameter might bear a
correlation with the period of existence of the language families under
investigation.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 08:57:43 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Choudhury",
"Monojit",
""
],
[
"Mukherjee",
"Animesh",
""
],
[
"Basu",
"Anupam",
""
],
[
"Ganguly",
"Niloy",
""
],
[
"Garg",
"Ashish",
""
],
[
"Jalan",
"Vaibhav",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0904.1296 | Jean-Marie Vanherpe | Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO) | On the perfect matching index of bridgeless cubic graphs | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If $G$ is a bridgeless cubic graph, Fulkerson conjectured that we can find 6
perfect matchings $M_1,...,M_6$ of $G$ with the property that every edge of $G$
is contained in exactly two of them and Berge conjectured that its edge set can
be covered by 5 perfect matchings. We define $\tau(G)$ as the least number of
perfect matchings allowing to cover the edge set of a bridgeless cubic graph
and we study this parameter. The set of graphs with perfect matching index 4
seems interesting and we give some informations on this class.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 09:47:18 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.1299 | Andreas W. Liehr | Moritz Riede, Rico Schueppel, Kristian O. Sylvester-Hvid, Martin
Kuehne, Michael C. Roettger, Klaus Zimmermann and Andreas W. Liehr | On the Communication of Scientific Results: The Full-Metadata Format | null | Comput.Phys.Commun.181:651-662,2010 | 10.1016/j.cpc.2009.11.014 | SI20090302a | cs.DL cs.IR physics.comp-ph physics.ins-det | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we introduce a scientific format for text-based data files,
which facilitates storing and communicating tabular data sets. The so-called
Full-Metadata Format builds on the widely used INI-standard and is based on
four principles: readable self-documentation, flexible structure, fail-safe
compatibility, and searchability. As a consequence, all metadata required to
interpret the tabular data are stored in the same file, allowing for the
automated generation of publication-ready tables and graphs and the semantic
searchability of data file collections. The Full-Metadata Format is introduced
on the basis of three comprehensive examples. The complete format and syntax is
given in the appendix.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 10:07:02 GMT"
}
]
| 2010-01-21T00:00:00 | [
[
"Riede",
"Moritz",
""
],
[
"Schueppel",
"Rico",
""
],
[
"Sylvester-Hvid",
"Kristian O.",
""
],
[
"Kuehne",
"Martin",
""
],
[
"Roettger",
"Michael C.",
""
],
[
"Zimmermann",
"Klaus",
""
],
[
"Liehr",
"Andreas W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "physics.ins-det",
"description": "Instrumentation and Detectors for research in natural science, including optical, molecular, atomic, nuclear and particle physics instrumentation and the associated electronics, services, infrastructure and control equipment. ",
"span": "(Instrumentation and Detectors)"
}
]
|
0904.1302 | Stephan Kreutzer | Stephan Kreutzer | On the Parameterised Intractability of Monadic Second-Order Logic | 23 pages | null | null | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of Courcelle's celebrated results states that if C is a class of graphs
of bounded tree-width, then model-checking for monadic second order logic is
fixed-parameter tractable on C by linear time parameterised algorithms. An
immediate question is whether this is best possible or whether the result can
be extended to classes of unbounded tree-width.
In this paper we show that in terms of tree-width, the theorem can not be
extended much further. More specifically, we show that if C is a class of
graphs which is closed under colourings and satisfies certain constructibility
conditions such that the tree-width of C is not bounded by log^{16}(n) then
MSO_2-model checking is not fixed-parameter tractable unless the satisfiability
problem SAT for propositional logic can be solved in sub-exponential time. If
the tree-width of C is not poly-logarithmically bounded, then MSO_2-model
checking is not fixed-parameter tractable unless all problems in the
polynomial-time hierarchy, and hence in particular all problems in NP, can be
solved in sub-exponential time.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 10:36:24 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Kreutzer",
"Stephan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.1313 | Hao Zhang | Hao Zhang, Gang Li, Huadong Meng | A Class of Novel STAP Algorithms Using Sparse Recovery Technique | 8 pages, 5 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A class of novel STAP algorithms based on sparse recovery technique were
presented. Intrinsic sparsity of distribution of clutter and target energy on
spatial-frequency plane was exploited from the viewpoint of compressed sensing.
The original sample data and distribution of target and clutter energy was
connected by a ill-posed linear algebraic equation and popular $L_1$
optimization method could be utilized to search for its solution with sparse
characteristic. Several new filtering algorithm acting on this solution were
designed to clean clutter component on spatial-frequency plane effectively for
detecting invisible targets buried in clutter. The method above is called
CS-STAP in general. CS-STAP showed their advantage compared with conventional
STAP technique, such as SMI, in two ways: Firstly, the resolution of CS-STAP on
estimation for distribution of clutter and target energy is ultra-high such
that clutter energy might be annihilated almost completely by carefully tuned
filter. Output SCR of CS-STAP algorithms is far superior to the requirement of
detection; Secondly, a much smaller size of training sample support compared
with SMI method is requested for CS-STAP method. Even with only one snapshot
(from target range cell) could CS-STAP method be able to reveal the existence
of target clearly. CS-STAP method display its great potential to be used in
heterogeneous situation. Experimental result on dataset from mountaintop
program has provided the evidence for our assertion on CS-STAP.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 11:58:02 GMT"
}
]
| 2009-04-09T00:00:00 | [
[
"Zhang",
"Hao",
""
],
[
"Li",
"Gang",
""
],
[
"Meng",
"Huadong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1331 | Sudhir R. Ghorpade | Sudhir R. Ghorpade, Sartaj Ul Hasan, and Meena Kumari | Primitive Polynomials, Singer Cycles, and Word-Oriented Linear Feedback
Shift Registers | Version 2 with some minor changes; to appear in Designs, Codes and
Cryptography. | Designs, Codes and Cryptography, Vol. 58, No. 2 (2011), pp.
123-134 | 10.1007/s10623-010-9387-7 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using the structure of Singer cycles in general linear groups, we prove that
a conjecture of Zeng, Han and He (2007) holds in the affirmative in a special
case, and outline a plausible approach to prove it in the general case. This
conjecture is about the number of primitive $\sigma$-LFSRs of a given order
over a finite field, and it generalizes a known formula for the number of
primitive LFSRs, which, in turn, is the number of primitive polynomials of a
given degree over a finite field. Moreover, this conjecture is intimately
related to an open question of Niederreiter (1995) on the enumeration of
splitting subspaces of a given dimension.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 13:06:59 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Mar 2010 08:31:16 GMT"
}
]
| 2011-02-10T00:00:00 | [
[
"Ghorpade",
"Sudhir R.",
""
],
[
"Hasan",
"Sartaj Ul",
""
],
[
"Kumari",
"Meena",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1366 | Jian Li | Jian Li, Barna Saha, Amol Deshpande | A Unified Approach to Ranking in Probabilistic Databases | null | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dramatic growth in the number of application domains that naturally
generate probabilistic, uncertain data has resulted in a need for efficiently
supporting complex querying and decision-making over such data. In this paper,
we present a unified approach to ranking and top-k query processing in
probabilistic databases by viewing it as a multi-criteria optimization problem,
and by deriving a set of features that capture the key properties of a
probabilistic dataset that dictate the ranked result. We contend that a single,
specific ranking function may not suffice for probabilistic databases, and we
instead propose two parameterized ranking functions, called PRF-w and PRF-e,
that generalize or can approximate many of the previously proposed ranking
functions. We present novel generating functions-based algorithms for
efficiently ranking large datasets according to these ranking functions, even
if the datasets exhibit complex correlations modeled using probabilistic
and/xor trees or Markov networks. We further propose that the parameters of the
ranking function be learned from user preferences, and we develop an approach
to learn those parameters. Finally, we present a comprehensive experimental
study that illustrates the effectiveness of our parameterized ranking
functions, especially PRF-e, at approximating other ranking functions and the
scalability of our proposed algorithms for exact or approximate ranking.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 15:30:58 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Apr 2009 04:42:10 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Dec 2010 19:25:42 GMT"
},
{
"version": "v4",
"created": "Wed, 15 Dec 2010 21:12:37 GMT"
}
]
| 2010-12-17T00:00:00 | [
[
"Li",
"Jian",
""
],
[
"Saha",
"Barna",
""
],
[
"Deshpande",
"Amol",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.1369 | Javier M. Paredes | Javier M. Paredes, Babak H. Khalaj, and Alex B. Gershman | Cooperative Transmission for Wireless Relay Networks Using Limited
Feedback | V1: 27 pages, 1 column, 6 figures. Submitted to IEEE Transactions on
Signal Processing, February 2, 2009. V2: 30 pages, 1 column, 8 figures.
Revised version submitted to IEEE Transactions on Signal Processing, July 23,
2009 | null | 10.1109/TSP.2010.2046079 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To achieve the available performance gains in half-duplex wireless relay
networks, several cooperative schemes have been earlier proposed using either
distributed space-time coding or distributed beamforming for the transmitter
without and with channel state information (CSI), respectively. However, these
schemes typically have rather high implementation and/or decoding complexities,
especially when the number of relays is high. In this paper, we propose a
simple low-rate feedback-based approach to achieve maximum diversity with a low
decoding and implementation complexity. To further improve the performance of
the proposed scheme, the knowledge of the second-order channel statistics is
exploited to design long-term power loading through maximizing the receiver
signal-to-noise ratio (SNR) with appropriate constraints. This maximization
problem is approximated by a convex feasibility problem whose solution is shown
to be close to the optimal one in terms of the error probability. Subsequently,
to provide robustness against feedback errors and further decrease the feedback
rate, an extended version of the distributed Alamouti code is proposed. It is
also shown that our scheme can be generalized to the differential transmission
case, where it can be applied to wireless relay networks with no CSI available
at the receiver.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 16:05:24 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Jul 2009 08:22:30 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Paredes",
"Javier M.",
""
],
[
"Khalaj",
"Babak H.",
""
],
[
"Gershman",
"Alex B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1409 | Hooman Shirani-Mehr | Hooman Shirani-Mehr, Giuseppe Caire and Michael J. Neely | MIMO Downlink Scheduling with Non-Perfect Channel State Knowledge | Submitted to IEEE Transactions on Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Downlink scheduling schemes are well-known and widely investigated under the
assumption that the channel state is perfectly known to the scheduler. In the
multiuser MIMO (broadcast) case, downlink scheduling in the presence of
non-perfect channel state information (CSI) is only scantly treated. In this
paper we provide a general framework that addresses the problem systematically.
