id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0904.2160 | Debprakash Patnaik | Debprakash Patnaik and Srivatsan Laxman and Naren Ramakrishnan | Inferring Dynamic Bayesian Networks using Frequent Episode Mining | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivation: Several different threads of research have been proposed for
modeling and mining temporal data. On the one hand, approaches such as dynamic
Bayesian networks (DBNs) provide a formal probabilistic basis to model
relationships between time-indexed random variables but these models are
intractable to learn in the general case. On the other, algorithms such as
frequent episode mining are scalable to large datasets but do not exhibit the
rigorous probabilistic interpretations that are the mainstay of the graphical
models literature.
Results: We present a unification of these two seemingly diverse threads of
research, by demonstrating how dynamic (discrete) Bayesian networks can be
inferred from the results of frequent episode mining. This helps bridge the
modeling emphasis of the former with the counting emphasis of the latter.
First, we show how, under reasonable assumptions on data characteristics and on
influences of random variables, the optimal DBN structure can be computed using
a greedy, local, algorithm. Next, we connect the optimality of the DBN
structure with the notion of fixed-delay episodes and their counts of distinct
occurrences. Finally, to demonstrate the practical feasibility of our approach,
we focus on a specific (but broadly applicable) class of networks, called
excitatory networks, and show how the search for the optimal DBN structure can
be conducted using just information from frequent episodes. Application on
datasets gathered from mathematical models of spiking neurons as well as real
neuroscience datasets are presented.
Availability: Algorithmic implementations, simulator codebases, and datasets
are available from our website at http://neural-code.cs.vt.edu/dbn
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 17:32:00 GMT"
}
]
| 2009-04-15T00:00:00 | [
[
"Patnaik",
"Debprakash",
""
],
[
"Laxman",
"Srivatsan",
""
],
[
"Ramakrishnan",
"Naren",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.2203 | Imran Pirwani | Imran A. Pirwani (1), Mohammad R. Salavatipour (1) ((1) Department of
Computing Science, University of Alberta, Edmonton, Canada) | A Weakly-Robust PTAS for Minimum Clique Partition in Unit Disk Graphs | 21 pages, 9 figures | null | 10.1007/978-3-642-13731-0_19 | null | cs.CG cs.DC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of partitioning the set of vertices of a given unit
disk graph (UDG) into a minimum number of cliques. The problem is NP-hard and
various constant factor approximations are known, with the current best ratio
of 3. Our main result is a {\em weakly robust} polynomial time approximation
scheme (PTAS) for UDGs expressed with edge-lengths, it either (i) computes a
clique partition or (ii) gives a certificate that the graph is not a UDG; for
the case (i) that it computes a clique partition, we show that it is guaranteed
to be within $(1+\eps)$ ratio of the optimum if the input is UDG; however if
the input is not a UDG it either computes a clique partition as in case (i)
with no guarantee on the quality of the clique partition or detects that it is
not a UDG. Noting that recognition of UDG's is NP-hard even if we are given
edge lengths, our PTAS is a weakly-robust algorithm. Our algorithm can be
transformed into an $O(\frac{\log^* n}{\eps^{O(1)}})$ time distributed PTAS.
We consider a weighted version of the clique partition problem on vertex
weighted UDGs that generalizes the problem. We note some key distinctions with
the unweighted version, where ideas useful in obtaining a PTAS breakdown. Yet,
surprisingly, it admits a $(2+\eps)$-approximation algorithm for the weighted
case where the graph is expressed, say, as an adjacency matrix. This improves
on the best known 8-approximation for the {\em unweighted} case for UDGs
expressed in standard form.
| [
{
"version": "v1",
"created": "Tue, 14 Apr 2009 20:44:57 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Dec 2009 22:50:13 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Pirwani",
"Imran A.",
""
],
[
"Salavatipour",
"Mohammad R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2237 | Luo Jinquan | Jinquan Luo | On Binary Cyclic Codes with Five Nonzero Weights | null | null | null | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $q=2^n$, $0\leq k\leq n-1$, $n/\gcd(n,k)$ be odd and $k\neq n/3, 2n/3$.
In this paper the value distribution of following exponential sums
\[\sum\limits_{x\in \bF_q}(-1)^{\mathrm{Tr}_1^n(\alpha x^{2^{2k}+1}+\beta
x^{2^k+1}+\ga x)}\quad(\alpha,\beta,\ga\in \bF_{q})\] is determined. As an
application, the weight distribution of the binary cyclic code $\cC$, with
parity-check polynomial $h_1(x)h_2(x)h_3(x)$ where $h_1(x)$, $h_2(x)$ and
$h_3(x)$ are the minimal polynomials of $\pi^{-1}$, $\pi^{-(2^k+1)}$ and
$\pi^{-(2^{2k}+1)}$ respectively for a primitive element $\pi$ of $\bF_q$, is
also determined.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 04:34:18 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Luo",
"Jinquan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2257 | Juha Honkala | Juha Honkala | The equality problem for infinite words generated by primitive morphisms | Preliminary version of a paper to appear in Information and
Computation | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the equality problem for infinite words obtained by iterating
morphisms. In particular, we give a practical algorithm to decide whether or
not two words generated by primitive morphisms are equal.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 08:17:34 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Honkala",
"Juha",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0904.2290 | Saloua Chettibi | Saloua Chettibi | A Comprehensive study of a New Multipath Energy Aware Routing Protocol
for Mobile Ad-hoc Networks | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximizing network lifetime is a very challenging issue in routing protocol
design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by
limited-capacity batteries. Furthermore, replacing or recharging batteries is
often impossible in critical environments (e.g. battlefields, disaster areas,
etc.) The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing)
protocol uses a load distribution policy in order to maximize network lifetime.
The simulation results have shown the efficiency of the proposed protocol in
comparison to DSR routing protocol in many difficult scenarios
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 11:55:05 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Chettibi",
"Saloua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.2302 | Chan Zhou | Chan Zhou and Gerhard Wunder | A Fundamental Characterization of Stability in Broadcast Queueing
Systems | null | null | null | null | cs.NI cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Stability with respect to a given scheduling policy has become an important
issue for wireless communication systems, but it is hard to prove in particular
scenarios. In this paper two simple conditions for stability in broadcast
channels are derived, which are easy to check. Heuristically, the conditions
imply that if the queue length in the system becomes large, the rate allocation
is always the solution of a weighted sum rate maximization problem.
Furthermore, the change of the weight factors between two time slots becomes
smaller and the weight factors of the users, whose queues are bounded while the
other queues expand, tend to zero. Then it is shown that for any mean arrival
rate vector inside the ergodic achievable rate region the system is stable in
the strong sense when the given scheduling policy complies with the conditions.
In this case the policy is so-called throughput-optimal. Subsequently, some
results on the necessity of the presented conditions are provided. Finally, in
several application examples it is shown that the results in the paper provide
a convenient way to verify the throughput-optimal policies.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 12:45:10 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Zhou",
"Chan",
""
],
[
"Wunder",
"Gerhard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2306 | Ching-Lueh Chang | Ching-Lueh Chang and Yuh-Dauh Lyuu | On irreversible dynamic monopolies in general graphs | null | null | null | null | cs.DM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider the following coloring process in a simple directed graph $G(V,E)$
with positive indegrees. Initially, a set $S$ of vertices are white, whereas
all the others are black. Thereafter, a black vertex is colored white whenever
more than half of its in-neighbors are white. The coloring process ends when no
additional vertices can be colored white. If all vertices end up white, we call
$S$ an irreversible dynamic monopoly (or dynamo for short) under the
strict-majority scenario. An irreversible dynamo under the simple-majority
scenario is defined similarly except that a black vertex is colored white when
at least half of its in-neighbors are white. We derive upper bounds of
$(2/3)\,|\,V\,|$ and $|\,V\,|/2$ on the minimum sizes of irreversible dynamos
under the strict and the simple-majority scenarios, respectively. For the
special case when $G$ is an undirected connected graph, we prove the existence
of an irreversible dynamo with size at most $\lceil |\,V\,|/2 \rceil$ under the
strict-majority scenario. Let $\epsilon>0$ be any constant. We also show that,
unless $\text{NP}\subseteq \text{TIME}(n^{O(\ln \ln n)}),$ no polynomial-time,
$((1/2-\epsilon)\ln |\,V\,|)$-approximation algorithms exist for finding the
minimum irreversible dynamo under either the strict or the simple-majority
scenario. The inapproximability results hold even for bipartite graphs with
diameter at most 8.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 12:56:19 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Oct 2009 15:43:01 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Mar 2010 16:55:18 GMT"
}
]
| 2010-03-10T00:00:00 | [
[
"Chang",
"Ching-Lueh",
""
],
[
"Lyuu",
"Yuh-Dauh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0904.2310 | Marek Karpinski | Piotr Berman, Marek Karpinski, Andrzej Lingas | Exact and Approximation Algorithms for Geometric and Capacitated Set
Cover Problems with Applications | null | null | null | null | cs.CC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | First, we study geometric variants of the standard set cover motivated by
assignment of directional antenna and shipping with deadlines, providing the
first known polynomial-time exact solutions. Next, we consider the following
general capacitated set cover problem. There is given a set of elements with
real weights and a family S of sets of elements. One can use a set if it is a
subset of one of the sets on our lists and the sum of weights is at most one.
The goal is to cover all the elements with the allowed sets.<br>We show that
any polynomial-time algorithm that approximates the un-capacitated version of
the set cover problem with ratio r can be converted to an approximation
algorithm for the capacitated version with ratio r + 1.357.In particular, the
composition of these two results yields a polynomial-time approximation
algorithm for the problem of covering a set of customers represented by a
weighted n-point set with a minimum number of antennas of variable angular
range and fixed capacity with ratio 2.357. Finally, we provide a PTAS for the
dual problem where the number of sets (e.g., antennas) to use is fixed and the
task is to minimize the maximum set load, in case the sets correspond to line
intervals or arcs.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 13:11:33 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Berman",
"Piotr",
""
],
[
"Karpinski",
"Marek",
""
],
[
"Lingas",
"Andrzej",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2311 | Haim Permuter Henry | Tsachy Weissman and Haim H. Permuter | Source Coding with a Side Information "Vending Machine" | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study source coding in the presence of side information, when the system
can take actions that affect the availability, quality, or nature of the side
information. We begin by extending the Wyner-Ziv problem of source coding with
decoder side information to the case where the decoder is allowed to choose
actions affecting the side information. We then consider the setting where
actions are taken by the encoder, based on its observation of the source.
Actions may have costs that are commensurate with the quality of the side
information they yield, and an overall per-symbol cost constraint may be
imposed. We characterize the achievable tradeoffs between rate, distortion, and
cost in some of these problem settings. Among our findings is the fact that
even in the absence of a cost constraint, greedily choosing the action
associated with the `best' side information is, in general, sub-optimal. A few
examples are worked out.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 13:26:45 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2009 12:31:00 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Weissman",
"Tsachy",
""
],
[
"Permuter",
"Haim H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2320 | Sherief Abdallah | Sherief Abdallah | Why Global Performance is a Poor Metric for Verifying Convergence of
Multi-agent Learning | 11 pages | null | null | null | cs.MA cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Experimental verification has been the method of choice for verifying the
stability of a multi-agent reinforcement learning (MARL) algorithm as the
number of agents grows and theoretical analysis becomes prohibitively complex.
For cooperative agents, where the ultimate goal is to optimize some global
metric, the stability is usually verified by observing the evolution of the
global performance metric over time. If the global metric improves and
eventually stabilizes, it is considered a reasonable verification of the
system's stability.
The main contribution of this note is establishing the need for better
experimental frameworks and measures to assess the stability of large-scale
adaptive cooperative systems. We show an experimental case study where the
stability of the global performance metric can be rather deceiving, hiding an
underlying instability in the system that later leads to a significant drop in
performance. We then propose an alternative metric that relies on agents' local
policies and show, experimentally, that our proposed metric is more effective
(than the traditional global performance metric) in exposing the instability of
MARL algorithms.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 13:49:42 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Abdallah",
"Sherief",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.2323 | Carsten Schneider | Carsten Schneider | A Symbolic Summation Approach to Find Optimal Nested Sum Representations | To appear in Clay Mathematics Proceedings | null | null | null | cs.SC math.CO math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following problem: Given a nested sum expression, find a sum
representation such that the nested depth is minimal. We obtain a symbolic
summation framework that solves this problem for sums defined, e.g., over
hypergeometric, $q$-hypergeometric or mixed hypergeometric expressions.
