id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0904.3611
Aubin Jarry
Florian Huc and Aubin Jarry
VRAC: Virtual Raw Anchor Coordinates Routing in Sensor Networks -- Concepts and Experimental Protocol
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to make full use of geographic routing techniques developed for large scale networks, nodes must be localized. However, localization and virtual localization techniques in sensor networks are dependent either on expensive and sometimes unavailable hardware (e.g. GPS) or on sophisticated localization calculus (e.g. triangulation) which are both error-prone and with a costly overhead. Instead of localizing nodes in a traditional 2-dimensional space, we intend to use directly the raw distance to a set of anchors to route messages in the multi-dimensional space. This should enable us to use any geographic routing protocol in a robust and efficient manner in a very large range of scenarios.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 07:40:59 GMT" } ]
2009-04-24T00:00:00
[ [ "Huc", "Florian", "" ], [ "Jarry", "Aubin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0904.3612
Martin Ziegler
Florentin Neumann, Andrea Reichenberger, Martin Ziegler
Variations of the Turing Test in the Age of Internet and Virtual Reality
null
pp.355-362 in Proc. 32nd Annual Conference on Artificial Intelligence (KI2009), Springer LNCS/LNAI vol.5803
10.1007/978-3-642-04617-9_45
null
cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by Hofstadter's Coffee-House Conversation (1982) and by the science fiction short story SAM by Schattschneider (1988), we propose and discuss criteria for non-mechanical intelligence. Firstly, we emphasize the practical need for such tests in view of massively multiuser online role-playing games (MMORPGs) and virtual reality systems like Second Life. Secondly, we demonstrate Second Life as a useful framework for implementing (some iterations of) that test.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 07:56:11 GMT" } ]
2010-05-10T00:00:00
[ [ "Neumann", "Florentin", "" ], [ "Reichenberger", "Andrea", "" ], [ "Ziegler", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0904.3629
Florentina Pintea
Diana Sophia Codat
Les technologies de l'information et de la communication au niveau mondial et en Roumanie dans les dernieres annees
10 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 21-30
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The level of development of the electronic communication market and of the information technology, the indicators regarding the penetration of Internet and the level of penetration of the connections in wide band, the integration degree of the Tic application in the business area are crucial for the development of an informational society and for the creation of a society based on knowledge. Though the levels are still reduced their positive evolution reflects the attenuation of the gaps by Romania, comparatively to other countries.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 08:54:06 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2009 15:01:38 GMT" } ]
2009-06-22T00:00:00
[ [ "Codat", "Diana Sophia", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0904.3631
Florentina Pintea
Ioan Despi, Lucian Luca
On the Ambiguity of Commercial Open Source
10 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 31-40
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Open source and commercial applications used to be two separate worlds. The former was the work of amateurs who had little interest in making a profit, while the latter was only profit oriented and was produced by big companies. Nowadays open source is a threat and an opportunity to serious businesses of all kinds, generating good profits while delivering low costs products to customers. The competition between commercial and open source software has impacted the industry and the society as a whole. But in the last years, the markets for commercial and open source software are converging rapidly and it is interesting to resume and discuss the implications of this new paradigm, taking into account arguments pro and against it.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 09:07:15 GMT" } ]
2009-04-24T00:00:00
[ [ "Despi", "Ioan", "" ], [ "Luca", "Lucian", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0904.3633
Florentina Pintea
Alexandra Fortis
Business Process Modeling Notation - An Overview
10 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 41-50
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BPMN represents an industrial standard created to offer a common and user friendly notation to all the participants to a business process. The present paper aims to briefly present the main features of this notation as well as an interpretation of some of the main patterns characterizing a business process modeled by the working fluxes.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 09:11:50 GMT" } ]
2009-04-24T00:00:00
[ [ "Fortis", "Alexandra", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0904.3634
Florentina Pintea
Florin Fortis, Alexandra Fortis
Tailored business solutions by workflow technologies
12 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 51-62
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
VISP (Virtual Internet Service Provider) is an IST-STREP project, which is conducting research in the field of these new technologies, targeted to telecom/ISP companies. One of the first tasks of the VISP project is to identify the most appropriate technologies in order to construct the VISP platform. This paper presents the most significant results in the field of choreography and orchestration, two key domains that must accompany process modeling in the construction of a workflow environment.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 09:22:22 GMT" } ]