Also, we illuminate the key role played by the channel state prediction error:
our scheme treats in a fundamentally different way users with small channel
prediction error ("predictable" users) and users with large channel prediction
error ("non-predictable" users), and can be interpreted as a near-optimal
opportunistic time-sharing strategy between MIMO downlink beamforming to
predictable users and space-time coding to nonpredictable users. Our results,
based on a realistic MIMO channel model used in 3GPP standardization, show that
the proposed algorithms can significantly outperform a conventional
"mismatched" scheduling scheme that treats the available CSI as if it was
perfect.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 02:40:12 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jul 2009 18:50:00 GMT"
}
]
| 2009-10-11T00:00:00 | [
[
"Shirani-Mehr",
"Hooman",
""
],
[
"Caire",
"Giuseppe",
""
],
[
"Neely",
"Michael J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1435 | Shiva Kintali | Shiva Kintali, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram,
Shang-Hua Teng | Reducibility Among Fractional Stability Problems | null | null | null | null | cs.CC cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we resolve the computational complexity of a number of
outstanding open problems with practical applications. Here is the list of
problems we show to be PPAD-complete, along with the domains of practical
significance: Fractional Stable Paths Problem (FSPP) [21] - Internet routing;
Core of Balanced Games [41] - Economics and Game theory; Scarf's Lemma [41] -
Combinatorics; Hypergraph Matching [1]- Social Choice and Preference Systems;
Fractional Bounded Budget Connection Games (FBBC) [30] - Social networks; and
Strong Fractional Kernel [2]- Graph Theory. In fact, we show that no fully
polynomial-time approximation schemes exist (unless PPAD is in FP).
This paper is entirely a series of reductions that build in nontrivial ways
on the framework established in previous work. In the course of deriving these
reductions, we created two new concepts - preference games and personalized
equilibria. The entire set of new reductions can be presented as a lattice with
the above problems sandwiched between preference games (at the "easy" end) and
personalized equilibria (at the "hard" end). Our completeness results extend to
natural approximate versions of most of these problems. On a technical note, we
wish to highlight our novel "continuous-to-discrete" reduction from exact
personalized equilibria to approximate personalized equilibria using a linear
program augmented with an exponential number of "min" constraints of a specific
form. In addition to enhancing our repertoire of PPAD-complete problems, we
expect the concepts and techniques in this paper to find future use in
algorithmic game theory.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 22:03:54 GMT"
}
]
| 2009-04-10T00:00:00 | [
[
"Kintali",
"Shiva",
""
],
[
"Poplawski",
"Laura J.",
""
],
[
"Rajaraman",
"Rajmohan",
""
],
[
"Sundaram",
"Ravi",
""
],
[
"Teng",
"Shang-Hua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.1439 | Chaomei Chen | Chaomei Chen (1 and 2), Yue Chen (2), Mark Horowitz (1), Haiyan Hou
(2), Zeyuan Liu (2) and Don Pellegrino (1) ((1) Drexel University, (2) Dalian
University of Technology) | Towards an explanatory and computational theory of scientific discovery | 32 pages, 6 figures. Journal of Informetirics, 2009, volume 3 (in
press) | Journal of Informetirics, 3(2009), 191-209 | null | null | cs.GL cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an explanatory and computational theory of transformative
discoveries in science. The theory is derived from a recurring theme found in a
diverse range of scientific change, scientific discovery, and knowledge
diffusion theories in philosophy of science, sociology of science, social
network analysis, and information science. The theory extends the concept of
structural holes from social networks to a broader range of associative
networks found in science studies, especially including networks that reflect
underlying intellectual structures such as co-citation networks and
collaboration networks. The central premise is that connecting otherwise
disparate patches of knowledge is a valuable mechanism of creative thinking in
general and transformative scientific discovery in particular.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 23:46:10 GMT"
}
]
| 2010-02-09T00:00:00 | [
[
"Chen",
"Chaomei",
"",
"1 and 2"
],
[
"Chen",
"Yue",
""
],
[
"Horowitz",
"Mark",
""
],
[
"Hou",
"Haiyan",
""
],
[
"Liu",
"Zeyuan",
""
],
[
"Pellegrino",
"Don",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0904.1444 | RadhaKrishna Ganti | Radha Krishna Ganti and Martin Haenggi | Spatial and Temporal Correlation of the Interference in ALOHA Ad Hoc
Networks | null | null | 10.1109/LCOMM.2009.090837 | null | cs.IT cs.NI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interference is a main limiting factor of the performance of a wireless ad
hoc network. The temporal and the spatial correlation of the interference makes
the outages correlated temporally (important for retransmissions) and spatially
correlated (important for routing). In this letter we quantify the temporal and
spatial correlation of the interference in a wireless ad hoc network whose
nodes are distributed as a Poisson point process on the plane when ALOHA is
used as the multiple-access scheme.
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 23:47:41 GMT"
}
]
| 2010-10-11T00:00:00 | [
[
"Ganti",
"Radha Krishna",
""
],
[
"Haenggi",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0904.1446 | Yaming Yu | Yaming Yu and Oliver Johnson | Concavity of entropy under thinning | To be presented at ISIT09 | IEEE International Symposium on Information Theory, June 28
2009-July 3, 2009, pp. 144 -- 148 | 10.1109/ISIT.2009.5205880 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Building on the recent work of Johnson (2007) and Yu (2008), we prove that
entropy is a concave function with respect to the thinning operation T_a. That
is, if X and Y are independent random variables on Z_+ with ultra-log-concave
probability mass functions, then H(T_a X+T_{1-a} Y)>= a H(X)+(1-a)H(Y), 0 <= a
<= 1, where H denotes the discrete entropy. This is a discrete analogue of the
inequality (h denotes the differential entropy) h(sqrt(a) X + sqrt{1-a} Y)>= a
h(X)+(1-a) h(Y), 0 <= a <= 1, which holds for continuous X and Y with finite
variances and is equivalent to Shannon's entropy power inequality. As a
consequence we establish a special case of a conjecture of Shepp and Olkin
(1981).
| [
{
"version": "v1",
"created": "Wed, 8 Apr 2009 23:55:46 GMT"
}
]
| 2009-09-24T00:00:00 | [
[
"Yu",
"Yaming",
""
],
[
"Johnson",
"Oliver",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1488 | Francesco Ranzato | Francesco Ranzato and Francesco Tapparo | Computing Stuttering Simulations | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stuttering bisimulation is a well-known behavioral equivalence that preserves
CTL-X, namely CTL without the next-time operator X. Correspondingly, the
stuttering simulation preorder induces a coarser behavioral equivalence that
preserves the existential fragment ECTL-{X,G}, namely ECTL without the
next-time X and globally G operators. While stuttering bisimulation equivalence
can be computed by the well-known Groote and Vaandrager's [1990] algorithm, to
the best of our knowledge, no algorithm for computing the stuttering simulation
preorder and equivalence is available. This paper presents such an algorithm
for finite state systems.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2009 09:40:33 GMT"
}
]
| 2009-04-10T00:00:00 | [
[
"Ranzato",
"Francesco",
""
],
[
"Tapparo",
"Francesco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.1529 | Luigi Santocanale | Luigi Santocanale (LIF), Robin Cockett | On the word problem for SP-categories, and the properties of two-way
communication | null | null | null | null | cs.LO math.CT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The word problem for categories with free products and coproducts (sums),
SP-categories, is directly related to the problem of determining the
equivalence of certain processes. Indeed, the maps in these categories may be
directly interpreted as processes which communicate by two-way channels. The
maps of an SP-category may also be viewed as a proof theory for a simple logic
with a game theoretic intepretation. The cut-elimination procedure for this
logic determines equality only up to certain permuting conversions. As the
equality classes under these permuting conversions are finite, it is easy to
see that equality between cut-free terms (even in the presence of the additive
units) is decidable. Unfortunately, this does not yield a tractable decision
algorithm as these equivalence classes can contain exponentially many terms.
However, the rather special properties of these free categories -- and, thus,
of two-way communication -- allow one to devise a tractable algorithm for
equality. We show that, restricted to cut-free terms s,t : X --> A, the
decision procedure runs in time polynomial on |X||A|, the product of the sizes
of the domain and codomain type.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2009 13:31:00 GMT"
}
]
| 2009-04-10T00:00:00 | [
[
"Santocanale",
"Luigi",
"",
"LIF"
],
[
"Cockett",
"Robin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0904.1534 | Jeereome Jaffree | Jianfeng Zhang, Guy Chavent (INRIA Rocquencourt, CEREMADE), J\'er\^ome
Jaffr\'e (INRIA Rocquencourt) | Estimating nonlinearities in twophase flow in porous media | null | null | null | null | cs.NA math.AP physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to analyze numerically inverse problems several techniques based on
linear and nonlinear stability analysis are presented. These techniques are
illustrated on the problem of estimating mobilities and capillary pressure in
one-dimensional two-phase displacements in porous media that are performed in
laboratories. This is an example of the problem of estimating nonlinear
coefficients in a system of nonlinear partial differential equations.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2009 14:03:59 GMT"
}
]
| 2014-02-12T00:00:00 | [
[
"Zhang",
"Jianfeng",
"",
"INRIA Rocquencourt, CEREMADE"
],
[
"Chavent",
"Guy",
"",
"INRIA Rocquencourt, CEREMADE"
],
[
"Jaffré",
"Jérôme",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
]
|
0904.1538 | P{\aa}l Anders Floor Dr | P{\aa}l Anders Floor and Tor A. Ramstad | Shannon-Kotel'nikov Mappings for Analog Point-to-Point Communications | Revision of old manuscript to be submitted | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper an approach to joint source-channel coding (JSCC) named
Shannon-Kotel'nikov mappings (S-K mappings) is presented. S-K mappings are
continuous, or piecewise continuous direct source-to-channel mappings operating
directly on amplitude continuous and discrete time signals. Such mappings
include several existing JSCC schemes as special cases. Many existing
approaches to analog- or hybrid discrete analog JSCC provide both excellent
performance as well as robustness to variations in noise level. This at low
delay and relatively low complexity. However, a theory explaining their
performance and behaviour on a general basis, as well as guidelines on how to
construct close to optimal mappings in general, does not currently exist.