Recently, our methods have found applications in quantum field theory.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 14:00:07 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Schneider",
"Carsten",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0904.2340 | Diletta Romana Cacciagrano | D. Cacciagrano, F. Corradini, C. Palamidessi | Explicit fairness in testing semantics | 27 pages, 1 figure, appeared in LMCS | Logical Methods in Computer Science, Volume 5, Issue 2 (June 22,
2009) lmcs:1134 | 10.2168/LMCS-5(2:15)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we investigate fair computations in the pi-calculus. Following
Costa and Stirling's approach for CCS-like languages, we consider a method to
label process actions in order to filter out unfair computations. We contrast
the existing fair-testing notion with those that naturally arise by imposing
weak and strong fairness. This comparison provides insight about the
expressiveness of the various `fair' testing semantics and about their
discriminating power.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 15:55:56 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 11:30:11 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Cacciagrano",
"D.",
""
],
[
"Corradini",
"F.",
""
],
[
"Palamidessi",
"C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.2375 | Navin Kashyap | Akiko Manada and Navin Kashyap | The Zeta Function of a Periodic-Finite-Type Shift | To appear in Proceedings of the 2009 IEEE International Symposium on
Information Theory (ISIT'09); 5 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The class of periodic-finite-type shifts (PFT's) is a class of sofic shifts
that strictly includes the class of shifts of finite type (SFT's), and the zeta
function of a PFT is a generating function for the number of periodic sequences
in the shift. In this paper, we derive a useful formula for the zeta function
of a PFT. This formula allows the zeta function of a PFT to be computed more
efficiently than the specialization of a formula known for a generic sofic
shift
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 18:56:15 GMT"
}
]
| 2009-04-16T00:00:00 | [
[
"Manada",
"Akiko",
""
],
[
"Kashyap",
"Navin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2385 | Stefan Milius | Stefan Milius, Lawrence S. Moss | The Category Theoretic Solution of Recursive Program Schemes | this version includes the corrections from the corrigendum in
Theoret. Comput. Sci. 403 (2008), 409-415 | Theoret. Comput. Sci. 366 (2006), 3-59 | null | null | cs.LO math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides a general account of the notion of recursive program
schemes, studying both uninterpreted and interpreted solutions. It can be
regarded as the category-theoretic version of the classical area of algebraic
semantics. The overall assumptions needed are small indeed: working only in
categories with "enough final coalgebras" we show how to formulate, solve, and
study recursive program schemes. Our general theory is algebraic and so avoids
using ordered, or metric structures. Our work generalizes the previous
approaches which do use this extra structure by isolating the key concepts
needed to study substitution in infinite trees, including second-order
substitution. As special cases of our interpreted solutions we obtain the usual
denotational semantics using complete partial orders, and the one using
complete metric spaces. Our theory also encompasses implicitly defined objects
which are not usually taken to be related to recursive program schemes. For
example, the classical Cantor two-thirds set falls out as an interpreted
solution (in our sense) of a recursive program scheme.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 19:57:26 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Apr 2009 20:27:58 GMT"
}
]
| 2011-01-26T00:00:00 | [
[
"Milius",
"Stefan",
""
],
[
"Moss",
"Lawrence S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
]
|
0904.2389 | M. Angeles Serrano | M. Angeles Serrano, Marian Boguna, Alessandro Vespignani | Extracting the multiscale backbone of complex weighted networks | null | Proc. Natl. Acad. Sci. USA 106, 6483-6488 (2009) | 10.1073/pnas.0808904106 | null | physics.soc-ph cond-mat.dis-nn cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A large number of complex systems find a natural abstraction in the form of
weighted networks whose nodes represent the elements of the system and the
weighted edges identify the presence of an interaction and its relative
strength. In recent years, the study of an increasing number of large scale
networks has highlighted the statistical heterogeneity of their interaction
pattern, with degree and weight distributions which vary over many orders of
magnitude. These features, along with the large number of elements and links,
make the extraction of the truly relevant connections forming the network's
backbone a very challenging problem. More specifically, coarse-graining
approaches and filtering techniques are at struggle with the multiscale nature
of large scale systems. Here we define a filtering method that offers a
practical procedure to extract the relevant connection backbone in complex
multiscale networks, preserving the edges that represent statistical
significant deviations with respect to a null model for the local assignment of
weights to edges. An important aspect of the method is that it does not
belittle small-scale interactions and operates at all scales defined by the
weight distribution. We apply our method to real world network instances and
compare the obtained results with alternative backbone extraction techniques.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 20:09:08 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Serrano",
"M. Angeles",
""
],
[
"Boguna",
"Marian",
""
],
[
"Vespignani",
"Alessandro",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.2400 | Patrick Briest | Patrick Briest, Shuchi Chawla, Robert Kleinberg, and S. Matthew
Weinberg | Pricing Randomized Allocations | null | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Randomized mechanisms, which map a set of bids to a probability distribution
over outcomes rather than a single outcome, are an important but ill-understood
area of computational mechanism design. We investigate the role of randomized
outcomes (henceforth, "lotteries") in the context of a fundamental and
archetypical multi-parameter mechanism design problem: selling heterogeneous
items to unit-demand bidders. To what extent can a seller improve her revenue
by pricing lotteries rather than items, and does this modification of the
problem affect its computational tractability? Our results show that the
answers to these questions hinge on whether consumers can purchase only one
lottery (the buy-one model) or purchase any set of lotteries and receive an
independent sample from each (the buy-many model). In the buy-one model, there
is a polynomial-time algorithm to compute the revenue-maximizing envy-free
prices (thus overcoming the inapproximability of the corresponding item pricing
problem) and the revenue of the optimal lottery system can exceed the revenue
of the optimal item pricing by an unbounded factor as long as the number of
item types exceeds 4. In the buy-many model with n item types, the profit
achieved by lottery pricing can exceed item pricing by a factor of O(log n) but
not more, and optimal lottery pricing cannot be approximated within a factor of
O(n^eps) for some eps>0, unless NP has subexponential-time randomized
algorithms. Our lower bounds rely on a mixture of geometric and algebraic
techniques, whereas the upper bounds use a novel rounding scheme to transform a
mechanism with randomized outcomes into one with deterministic outcomes while
losing only a bounded amount of revenue.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 16:30:59 GMT"
}
]
| 2009-04-17T00:00:00 | [
[
"Briest",
"Patrick",
""
],
[
"Chawla",
"Shuchi",
""
],
[
"Kleinberg",
"Robert",
""
],
[
"Weinberg",
"S. Matthew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2401 | Seyed M. Sadegh Tabatabaei Yazdi | S. M. Sadegh Tabatabaei Yazdi and Serap A. Savari | A Combinatorial Study of Linear Deterministic Relay Networks | 24 pages, 2 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the last few years the so--called "linear deterministic" model of relay
channels has gained popularity as a means of studying the flow of information
over wireless communication networks, and this approach generalizes the model
of wireline networks which is standard in network optimization. There is recent
work extending the celebrated max--flow/min--cut theorem to the capacity of a
unicast session over a linear deterministic relay network which is modeled by a
layered directed graph. This result was first proved by a random coding scheme
over large blocks of transmitted signals. We demonstrate the same result with a
simple, deterministic, polynomial--time algorithm which takes as input a single
transmitted signal instead of a long block of signals. Our capacity-achieving
transmission scheme for a two--layer network requires the extension of a
one--dimensional Rado--Hall transversal theorem on the independent subsets of
rows of a row--partitioned matrix into a two--dimensional variation for block
matrices. To generalize our approach to larger networks we use the
submodularity of the capacity of a cut for our model and show that our complete
transmission scheme can be obtained by solving a linear program over the
intersection of two polymatroids. We prove that our transmission scheme can
achieve the max-flow/min-cut capacity by applying a theorem of Edmonds about
such linear programs. We use standard submodular function minimization
techniques as part of our polynomial--time algorithm to construct our
capacity-achieving transmission scheme.
| [
{
"version": "v1",
"created": "Wed, 15 Apr 2009 21:42:33 GMT"
}
]
| 2009-04-17T00:00:00 | [
[
"Yazdi",
"S. M. Sadegh Tabatabaei",
""
],
[
"Savari",
"Serap A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2441 | Karsten Fyhn Nielsen | Rasmus Jacobsen, Karsten Fyhn Nielsen, Petar Popovski, Torben Larsen | Reliable Identification of RFID Tags Using Multiple Independent Reader
Sessions | Presented at IEEE RFID 2009 Conference | null | 10.1109/RFID.2009.4911187 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Radio Frequency Identification (RFID) systems are gaining momentum in various
applications of logistics, inventory, etc. A generic problem in such systems is
to ensure that the RFID readers can reliably read a set of RFID tags, such that
the probability of missing tags stays below an acceptable value. A tag may be
missing (left unread) due to errors in the communication link towards the
reader e.g. due to obstacles in the radio path. The present paper proposes
techniques that use multiple reader sessions, during which the system of
readers obtains a running estimate of the probability to have at least one tag
missing. Based on such an estimate, it is decided whether an additional reader
session is required. Two methods are proposed, they rely on the statistical
independence of the tag reading errors across different reader sessions, which
is a plausible assumption when e.g. each reader session is executed on
different readers. The first method uses statistical relationships that are
valid when the reader sessions are independent. The second method is obtained
by modifying an existing capture-recapture estimator. The results show that,
when the reader sessions are independent, the proposed mechanisms provide a
good approximation to the probability of missing tags, such that the number of
reader sessions made, meets the target specification. If the assumption of
independence is violated, the estimators are still useful, but they should be
corrected by a margin of additional reader sessions to ensure that the target
probability of missing tags is met.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 07:33:40 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Jacobsen",
"Rasmus",
""
],
[
"Nielsen",
"Karsten Fyhn",
""
],
[
"Popovski",
"Petar",
""
],
[
"Larsen",
"Torben",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2448 | Francesc Rossell\'o | Francesc Rossello, Gabriel Valiente | All that Glisters is not Galled | 13 pages | null | null | null | cs.DM cs.CE q-bio.PE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Galled trees, evolutionary networks with isolated reticulation cycles, have
appeared under several slightly different definitions in the literature. In
this paper we establish the actual relationships between the main four such
alternative definitions: namely, the original galled trees, level-1 networks,
nested networks with nesting depth 1, and evolutionary networks with
arc-disjoint reticulation cycles.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 09:12:06 GMT"
}
]
| 2009-05-05T00:00:00 | [
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
]
|
0904.2452 | Bruno Salvy | Marc Mezzarobba and Bruno Salvy | Effective Bounds for P-Recursive Sequences | 26 pages | null | 10.1016/j.jsc.2010.06.024 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe an algorithm that takes as input a complex sequence $(u_n)$ given
by a linear recurrence relation with polynomial coefficients along with initial
values, and outputs a simple explicit upper bound $(v_n)$ such that $|u_n| \leq
v_n$ for all $n$. Generically, the bound is tight, in the sense that its
asymptotic behaviour matches that of $u_n$. We discuss applications to the
evaluation of power series with guaranteed precision.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 09:39:09 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Dec 2009 08:59:13 GMT"
}
]
| 2013-06-19T00:00:00 | [
[
"Mezzarobba",
"Marc",
""
],
[
"Salvy",
"Bruno",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0904.2457 | Guillaume Theyssier | Emmanuel Jeandel (LIF), Guillaume Theyssier (LM-Savoie) | Subshifts, Languages and Logic | null | 13th International Conference on Developments in Language Theory,
Stuttgart : Allemagne (2009) | null | null | cs.DM cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the Monadic Second Order (MSO) Hierarchy over infinite pictures,
that is tilings. We give a characterization of existential MSO in terms of
tilings and projections of tilings. Conversely, we characterise logic fragments
corresponding to various classes of infinite pictures (subshifts of finite
type, so?c subshifts).
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 09:53:05 GMT"
}
]
| 2016-11-25T00:00:00 | [
[
"Jeandel",
"Emmanuel",
"",
"LIF"
],
[
"Theyssier",
"Guillaume",
"",
"LM-Savoie"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.2477 | Peter Harremo\"es | Peter Harremo\"es | Joint Range of R\'enyi Entropies | null | null | null | null | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The exact range of the joined values of several R\'{e}nyi entropies is
determined. The method is based on topology with special emphasis on the
orientation of the objects studied. Like in the case when only two orders of
R\'{e}nyi entropies are studied one can parametrize upper and lower bounds but
an explicit formula for a tight upper or lower bound cannot be given.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 12:38:16 GMT"
}
]
| 2009-04-17T00:00:00 | [
[
"Harremoës",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0904.2482 | Eirik Rosnes | Alexandre Graell i Amat and Eirik Rosnes | Good Concatenated Code Ensembles for the Binary Erasure Channel | To appear in IEEE Journal on Selected Areas in Communications,
special issue on Capacity Approaching Codes | IEEE J. Select. Areas Commun., vol. 27, no. 6, pp. 928-943, Aug.
2009 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we give good concatenated code ensembles for the binary erasure
channel (BEC). In particular, we consider repeat multiple-accumulate (RMA) code
ensembles formed by the serial concatenation of a repetition code with multiple
accumulators, and the hybrid concatenated code (HCC) ensembles recently
introduced by Koller et al. (5th Int. Symp. on Turbo Codes & Rel. Topics,
Lausanne, Switzerland) consisting of an outer multiple parallel concatenated
code serially concatenated with an inner accumulator. We introduce stopping
sets for iterative constituent code oriented decoding using maximum a
posteriori erasure correction in the constituent codes. We then analyze the
asymptotic stopping set distribution for RMA and HCC ensembles and show that
their stopping distance hmin, defined as the size of the smallest nonempty
stopping set, asymptotically grows linearly with the block length. Thus, these
code ensembles are good for the BEC. It is shown that for RMA code ensembles,
contrary to the asymptotic minimum distance dmin, whose growth rate coefficient
increases with the number of accumulate codes, the hmin growth rate coefficient
diminishes with the number of accumulators. We also consider random puncturing
of RMA code ensembles and show that for sufficiently high code rates, the
asymptotic hmin does not grow linearly with the block length, contrary to the
asymptotic dmin, whose growth rate coefficient approaches the Gilbert-Varshamov
bound as the rate increases. Finally, we give iterative decoding thresholds for
the different code ensembles to compare the convergence properties.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 13:32:47 GMT"
}
]
| 2011-05-31T00:00:00 | [
[
"Amat",
"Alexandre Graell i",
""
],
[
"Rosnes",
"Eirik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2511 | V\'aclav Bro\v{z}ek | Tom\'a\v{s} Br\'azdil, V\'aclav Bro\v{z}ek, Kousha Etessami, Anton\'in
Ku\v{c}era, Dominik Wojtczak | One-Counter Markov Decision Processes | Updated preliminary version, submitted to SODA2010 | null | null | null | cs.GT cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the computational complexity of central analysis problems for
One-Counter Markov Decision Processes (OC-MDPs), a class of finitely-presented,
countable-state MDPs. OC-MDPs are equivalent to a controlled extension of
(discrete-time) Quasi-Birth-Death processes (QBDs), a stochastic model studied
heavily in queueing theory and applied probability. They can thus be viewed as
a natural ``adversarial'' version of a classic stochastic model. Alternatively,
they can also be viewed as a natural probabilistic/controlled extension of
classic one-counter automata. OC-MDPs also subsume (as a very restricted
special case) a recently studied MDP model called ``solvency games'' that model
a risk-averse gambling scenario. Basic computational questions about these
models include ``termination'' questions and ``limit'' questions, such as the
following: does the controller have a ``strategy'' (or ``policy'') to ensure
that the counter (which may for example count the number of jobs in the queue)
will hit value 0 (the empty queue) almost surely (a.s.)? Or that it will have
infinite limsup value, a.s.? Or, that it will hit value 0 in selected terminal
states, a.s.? Or, in case these are not satisfied a.s., compute the maximum
(supremum) such probability over all strategies. We provide new upper and lower
bounds on the complexity of such problems. For some of them we present a
polynomial-time algorithm, whereas for others we show PSPACE- or BH-hardness
and give an EXPTIME upper bound. Our upper bounds combine techniques from the
theory of MDP reward models, the theory of random walks, and a variety of
automata-theoretic methods.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 14:56:10 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Apr 2009 13:50:56 GMT"
},
{
"version": "v3",
"created": "Sat, 30 May 2009 05:50:42 GMT"
},
{
"version": "v4",
"created": "Fri, 11 Sep 2009 14:41:54 GMT"
}
]
| 2009-09-11T00:00:00 | [
[
"Brázdil",
"Tomáš",
""
],
[
"Brožek",
"Václav",
""
],
[
"Etessami",
"Kousha",
""
],
[
"Kučera",
"Antonín",
""
],
[
"Wojtczak",
"Dominik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0904.2521 | Florent Madelaine | Florent R. Madelaine | Universal Structures and the logic of Forbidden Patterns | 25 pages, 3 figures, extended version of conference papers at CSR'06
and CSL'06 | Logical Methods in Computer Science, Volume 5, Issue 2 (June 2,
2009) lmcs:1237 | 10.2168/LMCS-5(2:13)2009 | null | cs.LO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Forbidden Patterns Problems (FPPs) are a proper generalisation of Constraint
Satisfaction Problems (CSPs). However, we show that when the input is connected
and belongs to a class which has low tree-depth decomposition (e.g. structure
of bounded degree, proper minor closed class and more generally class of
bounded expansion) any FPP becomes a CSP. This result can also be rephrased in
terms of expressiveness of the logic MMSNP, introduced by Feder and Vardi in
relation with CSPs. Our proof generalises that of a recent paper by Nesetril
and Ossona de Mendez. Note that our result holds in the general setting of
problems over arbitrary relational structures (not just for graphs).
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 15:26:40 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jun 2009 12:56:10 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Madelaine",
"Florent R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.2540 | David Wolpert | David H. Wolpert Gregory Benford | What does Newcomb's paradox teach us? | Revised version with analysis extended and clarified; 22 pages, 1
table | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In Newcomb's paradox you choose to receive either the contents of a
particular closed box, or the contents of both that closed box and another one.