2009-04-24T00:00:00
[ [ "Fortis", "Florin", "" ], [ "Fortis", "Alexandra", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0904.3638
Florentina Pintea
Vladimir Gotsulenko, Lyudmila Gaponova
On one method of boundary value problem regularization by passage to the limit
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 63-68
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For one class of boundary value problem depending on small parameter for which numerical methods for their solution are actually inapplicable, procedure of limiting problem acquisition which is much easier and which solution as much as close to the initial solution is described.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 09:51:51 GMT" } ]
2009-04-24T00:00:00
[ [ "Gotsulenko", "Vladimir", "" ], [ "Gaponova", "Lyudmila", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0904.3642
Farzan Haddadi
Farzan Haddadi, Mohammad Mahdi Nayebi, Mohammad Reza Aref
Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals
IEEE Transactions on Signal Processing, vol. 57, pp. 600-609, Feb. 2009
null
10.1109/TSP.2008.2008220
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
signal direction-of-arrival estimation using an array of sensors has been the subject of intensive research and development during the last two decades. Efforts have been directed to both, better solutions for the general data model and to develop more realistic models. So far, many authors have assumed the data to be iid samples of a multivariate statistical model. Although this assumption reduces the complexity of the model, it may not be true in certain situations where signals show temporal correlation. Some results are available on the temporally correlated signal model in the literature. The temporally correlated stochastic Cramer-Rao bound (CRB) has been calculated and an instrumental variable-based method called IV-SSF is introduced. Also, it has been shown that temporally correlated CRB is lower bounded by the deterministic CRB. In this paper, we show that temporally correlated CRB is also upper bounded by the stochastic iid CRB. We investigate the effect of temporal correlation of the signals on the best achievable performance. We also show that the IV-SSF method is not efficient and based on an analysis of the CRB, propose a variation in the method which boosts its performance. Simulation results show the improved performance of the proposed method in terms of lower bias and error variance.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 10:09:24 GMT" } ]
2009-11-13T00:00:00
[ [ "Haddadi", "Farzan", "" ], [ "Nayebi", "Mohammad Mahdi", "" ], [ "Aref", "Mohammad Reza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.3648
Florentina Pintea
Tiberiu Marius Karnyanszky, Mihai Titu
Computer Aided Optimization of the Unconventional Processing
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 85-90
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The unconventional technologies, currently applied at a certain category of materials, difficult to be processed through usual techniques, have undergone during the last 60 years all the stages, since their discovery to their use on a large scale. They are based on elementary mechanisms which run the processing through classic methods, yet, they use in addition the interconnections of these methods. This leads to a plus in performance by increasing the outcomes precision, reducing the processing time, increasing the quality of the finite product, etc. This performance can be much increased by using the computer and a software product in assisting the human operator in the processing by an unconventional method such as; the electric or electro-chemical erosion, the complex electric-electro-chemical erosion, the processing by a laser fascicle and so on. The present work presents such an application based on a data base combining the previous experimental results, which proposes a method of optimization of the outcomes.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 10:38:24 GMT" } ]
2009-04-24T00:00:00
[ [ "Karnyanszky", "Tiberiu Marius", "" ], [ "Titu", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0904.3650
Florentina Pintea
Dan L. Lacrama, Ioan Snep
The use of invariant moments in hand-written character recognition
12 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 91-102
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to present the implementation of a Radial Basis Function neural network with built-in knowledge to recognize hand-written characters. The neural network includes in its architecture gates controlled by an attraction/repulsion system of coefficients. These coefficients are derived from a preprocessing stage which groups the characters according to their ascendant, central, or descendent components. The neural network is trained using data from invariant moment functions. Results are compared with those obtained using a K nearest neighbor method on the same moment data.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 10:44:21 GMT" } ]
2009-04-24T00:00:00
[ [ "Lacrama", "Dan L.", "" ], [ "Snep", "Ioan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0904.3664
Amnon Shashua
Amnon Shashua
Introduction to Machine Learning: Class Notes 67577
109 pages, class notes of Machine Learning course given at the Hebrew University of Jerusalem
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Introduction to Machine learning covering Statistical Inference (Bayes, EM, ML/MaxEnt duality), algebraic and spectral methods (PCA, LDA, CCA, Clustering), and PAC learning (the Formal model, VC dimension, Double Sampling theorem).