Therefore, such mappings are often found based on educated guesses inspired of
configurations that are known in advance to produce good solutions, combination
of already existing mappings, numerical optimization or machine learning
methods. The objective of this paper is to introduce a theoretical framework
for analysis of analog- or hybrid discrete analog S-K mappings. This framework
will enable calculation of distortion when applying such schemes on
point-to-point links, reveal more about their fundamental nature, and provide
guidelines on how they should be constructed in order to perform well at both
low and arbitrary complexity and delay. Such guidelines will likely help
constrain solutions to numerical approaches and help explain why machine
learning approaches finds the solutions they do. This task is difficult and we
do not provide a complete framework at this stage: We focus on high SNR and
memoryless sources with an arbitrary continuous unimodal density function and
memoryless Gaussian channels. We also provide example of mappings based on
surfaces which are chosen based on the provided theory.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2009 14:54:19 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Apr 2012 22:52:12 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jul 2021 21:49:38 GMT"
},
{
"version": "v4",
"created": "Sun, 20 Mar 2022 19:25:42 GMT"
}
]
| 2022-03-22T00:00:00 | [
[
"Floor",
"Pål Anders",
""
],
[
"Ramstad",
"Tor A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1579 | Fedor Zhdanov | Fedor Zhdanov, Vladimir Vovk, Brian Burford, Dmitry Devetyarov, Ilia
Nouretdinov and Alex Gammerman | Online prediction of ovarian cancer | 11 pages, 4 figures, uses llncs.cls | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we apply computer learning methods to diagnosing ovarian cancer
using the level of the standard biomarker CA125 in conjunction with information
provided by mass-spectrometry. We are working with a new data set collected
over a period of 7 years. Using the level of CA125 and mass-spectrometry peaks,
our algorithm gives probability predictions for the disease. To estimate
classification accuracy we convert probability predictions into strict
predictions. Our algorithm makes fewer errors than almost any linear
combination of the CA125 level and one peak's intensity (taken on the log
scale). To check the power of our algorithm we use it to test the hypothesis
that CA125 and the peaks do not contain useful information for the prediction
of the disease at a particular time before the diagnosis. Our algorithm
produces $p$-values that are better than those produced by the algorithm that
has been previously applied to this data set. Our conclusion is that the
proposed algorithm is more reliable for prediction on new data.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2009 18:26:36 GMT"
}
]
| 2009-04-10T00:00:00 | [
[
"Zhdanov",
"Fedor",
""
],
[
"Vovk",
"Vladimir",
""
],
[
"Burford",
"Brian",
""
],
[
"Devetyarov",
"Dmitry",
""
],
[
"Nouretdinov",
"Ilia",
""
],
[
"Gammerman",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.1613 | Andriy Myronenko | Andriy Myronenko, Xubo Song | On the closed-form solution of the rotation matrix arising in computer
vision problems | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show the closed-form solution to the maximization of trace(A'R), where A
is given and R is unknown rotation matrix. This problem occurs in many computer
vision tasks involving optimal rotation matrix estimation. The solution has
been continuously reinvented in different fields as part of specific problems.
We summarize the historical evolution of the problem and present the general
proof of the solution. We contribute to the proof by considering the degenerate
cases of A and discuss the uniqueness of R.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2009 22:15:25 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Myronenko",
"Andriy",
""
],
[
"Song",
"Xubo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0904.1616 | Juan Meza | Juan Meza, Scott Campbell, and David Bailey | Mathematical and Statistical Opportunities in Cyber Security | null | null | null | LBNL-1667E | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The role of mathematics in a complex system such as the Internet has yet to
be deeply explored. In this paper, we summarize some of the important and
pressing problems in cyber security from the viewpoint of open science
environments. We start by posing the question "What fundamental problems exist
within cyber security research that can be helped by advanced mathematics and
statistics?" Our first and most important assumption is that access to
real-world data is necessary to understand large and complex systems like the
Internet. Our second assumption is that many proposed cyber security solutions
could critically damage both the openness and the productivity of scientific
research. After examining a range of cyber security problems, we come to the
conclusion that the field of cyber security poses a rich set of new and
exciting research opportunities for the mathematical and statistical sciences.
| [
{
"version": "v1",
"created": "Thu, 9 Apr 2009 22:30:03 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Meza",
"Juan",
""
],
[
"Campbell",
"Scott",
""
],
[
"Bailey",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.1629 | Petar Kormushev | Yoichi Yamazaki, Fangyan Dong, Yuta Masuda, Yukiko Uehara, Petar
Kormushev, Hai An Vu, Phuc Quang Le, Kaoru Hirota | Fuzzy inference based mentality estimation for eye robot agent | 2 pages, in Japanese | Proceedings of 23rd Fuzzy System Symposium (FSS 2007), pp.
387-388, 2007 | null | null | cs.RO cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Household robots need to communicate with human beings in a friendly fashion.
To achieve better understanding of displayed information, an importance and a
certainty of the information should be communicated together with the main
information. The proposed intent expression system aims to convey this
additional information using an eye robot. The eye motions are represented as
states in a pleasure-arousal space model. Change of the model state is
calculated by fuzzy inference according to the importance and certainty of the
displayed information. This change influences the arousal-sleep coordinate in
the space which corresponds to activeness in communication. The eye robot
provides a basic interface for the mascot robot system which is an easy to
understand information terminal for home environments in a humatronics society.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 03:17:39 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Yamazaki",
"Yoichi",
""
],
[
"Dong",
"Fangyan",
""
],
[
"Masuda",
"Yuta",
""
],
[
"Uehara",
"Yukiko",
""
],
[
"Kormushev",
"Petar",
""
],
[
"Vu",
"Hai An",
""
],
[
"Le",
"Phuc Quang",
""
],
[
"Hirota",
"Kaoru",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0904.1630 | Aaron Sterling | Aaron Sterling | Self-Assembly of a Statistically Self-Similar Fractal | I am withdrawing all work I would like to polish before resubmitting,
including this paper. Several typos fixed | null | null | null | cs.CC cs.DS cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We demonstrate existence of a tile assembly system that self-assembles the
statistically self-similar Sierpinski Triangle in the Winfree-Rothemund Tile
Assembly Model. This appears to be the first paper that considers self-assembly
of a random fractal, instead of a deterministic fractal or a finite, bounded
shape. Our technical contributions include a way to remember, and use,
unboundedly-long prefixes of an infinite coding sequence at each stage of
fractal construction; a tile assembly mechanism for nested recursion; and a
definition of "almost-everywhere local determinism," to describe a tileset
whose assembly is locally determined, conditional upon a zeta-dimension zero
set of (infinitely many) "input" tiles. This last is similar to the definition
of randomized computation for Turing machines, in which an algorithm is
deterministic relative to an oracle sequence of coin flips that provides advice
but does not itself compute. Keywords: tile self-assembly, statistically
self-similar Sierpinski Triangle.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 03:19:04 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Apr 2009 15:58:20 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Jul 2011 14:00:06 GMT"
}
]
| 2011-07-21T00:00:00 | [
[
"Sterling",
"Aaron",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.1631 | Petar Kormushev | Yoichi Yamazaki, Fangyan Dong, Yuta Masuda, Yukiko Uehara, Petar
Kormushev, Hai An Vu, Phuc Quang Le, Kaoru Hirota | Intent expression using eye robot for mascot robot system | 5 pages | 8th International Symposium on Advanced Intelligent Systems
(ISIS2007), pp. 576-580, 2007 | null | null | cs.RO cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An intent expression system using eye robots is proposed for a mascot robot
system from a viewpoint of humatronics. The eye robot aims at providing a basic
interface method for an information terminal robot system. To achieve better
understanding of the displayed information, the importance and the degree of
certainty of the information should be communicated along with the main
content. The proposed intent expression system aims at conveying this
additional information using the eye robot system. Eye motions are represented
as the states in a pleasure-arousal space model. Changes in the model state are
calculated by fuzzy inference according to the importance and degree of
certainty of the displayed information. These changes influence the
arousal-sleep coordinates in the space that corresponds to levels of liveliness
during communication. The eye robot provides a basic interface for the mascot
robot system that is easy to be understood as an information terminal for home
environments in a humatronics society.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 03:35:33 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Yamazaki",
"Yoichi",
""
],
[
"Dong",
"Fangyan",
""
],
[
"Masuda",
"Yuta",
""
],
[
"Uehara",
"Yukiko",
""
],
[
"Kormushev",
"Petar",
""
],
[
"Vu",
"Hai An",
""
],
[
"Le",
"Phuc Quang",
""
],
[
"Hirota",
"Kaoru",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0904.1645 | Cedric Chauve | Cedric Chauve, A\"ida Ouangraoua (LaBRI) | A 3-approximation algorithm for computing a parsimonious first
speciation in the gene duplication model | null | null | null | null | cs.DM cs.DS q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following problem: from a given set of gene families trees on
a set of genomes, find a first speciation, that splits these genomes into two
subsets, that minimizes the number of gene duplications that happened before
this speciation. We call this problem the Minimum Duplication Bipartition
Problem. Using a generalization of the Minimum Edge-Cut Problem, known as
Submodular Function Minimization, we propose a polynomial time and space
3-approximation algorithm for the Minimum Duplication Bipartition Problem.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 06:28:07 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2009 06:29:22 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Chauve",
"Cedric",
"",
"LaBRI"
],
[
"Ouangraoua",
"Aïda",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0904.1672 | Joost Vennekens | Joost Vennekens, Marc Denecker, Maurice Bruynooghe | CP-logic: A Language of Causal Probabilistic Events and Its Relation to
Logic Programming | To be published in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This papers develops a logical language for representing probabilistic causal
laws. Our interest in such a language is twofold. First, it can be motivated as
a fundamental study of the representation of causal knowledge. Causality has an
inherent dynamic aspect, which has been studied at the semantical level by
Shafer in his framework of probability trees. In such a dynamic context, where
the evolution of a domain over time is considered, the idea of a causal law as
something which guides this evolution is quite natural. In our formalization, a
set of probabilistic causal laws can be used to represent a class of
probability trees in a concise, flexible and modular way. In this way, our work
extends Shafer's by offering a convenient logical representation for his
semantical objects.