Before you choose though, an antagonist uses a prediction algorithm to deduce
your choice, and fills the two boxes based on that deduction. Newcomb's paradox
is that game theory's expected utility and dominance principles appear to
provide conflicting recommendations for what you should choose. A recent
extension of game theory provides a powerful tool for resolving paradoxes
concerning human choice, which formulates such paradoxes in terms of Bayes
nets. Here we apply this to ol to Newcomb's scenario. We show that the
conflicting recommendations in Newcomb's scenario use different Bayes nets to
relate your choice and the algorithm's prediction. These two Bayes nets are
incompatible. This resolves the paradox: the reason there appears to be two
conflicting recommendations is that the specification of the underlying Bayes
net is open to two, conflicting interpretations. We then show that the accuracy
of the prediction algorithm in Newcomb's paradox, the focus of much previous
work, is irrelevant. We similarly show that the utility functions of you and
the antagonist are irrelevant. We end by showing that Newcomb's paradox is
time-reversal invariant; both the paradox and its resolution are unchanged if
the algorithm makes its `prediction' \emph{after} you make your choice rather
than before.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 16:50:22 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 18:53:17 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Sep 2010 16:29:44 GMT"
}
]
| 2010-10-01T00:00:00 | [
[
"Benford",
"David H. Wolpert Gregory",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.2541 | Heidi Gebauer | Heidi Gebauer | Disproof of the Neighborhood Conjecture with Implications to SAT | 12 pages, 1 figure | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a Maker/Breaker game described by Beck. As a result we disprove a
conjecture of Beck on positional games, establish a connection between this
game and SAT and construct an unsatisfiable k-CNF formula with few occurrences
per variable, thereby improving a previous result by Hoory and Szeider and
showing that the bound obtained from the Lovasz Local Lemma is tight up to a
constant factor. The Maker/Breaker game we study is as follows. Maker and
Breaker take turns in choosing vertices from a given n-uniform hypergraph F,
with Maker going first. Maker's goal is to completely occupy a hyperedge and
Breaker tries to avoid this. Beck conjectures that if the maximum neighborhood
size of F is at most 2^(n-1) then Breaker has a winning strategy. We disprove
this conjecture by establishing an n-uniform hypergraph with maximum
neighborhood size 3*2^(n - 3) where Maker has a winning strategy. Moreover, we
show how to construct an n-uniform hypergraph with maximum degree (2^(n-1))/n
where maker has a winning strategy. Finally, we establish a connection between
SAT and the Maker/Breaker game we study. We can use this connection to derive
new results in SAT. Kratochvil, Savicky and Tuza showed that for every k >= 3
there is an integer f(k) such that every (k,f(k))-formula is satisfiable, but
(k,f(k) + 1)-SAT is already NP-complete (it is not known whether f(k) is
computable). Kratochvil, Savicky and Tuza also gave the best known lower bound
f(k) = Omega(2^k/k), which is a consequence of the Lovasz Local Lemma. We prove
that, in fact, f(k) = Theta(2^k/k), improving upon the best known upper bound
O((log k) * 2^k/k) by Hoory and Szeider.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 17:04:21 GMT"
},
{
"version": "v2",
"created": "Thu, 7 May 2009 21:25:14 GMT"
},
{
"version": "v3",
"created": "Fri, 15 May 2009 07:59:53 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Gebauer",
"Heidi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.2550 | Stefanie Wuhrer | Anil Maheshwari and Stefanie Wuhrer | Geodesic Paths On 3D Surfaces: Survey and Open Problems | null | Extended version in: Computational Geometry - Theory and
Applications, 44(9):486-498, 2011 | 10.1016/j.comgeo.2011.05.006 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This survey gives a brief overview of theoretically and practically relevant
algorithms to compute geodesic paths and distances on three-dimensional
surfaces. The survey focuses on polyhedral three-dimensional surfaces.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 17:42:44 GMT"
}
]
| 2012-10-23T00:00:00 | [
[
"Maheshwari",
"Anil",
""
],
[
"Wuhrer",
"Stefanie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.2576 | Anna Adamaszek | Anna Adamaszek, Artur Czumaj, Andrzej Lingas | PTAS for k-tour cover problem on the plane for moderately large values
of k | 11 pages, 2 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let P be a set of n points in the Euclidean plane and let O be the origin
point in the plane. In the k-tour cover problem (called frequently the
capacitated vehicle routing problem), the goal is to minimize the total length
of tours that cover all points in P, such that each tour starts and ends in O
and covers at most k points from P.
The k-tour cover problem is known to be NP-hard. It is also known to admit
constant factor approximation algorithms for all values of k and even a
polynomial-time approximation scheme (PTAS) for small values of k, i.e.,
k=O(log n / log log n).
We significantly enlarge the set of values of k for which a PTAS is provable.
We present a new PTAS for all values of k <= 2^{log^{\delta}n}, where \delta =
\delta(\epsilon). The main technical result proved in the paper is a novel
reduction of the k-tour cover problem with a set of n points to a small set of
instances of the problem, each with O((k/\epsilon)^O(1)) points.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 20:12:33 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Adamaszek",
"Anna",
""
],
[
"Czumaj",
"Artur",
""
],
[
"Lingas",
"Andrzej",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2584 | Jose Avelino Manzano Lizcano | J. A. Manzano Lizcano, S. A. Jaramillo Florez | New technologies for high speed computer networks: a wavelet approach | in spanish, 13 pages, associated research in
http://www.airenatural.com; Published in Revista AIELEC de la Universidad
Pontificia Bolivariana. 2001 | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Indoor multpropagation channel is modeled by the Kaiser electromagnetic
wavelet. A method for channel characterization is proposed by modeling all the
reflections of indoor propagation in a kernel function instead of its impulse
response. This lead us to consider a fractal modulation scheme in which Kaiser
wavelets substitute the traditional sinusoidal carrier.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 20:48:43 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Lizcano",
"J. A. Manzano",
""
],
[
"Florez",
"S. A. Jaramillo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.2585 | Elena Veronica Belmega | Brice Djeumou, Elena Veronica Belmega, and Samson Lasaulce | Interference Relay Channels - Part I: Transmission Rates | Submitted to IEEE transactions on Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the performance of a system composed of two interfering
point-to-point links where the transmitters can exploit a common relay to
improve their individual transmission rate. When the relay uses the
amplify-and-forward protocol we prove that it is not always optimal (in some
sense defined later on) to exploit all the relay transmit power and derive the
corresponding optimal amplification factor. For the case of the
decode-and-forward protocol, already investigated in [1], we show that this
protocol, through the cooperation degree between each transmitter and the
relay, is the only one that naturally introduces a game between the
transmitters. For the estimate-and-forward protocol, we derive two rate regions
for the general case of discrete interference relay channels (IRCs) and
specialize these results to obtain the Gaussian case; these regions correspond
to two compression schemes at the relay, having different resolution levels.
These schemes are compared analytically in some special cases. All the results
mentioned are illustrated by simulations, given in this part, and exploited to
study power allocation games in multi-band IRCs in the second part of this
two-part paper.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 20:51:05 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Djeumou",
"Brice",
""
],
[
"Belmega",
"Elena Veronica",
""
],
[
"Lasaulce",
"Samson",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2587 | Elena Veronica Belmega | Elena Veronica Belmega, Brice Djeumou, and Samson Lasaulce | Interference Relay Channels - Part II: Power Allocation Games | This paper has been withdrawn by the authors | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the first part of this paper we have derived achievable transmission rates
for the (single-band) interference relay channel (IRC) when the relay
implements either the amplify-and-forward, decode-and-forward or
estimate-and-forward protocol. Here, we consider wireless networks that can be
modeled by a multi-band IRC. We tackle the existence issue of Nash equilibria
(NE) in these networks where each information source is assumed to selfishly
allocate its power between the available bands in order to maximize its
individual transmission rate. Interestingly, it is possible to show that the
three power allocation (PA) games (corresponding to the three protocols
assumed) under investigation are concave, which guarantees the existence of a
pure NE after Rosen [3]. Then, as the relay can also optimize several
parameters e.g., its position and transmit power, it is further considered as
the leader of a Stackelberg game where the information sources are the
followers. Our theoretical analysis is illustrated by simulations giving more
insights on the addressed issues.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 20:56:56 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Nov 2010 17:07:57 GMT"
}
]
| 2010-11-23T00:00:00 | [
[
"Belmega",
"Elena Veronica",
""
],
[
"Djeumou",
"Brice",
""
],
[
"Lasaulce",
"Samson",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2595 | Mark Levene | Mark Levene and Trevor Fenner | A Methodology for Learning Players' Styles from Game Records | 15 pages, 3 figures | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a preliminary investigation into learning a Chess player's style
from game records. The method is based on attempting to learn features of a
player's individual evaluation function using the method of temporal
differences, with the aid of a conventional Chess engine architecture. Some
encouraging results were obtained in learning the styles of two recent Chess
world champions, and we report on our attempt to use the learnt styles to
discriminate between the players from game records by trying to detect who was
playing white and who was playing black. We also discuss some limitations of
our approach and propose possible directions for future research. The method we
have presented may also be applicable to other strategic games, and may even be
generalisable to other domains where sequences of agents' actions are recorded.
| [
{
"version": "v1",
"created": "Thu, 16 Apr 2009 21:30:30 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Levene",
"Mark",
""
],
[
"Fenner",
"Trevor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.2623 | James Petterson | James Petterson, Tiberio Caetano, Julian McAuley, Jin Yu | Exponential Family Graph Matching and Ranking | null | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a method for learning max-weight matching predictors in bipartite
graphs. The method consists of performing maximum a posteriori estimation in
exponential families with sufficient statistics that encode permutations and
data features. Although inference is in general hard, we show that for one very
relevant application - web page ranking - exact inference is efficient. For
general model instances, an appropriate sampler is readily available. Contrary
to existing max-margin matching models, our approach is statistically
consistent and, in addition, experiments with increasing sample sizes indicate
superior improvement over such models. We apply the method to graph matching in
computer vision as well as to a standard benchmark dataset for learning web
page ranking, in which we obtain state-of-the-art results, in particular
improving on max-margin variants. The drawback of this method with respect to
max-margin alternatives is its runtime for large graphs, which is comparatively
high.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 03:48:02 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2009 03:54:58 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Petterson",
"James",
""
],
[
"Caetano",
"Tiberio",
""
],
[
"McAuley",
"Julian",
""
],
[
"Yu",
"Jin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0904.2638 | Krishnendu Chatterjee | Roderick Bloem, Krishnendu Chatterjee, Thomas A. Henzinger and Barbara
Jobstmann | Better Quality in Synthesis through Quantitative Objectives | null | null | null | null | cs.LO cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most specification languages express only qualitative constraints.
However, among two implementations that satisfy a given specification, one
may be preferred to another. For example, if a specification asks that every
request is followed by a response, one may prefer an implementation that
generates responses quickly but does not generate unnecessary responses. We use
quantitative properties to measure the "goodness" of an implementation. Using
games with corresponding quantitative objectives, we can synthesize "optimal"
implementations, which are preferred among the set of possible implementations
that satisfy a given specification. In particular, we show how automata with
lexicographic mean-payoff conditions can be used to express many interesting
quantitative properties for reactive systems. In this framework, the synthesis
of optimal implementations requires the solution of lexicographic mean-payoff
games (for safety requirements), and the solution of games with both
lexicographic mean-payoff and parity objectives (for liveness requirements). We
present algorithms for solving both kinds of novel graph games.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 05:56:33 GMT"
},
{
"version": "v2",
"created": "Fri, 17 May 2013 06:17:49 GMT"
},
{
"version": "v3",
"created": "Tue, 28 May 2013 07:13:59 GMT"
}
]
| 2013-05-29T00:00:00 | [
[
"Bloem",
"Roderick",
""
],
[
"Chatterjee",
"Krishnendu",
""
],
[
"Henzinger",
"Thomas A.",
""
],
[
"Jobstmann",
"Barbara",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.2658 | Jean Daligault | Jean Daligault, Stephan Thomasse | On Finding Directed Trees with Many Leaves | Submitted to ESA 09, 13 pages, 1 figure | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Rooted Maximum Leaf Outbranching problem consists in finding a spanning
directed tree rooted at some prescribed vertex of a digraph with the maximum
number of leaves. Its parameterized version asks if there exists such a tree
with at least $k$ leaves. We use the notion of $s-t$ numbering to exhibit
combinatorial bounds on the existence of spanning directed trees with many
leaves. These combinatorial bounds allow us to produce a constant factor
approximation algorithm for finding directed trees with many leaves, whereas
the best known approximation algorithm has a $\sqrt{OPT}$-factor. We also show
that Rooted Maximum Leaf Outbranching admits a quadratic kernel, improving over
the cubic kernel given by Fernau et al.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 09:30:30 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Daligault",
"Jean",
""
],
[
"Thomasse",
"Stephan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.2675 | Ugo Dal Lago | Ugo Dal Lago (Universit\`a di Bologna), Martin Hofmann (LMU, Munchen) | Bounded Linear Logic, Revisited | null | Logical Methods in Computer Science, Volume 6, Issue 4 (December
18, 2010) lmcs:1064 | 10.2168/LMCS-6(4:7)2010 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present QBAL, an extension of Girard, Scedrov and Scott's bounded linear
logic. The main novelty of the system is the possibility of quantifying over
resource variables. This generalization makes bounded linear logic considerably
more flexible, while preserving soundness and completeness for polynomial time.
In particular, we provide compositional embeddings of Leivant's RRW and
Hofmann's LFPL into QBAL.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 10:44:18 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Nov 2010 14:07:31 GMT"
},
{
"version": "v3",
"created": "Sat, 18 Dec 2010 16:54:05 GMT"
},
{
"version": "v4",
"created": "Tue, 21 Dec 2010 23:22:35 GMT"
},
{
"version": "v5",
"created": "Thu, 23 Dec 2010 13:48:35 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Lago",
"Ugo Dal",
"",
"Università di Bologna"
],
[
"Hofmann",
"Martin",
"",
"LMU, Munchen"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.2695 | Lianlin Li Dr | Lianlin Li, Wenji Zhang, Fang Li | Compressive Diffraction Tomography for Weakly Scattering | null | null | null | null | cs.CE cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | An appealing requirement from the well-known diffraction tomography (DT)
exists for success reconstruction from few-view and limited-angle data.
Inspired by the well-known compressive sensing (CS), the accurate
super-resolution reconstruction from highly sparse data for the weakly scatters
has been investigated in this paper. To realize the compressive data
measurement, in particular, to obtain the super-resolution reconstruction with
highly sparse data, the compressive system which is realized by surrounding the
probed obstacles by the random media has been proposed and empirically studied.