[ { "version": "v1", "created": "Thu, 23 Apr 2009 11:40:57 GMT" } ]
2009-04-24T00:00:00
[ [ "Shashua", "Amnon", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0904.3667
Florentina Pintea
Alin Munteanu, Cristina Ofelia Sofran
Considerations upon the Machine Learning Technologies
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 133-138
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial intelligence offers superior techniques and methods by which problems from diverse domains may find an optimal solution. The Machine Learning technologies refer to the domain of artificial intelligence aiming to develop the techniques allowing the computers to "learn". Some systems based on Machine Learning technologies tend to eliminate the necessity of the human intelligence while the others adopt a man-machine collaborative approach.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 11:48:38 GMT" } ]
2009-04-24T00:00:00
[ [ "Munteanu", "Alin", "" ], [ "Sofran", "Cristina Ofelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0904.3669
Florentina Pintea
Alin Munteanu, Cristina Ofelia Sofran
Collaborative systems and multiagent systems
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 139-144
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents some basic elements regarding the domain of the collaborative systems, a domain of maximum actuality and also the multiagent systems, developed as a result of a sound study on the one-agent systems.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 11:54:55 GMT" } ]
2009-04-24T00:00:00
[ [ "Munteanu", "Alin", "" ], [ "Sofran", "Cristina Ofelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0904.3677
Arindam Mitra
Arindam Mitra
Quantum theory can be collectively verified
Pdf, 8 pages, content unchanged
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
No theory of physics has been collectively scientifically verified in an experiment so far. It is pointed out that probabilistic structure of quantum theory can be collectively scientifically verified in an experiment. It is also argued that experimentalist point of view quantum theory is a complete theory.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 12:24:21 GMT" }, { "version": "v2", "created": "Wed, 29 Apr 2009 14:07:57 GMT" } ]
2012-01-31T00:00:00
[ [ "Mitra", "Arindam", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0904.3693
Florentina Pintea
Dieter Penteliuc Cotosman
The Multimedia Product - between Design and Information, Design and Utility and Design and Entertainment
28 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 167-194
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper investigates the possible coherent and effective alternatives to solve the problems related to the communication needs of any multimedia product. In essence, the presentation will focus on identifying the issues and principles governing three types of the design - in fact, the multimedia design in a broader sense - namely the information design - precisely aiming at ways of organization and presentation of information in a useful and significant form, the graphical user interface design, whose sub-domain consists of the information displayed on the monitor screen and of interactivity between user, computer and electronic devices, meaning, in fact, everything the user sees, touches, hears and all the elements with which he interacts, the graphic design, whose main concern is to create an aesthetic layout arrangement (from the visual and perceptive) information.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 13:50:36 GMT" } ]
2009-04-24T00:00:00
[ [ "Cotosman", "Dieter Penteliuc", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0904.3694
Florentina Pintea
Dieter Penteliuc-Cotosman
The new multimedia educational technologies, used in open and distance learning
10 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 195-204
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reviews and refers to the latest telematics technology that has turned the open system learning and helped it to become an institutional alternative to the face-to-face traditional one. Most technologies, briefly presented here, will be implemented in the "ARTeFACt" project - telematic system for vocational education system of open system learning, system which will be officially launched at the end of 2006, in the institutional offer of the Faculty of Arts of the University West of Timisoara. The scientific coordination of the doctoral project "ARTeFACt" is done by Mr. Prof. Dr. Eng. Savi G. George, representing the Department of Mechatronics Faculty of Mechanical Engineering from the University "Politehnica" of Timisoara, Romania
[ { "version": "v1", "created": "Thu, 23 Apr 2009 13:57:23 GMT" } ]
2009-04-24T00:00:00
[ [ "Penteliuc-Cotosman", "Dieter", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0904.3698
Florentina Pintea
Rolf Andreas Rasenack, Karsten Wolke, Kostyantyn Yermashov, Karl Hayo Siemsen
Semantic Linkage of Control Systems
8 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 205-212
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Control systems are sets of interconnected hardware and software components which regulate the behaviour of processes. The software of modern control systems rises for some years by requirements regarding the flexibility and functionality. Thus the force of innovation grows on enterprises, since ever newer products in ever shorter time intervals must be made available. Associated hereby is the crucial shortening of the product life cycle, whose effects show up in reduced care of the software and the spares inventory. The aim, the concept presented here and developed in a modeling environment, is proved and ensures a minimum functionality of software components. Replacing software components of a control system verified for functionality by a framework at run-time and if necessary the software conditions will become adapted. Quintessential point of this implementation is the usage of an abstract syntax tree. Within its hierarchical structure meta information is attached to nodes and processed by the framework. With the development of the concept for semantic proving of software components the lifetime of software-based products is increased.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 14:02:18 GMT" } ]