Second, this language also has relevance for the area of probabilistic logic
programming. In particular, we prove that the formal semantics of a theory in
our language can be equivalently defined as a probability distribution over the
well-founded models of certain logic programs, rendering it formally quite
similar to existing languages such as ICL or PRISM. Because we can motivate and
explain our language in a completely self-contained way as a representation of
probabilistic causal laws, this provides a new way of explaining the intuitions
behind such probabilistic logic programs: we can say precisely which knowledge
such a program expresses, in terms that are equally understandable by a
non-logician. Moreover, we also obtain an additional piece of knowledge
representation methodology for probabilistic logic programs, by showing how
they can express probabilistic causal laws.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 10:00:55 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Vennekens",
"Joost",
""
],
[
"Denecker",
"Marc",
""
],
[
"Bruynooghe",
"Maurice",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.1692 | Idan Goldenberg | Idan Goldenberg and David Burshtein | Error Bounds for Repeat-Accumulate Codes Decoded via Linear Programming | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine regular and irregular repeat-accumulate (RA) codes with repetition
degrees which are all even. For these codes and with a particular choice of an
interleaver, we give an upper bound on the decoding error probability of a
linear-programming based decoder which is an inverse polynomial in the block
length. Our bound is valid for any memoryless, binary-input, output-symmetric
(MBIOS) channel. This result generalizes the bound derived by Feldman et al.,
which was for regular RA(2) codes.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 14:14:48 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Feb 2010 08:10:41 GMT"
}
]
| 2010-02-22T00:00:00 | [
[
"Goldenberg",
"Idan",
""
],
[
"Burshtein",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1696 | Walid Belkhir | Walid Belkhir | Undirected Graphs of Entanglement 3 | 33 pages | null | null | null | cs.GT cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entanglement is a complexity measure of digraphs that origins in fixed-point
logics. Its combinatorial purpose is to measure the nested depth of cycles in
digraphs. We address the problem of characterizing the structure of graphs of
entanglement at most $k$. Only partial results are known so far: digraphs for
$k=1$, and undirected graphs for $k=2$. In this paper we investigate the
structure of undirected graphs for $k=3$. Our main tool is the so-called
\emph{Tutte's decomposition} of 2-connected graphs into cycles and 3-connected
components into a tree-like fashion. We shall give necessary conditions on
Tutte's tree to be a tree decomposition of a 2-connected graph of entanglement
3.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 14:55:37 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Belkhir",
"Walid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.1700 | Antoine Sinton | Antoine Sinton | Recovering the state sequence of hidden Markov models using mean-field
approximations | 43 pages, 41 figures | null | 10.1088/1742-5468/2009/07/P07026 | null | cond-mat.dis-nn cond-mat.stat-mech cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inferring the sequence of states from observations is one of the most
fundamental problems in Hidden Markov Models. In statistical physics language,
this problem is equivalent to computing the marginals of a one-dimensional
model with a random external field. While this task can be accomplished through
transfer matrix methods, it becomes quickly intractable when the underlying
state space is large.
This paper develops several low-complexity approximate algorithms to address
this inference problem when the state space becomes large. The new algorithms
are based on various mean-field approximations of the transfer matrix. Their
performances are studied in detail on a simple realistic model for DNA
pyrosequencing.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 15:19:14 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jun 2009 13:08:39 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Sinton",
"Antoine",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.1701 | Walid Belkhir | Walid Belkhir | The Star Height Hierarchy Vs. The Variable Hierarchy | null | null | null | null | cs.LO cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The star height hierarchy (resp. the variable hierarchy) results in
classifying $\mu$-terms into classes according to the nested depth of fixed
point operators (resp. to the number of bound variables). We prove, under some
assumptions, that the variable hierarchy is a proper refinement of the star
height hierarchy. We mean that the non collapse of the variable hierarchy
implies the non collapse of the star height hierarchy. The proof relies on the
combinatorial characterization of the two hierarchies.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 15:25:49 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Belkhir",
"Walid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.1703 | Walid Belkhir | Walid Belkhir | Closure Under Minors of Undirected Entanglement | null | null | null | null | cs.DM cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entanglement is a digraph complexity measure that origins in fixed-point
theory. Its purpose is to count the nested depth of cycles in digraphs.
In this paper we prove that the class of undirected graphs of entanglement at
most $k$, for arbitrary fixed $k \in \mathbb{N}$, is closed under taking
minors. Our proof relies on the game theoretic characterization of entanglement
in terms of Robber and Cops games.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 15:32:19 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Belkhir",
"Walid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.1705 | Giorgio Lucarelli | Evripidis Bampis, Alexander Kononov, Giorgio Lucarelli, Ioannis Milis | Bounded Max-Colorings of Graphs | 13 pages, 5 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a bounded max-coloring of a vertex/edge weighted graph, each color class
is of cardinality at most $b$ and of weight equal to the weight of the heaviest
vertex/edge in this class. The bounded max-vertex/edge-coloring problems ask
for such a coloring minimizing the sum of all color classes' weights.
In this paper we present complexity results and approximation algorithms for
those problems on general graphs, bipartite graphs and trees. We first show
that both problems are polynomial for trees, when the number of colors is
fixed, and $H_b$ approximable for general graphs, when the bound $b$ is fixed.
For the bounded max-vertex-coloring problem, we show a 17/11-approximation
algorithm for bipartite graphs, a PTAS for trees as well as for bipartite
graphs when $b$ is fixed. For unit weights, we show that the known 4/3 lower
bound for bipartite graphs is tight by providing a simple 4/3 approximation
algorithm. For the bounded max-edge-coloring problem, we prove approximation
factors of $3-2/\sqrt{2b}$, for general graphs, $\min\{e, 3-2/\sqrt{b}\}$, for
bipartite graphs, and 2, for trees. Furthermore, we show that this problem is
NP-complete even for trees. This is the first complexity result for
max-coloring problems on trees.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 15:36:02 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Bampis",
"Evripidis",
""
],
[
"Kononov",
"Alexander",
""
],
[
"Lucarelli",
"Giorgio",
""
],
[
"Milis",
"Ioannis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.1712 | Tarik Ait-Idir | Tarik Ait-Idir, Houda Chafnaji, and Samir Saoudi | Turbo Packet Combining for Broadband Space-Time BICM Hybrid-ARQ Systems
with Co-Channel Interference | 12 pages, 7 figures, and 2 tables | IEEE Transactions on Wireless Communications, vol. 9, no. 5, pp.
1686-1697, May 2010 | 10.1109/TWC.2010.05.090441 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, efficient turbo packet combining for single carrier (SC)
broadband multiple-input--multiple-output (MIMO) hybrid--automatic repeat
request (ARQ) transmission with unknown co-channel interference (CCI) is
studied. We propose a new frequency domain soft minimum mean square error
(MMSE)-based signal level combining technique where received signals and
channel frequency responses (CFR)s corresponding to all retransmissions are
used to decode the data packet. We provide a recursive implementation algorithm
for the introduced scheme, and show that both its computational complexity and
memory requirements are quite insensitive to the ARQ delay, i.e., maximum
number of ARQ rounds. Furthermore, we analyze the asymptotic performance, and
show that under a sum-rank condition on the CCI MIMO ARQ channel, the proposed
packet combining scheme is not interference-limited. Simulation results are
provided to demonstrate the gains offered by the proposed technique.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 17:05:49 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Aug 2010 16:55:16 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Ait-Idir",
"Tarik",
""
],
[
"Chafnaji",
"Houda",
""
],
[
"Saoudi",
"Samir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1729 | Sugumar Murugesan | Sugumar Murugesan, Philip Schniter | Joint Opportunistic Scheduling in Multi-Cellular Systems | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of multiuser scheduling with partial channel
information in a multi-cell environment. The scheduling problem is formulated
jointly with the ARQ based channel learning process and the intercell
interference mitigating cell breathing protocol. The optimal joint scheduling
policy under various system constraints is established. The general problem is
posed as a generalized Restless Multiarmed Bandit process and the notion of
indexability is studied. We conjecture, with numerical support, that the
multicell multiuser scheduling problem is indexable and obtain a partial
structure of the index policy.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 18:55:12 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Murugesan",
"Sugumar",
""
],
[
"Schniter",
"Philip",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.1730 | Jay Kumar Sundararajan | Jay Kumar Sundararajan, Devavrat Shah, Muriel Medard | Feedback-based online network coding | 27 pages, 7 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current approaches to the practical implementation of network coding are
batch-based, and often do not use feedback, except possibly to signal
completion of a file download. In this paper, the various benefits of using
feedback in a network coded system are studied. It is shown that network coding
can be performed in a completely online manner, without the need for batches or
generations, and that such online operation does not affect the throughput.
Although these ideas are presented in a single-hop packet erasure broadcast
setting, they naturally extend to more general lossy networks which employ
network coding in the presence of feedback. The impact of feedback on queue
size at the sender and decoding delay at the receivers is studied. Strategies
for adaptive coding based on feedback are presented, with the goal of
minimizing the queue size and delay. The asymptotic behavior of these metrics
is characterized, in the limit of the traffic load approaching capacity.