Several interesting conclusions have been drawn: (a) if the desired resolution
is within the range from to, the K-sparse N-unknowns imaging can be obtained
exactly bymeasurements, which is comparable to the required number of
measurement by the Gaussian random matrix in the literatures of compressive
sensing. (b) With incorporating the random media which is used to enforce the
multi-path effect of wave propagation, the resulting measurement matrix is
incoherence with wavelet matrix, in other words, when the probed obstacles are
sparse with the framework of wavelet, the required number of measurements for
successful reconstruction is similar as above. (c) If the expected resolution
is lower than, the required number of measurements of proposed compressive
system is almost identical to the case of free space. (d) There is also a
requirement to make the tradeoff between the imaging resolutions and the number
of measurements. In addition, by the introduction of complex Gaussian variable
the kind of fast sparse Bayesian algorithm has been slightly modified to deal
with the complex-valued optimization with sparse constraints.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 13:19:50 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Li",
"Lianlin",
""
],
[
"Zhang",
"Wenji",
""
],
[
"Li",
"Fang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2712 | Mingyu Xiao | Mingyu Xiao | New Branching Rules: Improvements on Independent Set and Vertex Cover in
Sparse Graphs | The paper was presented at the 2nd annual meeting of asian
association for algorithms and computation (AAAC 2009), April 11-12, 2009,
Hangzhou, China | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an $O^*(1.0919^n)$-time algorithm for finding a maximum
independent set in an $n$-vertex graph with degree bounded by 3, which improves
the previously known algorithm of running time $O^*(1.0977^n)$ by Bourgeois,
Escoffier and Paschos [IWPEC 2008]. We also present an $O^*(1.1923^k)$-time
algorithm to decide if a graph with degree bounded by 3 has a vertex cover of
size $k$, which improves the previously known algorithm of running time
$O^*(1.1939^k)$ by Chen, Kanj and Xia [ISAAC 2003].
Two new branching techniques, \emph{branching on a bottle} and
\emph{branching on a 4-cycle}, are introduced, which help us to design simple
and fast algorithms for the maximum independent set and minimum vertex cover
problems and avoid tedious branching rules.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 14:19:12 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Xiao",
"Mingyu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.2716 | Cl\'emence Magnien | Clemence Magnien (1), Frederic Ouedraogo (1 and 2), Guillaume Valadon
(1), Matthieu Latapy (1) ((1) LIP6 (CNRS - UPMC), (2) LTIC (University of
Ouagadougou)) | Fast dynamics in Internet topology: preliminary observations and
explanations | Fourth International Conference on Internet Monitoring and Protection
(ICIMP 2009), May 24-28, 2009, Venice, Italy | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | By focusing on what can be observed by running traceroute-like measurements
at a high frequency from a single monitor to a fixed destination set, we show
that the observed view of the topology is constantly evolving at a pace much
higher than expected. Repeated measurements discover new IP addresses at a
constant rate, for long period of times (up to several months). In order to
provide explanations, we study this phenomenon both at the IP, and at the
Autonomous System levels. We show that this renewal of IP addresses is
partially caused by a BGP routing dynamics, altering paths between existing
ASes. Furthermore, we conjecture that an intra AS routing dynamics is another
cause of this phenomenon.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 14:57:35 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Magnien",
"Clemence",
"",
"1 and 2"
],
[
"Ouedraogo",
"Frederic",
"",
"1 and 2"
],
[
"Valadon",
"Guillaume",
""
],
[
"Latapy",
"Matthieu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.2722 | MinJi Kim | MinJi Kim, Lu\'isa Lima, Fang Zhao, Joao Barros, Muriel Medard, Ralf
Koetter, Ton Kalker, Keesook Han | On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer
Networks | 26 pages, 9 figures, Submitted to IEEE Journal on Selected Areas in
Communications (JSAC) "Mission Critical Networking" | null | 10.1109/JSAC.2010.100607 | null | cs.NI cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Random linear network coding can be used in peer-to-peer networks to increase
the efficiency of content distribution and distributed storage. However, these
systems are particularly susceptible to Byzantine attacks. We quantify the
impact of Byzantine attacks on the coded system by evaluating the probability
that a receiver node fails to correctly recover a file. We show that even for a
small probability of attack, the system fails with overwhelming probability. We
then propose a novel signature scheme that allows packet-level Byzantine
detection. This scheme allows one-hop containment of the contamination, and
saves bandwidth by allowing nodes to detect and drop the contaminated packets.
We compare the net cost of our signature scheme with various other Byzantine
schemes, and show that when the probability of Byzantine attacks is high, our
scheme is the most bandwidth efficient.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 15:31:46 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Kim",
"MinJi",
""
],
[
"Lima",
"Luísa",
""
],
[
"Zhao",
"Fang",
""
],
[
"Barros",
"Joao",
""
],
[
"Medard",
"Muriel",
""
],
[
"Koetter",
"Ralf",
""
],
[
"Kalker",
"Ton",
""
],
[
"Han",
"Keesook",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.2728 | Cl\'emence Magnien | Clemence Magnien (1), Matthieu Latapy (1) and Michel Habib (2) ((1)
LIP6 (CNRS - UPMC), (2) LIAFA (CNRS - Universite Paris Diderot)) | Fast Computation of Empirically Tight Bounds for the Diameter of Massive
Graphs | ACM Journal of Experimental Algorithmics (JEA), 13, 2008 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The diameter of a graph is among its most basic parameters. Since a few
years, it moreover became a key issue to compute it for massive graphs in the
context of complex network analysis. However, known algorithms, including the
ones producing approximate values, have too high a time and/or space complexity
to be used in such cases. We propose here a new approach relying on very simple
and fast algorithms that compute (upper and lower) bounds for the diameter. We
show empirically that, on various real-world cases representative of complex
networks studied in the literature, the obtained bounds are very tight (and
even equal in some cases). This leads to rigorous and very accurate estimations
of the actual diameter in cases which were previously untractable in practice.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 15:44:49 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Magnien",
"Clemence",
""
],
[
"Latapy",
"Matthieu",
""
],
[
"Habib",
"Michel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2733 | Cl\'emence Magnien | Fabien Viger (1), Brice Augustin (1), Xavier Cuvellier (1), Clemence
Magnien (1), Matthieu Latapy (1), Timur Friedman (1), and Renata Teixeira (1)
((1) LIP6 (CNRS - UPMC)) | Detection, Understanding, and Prevention of Traceroute Measurement
Artifacts | Computer Networks 52-5 (2008), pp. 998-1018. Extended abstract
published in the proceedings of the 6-th Internet Measurement Conference
IMC'06, 2006, Rio de Janeiro, Brazil | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traceroute is widely used: from the diagnosis of network problems to the
assemblage of internet maps. Unfortu- nately, there are a number of problems
with traceroute methodology, which lead to the inference of erroneous routes.
This paper studies particular structures arising in nearly all traceroute
measurements. We characterize them as "loops", "cycles", and "diamonds". We
iden- tify load balancing as a possible cause for the appear- ance of false
loops, cycles and diamonds, i.e., artifacts that do not represent the internet
topology. We pro- vide a new publicly-available traceroute, called Paris
traceroute, which, by controlling the packet header con- tents, provides a
truer picture of the actual routes that packets follow. We performed
measurements, from the perspective of a single source tracing towards multiple
destinations, and Paris traceroute allowed us to show that many of the
particular structures we observe are indeed traceroute measurement artifacts.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 15:59:27 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Viger",
"Fabien",
"",
"LIP6"
],
[
"Augustin",
"Brice",
"",
"LIP6"
],
[
"Cuvellier",
"Xavier",
"",
"LIP6"
],
[
"Magnien",
"Clemence",
"",
"LIP6"
],
[
"Latapy",
"Matthieu",
"",
"LIP6"
],
[
"Friedman",
"Timur",
"",
"LIP6"
],
[
"Teixeira",
"Renata",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.2751 | Andrea Montanari | Andrea Montanari, Ricardo Restrepo and Prasad Tetali | Reconstruction and Clustering in Random Constraint Satisfaction Problems | 21 pages | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Random instances of Constraint Satisfaction Problems (CSP's) appear to be
hard for all known algorithms, when the number of constraints per variable lies
in a certain interval. Contributing to the general understanding of the
structure of the solution space of a CSP in the satisfiable regime, we
formulate a set of natural technical conditions on a large family of (random)
CSP's, and prove bounds on three most interesting thresholds for the density of
such an ensemble: namely, the satisfiability threshold, the threshold for
clustering of the solution space, and the threshold for an appropriate
reconstruction problem on the CSP's. The bounds become asymptoticlally tight as
the number of degrees of freedom in each clause diverges. The families are
general enough to include commonly studied problems such as, random instances
of Not-All-Equal-SAT, k-XOR formulae, hypergraph 2-coloring, and graph
k-coloring. An important new ingredient is a condition involving the Fourier
expansion of clauses, which characterizes the class of problems with a similar
threshold structure.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 17:27:59 GMT"
}
]
| 2009-04-20T00:00:00 | [
[
"Montanari",
"Andrea",
""
],
[
"Restrepo",
"Ricardo",
""
],
[
"Tetali",
"Prasad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.2759 | Ben Reichardt | Ben W. Reichardt | Span programs and quantum query complexity: The general adversary bound
is nearly tight for every boolean function | 70 pages, 2 figures | Extended abstract in Proc. 50th IEEE Symp. on Foundations of
Computer Science (FOCS), 2009, pages 544-551 | 10.1109/FOCS.2009.55 | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The general adversary bound is a semi-definite program (SDP) that
lower-bounds the quantum query complexity of a function. We turn this lower
bound into an upper bound, by giving a quantum walk algorithm based on the dual
SDP that has query complexity at most the general adversary bound, up to a
logarithmic factor.
In more detail, the proof has two steps, each based on "span programs," a
certain linear-algebraic model of computation. First, we give an SDP that
outputs for any boolean function a span program computing it that has optimal
"witness size." The optimal witness size is shown to coincide with the general
adversary lower bound. Second, we give a quantum algorithm for evaluating span
programs with only a logarithmic query overhead on the witness size.
The first result is motivated by a quantum algorithm for evaluating composed
span programs. The algorithm is known to be optimal for evaluating a large
class of formulas. The allowed gates include all constant-size functions for
which there is an optimal span program. So far, good span programs have been
found in an ad hoc manner, and the SDP automates this procedure. Surprisingly,
the SDP's value equals the general adversary bound. A corollary is an optimal
quantum algorithm for evaluating "balanced" formulas over any finite boolean
gate set. The second result extends span programs' applicability beyond the
formula evaluation problem.
A strong universality result for span programs follows. A good quantum query
algorithm for a problem implies a good span program, and vice versa. Although
nearly tight, this equivalence is nontrivial. Span programs are a promising
model for developing more quantum algorithms.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 18:41:43 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Reichardt",
"Ben W.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.2761 | Bruno Salvy | Fr\'ed\'eric Chyzak (INRIA Rocquencourt), Manuel Kauers, Bruno Salvy
(INRIA Rocquencourt) | A Non-Holonomic Systems Approach to Special Function Identities | null | null | 10.1145/1576702.1576720 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend Zeilberger's approach to special function identities to cases that
are not holonomic. The method of creative telescoping is thus applied to
definite sums or integrals involving Stirling or Bernoulli numbers, incomplete
Gamma function or polylogarithms, which are not covered by the holonomic
framework. The basic idea is to take into account the dimension of appropriate
ideals in Ore algebras. This unifies several earlier extensions and provides
algorithms for summation and integration in classes that had not been
accessible to computer algebra before.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 18:36:10 GMT"
}
]
| 2013-06-19T00:00:00 | [
[
"Chyzak",
"Frédéric",
"",
"INRIA Rocquencourt"
],
[
"Kauers",
"Manuel",
"",
"INRIA Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0904.2769 | Amit K Awasthi | Amit K Awasthi and Sanjay Chaudhary | Non Homogeneous Poisson Process Model based Optimal Modular Software
Testing using Fault Tolerance | null | null | null | null | cs.SE | http://creativecommons.org/licenses/by/3.0/ | In software development process we come across various modules. Which raise
the idea of priority of the different modules of a software so that important
modules are tested on preference. This approach is desirable because it is not
possible to test each module regressively due to time and cost constraints.
This paper discuss on some parameters, required to prioritize several modules
of a software and provides measure of optimal time and cost for testing based
on non homogeneous Poisson process.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 19:40:05 GMT"
},
{
"version": "v2",
"created": "Sun, 10 May 2009 16:19:43 GMT"
}
]
| 2009-05-10T00:00:00 | [
[
"Awasthi",
"Amit K",
""
],
[
"Chaudhary",
"Sanjay",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.2785 | Daniel Kral | Daniel Kral | Decomposition width - a new width parameter for matroids | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new width parameter for matroids called decomposition width
and prove that every matroid property expressible in the monadic second order
logic can be computed in linear time for matroids with bounded decomposition
width if their decomposition is given. Since decompositions of small width for
our new notion can be computed in polynomial time for matroids of bounded
branch-width represented over finite fields, our results include recent
algorithmic results of Hlineny [J. Combin. Theory Ser. B 96 (2006), 325-351] in
this area and extend his results to matroids not necessarily representable over
finite fields.
| [
{
"version": "v1",
"created": "Fri, 17 Apr 2009 21:09:35 GMT"
}
]
| 2009-04-21T00:00:00 | [
[
"Kral",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.2827 | Elena Wishnevskaya S. | Elena S. Vishnevksaya | Principle of development | This paper has been withdrawn by the author | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Today, science have a powerful tool for the description of reality - the
numbers. However, the concept of number was not immediately, lets try to trace
the evolution of the concept. The numbers emerged as the need for accurate
estimates of the amount in order to permit a comparison of some objects. So if
you see to it how many times a day a person uses the numbers and compare, it
becomes evident that the comparison is used much more frequently. However, the
comparison is not possible without two opposite basic standards. Thus, to
introduce the concept of comparison, must have two opposing standards, in turn,
the operation of comparison is necessary to introduce the concept of number.
Arguably, the scientific description of reality is impossible without the
concept of opposites.
In this paper analyzes the concept of opposites, as the basis for the
introduction of the principle of development.
| [
{
"version": "v1",
"created": "Sat, 18 Apr 2009 10:49:05 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2009 09:49:52 GMT"
},
{
"version": "v3",
"created": "Mon, 16 May 2011 08:12:00 GMT"
},
{
"version": "v4",
"created": "Wed, 12 Oct 2011 03:02:38 GMT"
},
{
"version": "v5",
"created": "Thu, 13 Oct 2011 08:13:19 GMT"
}
]
| 2011-10-14T00:00:00 | [
[
"Vishnevksaya",
"Elena S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0904.2861 | Sergei Fedorenko | Sergei V. Fedorenko | A simple algorithm for decoding both errors and erasures of Reed-Solomon
codes | Comments: 6 pages. Proceedings of the Workshop "Coding Theory Days in
St. Petersburg", Russia, October 2008. pp.18-21 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A simple algorithm for decoding both errors and erasures of Reed-Solomon
codes is described.
| [
{
"version": "v1",
"created": "Sat, 18 Apr 2009 17:53:12 GMT"
}
]
| 2009-04-21T00:00:00 | [
[
"Fedorenko",
"Sergei V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2863 | Prabir Barooah | Prabir Barooah, Joao P. Hespanha | Error Scaling Laws for Linear Optimal Estimation from Relative
Measurements | 15 pages, submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2009.2032805 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of estimating vector-valued variables from noisy
"relative" measurements. This problem arises in several sensor network
applications. The measurement model can be expressed in terms of a graph, whose
nodes correspond to the variables and edges to noisy measurements of the
difference between two variables. We take an arbitrary variable as the
reference and consider the optimal (minimum variance) linear unbiased estimate
of the remaining variables.