2009-04-24T00:00:00
[ [ "Rasenack", "Rolf Andreas", "" ], [ "Wolke", "Karsten", "" ], [ "Yermashov", "Kostyantyn", "" ], [ "Siemsen", "Karl Hayo", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0904.3701
Fabien Gandon
Guillaume Er\'et\'eo (INRIA Sophia Antipolis), Fabien Gandon (INRIA Sophia Antipolis), Olivier Corby (INRIA Sophia Antipolis), Michel Buffa
Semantic Social Network Analysis
published in Web Science (2009)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social Network Analysis (SNA) tries to understand and exploit the key features of social networks in order to manage their life cycle and predict their evolution. Increasingly popular web 2.0 sites are forming huge social network. Classical methods from social network analysis (SNA) have been applied to such online networks. In this paper, we propose leveraging semantic web technologies to merge and exploit the best features of each domain. We present how to facilitate and enhance the analysis of online social networks, exploiting the power of semantic social network analysis.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 14:22:05 GMT" } ]
2009-04-24T00:00:00
[ [ "Erétéo", "Guillaume", "", "INRIA Sophia Antipolis" ], [ "Gandon", "Fabien", "", "INRIA\n Sophia Antipolis" ], [ "Corby", "Olivier", "", "INRIA Sophia Antipolis" ], [ "Buffa", "Michel", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0904.3711
Florentina Pintea
Mihai Timis
Output Width Signal Control In Asynchronous Digital Systems Using External Clock Signal
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 237-242
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In present paper, I propose a method for resolving the timing delays for output signals from an asynchronous sequential system. It will be used an example of an asynchronous sequential system that will set up an output signal when an input signal will be set up. The width of the output signal depends on the input signal width, and in this case it is very short. There are many synthesis methods, like using a RC group system, a monostable system in design of the asynchronous digital system or using an external clock signal, CK. In this paper will be used an external clock signal, CK.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 14:45:42 GMT" } ]
2009-04-24T00:00:00
[ [ "Timis", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0904.3714
Florentina Pintea
Mihai Timis
Output Width Signal Control In Asynchronous Digital Systems Using Monostable Circuits
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 243-248
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In present paper, I propose a method for resolving the timing delays for output signals from an asynchronous sequential system. It will be used an example of an asynchronous sequential system that will set up an output signal when an input signal will be set up. The width of the output signal depends on the input signal width, and in this case it is very short. There are many synthesis methods, like using a RC group system, a monostable system in design of the asynchronous digital system or using an external clock signal, CK. In this paper will be used a monostable circuit.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 14:50:31 GMT" } ]
2009-04-24T00:00:00
[ [ "Timis", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0904.3715
Florentina Pintea
Radu Vultur
Mesh
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 261-266
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Whether you just want to take a peek of a remote computer status, or you want to install the latest version of a software on several workstations, you can do all of this from your computer. The networks are growing, the time spent administering the workstations increases and the number of repetitive tasks is going sky high. But here comes MESH to take that load off your shoulders. And because of SMS commands you can take this "command center" wherever you will go. Just connect a GSM phone to the computer (using a cable, IrDA or Bluetooth) and lock/restart/shutdown computers from your LAN with the push of a cell phone button. You can even create your own SMS commands. This is MESH - the network administrator's Swiss knife
[ { "version": "v1", "created": "Thu, 23 Apr 2009 14:56:47 GMT" } ]
2009-04-24T00:00:00
[ [ "Vultur", "Radu", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0904.3716
Florentina Pintea
Karsten Wolke, K. Yermashov, K. H. Siemsen, Rolf Andreas Rasenack
Failover of Software Services with State Replication
10 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 267-276
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing systems are becoming more and more complex and assuming more and more responsibilities in all sectors of human activity. Applications do not run locally on a single computer any more. A lot of today's applications are built as distributed system; with services on different computers communicating with each other. Distributed systems arise everywhere. The Internet is one of the best-known distributed systems and used by nearly everyone today. It is obvious that we are more and more dependent on computer services. Many people expect to be able to buy things like clothing or electronic equipment even at night on the Internet. Computers are expected to be operational and available 7 days a week, 24 hours a day. Downtime, even for maintenance, is no longer acceptable.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 15:01:45 GMT" } ]