Different notions of decoding delay are considered, including an
order-sensitive notion which assumes that packets are useful only when
delivered in order. Our work may be viewed as a natural extension of Automatic
Repeat reQuest (ARQ) schemes to coded networks.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 19:13:43 GMT"
}
]
| 2009-04-13T00:00:00 | [
[
"Sundararajan",
"Jay Kumar",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Medard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1752 | Fran\c{c}ois Nicolas | Julien Cassaigne and Francois Nicolas | On polynomial growth functions of D0L-systems | Not intended to be published | null | null | null | cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to prove that every polynomial function that maps
the natural integers to the positive integers is the growth function of some
D0L-system.
| [
{
"version": "v1",
"created": "Sat, 11 Apr 2009 11:52:41 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Aug 2009 14:34:22 GMT"
},
{
"version": "v3",
"created": "Tue, 3 Jan 2012 21:52:10 GMT"
}
]
| 2012-01-05T00:00:00 | [
[
"Cassaigne",
"Julien",
""
],
[
"Nicolas",
"Francois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0904.1754 | Sugumar Murugesan | Sugumar Murugesan, Philip Schniter | Opportunistic Multiuser Scheduling in a Three State Markov-modeled
Downlink | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the downlink of a cellular system and address the problem of
multiuser scheduling with partial channel information. In our setting, the
channel of each user is modeled by a three-state Markov chain. The scheduler
indirectly estimates the channel via accumulated Automatic Repeat Request (ARQ)
feedback from the scheduled users and uses this information in future
scheduling decisions. Using a Partially Observable Markov Decision Process
(POMDP), we formulate a throughput maximization problem that is an extension of
our previous work where the channels were modeled using two states. We recall
the greedy policy that was shown to be optimal and easy to implement in the two
state case and study the implementation structure of the greedy policy in the
considered downlink. We classify the system into two types based on the channel
statistics and obtain round robin structures for the greedy policy for each
system type. We obtain performance bounds for the downlink system using these
structures and study the conditions under which the greedy policy is optimal.
| [
{
"version": "v1",
"created": "Fri, 10 Apr 2009 20:42:18 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Murugesan",
"Sugumar",
""
],
[
"Schniter",
"Philip",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.1783 | Roberto Bagnara | Roberto Bagnara, Patricia M. Hill, Enea Zaffanella | Exact Join Detection for Convex Polyhedra and Other Numerical
Abstractions | 36 pages, 4 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Deciding whether the union of two convex polyhedra is itself a convex
polyhedron is a basic problem in polyhedral computations; having important
applications in the field of constrained control and in the synthesis,
analysis, verification and optimization of hardware and software systems. In
such application fields though, general convex polyhedra are just one among
many, so-called, numerical abstractions, which range from restricted families
of (not necessarily closed) convex polyhedra to non-convex geometrical objects.
We thus tackle the problem from an abstract point of view: for a wide range of
numerical abstractions that can be modeled as bounded join-semilattices --that
is, partial orders where any finite set of elements has a least upper bound--,
we show necessary and sufficient conditions for the equivalence between the
lattice-theoretic join and the set-theoretic union. For the case of closed
convex polyhedra --which, as far as we know, is the only one already studied in
the literature-- we improve upon the state-of-the-art by providing a new
algorithm with a better worst-case complexity. The results and algorithms
presented for the other numerical abstractions are new to this paper. All the
algorithms have been implemented, experimentally validated, and made available
in the Parma Polyhedra Library.
| [
{
"version": "v1",
"created": "Sat, 11 Apr 2009 07:48:47 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2009 08:49:49 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Aug 2009 10:22:17 GMT"
}
]
| 2009-08-10T00:00:00 | [
[
"Bagnara",
"Roberto",
""
],
[
"Hill",
"Patricia M.",
""
],
[
"Zaffanella",
"Enea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.1812 | Wei Zhang | Wei Zhang, Tianyi Xu, and Xiang-Gen Xia | Two Designs of Space-Time Block Codes Achieving Full Diversity with
Partial Interference Cancellation Group Decoding | 41 pages, 6 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A partial interference cancellation (PIC) group decoding based space-time
block code (STBC) design criterion was recently proposed by Guo and Xia, where
the decoding complexity and the code rate trade-off is dealt when the full
diversity is achieved. In this paper, two designs of STBC are proposed for any
number of transmit antennas that can obtain full diversity when a PIC group
decoding (with a particular grouping scheme) is applied at receiver. With the
PIC group decoding and an appropriate grouping scheme for the decoding, the
proposed STBC are shown to obtain the same diversity gain as the ML decoding,
but have a low decoding complexity. The first proposed STBC is designed with
multiple diagonal layers and it can obtain the full diversity for two-layer
design with the PIC group decoding and the rate is up to 2 symbols per channel
use. But with PIC-SIC group decoding, the first proposed STBC can obtain full
diversity for any number of layers and the rate can be full. The second
proposed STBC can obtain full diversity and a rate up to 9/4 with the PIC group
decoding. Some code design examples are given and simulation results show that
the newly proposed STBC can well address the rate-performance-complexity
tradeoff of the MIMO systems.
| [
{
"version": "v1",
"created": "Sat, 11 Apr 2009 16:47:23 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2009 07:15:45 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Jan 2010 17:04:14 GMT"
}
]
| 2010-01-04T00:00:00 | [
[
"Zhang",
"Wei",
""
],
[
"Xu",
"Tianyi",
""
],
[
"Xia",
"Xiang-Gen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1840 | Soummya Kar | Usman A. Khan, Soummya Kar, and Jose M. F. Moura | Higher Dimensional Consensus: Learning in Large-Scale Networks | 30 pages, 4 figures Submitted for journal publication | U. A. Khan, S. Kar, and J. M. F. Moura, "Higher dimensional
consensus: Learning in large-scale networks," IEEE Transactions on Signal
Processing, vol. 58, no. 5, pp. 2836-2849, May 2010 | 10.1109/TSP.2010.2042482 | null | cs.IT cs.DC math.IT math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents higher dimension consensus (HDC) for large-scale networks.
HDC generalizes the well-known average-consensus algorithm. It divides the
nodes of the large-scale network into anchors and sensors. Anchors are nodes
whose states are fixed over the HDC iterations, whereas sensors are nodes that
update their states as a linear combination of the neighboring states. Under
appropriate conditions, we show that the sensor states converge to a linear
combination of the anchor states. Through the concept of anchors, HDC captures
in a unified framework several interesting network tasks, including distributed
sensor localization, leader-follower, distributed Jacobi to solve linear
systems of algebraic equations, and, of course, average-consensus. In many
network applications, it is of interest to learn the weights of the distributed
linear algorithm so that the sensors converge to a desired state. We term this
inverse problem the HDC learning problem. We pose learning in HDC as a
constrained non-convex optimization problem, which we cast in the framework of
multi-objective optimization (MOP) and to which we apply Pareto optimality. We
prove analytically relevant properties of the MOP solutions and of the Pareto
front from which we derive the solution to learning in HDC. Finally, the paper
shows how the MOP approach resolves interesting tradeoffs (speed of convergence
versus quality of the final state) arising in learning in HDC in resource
constrained networks.
| [
{
"version": "v1",
"created": "Sun, 12 Apr 2009 06:08:39 GMT"
}
]
| 2013-12-19T00:00:00 | [
[
"Khan",
"Usman A.",
""
],
[
"Kar",
"Soummya",
""
],
[
"Moura",
"Jose M. F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0904.1888 | Stevan Harnad | Stevan Harnad | On Fodor on Darwin on Evolution | 21 | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Jerry Fodor argues that Darwin was wrong about "natural selection" because
(1) it is only a tautology rather than a scientific law that can support
counterfactuals ("If X had happened, Y would have happened") and because (2)
only minds can select. Hence Darwin's analogy with "artificial selection" by
animal breeders was misleading and evolutionary explanation is nothing but
post-hoc historical narrative. I argue that Darwin was right on all counts.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 00:59:10 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.1889 | Stevan Harnad | Stevan Harnad | First Person Singular | 6 pages | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Brian Rotman argues that (one) "mind" and (one) "god" are only conceivable,
literally, because of (alphabetic) literacy, which allowed us to designate each
of these ghosts as an incorporeal, speaker-independent "I" (or, in the case of
infinity, a notional agent that goes on counting forever). I argue that to have
a mind is to have the capacity to feel. No one can be sure which organisms
feel, hence have minds, but it seems likely that one-celled organisms and
plants do not, whereas animals do. So minds originated before humans and before
language --hence, a fortiori, before writing, whether alphabetic or
ideographic.
| [
{
"version": "v1",
"created": "Sun, 12 Apr 2009 23:13:13 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Harnad",
"Stevan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.1892 | Tal Philosof | Tal Philosof, Ram Zamir, Uri Erez and Ashish Khisti | Lattice Strategies for the Dirty Multiple Access Channel | 42 pages, 14 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A generalization of the Gaussian dirty-paper problem to a multiple access
setup is considered. There are two additive interference signals, one known to
each transmitter but none to the receiver. The rates achievable using Costa's
strategies (i.e. by a random binning scheme induced by Costa's auxiliary random
variables) vanish in the limit when the interference signals are strong. In
contrast, it is shown that lattice strategies ("lattice precoding") can achieve
positive rates independent of the interferences, and in fact in some cases -
which depend on the noise variance and power constraints - they are optimal. In
particular, lattice strategies are optimal in the limit of high SNR. It is also
shown that the gap between the achievable rate region and the capacity region
is at most 0.167 bit. Thus, the dirty MAC is another instance of a network
setup, like the Korner-Marton modulo-two sum problem, where linear coding is
potentially better than random binning. Lattice transmission schemes and
conditions for optimality for the asymmetric case, where there is only one
interference which is known to one of the users (who serves as a "helper" to
the other user), and for the "common interference" case are also derived. In
the former case the gap between the helper achievable rate and its capacity is
at most 0.085 bit.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 00:28:35 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Philosof",
"Tal",
""
],
[
"Zamir",
"Ram",
""
],
[
"Erez",
"Uri",
""
],
[
"Khisti",
"Ashish",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1897 | Shenghao Yang | Shenghao Yang, Raymond W. Yeung, Chi-Kin Ngai | Refined Coding Bounds and Code Constructions for Coherent Network Error
Correction | 32 pages | IEEE-J-IT 57 (2011) 1409 - 1424 | 10.1109/TIT.2011.2106930 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Coherent network error correction is the error-control problem in network
coding with the knowledge of the network codes at the source and sink nodes.