We investigate how the error in the optimal linear unbiased estimate of a
node variable grows with the distance of the node to the reference node. We
establish a classification of graphs, namely, dense or sparse in Rd,1<= d <=3,
that determines how the linear unbiased optimal estimation error of a node
grows with its distance from the reference node. In particular, if a graph is
dense in 1,2, or 3D, then a node variable's estimation error is upper bounded
by a linear, logarithmic, or bounded function of distance from the reference,
respectively. Corresponding lower bounds are obtained if the graph is sparse in
1, 2 and 3D.
Our results also show that naive measures of graph density, such as node
degree, are inadequate predictors of the estimation error. Being true for the
optimal linear unbiased estimate, these scaling laws determine
algorithm-independent limits on the estimation accuracy achievable in large
graphs.
| [
{
"version": "v1",
"created": "Sat, 18 Apr 2009 19:55:33 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Barooah",
"Prabir",
""
],
[
"Hespanha",
"Joao P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2894 | Pascal Weil | Manfred Kufleitner, Pascal Weil (LaBRI) | On FO2 quantifier alternation over words | null | Mathematical Foundations of Computer Science 2009, slovaque,
R\'epublique (2009) | 10.1007/978-3-642-03816-7_44 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that each level of the quantifier alternation hierarchy within
FO^2[<] -- the 2-variable fragment of the first order logic of order on words
-- is a variety of languages. We then use the notion of condensed rankers, a
refinement of the rankers defined by Weis and Immerman, to produce a decidable
hierarchy of varieties which is interwoven with the quantifier alternation
hierarchy -- and conjecturally equal to it. It follows that the latter
hierarchy is decidable within one unit: given a formula alpha in FO^2[<], one
can effectively compute an integer m such that alpha is equivalent to a formula
with at most m+1 alternating blocks of quantifiers, but not to a formula with
only m-1 blocks. This is a much more precise result than what is known about
the quantifier alternation hierarchy within FO[<], where no decidability result
is known beyond the very first levels.
| [
{
"version": "v1",
"created": "Sun, 19 Apr 2009 08:01:34 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Kufleitner",
"Manfred",
"",
"LaBRI"
],
[
"Weil",
"Pascal",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.2921 | Sidharth Jaggi | Amir-Hamed Mohsenian-Rad, Jianwei Huang, Vincent W.S. Wong, Sidharth
Jaggi, and Robert Schober | Inter-Session Network Coding with Strategic Users: A Game-Theoretic
Analysis of Network Coding | 50 pages. To be presented at ICC 2009. Submitted to IEEE Transactions
on IT | null | 10.1109/TCOMM.2013.021413.110555 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A common assumption in the existing network coding literature is that the
users are cooperative and non-selfish. However, this assumption can be violated
in practice. In this paper, we analyze inter-session network coding in a wired
network using game theory. We assume selfish users acting strategically to
maximize their own utility, leading to a resource allocation game among users.
In particular, we study the well-known butterfly network topology where a
bottleneck link is shared by several network coding and routing flows. We prove
the existence of a Nash equilibrium for a wide range of utility functions. We
show that the number of Nash equilibria can be large (even infinite) for
certain choices of system parameters. This is in sharp contrast to a similar
game setting with traditional packet forwarding where the Nash equilibrium is
always unique. We then characterize the worst-case efficiency bounds, i.e., the
Price-of-Anarchy (PoA), compared to an optimal and cooperative network design.
We show that by using a novel discriminatory pricing scheme which charges
encoded and forwarded packets differently, we can improve the PoA. However,
regardless of the discriminatory pricing scheme being used, the PoA is still
worse than for the case when network coding is not applied. This implies that,
although inter-session network coding can improve performance compared to
ordinary routing, it is significantly more sensitive to users' strategic
behaviour. For example, in a butterfly network where the side links have zero
cost, the efficiency can be as low as 25%. If the side links have non-zero
cost, then the efficiency can further reduce to only 20%. These results
generalize the well-known result of guaranteed 67% worst-case efficiency for
traditional packet forwarding networks.
| [
{
"version": "v1",
"created": "Sun, 19 Apr 2009 14:47:09 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Mohsenian-Rad",
"Amir-Hamed",
""
],
[
"Huang",
"Jianwei",
""
],
[
"Wong",
"Vincent W. S.",
""
],
[
"Jaggi",
"Sidharth",
""
],
[
"Schober",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.2953 | Fahem Kebair | Fahem Kebair and Frederic Serin | Towards an Intelligent System for Risk Prevention and Management | 11 pages | Proceedings of the 5th International ISCRAM Conference. 526-535,
Washington, DC, USA May 2008 | null | null | cs.AI cs.MA | http://creativecommons.org/licenses/by/3.0/ | Making a decision in a changeable and dynamic environment is an arduous task
owing to the lack of information, their uncertainties and the unawareness of
planners about the future evolution of incidents. The use of a decision support
system is an efficient solution of this issue. Such a system can help emergency
planners and responders to detect possible emergencies, as well as to suggest
and evaluate possible courses of action to deal with the emergency. We are
interested in our work to the modeling of a monitoring preventive and emergency
management system, wherein we stress the generic aspect. In this paper we
propose an agent-based architecture of this system and we describe a first step
of our approach which is the modeling of information and their representation
using a multiagent system.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 07:02:54 GMT"
}
]
| 2009-04-21T00:00:00 | [
[
"Kebair",
"Fahem",
""
],
[
"Serin",
"Frederic",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0904.2954 | Fahem Kebair | Fahem Kebair and Frederic Serin | Agent-Based Decision Support System to Prevent and Manage Risk
Situations | 5 pages | null | null | null | cs.AI cs.MA | http://creativecommons.org/licenses/by/3.0/ | The topic of risk prevention and emergency response has become a key social
and political concern. One approach to address this challenge is to develop
Decision Support Systems (DSS) that can help emergency planners and responders
to detect emergencies, as well as to suggest possible course of actions to deal
with the emergency. Our research work comes in this framework and aims to
develop a DSS that must be generic as much as possible and independent from the
case study.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 07:12:01 GMT"
}
]
| 2009-04-21T00:00:00 | [
[
"Kebair",
"Fahem",
""
],
[
"Serin",
"Frederic",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0904.2955 | Rene David | Ren\'e David (LAMA) | A short proof that adding some permutation rules to beta preserves SN | null | null | null | null | math.LO cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I show that, if a term is $SN$ for $\beta$, it remains $SN$ when some
permutation rules are added.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 07:21:04 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2009 08:23:55 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"David",
"René",
"",
"LAMA"
]
]
| [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.3036 | Carl Hewitt | Carl Hewitt | Inconsistency Robustness in Logic Programs | Limits of Classical Logic | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inconsistency robustness is "information system performance in the face of
continually pervasive inconsistencies." A fundamental principle of
Inconsistency Robustness is to make contradictions explicit so that arguments
for and against propositions can be formalized. This paper explores the role of
Inconsistency Robustness in the history and theory of Logic Programs.
Robert Kowalski put forward a bold thesis: "Looking back on our early
discoveries, I value most the discovery that computation could be subsumed by
deduction." However, mathematical logic cannot always infer computational steps
because computational systems make use of arbitration for determining which
message is processed next by a recipient that is sent multiple messages
concurrently. Since reception orders are in general indeterminate, they cannot
be inferred from prior information by mathematical logic alone. Therefore
mathematical logic cannot in general implement computation.
Over the course of history, the term "Functional Program" has grown more
precise and technical as the field has matured. "Logic Program" should be on a
similar trajectory. Accordingly, "Logic Program" should have a general precise
characterization. In the fall of 1972, different characterizations of Logic
Programs that have continued to this day:
* A Logic Program uses Horn-Clause syntax for forward and backward chaining
* Each computational step (according to Actor Model) of a Logic Program is
deductively inferred (e.g. in Direct Logic).
The above examples are illustrative of how issues of inconsistency robustness
have repeatedly arisen in Logic Programs.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 14:07:18 GMT"
},
{
"version": "v10",
"created": "Fri, 18 Jun 2010 16:44:09 GMT"
},
{
"version": "v11",
"created": "Mon, 4 Oct 2010 21:02:55 GMT"
},
{
"version": "v12",
"created": "Mon, 28 Feb 2011 19:02:29 GMT"
},
{
"version": "v13",
"created": "Thu, 3 Mar 2011 01:33:09 GMT"
},
{
"version": "v14",
"created": "Fri, 18 Mar 2011 18:31:18 GMT"
},
{
"version": "v15",
"created": "Tue, 17 May 2011 14:34:20 GMT"
},
{
"version": "v16",
"created": "Tue, 21 Jun 2011 02:36:46 GMT"
},
{
"version": "v17",
"created": "Sun, 26 Jun 2011 23:31:58 GMT"
},
{
"version": "v18",
"created": "Mon, 5 Sep 2011 19:11:43 GMT"
},
{
"version": "v19",
"created": "Sun, 18 Sep 2011 14:07:27 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2009 15:24:23 GMT"
},
{
"version": "v20",
"created": "Mon, 26 Sep 2011 20:47:04 GMT"
},
{
"version": "v21",
"created": "Tue, 11 Oct 2011 06:40:19 GMT"
},
{
"version": "v22",
"created": "Fri, 13 Jan 2012 19:21:20 GMT"
},
{
"version": "v23",
"created": "Sun, 4 Mar 2012 13:53:31 GMT"
},
{
"version": "v24",
"created": "Wed, 20 Jun 2012 21:15:29 GMT"
},
{
"version": "v25",
"created": "Sun, 13 Jan 2013 16:51:38 GMT"
},
{
"version": "v26",
"created": "Tue, 26 Nov 2013 15:26:43 GMT"
},
{
"version": "v27",
"created": "Wed, 1 Jan 2014 02:23:44 GMT"
},
{
"version": "v28",
"created": "Mon, 13 Jan 2014 21:14:32 GMT"
},
{
"version": "v29",
"created": "Mon, 3 Feb 2014 21:37:44 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Apr 2009 19:52:06 GMT"
},
{
"version": "v30",
"created": "Fri, 14 Feb 2014 20:53:33 GMT"
},
{
"version": "v31",
"created": "Mon, 24 Feb 2014 12:36:29 GMT"
},
{
"version": "v32",
"created": "Mon, 3 Mar 2014 20:07:10 GMT"
},
{
"version": "v33",
"created": "Sun, 9 Mar 2014 22:19:34 GMT"
},
{
"version": "v34",
"created": "Mon, 24 Mar 2014 22:10:32 GMT"
},
{
"version": "v35",
"created": "Sun, 4 May 2014 21:48:36 GMT"
},
{
"version": "v36",
"created": "Wed, 23 Jul 2014 20:25:43 GMT"
},
{
"version": "v37",
"created": "Tue, 4 Nov 2014 20:43:00 GMT"
},
{
"version": "v38",
"created": "Sun, 23 Nov 2014 23:13:49 GMT"
},
{
"version": "v39",
"created": "Mon, 29 Dec 2014 18:41:01 GMT"
},
{
"version": "v4",
"created": "Mon, 27 Apr 2009 08:22:06 GMT"
},
{
"version": "v40",
"created": "Tue, 17 Feb 2015 18:30:46 GMT"
},
{
"version": "v41",
"created": "Mon, 2 Mar 2015 06:23:10 GMT"
},
{
"version": "v5",
"created": "Mon, 29 Jun 2009 15:37:33 GMT"
},
{
"version": "v6",
"created": "Thu, 13 Aug 2009 07:30:37 GMT"
},
{
"version": "v7",
"created": "Sat, 31 Oct 2009 21:59:49 GMT"
},
{
"version": "v8",
"created": "Thu, 3 Dec 2009 15:57:46 GMT"
},
{
"version": "v9",
"created": "Mon, 26 Apr 2010 13:24:20 GMT"
}
]
| 2015-03-03T00:00:00 | [
[
"Hewitt",
"Carl",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.3060 | Yingyu Zhang | Heping Hu, Yingyu Zhang, Zhengding Lu | An efficient quantum search engine on unsorted database | 7 pages, 1 figure | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of finding one or more desired items out of an
unsorted database. Patel has shown that if the database permits quantum
queries, then mere digitization is sufficient for efficient search for one
desired item. The algorithm, called factorized quantum search algorithm,
presented by him can locate the desired item in an unsorted database using
$O(log_{4}N)$ queries to factorized oracles. But the algorithm requires that
all the property values must be distinct from each other. In this paper, we
discuss how to make a database satisfy the requirements, and present a quantum
search engine based on the algorithm. Our goal is achieved by introducing
auxiliary files for the property values that are not distinct, and converting
every complex query request into a sequence of calls to factorized quantum
search algorithm. The query complexity of our algorithm is $O(P*Q*M*log_{4}N)$,
where P is the number of the potential simple query requests in the complex
query request, Q is the maximum number of calls to the factorized quantum
search algorithm of the simple queries, M is the number of the auxiliary files
for the property on which our algorithm are searching for desired items. This
implies that to manage an unsorted database on an actual quantum computer is
possible and efficient.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 15:43:06 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Hu",
"Heping",
""
],
[
"Zhang",
"Yingyu",
""
],
[
"Lu",
"Zhengding",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3062 | Mikl\'os Cs\H{u}r\"os | Miklos Csuros | Approximate counting with a floating-point counter | Updated content (fixed errors in the previous version) | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Memory becomes a limiting factor in contemporary applications, such as
analyses of the Webgraph and molecular sequences, when many objects need to be
counted simultaneously. Robert Morris [Communications of the ACM, 21:840--842,
1978] proposed a probabilistic technique for approximate counting that is
extremely space-efficient. The basic idea is to increment a counter containing
the value $X$ with probability $2^{-X}$. As a result, the counter contains an
approximation of $\lg n$ after $n$ probabilistic updates stored in $\lg\lg n$
bits. Here we revisit the original idea of Morris, and introduce a binary
floating-point counter that uses a $d$-bit significand in conjunction with a
binary exponent. The counter yields a simple formula for an unbiased estimation
of $n$ with a standard deviation of about $0.6\cdot n2^{-d/2}$, and uses
$d+\lg\lg n$ bits.