2009-04-24T00:00:00
[ [ "Wolke", "Karsten", "" ], [ "Yermashov", "K.", "" ], [ "Siemsen", "K. H.", "" ], [ "Rasenack", "Rolf Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0904.3718
Florentina Pintea
K. Yermashov, K. H. Siemsen, K. Wolke, R.A. Rasenack
Architecture of the Neurath Basic Model View Controller
6 pages,exposed on 1st "European Conference on Computer Sciences & Applications" - XA2006, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 277-282
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The idea of the Neurath Basic Model View Controller (NBMVC) appeared during the discussion of the design of domain-specific modeling tools based on the Neurath Modeling Language [Yer06]. The NBMVC is the core of the modeling process within the modeling environment. It reduces complexity out of the design process by providing domain-specific interfaces between the developer and the model. These interfaces help to organize and manipulate the model. The organization includes, for example, a layer with visual components to drop them in and filter them out. The control routines includes, for example, model transformations.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 15:05:01 GMT" } ]
2009-04-24T00:00:00
[ [ "Yermashov", "K.", "" ], [ "Siemsen", "K. H.", "" ], [ "Wolke", "K.", "" ], [ "Rasenack", "R. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0904.3741
David Eppstein
David Eppstein and Emma S. Spiro
The h-Index of a Graph and its Application to Dynamic Subgraph Statistics
To appear at Algorithms and Data Structures Symposium, Banff, Canada, August 2009. 18 pages, 4 figures. Includes six pages of appendices that will not be included in the conference proceedings version
J. Graph Algorithms & Applications 16(2): 543-567, 2012
10.7155/jgaa.00273
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a data structure that maintains the number of triangles in a dynamic undirected graph, subject to insertions and deletions of edges and of degree-zero vertices. More generally it can be used to maintain the number of copies of each possible three-vertex subgraph in time O(h) per update, where h is the h-index of the graph, the maximum number such that the graph contains $h$ vertices of degree at least h. We also show how to maintain the h-index itself, and a collection of h high-degree vertices in the graph, in constant time per update. Our data structure has applications in social network analysis using the exponential random graph model (ERGM); its bound of O(h) time per edge is never worse than the Theta(sqrt m) time per edge necessary to list all triangles in a static graph, and is strictly better for graphs obeying a power law degree distribution. In order to better understand the behavior of the h-index statistic and its implications for the performance of our algorithms, we also study the behavior of the h-index on a set of 136 real-world networks.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 18:37:36 GMT" } ]
2015-07-16T00:00:00
[ [ "Eppstein", "David", "" ], [ "Spiro", "Emma S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0904.3756
Michael Goodrich
Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker
On the Approximability of Geometric and Geographic Generalization and the Min-Max Bin Covering Problem
18 pages. Expanded version of paper appearing in 2009 Algorithms and Data Structures Symposium (formerly WADS)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of abstracting a table of data about individuals so that no selection query can identify fewer than k individuals. We show that it is impossible to achieve arbitrarily good polynomial-time approximations for a number of natural variations of the generalization technique, unless P = NP, even when the table has only a single quasi-identifying attribute that represents a geographic or unordered attribute: Zip-codes: nodes of a planar graph generalized into connected subgraphs GPS coordinates: points in R2 generalized into non-overlapping rectangles Unordered data: text labels that can be grouped arbitrarily. In addition to impossibility results, we provide approximation algorithms for these difficult single-attribute generalization problems, which, of course, apply to multiple-attribute instances with one that is quasi-identifying. We show theoretically and experimentally that our approximation algorithms can come reasonably close to optimal solutions. Incidentally, the generalization problem for unordered data can be viewed as a novel type of bin packing problem--min-max bin covering--which may be of independent interest.
[ { "version": "v1", "created": "Thu, 23 Apr 2009 21:06:58 GMT" }, { "version": "v2", "created": "Mon, 27 Apr 2009 22:59:44 GMT" }, { "version": "v3", "created": "Tue, 12 May 2009 16:16:10 GMT" } ]
2009-05-12T00:00:00
[ [ "Du", "Wenliang", "" ], [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Lueker", "George S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0904.3761
Charalampos Tsourakakis
Charalampos E. Tsourakakis, Mihail N. Kolountzakis, Gary L. Miller
Approximate Triangle Counting
1) 16 pages, 2 figures, under submission 2) Removed the erroneous random projection part. Thanks to Ioannis Koutis for pointing out the error. 3) Added experimental session