With respect to a given set of local encoding kernels defining a linear network
code, we obtain refined versions of the Hamming bound, the Singleton bound and
the Gilbert-Varshamov bound for coherent network error correction. Similar to
its classical counterpart, this refined Singleton bound is tight for linear
network codes. The tightness of this refined bound is shown by two construction
algorithms of linear network codes achieving this bound. These two algorithms
illustrate different design methods: one makes use of existing network coding
algorithms for error-free transmission and the other makes use of classical
error-correcting codes. The implication of the tightness of the refined
Singleton bound is that the sink nodes with higher maximum flow values can have
higher error correction capabilities.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 02:04:21 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jan 2010 07:30:25 GMT"
}
]
| 2013-01-01T00:00:00 | [
[
"Yang",
"Shenghao",
""
],
[
"Yeung",
"Raymond W.",
""
],
[
"Ngai",
"Chi-Kin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1902 | Zhilin Wu | Stephane Grumbach (INRIA Liama), Zhilin Wu (CASIA Liama) | On Distributed Model Checking of MSO on Graphs | 30 pages, 4 figures, llncs.cls,llncsdoc.sty | null | null | null | cs.LO cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider distributed model-checking of Monadic Second-Order logic (MSO) on
graphs which constitute the topology of communication networks. The graph is
thus both the structure being checked and the system on which the distributed
computation is performed. We prove that MSO can be distributively model-checked
with only a constant number of messages sent over each link for planar networks
with bounded diameter, as well as for networks with bounded degree and bounded
tree-length. The distributed algorithms rely on nontrivial transformations of
linear time sequential algorithms for tree decompositions of bounded tree-width
graphs.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 04:33:15 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Grumbach",
"Stephane",
"",
"INRIA Liama"
],
[
"Wu",
"Zhilin",
"",
"CASIA Liama"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0904.1907 | Qi Chen | Qi Chen, Chen He, Lingge Jiang, Qingchuan Wang | Average Entropy Functions | accepted by ISIT2009 | null | null | null | cs.IT cs.RO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The closure of the set of entropy functions associated with n discrete
variables, Gammar*n, is a convex cone in (2n-1)- dimensional space, but its
full characterization remains an open problem. In this paper, we map Gammar*n
to an n-dimensional region Phi*n by averaging the joint entropies with the same
number of variables, and show that the simpler Phi*n can be characterized
solely by the Shannon-type information inequalities
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 04:51:55 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Chen",
"Qi",
""
],
[
"He",
"Chen",
""
],
[
"Jiang",
"Lingge",
""
],
[
"Wang",
"Qingchuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1910 | Andriyan Suksmono Bayu | Andriyan Bayu Suksmono | Compressive Sampling with Known Spectral Energy Density | Proc. of Int. Conf. on Rural ICT 2009 | null | null | null | cs.IT cs.CE math.FA math.IT | http://creativecommons.org/licenses/publicdomain/ | A method to improve l1 performance of the CS (Compressive Sampling) for
A-scan SFCW-GPR (Stepped Frequency Continuous Wave-Ground Penetrating Radar)
signals with known spectral energy density is proposed. Instead of random
sampling, the proposed method selects the location of samples to follow the
distribution of the spectral energy. Samples collected from three different
measurement methods; the uniform sampling, random sampling, and energy
equipartition sampling, are used to reconstruct a given monocycle signal whose
spectral energy density is known. Objective performance evaluation in term of
PSNR (Peak Signal to Noise Ratio) indicates empirically that the CS
reconstruction of random sampling outperform the uniform sampling, while the
energy equipartition sampling outperforms both of them. These results suggest
that similar performance improvement can be achieved for the compressive SFCW
(Stepped Frequency Continuous Wave) radar, allowing even higher acquisition
speed.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 05:09:43 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Apr 2009 02:04:55 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Nov 2013 01:52:18 GMT"
}
]
| 2013-11-05T00:00:00 | [
[
"Suksmono",
"Andriyan Bayu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1915 | Zhilin Wu | Stephane Grumbach (INRIA Liama), Zhilin Wu (CASIA Liama) | Logical locality entails frugal distributed computation over graphs | 31 pages, 0 figures | null | null | null | cs.LO cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | First-order logic is known to have limited expressive power over finite
structures. It enjoys in particular the locality property, which states that
first-order formulae cannot have a global view of a structure. This limitation
ensures on their low sequential computational complexity. We show that the
locality impacts as well on their distributed computational complexity. We use
first-order formulae to describe the properties of finite connected graphs,
which are the topology of communication networks, on which the first-order
formulae are also evaluated. We show that over bounded degree networks and
planar networks, first-order properties can be frugally evaluated, that is,
with only a bounded number of messages, of size logarithmic in the number of
nodes, sent over each link. Moreover, we show that the result carries over for
the extension of first-order logic with unary counting.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 06:16:39 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Grumbach",
"Stephane",
"",
"INRIA Liama"
],
[
"Wu",
"Zhilin",
"",
"CASIA Liama"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0904.1920 | Zhilin Wu | Zhilin Wu (CASIA Liama), Stephane Grumbach (INRIA Liama) | Feasibility of Motion Planning on Acyclic and Strongly Connected
Directed Graphs | 19 pages, 9 figures, algorithm2e.sty | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motion planning is a fundamental problem of robotics with applications in
many areas of computer science and beyond. Its restriction to graphs has been
investigated in the literature for it allows to concentrate on the
combinatorial problem abstracting from geometric considerations. In this paper,
we consider motion planning over directed graphs, which are of interest for
asymmetric communication networks. Directed graphs generalize undirected
graphs, while introducing a new source of complexity to the motion planning
problem: moves are not reversible. We first consider the class of acyclic
directed graphs and show that the feasibility can be solved in time linear in
the product of the number of vertices and the number of arcs. We then turn to
strongly connected directed graphs. We first prove a structural theorem for
decomposing strongly connected directed graphs into strongly biconnected
components.Based on the structural decomposition, we give an algorithm for the
feasibility of motion planning on strongly connected directed graphs, and show
that it can also be decided in time linear in the product of the number of
vertices and the number of arcs.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 07:32:43 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Wu",
"Zhilin",
"",
"CASIA Liama"
],
[
"Grumbach",
"Stephane",
"",
"INRIA Liama"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.1923 | Vincent Limouzy | Vincent Limouzy | Seidel Minor, Permutation Graphs and Combinatorial Properties | submitted | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A permutation graph is an intersection graph of segments lying between two
parallel lines. A Seidel complementation of a finite graph at one of it vertex
$v$ consists to complement the edges between the neighborhood and the
non-neighborhood of $v$. Two graphs are Seidel complement equivalent if one can
be obtained from the other by a successive application of Seidel
complementation.
In this paper we introduce the new concept of Seidel complementation and
Seidel minor, we then show that this operation preserves cographs and the
structure of modular decomposition. The main contribution of this paper is to
provide a new and succinct characterization of permutation graphs i.e. A graph
is a permutation graph \Iff it does not contain the following graphs: $C_5$,
$C_7$, $XF_{6}^{2}$, $XF_{5}^{2n+3}$, $C_{2n}, n\geqslant6$ and their
complement as Seidel minor. In addition we provide a $O(n+m)$-time algorithm to
output one of the forbidden Seidel minor if the graph is not a permutation
graph.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 07:23:18 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jun 2010 15:18:06 GMT"
}
]
| 2010-06-22T00:00:00 | [
[
"Limouzy",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.1931 | Byron Gao | Obi L. Griffith, Byron J. Gao, Mikhail Bilenky, Yuliya Prichyna,
Martin Ester, Steven J.M. Jones | KiWi: A Scalable Subspace Clustering Algorithm for Gene Expression
Analysis | International Conference on Bioinformatics and Biomedical Engineering
(iCBBE), 2009 | null | null | null | cs.DB cs.AI q-bio.GN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Subspace clustering has gained increasing popularity in the analysis of gene
expression data. Among subspace cluster models, the recently introduced
order-preserving sub-matrix (OPSM) has demonstrated high promise. An OPSM,
essentially a pattern-based subspace cluster, is a subset of rows and columns
in a data matrix for which all the rows induce the same linear ordering of
columns. Existing OPSM discovery methods do not scale well to increasingly
large expression datasets. In particular, twig clusters having few genes and
many experiments incur explosive computational costs and are completely pruned
off by existing methods. However, it is of particular interest to determine
small groups of genes that are tightly coregulated across many conditions. In
this paper, we present KiWi, an OPSM subspace clustering algorithm that is
scalable to massive datasets, capable of discovering twig clusters and
identifying negative as well as positive correlations. We extensively validate
KiWi using relevant biological datasets and show that KiWi correctly assigns
redundant probes to the same cluster, groups experiments with common clinical
annotations, differentiates real promoter sequences from negative control
sequences, and shows good association with cis-regulatory motif predictions.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 08:16:53 GMT"
}
]
| 2009-04-14T00:00:00 | [
[
"Griffith",
"Obi L.",
""
],
[
"Gao",
"Byron J.",
""
],
[
"Bilenky",
"Mikhail",
""
],
[
"Prichyna",
"Yuliya",
""
],
[
"Ester",
"Martin",
""
],
[
"Jones",
"Steven J. M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
}
]
|
0904.1956 | Vaneet Aggarwal | Vaneet Aggarwal and Lalitha Sankar and A. Robert Calderbank and H.
Vincent Poor | Ergodic Layered Erasure One-Sided Interference Channels | in Proc. IEEE Information Theory Workshop, Taormina, Sicily, Oct 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sum capacity of a class of layered erasure one-sided interference
channels is developed under the assumption of no channel state information at
the transmitters. Outer bounds are presented for this model and are shown to be
tight for the following sub-classes: i) weak, ii) strong (mix of strong but not
very strong (SnVS) and very strong (VS)), iii) ergodic very strong (mix of
strong and weak), and (iv) a sub-class of mixed interference (mix of SnVS and
weak). Each sub-class is uniquely defined by the fading statistics.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 15:15:42 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Aug 2009 16:40:00 GMT"
}
]
| 2009-08-18T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
],
[
"Sankar",
"Lalitha",
""
],
[
"Calderbank",
"A. Robert",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.1989 | Tao Zhou | Zi-Ke Zhang, Tao Zhou, Yi-Cheng Zhang | Personalized Recommendation via Integrated Diffusion on User-Item-Tag
Tripartite Graphs | 12 pages, 6 figures, 2 tables | Physica A 389 (2010) 179-186 | 10.1016/j.physa.2009.08.036 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Personalized recommender systems are confronting great challenges of
accuracy, diversification and novelty, especially when the data set is sparse
and lacks accessorial information, such as user profiles, item attributes and
explicit ratings. Collaborative tags contain rich information about
personalized preferences and item contents, and are therefore potential to help
in providing better recommendations. In this paper, we propose a recommendation
algorithm based on an integrated diffusion on user-item-tag tripartite graphs.