We analyze the floating-point counter's performance in a general framework
that applies to any probabilistic counter, and derive practical formulas to
assess its accuracy.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 15:53:33 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Aug 2009 05:10:03 GMT"
}
]
| 2009-08-24T00:00:00 | [
[
"Csuros",
"Miklos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3063 | Juan J. Merelo Pr. | C. M. Fernandes, J.J. Merelo and A.C. Rosa | Using Dissortative Mating Genetic Algorithms to Track the Extrema of
Dynamic Deceptive Functions | Technical report complementing Carlos Fernandes' PhD | null | null | null | cs.NE | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Traditional Genetic Algorithms (GAs) mating schemes select individuals for
crossover independently of their genotypic or phenotypic similarities. In
Nature, this behaviour is known as random mating. However, non-random schemes -
in which individuals mate according to their kinship or likeness - are more
common in natural systems. Previous studies indicate that, when applied to GAs,
negative assortative mating (a specific type of non-random mating, also known
as dissortative mating) may improve their performance (on both speed and
reliability) in a wide range of problems. Dissortative mating maintains the
genetic diversity at a higher level during the run, and that fact is frequently
observed as an explanation for dissortative GAs ability to escape local optima
traps. Dynamic problems, due to their specificities, demand special care when
tuning a GA, because diversity plays an even more crucial role than it does
when tackling static ones. This paper investigates the behaviour of
dissortative mating GAs, namely the recently proposed Adaptive Dissortative
Mating GA (ADMGA), on dynamic trap functions. ADMGA selects parents according
to their Hamming distance, via a self-adjustable threshold value. The method,
by keeping population diversity during the run, provides an effective means to
deal with dynamic problems. Tests conducted with deceptive and nearly deceptive
trap functions indicate that ADMGA is able to outperform other GAs, some
specifically designed for tracking moving extrema, on a wide range of tests,
being particularly effective when speed of change is not very fast. When
comparing the algorithm to a previously proposed dissortative GA, results show
that performance is equivalent on the majority of the experiments, but ADMGA
performs better when solving the hardest instances of the test set.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 15:57:20 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Fernandes",
"C. M.",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Rosa",
"A. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0904.3074 | Misha Popov A | Michael A. Popov | P vs NP Problem in the field anthropology | null | null | null | null | cs.OH | http://creativecommons.org/licenses/by-nc-sa/3.0/ | An attempt of a new kind of complexity anthropology is considered.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 17:16:06 GMT"
}
]
| 2009-04-21T00:00:00 | [
[
"Popov",
"Michael A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3087 | Arnaud Casteigts | Arnaud Casteigts (LaBRI), Serge Chaumette (LaBRI), Fr\'ed\'eric
Guinand (LITIS), Yoann Pign\'e (LITIS) | Distributed Maintenance of Anytime Available Spanning Trees in Dynamic
Networks | Distributed Maintenance of Anytime Available Spanning Trees in
Dynamic Networks, Poland (2013) | null | null | null | cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of building and maintaining distributed spanning trees
in highly dynamic networks, in which topological events can occur at any time
and any rate, and no stable periods can be assumed. In these harsh
environments, we strive to preserve some properties such as cycle-freeness or
the existence of a root in each tree, in order to make it possible to keep
using the trees uninterruptedly (to a possible extent). Our algorithm operates
at a coarse-grain level, using atomic pairwise interactions in a way akin to
recent population protocol models. The algorithm relies on a perpetual
alternation of \emph{topology-induced splittings} and \emph{computation-induced
mergings} of a forest of spanning trees. Each tree in the forest hosts exactly
one token (also called root) that performs a random walk {\em inside} the tree,
switching parent-child relationships as it crosses edges. When two tokens are
located on both sides of a same edge, their trees are merged upon this edge and
one token disappears. Whenever an edge that belongs to a tree disappears, its
child endpoint regenerates a new token instantly. The main features of this
approach is that both \emph{merging} and \emph{splitting} are purely localized
phenomenons. In this paper, we present and motivate the algorithm, and we prove
its correctness in arbitrary dynamic networks. Then we discuss several
implementation choices around this general principle. Preliminary results
regarding its analysis are also discussed, in particular an analytical
expression of the expected merging time for two given trees in a static
context.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 18:50:09 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Mar 2013 09:32:17 GMT"
},
{
"version": "v3",
"created": "Mon, 29 Apr 2013 09:25:52 GMT"
},
{
"version": "v4",
"created": "Mon, 22 Jul 2013 19:31:36 GMT"
}
]
| 2013-07-23T00:00:00 | [
[
"Casteigts",
"Arnaud",
"",
"LaBRI"
],
[
"Chaumette",
"Serge",
"",
"LaBRI"
],
[
"Guinand",
"Frédéric",
"",
"LITIS"
],
[
"Pigné",
"Yoann",
"",
"LITIS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.3093 | Petteri Kaski | Andreas Bj\"orklund and Thore Husfeldt and Petteri Kaski and Mikko
Koivisto | Counting Paths and Packings in Halves | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that one can count $k$-edge paths in an $n$-vertex graph and
$m$-set $k$-packings on an $n$-element universe, respectively, in time ${n
\choose k/2}$ and ${n \choose mk/2}$, up to a factor polynomial in $n$, $k$,
and $m$; in polynomial space, the bounds hold if multiplied by $3^{k/2}$ or
$5^{mk/2}$, respectively. These are implications of a more general result:
given two set families on an $n$-element universe, one can count the disjoint
pairs of sets in the Cartesian product of the two families with $\nO(n \ell)$
basic operations, where $\ell$ is the number of members in the two families and
their subsets.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 19:46:39 GMT"
}
]
| 2009-04-21T00:00:00 | [
[
"Björklund",
"Andreas",
""
],
[
"Husfeldt",
"Thore",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Koivisto",
"Mikko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.3116 | Daniil Musatov | Daniil Musatov, Andrei Romashchenko, Alexander Shen | Variations on Muchnik's Conditional Complexity Theorem | 24 pages, 1 figure, presented at CSR2009 | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Muchnik's theorem about simple conditional descriptions states that for all
strings $a$ and $b$ there exists a short program $p$ transforming $a$ to $b$
that has the least possible length and is simple conditional on $b$. In this
paper we present two new proofs of this theorem. The first one is based on the
on-line matching algorithm for bipartite graphs. The second one, based on
extractors, can be generalized to prove a version of Muchnik's theorem for
space-bounded Kolmogorov complexity.
| [
{
"version": "v1",
"created": "Mon, 20 Apr 2009 21:05:09 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Oct 2009 17:58:42 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Aug 2010 14:13:23 GMT"
},
{
"version": "v4",
"created": "Fri, 18 Mar 2011 12:33:43 GMT"
}
]
| 2011-03-21T00:00:00 | [
[
"Musatov",
"Daniil",
""
],
[
"Romashchenko",
"Andrei",
""
],
[
"Shen",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.3148 | Hao Chen | Hao Chen | CRT-Based High Speed Parallel Architecture for Long BCH Encoding | 3 pages | null | null | null | cs.AR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | BCH (Bose-Chaudhuri-Hocquenghen) error correcting codes ([1]-[2]) are now
widely used in communication systems and digital technology. Direct LFSR(linear
feedback shifted register)-based encoding of a long BCH code suffers from
serial-in and serial-out limitation and large fanout effect of some XOR gates.
This makes the LFSR-based encoders of long BCH codes cannot keep up with the
data transmission speed in some applications. Several parallel long parallel
encoders for long cyclic codes have been proposed in [3]-[8]. The technique for
eliminating the large fanout effect by J-unfolding method and some algebraic
manipulation was presented in [7] and [8] . In this paper we propose a
CRT(Chinese Remainder Theorem)-based parallel architecture for long BCH
encoding. Our novel technique can be used to eliminate the fanout bottleneck.
The only restriction on the speed of long BCH encoding of our CRT-based
architecture is $log_2N$, where $N$ is the length of the BCH code.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 00:34:43 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Chen",
"Hao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3151 | Takeaki Uno | Takeaki Uno, Masashi Sugiyama, Koji Tsuda | Efficient Construction of Neighborhood Graphs by the Multiple Sorting
Method | null | null | null | null | cs.DS cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Neighborhood graphs are gaining popularity as a concise data representation
in machine learning. However, naive graph construction by pairwise distance
calculation takes $O(n^2)$ runtime for $n$ data points and this is
prohibitively slow for millions of data points. For strings of equal length,
the multiple sorting method (Uno, 2008) can construct an $\epsilon$-neighbor
graph in $O(n+m)$ time, where $m$ is the number of $\epsilon$-neighbor pairs in
the data. To introduce this remarkably efficient algorithm to continuous
domains such as images, signals and texts, we employ a random projection method
to convert vectors to strings. Theoretical results are presented to elucidate
the trade-off between approximation quality and computation time. Empirical
results show the efficiency of our method in comparison to fast nearest
neighbor alternatives.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 01:03:06 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Uno",
"Takeaki",
""
],
[
"Sugiyama",
"Masashi",
""
],
[
"Tsuda",
"Koji",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.3157 | Zhilin Wu | Stephane Grumbach (INRIA Liama), Fang Wang (ISCAS Sklcs) and Zhilin Wu
(CASIA Liama) | On the distributed evaluation of recursive queries over graphs | 28 pages, 0 figures, NOTERE 2009 | null | null | null | cs.LO cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Logical formalisms such as first-order logic (FO) and fixpoint logic (FP) are
well suited to express in a declarative manner fundamental graph
functionalities required in distributed systems. We show that these logics
constitute good abstractions for programming distributed systems as a whole,
since they can be evaluated in a fully distributed manner with reasonable
complexity upper-bounds. We first prove that FO and FP can be evaluated with a
polynomial number of messages of logarithmic size. We then show that the
(global) logical formulas can be translated into rule programs describing the
local behavior of the nodes of the distributed system, which compute equivalent
results. Finally, we introduce local fragments of these logics, which preserve
as much as possible the locality of their distributed computation, while
offering a rich expressive power for networking functionalities. We prove that
they admit tighter upper-bounds with bounded number of messages of bounded
size. Finally, we show that the semantics and the complexity of the local
fragments are preserved over locally consistent networks as well as anonymous
networks, thus showing the robustness of the proposed local logical formalisms.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 02:24:13 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Grumbach",
"Stephane",
"",
"INRIA Liama"
],
[
"Wang",
"Fang",
"",
"ISCAS Sklcs"
],
[
"Wu",
"Zhilin",
"",
"CASIA Liama"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0904.3165 | Roy Yates | David Tse, Roy Yates | Fading Broadcast Channels with State Information at the Receivers | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Despite considerable progress on the information-theoretic broadcast channel,
the capacity region of fading broadcast channels with channel state known at
the receivers but unknown at the transmitter remains unresolved. We address
this subject by introducing a layered erasure broadcast channel model in which
each component channel has a state that specifies the received signal levels in
an instance of a deterministic binary expansion channel. We find the capacity
region of this class of broadcast channels. The capacity achieving strategy
assigns each signal level to the user that derives the maximum expected rate
from that level. The outer bound is based on a channel enhancement that creates
a degraded broadcast channel for which the capacity region is known. This same
approach is then used to find inner and outer bounds to the capacity region of
fading Gaussian broadcast channels. The achievability scheme employs a
superposition of binary inputs. For intermittent AWGN channels and for Rayleigh
fading channels, the achievable rates are observed to be with 1-2 bits of the
outer bound at high SNR. We also prove that the achievable rate region is
within 6.386 bits/s/Hz of the capacity region for all fading AWGN broadcast
channels.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 06:11:07 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Tse",
"David",
""
],
[
"Yates",
"Roy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3169 | Christoph Durr | Christoph Durr and Flavio Guinez and Martin Matamala | Reconstructing 3-colored grids from horizontal and vertical projections
is NP-hard | null | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of coloring a grid using k colors with the
restriction that in each row and each column has an specific number of cells of
each color. In an already classical result, Ryser obtained a necessary and
sufficient condition for the existence of such a coloring when two colors are
considered. This characterization yields a linear time algorithm for
constructing such a coloring when it exists. Gardner et al. showed that for
k>=7 the problem is NP-hard. Afterward Chrobak and Durr improved this result,
by proving that it remains NP-hard for k>=4. We solve the gap by showing that
for 3 colors the problem is already NP-hard. Besides we also give some results
on tiling tomography problems.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 08:55:44 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Durr",
"Christoph",
""
],
[
"Guinez",
"Flavio",
""
],
[
"Matamala",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.3183 | Fredrik Kuivinen | Fredrik Kuivinen | On the Complexity of Submodular Function Minimisation on Diamonds | 31 pages, 2 figures | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $(L; \sqcap, \sqcup)$ be a finite lattice and let $n$ be a positive
integer. A function $f : L^n \to \mathbb{R}$ is said to be submodular if
$f(\tup{a} \sqcap \tup{b}) + f(\tup{a} \sqcup \tup{b}) \leq f(\tup{a}) +
f(\tup{b})$ for all $\tup{a}, \tup{b} \in L^n$. In this paper we study
submodular functions when $L$ is a diamond. Given oracle access to $f$ we are
interested in finding $\tup{x} \in L^n$ such that $f(\tup{x}) = \min_{\tup{y}
\in L^n} f(\tup{y})$ as efficiently as possible.