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Triangle counting is an important problem in graph mining. Clustering coefficients of vertices and the transitivity ratio of the graph are two metrics often used in complex network analysis. Furthermore, triangles have been used successfully in several real-world applications. However, exact triangle counting is an expensive computation. In this paper we present the analysis of a practical sampling algorithm for counting triangles in graphs. Our analysis yields optimal values for the sampling rate, thus resulting in tremendous speedups ranging from \emph{2800}x to \emph{70000}x when applied to real-world networks. At the same time the accuracy of the estimation is excellent. Our contributions include experimentation on graphs with several millions of nodes and edges, where we show how practical our proposed method is. Finally, our algorithm's implementation is a part of the \pegasus library (Code and datasets are available at (http://www.cs.cmu.edu/~ctsourak/).) a Peta-Graph Mining library implemented in Hadoop, the open source version of Mapreduce.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 14:21:13 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 09:02:34 GMT" } ]
2009-06-30T00:00:00
[ [ "Tsourakakis", "Charalampos E.", "" ], [ "Kolountzakis", "Mihail N.", "" ], [ "Miller", "Gary L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0904.3778
Roy Timo
Roy Timo, Kim Blackmore and Leif Hanlen
Word-Valued Sources: an Ergodic Theorem, an AEP and the Conservation of Entropy
21 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A word-valued source $\mathbf{Y} = Y_1,Y_2,...$ is discrete random process that is formed by sequentially encoding the symbols of a random process $\mathbf{X} = X_1,X_2,...$ with codewords from a codebook $\mathscr{C}$. These processes appear frequently in information theory (in particular, in the analysis of source-coding algorithms), so it is of interest to give conditions on $\mathbf{X}$ and $\mathscr{C}$ for which $\mathbf{Y}$ will satisfy an ergodic theorem and possess an Asymptotic Equipartition Property (AEP). In this correspondence, we prove the following: (1) if $\mathbf{X}$ is asymptotically mean stationary, then $\mathbf{Y}$ will satisfy a pointwise ergodic theorem and possess an AEP; and, (2) if the codebook $\mathscr{C}$ is prefix-free, then the entropy rate of $\mathbf{Y}$ is equal to the entropy rate of $\mathbf{X}$ normalized by the average codeword length.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 01:56:14 GMT" } ]
2009-04-27T00:00:00
[ [ "Timo", "Roy", "" ], [ "Blackmore", "Kim", "" ], [ "Hanlen", "Leif", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.3780
Deanna Needell
Deanna Needell
Noisy Signal Recovery via Iterative Reweighted L1-Minimization
null
null
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing has shown that it is possible to reconstruct sparse high dimensional signals from few linear measurements. In many cases, the solution can be obtained by solving an L1-minimization problem, and this method is accurate even in the presence of noise. Recent a modified version of this method, reweighted L1-minimization, has been suggested. Although no provable results have yet been attained, empirical studies have suggested the reweighted version outperforms the standard method. Here we analyze the reweighted L1-minimization method in the noisy case, and provide provable results showing an improvement in the error bound over the standard bounds.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 02:52:26 GMT" } ]
2009-04-27T00:00:00
[ [ "Needell", "Deanna", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.3789
Serguei Mokhov
Serguei A. Mokhov and Joey Paquet
Formally Specifying and Proving Operational Aspects of Forensic Lucid in Isabelle
23 pages, 3 listings, 3 figures, 1 table, 1 Appendix with theorems, pp. 76--98. TPHOLs 2008 Emerging Trends Proceedings, August 18-21, Montreal, Canada. Editors: Otmane Ait Mohamed and Cesar Munoz and Sofiene Tahar. The individual paper's PDF is at http://users.encs.concordia.ca/~tphols08/TPHOLs2008/ET/76-98.pdf
null
null
2008-1-Ait Mohamed
cs.LO cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Forensic Lucid intensional programming language has been proposed for intensional cyberforensic analysis. In large part, the language is based on various predecessor and codecessor Lucid dialects bound by the higher-order intensional logic (HOIL) that is behind them. This work formally specifies the operational aspects of the Forensic Lucid language and compiles a theory of its constructs using Isabelle, a proof assistant system.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 03:30:20 GMT" } ]
2009-05-08T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "Paquet", "Joey", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0904.3797
Reginald Smith
Reginald D. Smith
Internet Traffic Periodicities and Oscillations: A Brief Review
10 pages 2 figures; submitted to Computer Networks
null
null
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
Internet traffic displays many persistent periodicities (oscillations) on a large range of time scales. This paper describes the measurement methodology to detect Internet traffic periodicities and also describes the main periodicities in Internet traffic.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 12:35:01 GMT" }, { "version": "v2", "created": "Mon, 27 Apr 2009 11:45:55 GMT" } ]
2009-04-27T00:00:00
[ [ "Smith", "Reginald D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0904.3808
Forrest Sheng Bao
Forrest Sheng Bao, Jue-Ming Gao, Jing Hu, Donald Y.-C. Lie, Yuanlin Zhang and K. J. Oommen
Automated Epilepsy Diagnosis Using Interictal Scalp EEG
5 pages, 4 figures, 3 tables, based on our IEEE ICTAI'08 paper, submitted to IEEE EMBC'09
null
null
null
cs.AI cs.CV
http://creativecommons.org/licenses/by-nc-sa/3.0/