We use three benchmark data sets, Del.icio.us, MovieLens and BibSonomy, to
evaluate our algorithm. Experimental results demonstrate that the usage of tag
information can significantly improve accuracy, diversification and novelty of
recommendations.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 19:13:03 GMT"
}
]
| 2009-10-07T00:00:00 | [
[
"Zhang",
"Zi-Ke",
""
],
[
"Zhou",
"Tao",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0904.2012 | David Spivak | David I. Spivak | Simplicial Databases | null | null | null | null | cs.DB cs.IR | http://creativecommons.org/licenses/by/3.0/ | In this paper, we define a category DB, called the category of simplicial
databases, whose objects are databases and whose morphisms are data-preserving
maps. Along the way we give a precise formulation of the category of relational
databases, and prove that it is a full subcategory of DB. We also prove that
limits and colimits always exist in DB and that they correspond to queries such
as select, join, union, etc.
One feature of our construction is that the schema of a simplicial database
has a natural geometric structure: an underlying simplicial set. The geometry
of a schema is a way of keeping track of relationships between distinct tables,
and can be thought of as a system of foreign keys. The shape of a schema is
generally intuitive (e.g. the schema for round-trip flights is a circle
consisting of an edge from $A$ to $B$ and an edge from $B$ to $A$), and as
such, may be useful for analyzing data.
We give several applications of our approach, as well as possible advantages
it has over the relational model. We also indicate some directions for further
research.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 21:20:57 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Spivak",
"David I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0904.2018 | Jing Xie Ms. | J.Xie and Y.Jiang | Stochastic Service Guarantee Analysis Based on Time-Domain Models | Accepted by 17th Annual Meeting of the IEEE/ACM International
Symposium on Modelling, Analysis and Simulation of Computer and
Telecommunication Systems. This version fixed Lemma 2 &3 and Theorem 3 and
also corrected some typos | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stochastic network calculus is a theory for stochastic service guarantee
analysis of computer communication networks. In the current stochastic network
calculus literature, its traffic and server models are typically based on the
cumulative amount of traffic and cumulative amount of service respectively.
However, there are network scenarios where the applicability of such models is
limited, and hence new ways of modeling traffic and service are needed to
address this limitation. This paper presents time-domain models and results for
stochastic network calculus. Particularly, we define traffic models, which are
based on probabilistic lower-bounds on cumulative packet inter-arrival time,
and server models, which are based on probabilistic upper-bounds on cumulative
packet service time. In addition, examples demonstrating the use of the
proposed time-domain models are provided. On the basis of the proposed models,
the five basic properties of stochastic network calculus are also proved, which
implies broad applicability of the proposed time-domain approach.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 11:47:31 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jun 2009 08:51:16 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Xie",
"J.",
""
],
[
"Jiang",
"Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0904.2022 | Pascal Vontobel | Roxana Smarandache, Pascal O. Vontobel | Absdet-Pseudo-Codewords and Perm-Pseudo-Codewords: Definitions and
Properties | null | Proc. IEEE Int. Symp. Information Theory, Seoul, Korea, June 28 -
July 3, 2009 | 10.1109/ISIT.2009.5205910 | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The linear-programming decoding performance of a binary linear code crucially
depends on the structure of the fundamental cone of the parity-check matrix
that describes the code. Towards a better understanding of fundamental cones
and the vectors therein, we introduce the notion of absdet-pseudo-codewords and
perm-pseudo-codewords: we give the definitions, we discuss some simple
examples, and we list some of their properties.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 22:37:37 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Smarandache",
"Roxana",
""
],
[
"Vontobel",
"Pascal O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2023 | Bjoern Grohmann | Bjoern Grohmann | A new Protocol for 1-2 Oblivious Transfer | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new protocol for 1-2 (String) Oblivious Transfer is proposed. The protocol
uses 5 rounds of message exchange.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 22:30:53 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Grohmann",
"Bjoern",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.2027 | Jelani Nelson | Jelani Nelson, David P. Woodruff | A Near-Optimal Algorithm for L1-Difference | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give the first L_1-sketching algorithm for integer vectors which produces
nearly optimal sized sketches in nearly linear time. This answers the first
open problem in the list of open problems from the 2006 IITK Workshop on
Algorithms for Data Streams. Specifically, suppose Alice receives a vector x in
{-M,...,M}^n and Bob receives y in {-M,...,M}^n, and the two parties share
randomness. Each party must output a short sketch of their vector such that a
third party can later quickly recover a (1 +/- eps)-approximation to ||x-y||_1
with 2/3 probability given only the sketches. We give a sketching algorithm
which produces O(eps^{-2}log(1/eps)log(nM))-bit sketches in O(n*log^2(nM))
time, independent of eps. The previous best known sketching algorithm for L_1
is due to [Feigenbaum et al., SICOMP 2002], which achieved the optimal sketch
length of O(eps^{-2}log(nM)) bits but had a running time of O(n*log(nM)/eps^2).
Notice that our running time is near-linear for every eps, whereas for
sufficiently small values of eps, the running time of the previous algorithm
can be as large as quadratic. Like their algorithm, our sketching procedure
also yields a small-space, one-pass streaming algorithm which works even if the
entries of x,y are given in arbitrary order.
| [
{
"version": "v1",
"created": "Mon, 13 Apr 2009 22:54:26 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Nelson",
"Jelani",
""
],
[
"Woodruff",
"David P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2028 | Tao Chen | Tao Chen, Honggang Zhang, Marcos Katz | Cloud Networking Formation in CogMesh Environment | 10 pages | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As radio spectrum usage paradigm moving from the traditional command and
control allocation scheme to the open spectrum allocation scheme, wireless
networks meet new opportunities and challenges. In this article we introduce
the concept of cognitive wireless mesh (CogMesh) networks and address the
unique problem in such a network. CogMesh is a self-organized distributed
network architecture combining cognitive technologies with the mesh structure
in order to provide a uniform service platform over a wide range of networks.
It is based on dynamic spectrum access (DSA) and featured by self-organization,
self-configuration and self-healing. The unique problem in CogMesh is the
common control channel problem, which is caused by the opportunistic spectrum
sharing nature of secondary users (SU) in the network. More precisely, since
the channels of SUs are fluctuating according to the radio environment, it is
difficult to find always available global common control channels. This puts a
significant challenge on the network design. We develop the control cloud based
control channel selection and cluster based network formation techniques to
tackle this problem. Moreover, we show in this article that the swarm
intelligence is a good candidate to deal with the control channel problem in
CogMesh. Since the study of cognitive wireless networks (CWN) is still in its
early phase, the ideas provided in this article act as a catalyst to inspire
new solutions in this field.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 11:49:06 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2009 15:47:47 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Chen",
"Tao",
""
],
[
"Zhang",
"Honggang",
""
],
[
"Katz",
"Marcos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.2037 | Chunhua Shen | Chunhua Shen and Hanxi Li | Boosting through Optimization of Margin Distributions | 9 pages. To publish/Published in IEEE Transactions on Neural
Networks, 21(7), July 2010 | null | null | null | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Boosting has attracted much research attention in the past decade. The
success of boosting algorithms may be interpreted in terms of the margin
theory. Recently it has been shown that generalization error of classifiers can
be obtained by explicitly taking the margin distribution of the training data
into account. Most of the current boosting algorithms in practice usually
optimizes a convex loss function and do not make use of the margin
distribution. In this work we design a new boosting algorithm, termed
margin-distribution boosting (MDBoost), which directly maximizes the average
margin and minimizes the margin variance simultaneously. This way the margin
distribution is optimized. A totally-corrective optimization algorithm based on
column generation is proposed to implement MDBoost. Experiments on UCI datasets
show that MDBoost outperforms AdaBoost and LPBoost in most cases.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 01:57:12 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Nov 2009 02:24:51 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Jan 2010 09:00:26 GMT"
}
]
| 2010-01-06T00:00:00 | [
[
"Shen",
"Chunhua",
""
],
[
"Li",
"Hanxi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0904.2051 | Michael Friedlander | Ewout van den Berg and Michael P. Friedlander | Joint-sparse recovery from multiple measurements | 19 pages, 9 figures | IEEE Transactions on Information Theory, 56(5):2516-2527, 2010 | 10.1109/TIT.2010.2043876 | University of British Columbia, Department of Computer Science Tech.
Rep. 2009-07 | cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | The joint-sparse recovery problem aims to recover, from sets of compressed
measurements, unknown sparse matrices with nonzero entries restricted to a
subset of rows. This is an extension of the single-measurement-vector (SMV)
problem widely studied in compressed sensing. We analyze the recovery
properties for two types of recovery algorithms. First, we show that recovery
using sum-of-norm minimization cannot exceed the uniform recovery rate of
sequential SMV using $\ell_1$ minimization, and that there are problems that
can be solved with one approach but not with the other. Second, we analyze the
performance of the ReMBo algorithm [M. Mishali and Y. Eldar, IEEE Trans. Sig.
Proc., 56 (2008)] in combination with $\ell_1$ minimization, and show how
recovery improves as more measurements are taken. From this analysis it follows
that having more measurements than number of nonzero rows does not improve the
potential theoretical recovery rate.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 05:54:33 GMT"
}
]
| 2018-08-23T00:00:00 | [
[
"Berg",
"Ewout van den",
""
],
[
"Friedlander",
"Michael P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2058 | Chandan Saha | Chandan Saha, Ramprasad Saptharishi, Nitin Saxena | The Power of Depth 2 Circuits over Algebras | null | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of polynomial identity testing (PIT) for depth 2
arithmetic circuits over matrix algebra. We show that identity testing of depth
3 (Sigma-Pi-Sigma) arithmetic circuits over a field F is polynomial time
equivalent to identity testing of depth 2 (Pi-Sigma) arithmetic circuits over
U_2(F), the algebra of upper-triangular 2 x 2 matrices with entries from F.
Such a connection is a bit surprising since we also show that, as computational
models, Pi-Sigma circuits over U_2(F) are strictly `weaker' than Sigma-Pi-Sigma
circuits over F.
The equivalence further shows that PIT of depth 3 arithmetic circuits reduces
to PIT of width-2 planar commutative Algebraic Branching Programs (ABP). Thus,
identity testing for commutative ABPs is interesting even in the case of
width-2.