We establish a min--max theorem, which states that the minimum of the
submodular function is equal to the maximum of a certain function defined over
a certain polyhedron; and a good characterisation of the minimisation problem,
i.e., we show that given an oracle for computing a submodular $f : L^n \to
\mathbb{Z}$ and an integer $m$ such that $\min_{\tup{x} \in L^n} f(\tup{x}) =
m$, there is a proof of this fact which can be verified in time polynomial in
$n$ and $\max_{\tup{t} \in L^n} \log |f(\tup{t})|$; and a pseudo-polynomial
time algorithm for the minimisation problem, i.e., given an oracle for
computing a submodular $f : L^n \to \mathbb{Z}$ one can find $\min_{\tup{t} \in
L^n} f(\tup{t})$ in time bounded by a polynomial in $n$ and $\max_{\tup{t} \in
L^n} |f(\tup{t})|$.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 12:41:07 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Kuivinen",
"Fredrik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.3215 | Cl\'emence Magnien | Oussama Allali (1), Matthieu Latapy (1) and Clemence Magnien (1) ((1)
LIP6 (CNRS - UPMC)) | Measurement of eDonkey Activity with Distributed Honeypots | Hot-P2P Sixth International Workshop on Hot Topics in Peer-to-Peer
Systems (Hot-P2P 2009), May 29, 2009, Rome, Italy | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collecting information about user activity in peer-to-peer systems is a key
but challenging task. We describe here a distributed platform for doing so on
the eDonkey network, relying on a group of honeypot peers which claim to have
certain files and log queries they receive for these files. We then conduct
some measurements with typical scenarios and use the obtained data to analyze
the impact of key parameters like measurement duration, number of honeypots
involved, and number of advertised files. This illustrates both the possible
uses of our measurement system, and the kind of data one may collect using it.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 10:36:17 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Allali",
"Oussama",
""
],
[
"Latapy",
"Matthieu",
""
],
[
"Magnien",
"Clemence",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.3222 | Cl\'emence Magnien | Fabien Tarissan (1), Matthieu Latapy (2) and Christophe Prieur (3)
((1) ISC (CNRS - Ecole Polytechnique), (2) LIP6 (CNRS - UPMC), (3) LIAFA
(Universite Paris Diderot)) | Efficient Measurement of Complex Networks Using Link Queries | Proceedings of the IEEE International Workshop on Network Science For
Communication Networks (NetSciCom'09) | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex networks are at the core of an intense research activity. However, in
most cases, intricate and costly measurement procedures are needed to explore
their structure. In some cases, these measurements rely on link queries: given
two nodes, it is possible to test the existence of a link between them. These
tests may be costly, and thus minimizing their number while maximizing the
number of discovered links is a key issue. This paper studies this problem: we
observe that properties classically observed on real-world complex networks
give hints for their efficient measurement; we derive simple principles and
several measurement strategies based on this, and experimentally evaluate their
efficiency on real-world cases. In order to do so, we introduce methods to
evaluate the efficiency of strategies. We also explore the bias that different
measurement strategies may induce.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 13:41:47 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Tarissan",
"Fabien",
""
],
[
"Latapy",
"Matthieu",
""
],
[
"Prieur",
"Christophe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.3243 | Manuel Oriol | Manuel Oriol | The Business of Selling Electronic Documents | 6 pages | null | null | null | cs.GL cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The music industry has huge troubles adapting to the new technologies. As
many pointed out, when copying music is essentially free and socially accepted
it becomes increasingly tempting for users to infringe copyrights and copy
music from one person to another. The answer of the music industry is to outlaw
a majority of citizens. This article describes how the music industry should
reinvent itself and adapt to a world where the network is ubiquitous and
exchanging information is essentially free. It relies on adapting prices to the
demand and lower costs of electronic documents in a dramatic way.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 13:00:15 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Oriol",
"Manuel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0904.3251 | Petteri Kaski | Andreas Bj\"orklund and Thore Husfeldt and Petteri Kaski and Mikko
Koivisto | On evaluation of permanents | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the time and space complexity of matrix permanents over rings and
semirings.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 13:37:21 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Björklund",
"Andreas",
""
],
[
"Husfeldt",
"Thore",
""
],
[
"Kaski",
"Petteri",
""
],
[
"Koivisto",
"Mikko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.3273 | John Hamel Dr. | John S. Hamel | A Thermodynamic Turing Machine: Artificial Molecular Computing Using
Classical Reversible Logic Switching Networks | Version 2 eliminates two erroneous figures (4 and 5 in version 1) and
adds a new section containing circuit examples of how to implement Hadamard
transforms in one step for Deutsch, Bernstein Vazirani and Simon problems | null | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discusses how to implement certain classes of quantum computer
algorithms using classical discrete switching networks that are amenable to
implementation in main stream CMOS transistor IC technology. The methods differ
from other classical approaches in that asynchronous feedback is exploited in
classical transistor reversible logic circuits to implement the Hadamard
transform in one simultaneous step over all qubits as in a true quantum
computer. The Simon problem is used as an example. The method is used to
provide an order n execution speed method for the Gaussian elimination step in
the Simon problem. The approach is referred to as a Thermodynamic Turing
Machine in that it behaves like an artificial molecule where solutions to a
problem are found by evolving the classical circuits from one thermodynamic
equilibrium state to another.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 15:39:45 GMT"
},
{
"version": "v2",
"created": "Thu, 14 May 2009 17:56:45 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Hamel",
"John S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0904.3310 | Shariq Bashir Mr. | Shariq Bashir, Abdul Rauf Baig | FastLMFI: An Efficient Approach for Local Maximal Patterns Propagation
and Maximal Patterns Superset Checking | 8 Pages, In the proceedings of 4th ACS/IEEE International Conference
on Computer Systems and Applications 2006, March 8, 2006, Dubai/Sharjah, UAE,
2006, Page(s) 452-459 | null | 10.1109/AICCSA.2006.205130 | null | cs.DB cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximal frequent patterns superset checking plays an important role in the
efficient mining of complete Maximal Frequent Itemsets (MFI) and maximal search
space pruning. In this paper we present a new indexing approach, FastLMFI for
local maximal frequent patterns (itemset) propagation and maximal patterns
superset checking. Experimental results on different sparse and dense datasets
show that our work is better than the previous well known progressive focusing
technique. We have also integrated our superset checking approach with an
existing state of the art maximal itemsets algorithm Mafia, and compare our
results with current best maximal itemsets algorithms afopt-max and FP
(zhu)-max. Our results outperform afopt-max and FP (zhu)-max on dense (chess
and mushroom) datasets on almost all support thresholds, which shows the
effectiveness of our approach.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 18:33:04 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Bashir",
"Shariq",
""
],
[
"Baig",
"Abdul Rauf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3312 | Shariq Bashir Mr. | Shariq Bashir, and Abdul Rauf Baig | HybridMiner: Mining Maximal Frequent Itemsets Using Hybrid Database
Representation Approach | 8 Pages In the proceedings of 9th IEEE-INMIC 2005, Karachi, Pakistan,
2005 | null | 10.1109/INMIC.2005.334484 | null | cs.DB cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a novel hybrid (arraybased layout and vertical
bitmap layout) database representation approach for mining complete Maximal
Frequent Itemset (MFI) on sparse and large datasets. Our work is novel in terms
of scalability, item search order and two horizontal and vertical projection
techniques. We also present a maximal algorithm using this hybrid database
representation approach. Different experimental results on real and sparse
benchmark datasets show that our approach is better than previous state of art
maximal algorithms.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 18:38:25 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Bashir",
"Shariq",
""
],
[
"Baig",
"Abdul Rauf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3316 | Shariq Bashir Mr. | Shariq Bashir, and Abdul Rauf Baig | Ramp: Fast Frequent Itemset Mining with Efficient Bit-Vector Projection
Technique | null | null | null | null | cs.DB cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mining frequent itemset using bit-vector representation approach is very
efficient for dense type datasets, but highly inefficient for sparse datasets
due to lack of any efficient bit-vector projection technique. In this paper we
present a novel efficient bit-vector projection technique, for sparse and dense
datasets. To check the efficiency of our bit-vector projection technique, we
present a new frequent itemset mining algorithm Ramp (Real Algorithm for Mining
Patterns) build upon our bit-vector projection technique. The performance of
the Ramp is compared with the current best (all, maximal and closed) frequent
itemset mining algorithms on benchmark datasets. Different experimental results
on sparse and dense datasets show that mining frequent itemset using Ramp is
faster than the current best algorithms, which show the effectiveness of our
bit-vector projection idea. We also present a new local maximal frequent
itemsets propagation and maximal itemset superset checking approach FastLMFI,
build upon our PBR bit-vector projection technique. Our different computational
experiments suggest that itemset maximality checking using FastLMFI is fast and
efficient than a previous will known progressive focusing approach.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 18:49:13 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Bashir",
"Shariq",
""
],
[
"Baig",
"Abdul Rauf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3319 | Shariq Bashir Mr. | Shariq Bashir, Zahoor Jan, Abdul Rauf Baig | Fast Algorithms for Mining Interesting Frequent Itemsets without Minimum
Support | 25 Pages | null | null | null | cs.DB cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Real world datasets are sparse, dirty and contain hundreds of items. In such
situations, discovering interesting rules (results) using traditional frequent
itemset mining approach by specifying a user defined input support threshold is
not appropriate. Since without any domain knowledge, setting support threshold
small or large can output nothing or a large number of redundant uninteresting
results. Recently a novel approach of mining only N-most/Top-K interesting
frequent itemsets has been proposed, which discovers the top N interesting
results without specifying any user defined support threshold. However, mining
interesting frequent itemsets without minimum support threshold are more costly
in terms of itemset search space exploration and processing cost. Thereby, the
efficiency of their mining highly depends upon three main factors (1) Database
representation approach used for itemset frequency counting, (2) Projection of
relevant transactions to lower level nodes of search space and (3) Algorithm
implementation technique. Therefore, to improve the efficiency of mining
process, in this paper we present two novel algorithms called (N-MostMiner and
Top-K-Miner) using the bit-vector representation approach which is very
efficient in terms of itemset frequency counting and transactions projection.
In addition to this, several efficient implementation techniques of N-MostMiner
and Top-K-Miner are also present which we experienced in our implementation.
Our experimental results on benchmark datasets suggest that the NMostMiner and
Top-K-Miner are very efficient in terms of processing time as compared to
current best algorithms BOMO and TFP.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 19:07:35 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Bashir",
"Shariq",
""
],
[
"Jan",
"Zahoor",
""
],
[
"Baig",
"Abdul Rauf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3320 | Shariq Bashir Mr. | Shariq Bashir, Saad Razzaq, Umer Maqbool, Sonya Tahir, Abdul Rauf Baig | Using Association Rules for Better Treatment of Missing Values | null | null | null | null | cs.DB cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The quality of training data for knowledge discovery in databases (KDD) and
data mining depends upon many factors, but handling missing values is
considered to be a crucial factor in overall data quality. Today real world
datasets contains missing values due to human, operational error, hardware
malfunctioning and many other factors. The quality of knowledge extracted,
learning and decision problems depend directly upon the quality of training
data. By considering the importance of handling missing values in KDD and data
mining tasks, in this paper we propose a novel Hybrid Missing values Imputation
Technique (HMiT) using association rules mining and hybrid combination of
k-nearest neighbor approach. To check the effectiveness of our HMiT missing
values imputation technique, we also perform detail experimental results on
real world datasets. Our results suggest that the HMiT technique is not only
better in term of accuracy but it also take less processing time as compared to
current best missing values imputation technique based on k-nearest neighbor
approach, which shows the effectiveness of our missing values imputation
technique.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 19:09:57 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Bashir",
"Shariq",
""
],
[
"Razzaq",
"Saad",
""
],
[
"Maqbool",
"Umer",
""
],
[
"Tahir",
"Sonya",
""
],
[
"Baig",
"Abdul Rauf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3321 | Shariq Bashir Mr. | Shariq Bashir, Saad Razzaq, Umer Maqbool, Sonya Tahir, Abdul Rauf Baig | Introducing Partial Matching Approach in Association Rules for Better
Treatment of Missing Values | null | null | null | null | cs.DB cs.AI cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Handling missing values in training datasets for constructing learning models
or extracting useful information is considered to be an important research task
in data mining and knowledge discovery in databases. In recent years, lot of
techniques are proposed for imputing missing values by considering attribute
relationships with missing value observation and other observations of training
dataset. The main deficiency of such techniques is that, they depend upon
single approach and do not combine multiple approaches, that why they are less
accurate. To improve the accuracy of missing values imputation, in this paper
we introduce a novel partial matching concept in association rules mining,
which shows better results as compared to full matching concept that we
described in our previous work. Our imputation technique combines the partial
matching concept in association rules with k-nearest neighbor approach. Since
this is a hybrid technique, therefore its accuracy is much better than as
compared to those techniques which depend upon single approach. To check the
efficiency of our technique, we also provide detail experimental results on
number of benchmark datasets which show better results as compared to previous
approaches.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 19:16:00 GMT"
}
]
| 2009-04-22T00:00:00 | [
[
"Bashir",
"Shariq",
""
],
[
"Razzaq",
"Saad",
""
],
[
"Maqbool",
"Umer",
""
],
[
"Tahir",
"Sonya",
""
],
[
"Baig",
"Abdul Rauf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3325 | Michael Ummels | Michael Ummels and Dominik Wojtczak | Decision Problems for Nash Equilibria in Stochastic Games | 22 pages, revised version | null | 10.1007/978-3-642-04027-6_37 | EDI-INF-RR-1325 | cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyse the computational complexity of finding Nash equilibria in
stochastic multiplayer games with $\omega$-regular objectives. While the
existence of an equilibrium whose payoff falls into a certain interval may be
undecidable, we single out several decidable restrictions of the problem.
First, restricting the search space to stationary, or pure stationary,
equilibria results in problems that are typically contained in PSPACE and NP,
respectively. Second, we show that the existence of an equilibrium with a
binary payoff (i.e. an equilibrium where each player either wins or loses with
probability 1) is decidable. We also establish that the existence of a Nash
equilibrium with a certain binary payoff entails the existence of an
equilibrium with the same payoff in pure, finite-state strategies.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 19:53:36 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Apr 2009 21:01:30 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Jun 2009 17:15:29 GMT"
}
]
| 2010-06-24T00:00:00 | [
[
"Ummels",
"Michael",
""
],
[
"Wojtczak",
"Dominik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.3340 | Ioannis Kontoyiannis | Chris Gioran, Ioannis Kontoyiannis | Lossy Compression in Near-Linear Time via Efficient Random Codebooks and
Databases | 23 pages, four figures, four tables | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The compression-complexity trade-off of lossy compression algorithms that are
based on a random codebook or a random database is examined. Motivated, in
part, by recent results of Gupta-Verd\'{u}-Weissman (GVW) and their underlying
connections with the pattern-matching scheme of Kontoyiannis' lossy Lempel-Ziv
algorithm, we introduce a non-universal version of the lossy Lempel-Ziv method
(termed LLZ). The optimality of LLZ for memoryless sources is established, and
its performance is compared to that of the GVW divide-and-conquer approach.
Experimental results indicate that the GVW approach often yields better
compression than LLZ, but at the price of much higher memory requirements. To
combine the advantages of both, we introduce a hybrid algorithm (HYB) that
utilizes both the divide-and-conquer idea of GVW and the single-database
structure of LLZ. It is proved that HYB shares with GVW the exact same
rate-distortion performance and implementation complexity, while, like LLZ,
requiring less memory, by a factor which may become unbounded, depending on the
choice or the relevant design parameters. Experimental results are also
presented, illustrating the performance of all three methods on data generated
by simple discrete memoryless sources. In particular, the HYB algorithm is
shown to outperform existing schemes for the compression of some simple
discrete sources with respect to the Hamming distortion criterion.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 20:54:29 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Gioran",
"Chris",
""
],
[
"Kontoyiannis",
"Ioannis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3351 | Majid Fozunbal | Majid Fozunbal | A Subsequence-Histogram Method for Generic Vocabulary Recognition over
Deletion Channels | 5 pages, International Symposium on Information Theory (ISIT) 2009 | null | null | HP Labs Technical Report HPL-2009-2 | cs.IT cs.DS math.IT stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of recognizing a vocabulary--a collection of words
(sequences) over a finite alphabet--from a potential subsequence of one of its
words. We assume the given subsequence is received through a deletion channel
as a result of transmission of a random word from one of the two generic
underlying vocabularies. An exact maximum a posterior (MAP) solution for this
problem counts the number of ways a given subsequence can be derived from
particular subsets of candidate vocabularies, requiring exponential time or
space.
We present a polynomial approximation algorithm for this problem. The
algorithm makes no prior assumption about the rules and patterns governing the
structure of vocabularies. Instead, through off-line processing of
vocabularies, it extracts data regarding regularity patterns in the
subsequences of each vocabulary. In the recognition phase, the algorithm just
uses this data, called subsequence-histogram, to decide in favor of one of the
vocabularies. We provide examples to demonstrate the performance of the
algorithm and show that it can achieve the same performance as MAP in some
situations.
Potential applications include bioinformatics, storage systems, and search
engines.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 21:47:19 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Fozunbal",
"Majid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0904.3352 | Istvan Szita | Istvan Szita, Andras Lorincz | Optimistic Initialization and Greediness Lead to Polynomial Time
Learning in Factored MDPs - Extended Version | This paper is the extended version of a similarly named paper
appearing in ICML'09, containing the rigorous proofs of the main theorem | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we propose an algorithm for polynomial-time reinforcement
learning in factored Markov decision processes (FMDPs). The factored optimistic
initial model (FOIM) algorithm, maintains an empirical model of the FMDP in a
conventional way, and always follows a greedy policy with respect to its model.