Approximately over 50 million people worldwide suffer from epilepsy. Traditional diagnosis of epilepsy relies on tedious visual screening by highly trained clinicians from lengthy EEG recording that contains the presence of seizure (ictal) activities. Nowadays, there are many automatic systems that can recognize seizure-related EEG signals to help the diagnosis. However, it is very costly and inconvenient to obtain long-term EEG data with seizure activities, especially in areas short of medical resources. We demonstrate in this paper that we can use the interictal scalp EEG data, which is much easier to collect than the ictal data, to automatically diagnose whether a person is epileptic. In our automated EEG recognition system, we extract three classes of features from the EEG data and build Probabilistic Neural Networks (PNNs) fed with these features. We optimize the feature extraction parameters and combine these PNNs through a voting mechanism. As a result, our system achieves an impressive 94.07% accuracy, which is very close to reported human recognition accuracy by experienced medical professionals.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 07:15:49 GMT" }, { "version": "v2", "created": "Fri, 24 Apr 2009 20:27:43 GMT" } ]
2009-04-27T00:00:00
[ [ "Bao", "Forrest Sheng", "" ], [ "Gao", "Jue-Ming", "" ], [ "Hu", "Jing", "" ], [ "Lie", "Donald Y. -C.", "" ], [ "Zhang", "Yuanlin", "" ], [ "Oommen", "K. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0904.3827
Annick Valibouze
Annick Valibouze (LSTA, Lip6)
La R\'esolvante de Lagrange et ses Applications
26 pages
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the changes of representations of a group are used in order to describe its action as algebraic Galois group of an univariate polynomial on the roots of factors of any Lagrange resolvent. By this way, the Galois group of resolvent factors are pre-determinated. In follows, different applications are exposed; in particular, some classical results of algebraic Galois theory.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 09:00:48 GMT" } ]
2009-04-27T00:00:00
[ [ "Valibouze", "Annick", "", "LSTA, Lip6" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0904.3894
J\"org B\"uhler
J. B\"uhler, G. Wunder
On Capacity Computation for the Two-User Binary Multiple-Access Channel
5 pages, IEEE International Symposium on Information Theory (ISIT) 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the problem of computing the boundary of the capacity region for the memoryless two-user binary-input binary-output multiple-access channel ((2,2;2)-MAC), or equivalently, the computation of input probability distributions maximizing weighted sum-rate. This is equivalent to solving a difficult nonconvex optimization problem. For a restricted class of (2,2;2)-MACs and weight vectors, it is shown that, depending on an ordering property of the channel matrix, the optimal solution is located on the boundary, or the objective function has at most one stationary point in the interior of the domain. For this, the problem is reduced to a pseudoconcave one-dimensional optimization and the single-user problem.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 19:22:33 GMT" }, { "version": "v2", "created": "Fri, 24 Apr 2009 20:13:11 GMT" }, { "version": "v3", "created": "Thu, 30 Apr 2009 19:24:08 GMT" } ]
2009-04-30T00:00:00
[ [ "Bühler", "J.", "" ], [ "Wunder", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.3898
Manfred Kufleitner
Mahmoud Fouz, Manfred Kufleitner, Bodo Manthey and Nima Zeini Jahromi
On Smoothed Analysis of Quicksort and Hoare's Find
To be presented at the 15th Int. Computing and Combinatorics Conference (COCOON 2009)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a smoothed analysis of Hoare's find algorithm and we revisit the smoothed analysis of quicksort. Hoare's find algorithm - often called quickselect - is an easy-to-implement algorithm for finding the k-th smallest element of a sequence. While the worst-case number of comparisons that Hoare's find needs is quadratic, the average-case number is linear. We analyze what happens between these two extremes by providing a smoothed analysis of the algorithm in terms of two different perturbation models: additive noise and partial permutations. Moreover, we provide lower bounds for the smoothed number of comparisons of quicksort and Hoare's find for the median-of-three pivot rule, which usually yields faster algorithms than always selecting the first element: The pivot is the median of the first, middle, and last element of the sequence. We show that median-of-three does not yield a significant improvement over the classic rule: the lower bounds for the classic rule carry over to median-of-three.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 16:12:40 GMT" }, { "version": "v2", "created": "Sat, 25 Apr 2009 09:02:30 GMT" } ]
2009-04-27T00:00:00
[ [ "Fouz", "Mahmoud", "" ], [ "Kufleitner", "Manfred", "" ], [ "Manthey", "Bodo", "" ], [ "Jahromi", "Nima Zeini", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0904.3912
Frank Ferraro
Frank Ferraro, Garrett Hall, Andrew Wood
Refutation of Aslam's Proof that NP = P
13 pages, 2 figures, a response to Aslam's paper (arXiv:0812.1385v11) and the underlying arguments (arXiv:0812.1385v9). Very minor content changes and typos fixed
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aslam presents an algorithm he claims will count the number of perfect matchings in any incomplete bipartite graph with an algorithm in the function-computing version of NC, which is itself a subset of FP. Counting perfect matchings is known to be #P-complete; therefore if Aslam's algorithm is correct, then NP=P. However, we show that Aslam's algorithm does not correctly count the number of perfect matchings and offer an incomplete bipartite graph as a concrete counter-example.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 18:01:54 GMT" }, { "version": "v2", "created": "Thu, 14 May 2009 22:52:47 GMT" } ]
2009-05-15T00:00:00
[ [ "Ferraro", "Frank", "" ], [ "Hall", "Garrett", "" ], [ "Wood", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0904.3927
Cole Brown
Andrew Keenan Richardson, Cole Arthur Brown
A Critique of "Solving the P/NP Problem Under Intrinsic Uncertainty", arXiv:0811.0463
7 pages
null
null
null
cs.CC
http://creativecommons.org/licenses/by/3.0/