Further, we give a deterministic polynomial time identity testing algorithm
for a Pi-Sigma circuit over any constant dimensional commutative algebra over
F. While over commutative algebras of polynomial dimension, identity testing is
at least as hard as that of Sigma-Pi-Sigma circuits over F.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 06:36:37 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Saha",
"Chandan",
""
],
[
"Saptharishi",
"Ramprasad",
""
],
[
"Saxena",
"Nitin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2060 | Zhigang Cao | Zhigang Cao, Xiaoguang Yang | Complementary cooperation, minimal winning coalitions, and power indices | 60 pages | Theoretical Computer Science, 470 (2013) 53-92 | 10.1016/j.tcs.2012.11.033 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new simple game, which is referred to as the complementary
weighted multiple majority game (C-WMMG for short). C-WMMG models a basic
cooperation rule, the complementary cooperation rule, and can be taken as a
sister model of the famous weighted majority game (WMG for short). In this
paper, we concentrate on the two dimensional C-WMMG. An interesting property of
this case is that there are at most $n+1$ minimal winning coalitions (MWC for
short), and they can be enumerated in time $O(n\log n)$, where $n$ is the
number of players. This property guarantees that the two dimensional C-WMMG is
more handleable than WMG. In particular, we prove that the main power indices,
i.e. the Shapley-Shubik index, the Penrose-Banzhaf index, the Holler-Packel
index, and the Deegan-Packel index, are all polynomially computable. To make a
comparison with WMG, we know that it may have exponentially many MWCs, and none
of the four power indices is polynomially computable (unless P=NP). Still for
the two dimensional case, we show that local monotonicity holds for all of the
four power indices. In WMG, this property is possessed by the Shapley-Shubik
index and the Penrose-Banzhaf index, but not by the Holler-Packel index or the
Deegan-Packel index. Since our model fits very well the cooperation and
competition in team sports, we hope that it can be potentially applied in
measuring the values of players in team sports, say help people give more
objective ranking of NBA players and select MVPs, and consequently bring new
insights into contest theory and the more general field of sports economics. It
may also provide some interesting enlightenments into the design of
non-additive voting mechanisms. Last but not least, the threshold version of
C-WMMG is a generalization of WMG, and natural variants of it are closely
related with the famous airport game and the stable marriage/roommates problem.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 07:53:07 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Mar 2012 08:17:23 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Jul 2012 11:46:15 GMT"
}
]
| 2013-01-04T00:00:00 | [
[
"Cao",
"Zhigang",
""
],
[
"Yang",
"Xiaoguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.2061 | Zhigang Cao | Zhigang Cao, Xiaoguang Yang | Selfish Bin Covering | 16 pages | Theoretical Computer Science, 412, 2011, 7049-7058 | 10.1016/j.tcs.2011.09.017 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the selfish bin covering problem, which is greatly
related both to the bin covering problem, and to the weighted majority game.
What we mainly concern is how much the lack of coordination harms the social
welfare. Besides the standard PoA and PoS, which are based on Nash equilibrium,
we also take into account the strong Nash equilibrium, and several other new
equilibria. For each equilibrium, the corresponding PoA and PoS are given, and
the problems of computing an arbitrary equilibrium, as well as approximating
the best one, are also considered.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 07:17:01 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jul 2009 14:22:34 GMT"
}
]
| 2011-11-10T00:00:00 | [
[
"Cao",
"Zhigang",
""
],
[
"Yang",
"Xiaoguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.2076 | Roberto Amadio | Roberto Amadio (PPS) | On stratified regions | null | Programming Languages and Systems, 7th Asian Symposium, APLAS
2009, Cor\'ee, R\'epublique De (2009) | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Type and effect systems are a tool to analyse statically the behaviour of
programs with effects. We present a proof based on the so called reducibility
candidates that a suitable stratification of the type and effect system entails
the termination of the typable programs. The proof technique covers a simply
typed, multi-threaded, call-by-value lambda-calculus, equipped with a variety
of scheduling (preemptive, cooperative) and interaction mechanisms (references,
channels, signals).
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 09:22:16 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jun 2009 07:39:01 GMT"
}
]
| 2010-07-01T00:00:00 | [
[
"Amadio",
"Roberto",
"",
"PPS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.2096 | Freedeeric Davesne | Christophe Domingues (IBISC), Samir Otmane (IBISC), Fr\'ed\'eric
Davesne (IBISC), Malik Mallem (IBISC) | A Distributed Software Architecture for Collaborative Teleoperation
based on a VR Platform and Web Application Interoperability | null | 18th International Conference on Artificial Reality and
Telexistence (ACM ICAT 2008), Yokohama : Japon (2008) | null | null | cs.HC cs.GR cs.MM cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Augmented Reality and Virtual Reality can provide to a Human Operator (HO) a
real help to complete complex tasks, such as robot teleoperation and
cooperative teleassistance. Using appropriate augmentations, the HO can
interact faster, safer and easier with the remote real world. In this paper, we
present an extension of an existing distributed software and network
architecture for collaborative teleoperation based on networked human-scaled
mixed reality and mobile platform. The first teleoperation system was composed
by a VR application and a Web application. However the 2 systems cannot be used
together and it is impossible to control a distant robot simultaneously. Our
goal is to update the teleoperation system to permit a heterogeneous
collaborative teleoperation between the 2 platforms. An important feature of
this interface is based on different Mobile platforms to control one or many
robots.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 11:21:47 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Domingues",
"Christophe",
"",
"IBISC"
],
[
"Otmane",
"Samir",
"",
"IBISC"
],
[
"Davesne",
"Frédéric",
"",
"IBISC"
],
[
"Mallem",
"Malik",
"",
"IBISC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0904.2115 | Matias Korman | G. Aloupis and J. Cardinal and S. Collette and S. Imahori and M.
Korman and S. Langerman and O. Schwartz and S. Smorodinsky and P. Taslakian | Colorful Strips | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a planar point set and an integer $k$, we wish to color the points with
$k$ colors so that any axis-aligned strip containing enough points contains all
colors. The goal is to bound the necessary size of such a strip, as a function
of $k$. We show that if the strip size is at least $2k{-}1$, such a coloring
can always be found. We prove that the size of the strip is also bounded in any
fixed number of dimensions. In contrast to the planar case, we show that
deciding whether a 3D point set can be 2-colored so that any strip containing
at least three points contains both colors is NP-complete.
We also consider the problem of coloring a given set of axis-aligned strips,
so that any sufficiently covered point in the plane is covered by $k$ colors.
We show that in $d$ dimensions the required coverage is at most $d(k{-}1)+1$.
Lower bounds are given for the two problems. This complements recent
impossibility results on decomposition of strip coverings with arbitrary
orientations. Finally, we study a variant where strips are replaced by wedges.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 13:00:41 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Apr 2011 13:17:06 GMT"
}
]
| 2011-04-08T00:00:00 | [
[
"Aloupis",
"G.",
""
],
[
"Cardinal",
"J.",
""
],
[
"Collette",
"S.",
""
],
[
"Imahori",
"S.",
""
],
[
"Korman",
"M.",
""
],
[
"Langerman",
"S.",
""
],
[
"Schwartz",
"O.",
""
],
[
"Smorodinsky",
"S.",
""
],
[
"Taslakian",
"P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.2129 | Tamara Mchedlidze David | Tamara Mchedlidze, Antonios Symvonis | Crossing-Optimal Acyclic HP-Completion for Outerplanar st-Digraphs | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an embedded planar acyclic digraph G, we define the problem of acyclic
hamiltonian path completion with crossing minimization (Acyclic-HPCCM) to be
the problem of determining a hamiltonian path completion set of edges such
that, when these edges are embedded on G, they create the smallest possible
number of edge crossings and turn G to a hamiltonian acyclic digraph. Our
results include: 1. We provide a characterization under which a planar
st-digraph G is hamiltonian. 2. For an outerplanar st-digraph G, we define the
st-polygon decomposition of G and, based on its properties, we develop a
linear-time algorithm that solves the Acyclic-HPCCM problem. 3. For the class
of planar st-digraphs, we establish an equivalence between the Acyclic-HPCCM
problem and the problem of determining an upward 2-page topological book
embedding with minimum number of spine crossings. We infer (based on this
equivalence) for the class of outerplanar st-digraphs an upward topological
2-page book embedding with minimum number of spine crossings. To the best of
our knowledge, it is the first time that edge-crossing minimization is studied
in conjunction with the acyclic hamiltonian completion problem and the first
time that an optimal algorithm with respect to spine crossing minimization is
presented for upward topological book embeddings.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 14:29:56 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Mchedlidze",
"Tamara",
""
],
[
"Symvonis",
"Antonios",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2136 | Fernando S\'aenz-P\'erez | S. Est\'evez-Mart\'in, T. Hortal\'a-Gonz\'alez, Rodr\'iguez-Artalejo,
R. del Vado-V\'irseda, F. S\'aenz-P\'erez, and A. J. Fern\'andez | On the Cooperation of the Constraint Domains H, R and FD in CFLP | 113 pages, 5 figures, 18 tables | null | null | null | cs.PL cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a computational model for the cooperation of constraint
domains and an implementation for a particular case of practical importance.
The computational model supports declarative programming with lazy and possibly
higher-order functions, predicates, and the cooperation of different constraint
domains equipped with their respective solvers, relying on a so-called
Constraint Functional Logic Programming (CFLP) scheme. The implementation has
been developed on top of the CFLP system TOY, supporting the cooperation of the
three domains H, R and FD, which supply equality and disequality constraints
over symbolic terms, arithmetic constraints over the real numbers, and finite
domain constraints over the integers, respectively. The computational model has
been proved sound and complete w.r.t. the declarative semantics provided by the
$CFLP$ scheme, while the implemented system has been tested with a set of
benchmarks and shown to behave quite efficiently in comparison to the closest
related approach we are aware of.
To appear in Theory and Practice of Logic Programming (TPLP)
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 14:58:46 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Estévez-Martín",
"S.",
""
],
[
"Hortalá-González",
"T.",
""
],
[
"Rodríguez-Artalejo",
"",
""
],
[
"del Vado-Vírseda",
"R.",
""
],
[
"Sáenz-Pérez",
"F.",
""
],
[
"Fernández",
"A. J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.