The only trick of the algorithm is that the model is initialized
optimistically. We prove that with suitable initialization (i) FOIM converges
to the fixed point of approximate value iteration (AVI); (ii) the number of
steps when the agent makes non-near-optimal decisions (with respect to the
solution of AVI) is polynomial in all relevant quantities; (iii) the per-step
costs of the algorithm are also polynomial. To our best knowledge, FOIM is the
first algorithm with these properties. This extended version contains the
rigorous proofs of the main theorem. A version of this paper appeared in
ICML'09.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 22:07:24 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Szita",
"Istvan",
""
],
[
"Lorincz",
"Andras",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.3356 | Yoav Freund | Yoav Freund | A method for Hedging in continuous time | null | null | null | null | cs.IT cs.AI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a method for hedging in continuous time.
| [
{
"version": "v1",
"created": "Tue, 21 Apr 2009 22:34:08 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Apr 2009 17:07:14 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Oct 2009 00:04:59 GMT"
}
]
| 2009-10-14T00:00:00 | [
[
"Freund",
"Yoav",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0904.3366 | Kai Salomaa | Mark Daley, Michael Domaratzki, Kai Salomaa | State complexity of orthogonal catenation | DCFS 2008 | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A language $L$ is the orthogonal catenation of languages $L_1$ and $L_2$ if
every word of $L$ can be written in a unique way as a catenation of a word in
$L_1$ and a word in $L_2$. We establish a tight bound for the state complexity
of orthogonal catenation of regular languages. The bound is smaller than the
bound for arbitrary catenation.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 01:04:06 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Daley",
"Mark",
""
],
[
"Domaratzki",
"Michael",
""
],
[
"Salomaa",
"Kai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0904.3395 | Guilhem Semerjian | Federico Ricci-Tersenghi and Guilhem Semerjian | On the cavity method for decimated random constraint satisfaction
problems and the analysis of belief propagation guided decimation algorithms | 32 pages, 24 figures | J Stat. Mech. P09001 (2009) | 10.1088/1742-5468/2009/09/P09001 | null | cond-mat.dis-nn cond-mat.stat-mech cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a version of the cavity method for diluted mean-field spin
models that allows the computation of thermodynamic quantities similar to the
Franz-Parisi quenched potential in sparse random graph models. This method is
developed in the particular case of partially decimated random constraint
satisfaction problems. This allows to develop a theoretical understanding of a
class of algorithms for solving constraint satisfaction problems, in which
elementary degrees of freedom are sequentially assigned according to the
results of a message passing procedure (belief-propagation). We confront this
theoretical analysis to the results of extensive numerical simulations.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 08:05:48 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Ricci-Tersenghi",
"Federico",
""
],
[
"Semerjian",
"Guilhem",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.3420 | Vandani Verma | Sunder Lal and Vandani Verma | Identity Based Strong Designated Verifier Parallel Multi-Proxy Signature
Scheme | 6 pages, 2 tables | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new identity based strong designated verifier parallel
multi-proxy signature scheme. Multi-Proxy signatures allow the original signer
to delegate his signing power to a group of proxy signers. In our scheme, the
designated verifier can only validate proxy signatures created by a group of
proxy signer.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 10:07:16 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Verma",
"Vandani",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.3422 | Vandani Verma | Sunder Lal and Vandani Verma | Some Proxy Signature and Designated verifier Signature Schemes over
Braid Groups | 15 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Braids groups provide an alternative to number theoretic public cryptography
and can be implemented quite efficiently. The paper proposes five signature
schemes: Proxy Signature, Designated Verifier, Bi-Designated Verifier,
Designated Verifier Proxy Signature And Bi-Designated Verifier Proxy Signature
scheme based on braid groups. We also discuss the security aspects of each of
the proposed schemes.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 10:14:06 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Lal",
"Sunder",
""
],
[
"Verma",
"Vandani",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.3444 | Bhupendra Gupta | Bhupendra Gupta (Indian Institute of Information
Technology-DM-Jabalpur) | Comment to "Coverage by Randomly Deployed Wireless Sensor Networks" | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is a correction paper on "P.J. Wan and C.W. Yi, "Coverage by Randomly
Deployed Wireless Sensor Networks", IEEE Transaction On Information Theory,
vol.52, No.6, June 2006."
In the above paper, Lemma (4), on page 2659 play the key role for deriving
the main results in the paper. The statement as well as the proof of Lemma (4),
page $2659,$ is not correct. We have given the correct version of Lemma. This
change in Lemma leads a drastic change in all the result derived in the above
paper.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 12:18:21 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Gupta",
"Bhupendra",
"",
"Indian Institute of Information\n Technology-DM-Jabalpur"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3458 | Praveen Sivadasan | Praveen Sivadasan, P Sojan Lal | JConstHide: A Framework for Java Source Code Constant Hiding | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Software obfuscation or obscuring a software is an approach to defeat the
practice of reverse engineering a software for using its functionality
illegally in the development of another software. Java applications are more
amenable to reverse engineering and re-engineering attacks through methods such
as decompilation because Java class files store the program in a semi complied
form called byte codes. The existing obfuscation systems obfuscate the Java
class files. Obfuscated source code produce obfuscated byte codes and hence two
level obfuscation (source code and byte code level) of the program makes it
more resilient to reverse engineering attacks . But source code obfuscation is
much more difficult due to richer set of programming constructs and the scope
of the different variables used in the program and only very little progress
has been made on this front. We in this paper are proposing a framework named
JConstHide for hiding constants, especially integers in the java source codes,
to defeat reverse engineering through decompilation. To the best of our
knowledge, no data hiding software are available for java source code constant
hiding.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 13:15:31 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Sivadasan",
"Praveen",
""
],
[
"Lal",
"P Sojan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.3469 | Giorgi Japaridze | Giorgi Japaridze | Toggling operators in computability logic | null | Theoretical Computer Science 412 (2011), pp. 971-1004 | 10.1016/j.tcs.2010.11.037 | null | cs.LO cs.AI math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computability logic (CL) (see http://www.cis.upenn.edu/~giorgi/cl.html ) is a
research program for redeveloping logic as a formal theory of computability, as
opposed to the formal theory of truth which it has more traditionally been.
Formulas in CL stand for interactive computational problems, seen as games
between a machine and its environment; logical operators represent operations
on such entities; and "truth" is understood as existence of an effective
solution. The formalism of CL is open-ended, and may undergo series of
extensions as the studies of the subject advance. So far three -- parallel,
sequential and choice -- sorts of conjunction and disjunction have been
studied. The present paper adds one more natural kind to this collection,
termed toggling. The toggling operations can be characterized as lenient
versions of choice operations where choices are retractable, being allowed to
be reconsidered any finite number of times. This way, they model
trial-and-error style decision steps in interactive computation. The main
technical result of this paper is constructing a sound and complete
axiomatization for the propositional fragment of computability logic whose
vocabulary, together with negation, includes all four -- parallel, toggling,
sequential and choice -- kinds of conjunction and disjunction. Along with
toggling conjunction and disjunction, the paper also introduces the toggling
versions of quantifiers and recurrence operations.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 14:32:01 GMT"
},
{
"version": "v2",
"created": "Sat, 1 May 2010 21:40:22 GMT"
}
]
| 2011-02-08T00:00:00 | [
[
"Japaridze",
"Giorgi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0904.3501 | Kamesh Munagala | Sayan Bhattacharya and Vincent Conitzer and Kamesh Munagala and Lirong
Xia | Incentive Compatible Budget Elicitation in Multi-unit Auctions | null | null | null | null | cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the problem of designing incentive compatible
auctions for multiple (homogeneous) units of a good, when bidders have private
valuations and private budget constraints. When only the valuations are private
and the budgets are public, Dobzinski {\em et al} show that the {\em adaptive
clinching} auction is the unique incentive-compatible auction achieving
Pareto-optimality. They further show thatthere is no deterministic
Pareto-optimal auction with private budgets. Our main contribution is to show
the following Budget Monotonicity property of this auction: When there is only
one infinitely divisible good, a bidder cannot improve her utility by reporting
a budget smaller than the truth. This implies that a randomized modification to
the adaptive clinching auction is incentive compatible and Pareto-optimal with
private budgets.
The Budget Monotonicity property also implies other improved results in this
context. For revenue maximization, the same auction improves the best-known
competitive ratio due to Abrams by a factor of 4, and asymptotically approaches
the performance of the optimal single-price auction.
Finally, we consider the problem of revenue maximization (or social welfare)
in a Bayesian setting. We allow the bidders have public size constraints (on
the amount of good they are willing to buy) in addition to private budget
constraints. We show a simple poly-time computable 5.83-approximation to the
optimal Bayesian incentive compatible mechanism, that is implementable in
dominant strategies. Our technique again crucially needs the ability to prevent
bidders from over-reporting budgets via randomization.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 16:47:40 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Bhattacharya",
"Sayan",
""
],
[
"Conitzer",
"Vincent",
""
],
[
"Munagala",
"Kamesh",
""
],
[
"Xia",
"Lirong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0904.3503 | Ferdinando Cicalese | Ferdinando Cicalese, Tobias Jacobs, Eduardo Laber and Marco Molinaro | On the Complexity of Searching in Trees: Average-case Minimization | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on the average-case analysis: A function w : V -> Z+ is given which
defines the likelihood for a node to be the one marked, and we want the
strategy that minimizes the expected number of queries. Prior to this paper,
very little was known about this natural question and the complexity of the
problem had remained so far an open question.
We close this question and prove that the above tree search problem is
NP-complete even for the class of trees with diameter at most 4. This results
in a complete characterization of the complexity of the problem with respect to
the diameter size. In fact, for diameter not larger than 3 the problem can be
shown to be polynomially solvable using a dynamic programming approach.
In addition we prove that the problem is NP-complete even for the class of
trees of maximum degree at most 16. To the best of our knowledge, the only
known result in this direction is that the tree search problem is solvable in
O(|V| log|V|) time for trees with degree at most 2 (paths).
We match the above complexity results with a tight algorithmic analysis. We
first show that a natural greedy algorithm attains a 2-approximation.
Furthermore, for the bounded degree instances, we show that any optimal
strategy (i.e., one that minimizes the expected number of queries) performs at
most O(\Delta(T) (log |V| + log w(T))) queries in the worst case, where w(T) is
the sum of the likelihoods of the nodes of T and \Delta(T) is the maximum
degree of T. We combine this result with a non-trivial exponential time
algorithm to provide an FPTAS for trees with bounded degree.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 17:09:15 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2009 14:09:25 GMT"
},
{
"version": "v3",
"created": "Sun, 9 Aug 2009 22:00:39 GMT"
}
]
| 2009-08-10T00:00:00 | [
[
"Cicalese",
"Ferdinando",
""
],
[
"Jacobs",
"Tobias",
""
],
[
"Laber",
"Eduardo",
""
],
[
"Molinaro",
"Marco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.3525 | David Monniaux | David Monniaux (VERIMAG - Imag) | On using floating-point computations to help an exact linear arithmetic
decision procedure | null | null | null | null | cs.LO cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the decision problem for quantifier-free formulas whose atoms are
linear inequalities interpreted over the reals or rationals. This problem may
be decided using satisfiability modulo theory (SMT), using a mixture of a SAT
solver and a simplex-based decision procedure for conjunctions.
State-of-the-art SMT solvers use simplex implementations over rational numbers,
which perform well for typical problems arising from model-checking and program
analysis (sparse inequalities, small coefficients) but are slow for other
applications (denser problems, larger coefficients). We propose a simple
preprocessing phase that can be adapted on existing SMT solvers and that may be
optionally triggered. Despite using floating-point computations, our method is
sound and complete - it merely affects efficiency. We implemented the method
and provide benchmarks showing that this change brings a naive and slow
decision procedure ("textbook simplex" with rational numbers) up to the
efficiency of recent SMT solvers, over test cases arising from model-checking,
and makes it definitely faster than state-of-the-art SMT solvers on dense
examples.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 18:40:01 GMT"
}
]
| 2009-04-23T00:00:00 | [
[
"Monniaux",
"David",
"",
"VERIMAG - Imag"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0904.3528 | Pierre Lescanne | Pierre Lescanne (LIP) | Deconstruction of Infinite Extensive Games using coinduction | 19 p | null | null | null | cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finite objects and more specifically finite games are formalized using
induction, whereas infinite objects are formalized using coinduction. In this
article, after an introduction to the concept of coinduction, we revisit on
infinite (discrete) extensive games the basic notions of game theory. Among
others, we introduce a definition of Nash equilibrium and a notion of subgame
perfect equilibrium for infinite games. We use those concepts to analyze well
known infinite games, like the dollar auction game and the centipede game and
we show that human behaviors that are often considered as illogic are perfectly
rational, if one admits that human agents reason coinductively.
| [
{
"version": "v1",
"created": "Wed, 22 Apr 2009 18:45:26 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Apr 2009 13:58:32 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Lescanne",
"Pierre",
"",
"LIP"
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.3552 | Florentina Pintea | Papin Nicolae, Tiberiu Marius Karnyanszky | Internet: Romania vs. Europe | 14 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 153-166 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents various access ways to Internet for home users, both for
those who are low consumers (consumed time online or traffic monthly value), or
large consumers (unlimited connection). The main purpose of the work consists
in making a comparison between the situation of the Internet in Romania and
other countries in Europe such as Hungary (more western than Romania, so a
little more developed, still an Eastern country comparing to the more developed
countries in Western Europe and others well developed such as England, Italy,
France, and to those in development such as Poland, and at the periphery of
Europe such as Ukraine.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 13:30:49 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Nicolae",
"Papin",
""
],
[
"Karnyanszky",
"Tiberiu Marius",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3588 | Zhihai Zhang | Bican Xia, Zhihai Zhang | Termination of Linear Programs with Nonlinear Constraints | 17pages, 0 figures | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Tiwari proved that termination of linear programs (loops with linear loop
conditions and updates) over the reals is decidable through Jordan forms and
eigenvectors computation. Braverman proved that it is also decidable over the
integers. In this paper, we consider the termination of loops with polynomial
loop conditions and linear updates over the reals and integers. First, we prove
that the termination of such loops over the integers is undecidable. Second,
with an assumption, we provide an complete algorithm to decide the termination
of a class of such programs over the reals. Our method is similar to that of
Tiwari in spirit but uses different techniques. Finally, we conjecture that the
termination of linear programs with polynomial loop conditions over the reals
is undecidable in general by %constructing a loop and reducing the problem to
another decision problem related to number theory and ergodic theory, which we
guess undecidable.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 02:52:15 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Xia",
"Bican",
""
],
[
"Zhang",
"Zhihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.3607 | Ali Akbar Safilian | Ali Akbar Safilian and Farzad Didehvar | Relation between the Usual Order and the Enumeration Orders of Elements
of r.e. Sets | 15 pages; submitted to Mathematical Logic Quarterly | null | null | null | cs.FL cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we have compared r.e. sets based on their enumeration orders
with Turing machines. Accordingly, we have defined novel concept uniformity for
Turing machines and r.e. sets and have studied some relationships between
uniformity and both one-reducibility and Turing reducibility. Furthermore, we
have defined type-2 uniformity concept and studied r.e. sets and Turing
machines based on this concept. In the end, we have introduced a new structure
called Turing Output Binary Search Tree that helps us lighten some ideas.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 07:07:35 GMT"
}
]
| 2010-02-03T00:00:00 | [
[
"Safilian",
"Ali Akbar",
""
],
[
"Didehvar",
"Farzad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.