Although whether P equals NP is an important, open problem in computer science, and although Jaeger's 2008 paper, "Solving the P/NP Problem Under Intrinsic Uncertainty" (arXiv:0811.0463) presents an attempt at tackling the problem by discussing the possibility that all computation is uncertain to some degree, there are a number of logical oversights present in that paper which preclude it from serious consideration toward having resolved P-versus-NP. There are several differences between the model of computation presented in Jaeger's paper and the standard model, as well as several bold assumptions that are not well supported in Jaeger's paper or in the literature. In addition, we find several omissions of rigorous proof that ultimately weaken this paper to a point where it cannot be considered a candidate solution to the P-versus-NP problem.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 19:32:10 GMT" } ]
2009-04-27T00:00:00
[ [ "Richardson", "Andrew Keenan", "" ], [ "Brown", "Cole Arthur", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0904.3941
Sagarmoy Dutta
Sagarmoy Dutta and Piyush P Kurur
Representating groups on graphs
13 pages, 2 figures
null
10.1007/978-3-642-03816-7_26
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we formulate and study the problem of representing groups on graphs. We show that with respect to polynomial time turing reducibility, both abelian and solvable group representability are all equivalent to graph isomorphism, even when the group is presented as a permutation group via generators. On the other hand, the representability problem for general groups on trees is equivalent to checking, given a group $G$ and $n$, whether a nontrivial homomorphism from $G$ to $S_n$ exists. There does not seem to be a polynomial time algorithm for this problem, in spite of the fact that tree isomorphism has polynomial time algorithm.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 20:39:59 GMT" } ]
2015-05-13T00:00:00
[ [ "Dutta", "Sagarmoy", "" ], [ "Kurur", "Piyush P", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0904.3944
Christopher Ward
Christopher O. Ward
Better Global Polynomial Approximation for Image Rectification
null
null
10.2316/Journal.205.2008.3.205-4669
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When using images to locate objects, there is the problem of correcting for distortion and misalignment in the images. An elegant way of solving this problem is to generate an error correcting function that maps points in an image to their corrected locations. We generate such a function by fitting a polynomial to a set of sample points. The objective is to identify a polynomial that passes "sufficiently close" to these points with "good" approximation of intermediate points. In the past, it has been difficult to achieve good global polynomial approximation using only sample points. We report on the development of a global polynomial approximation algorithm for solving this problem. Key Words: Polynomial approximation, interpolation, image rectification.
[ { "version": "v1", "created": "Fri, 24 Apr 2009 21:19:59 GMT" } ]
2009-04-28T00:00:00
[ [ "Ward", "Christopher O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0904.3953
Victor Marek
V.W. Marek and J.B. Remmel
Guarded resolution for answer set programming
13 pages, some results added. Accepted for publication at TPLP
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a variant of resolution rule of proof and show that it is complete for stable semantics of logic programs. We show applications of this result.
[ { "version": "v1", "created": "Sat, 25 Apr 2009 00:28:07 GMT" }, { "version": "v2", "created": "Sat, 2 May 2009 10:34:13 GMT" }, { "version": "v3", "created": "Sat, 14 Nov 2009 22:59:07 GMT" }, { "version": "v4", "created": "Sun, 21 Feb 2010 17:57:51 GMT" } ]
2010-02-21T00:00:00
[ [ "Marek", "V. W.", "" ], [ "Remmel", "J. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0904.4006
Rajesh Ramachandran
R. Rajesh, Vinod Sharma and V. K. Varshenya
Joint Source-Channel Coding on a Multiple Access Channel with Side Information
29 pages, 3 figures. Submitted to IEEE Trans. Information theory
null
10.1109/ISIT.2008.4595484
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of transmission of several distributed correlated sources over a multiple access channel (MAC) with side information at the sources and the decoder. Source-channel separation does not hold for this channel. Sufficient conditions are provided for transmission of sources with a given distortion. The source and/or the channel could have continuous alphabets (thus Gaussian sources and Gaussian MACs are special cases). Various previous results are obtained as special cases. We also provide several good joint source-channel coding schemes for discrete sources and discrete/continuous alphabet channel.
[ { "version": "v1", "created": "Sun, 26 Apr 2009 04:43:59 GMT" } ]
2016-11-15T00:00:00
[ [ "Rajesh", "R.", "" ], [ "Sharma", "Vinod", "" ], [ "Varshenya", "V. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4010
Marc Timme
Marc Timme, Frank van Bussel, Denny Fliegner, and Sebastian Stolzenberg
Counting Complex Disordered States by Efficient Pattern Matching: Chromatic Polynomials and Potts Partition Functions
7 pages, 4 figures
New J. Phys. 11:023001 (2009); freely available online
10.1088/1367-2630/11/2/023001
null
cond-mat.stat-mech cond-mat.dis-nn cs.SC math.CO
http://creativecommons.org/licenses/by-nc-sa/3.0/
Counting problems, determining the number of possible states of a large system under certain constraints, play an important role in many areas of science. They naturally arise for complex disordered systems in physics and chemistry, in mathematical graph theory, and in computer science. Counting problems, however, are among the hardest problems to access computationally. Here, we suggest a novel method to access a benchmark counting problem, finding chromatic polynomials of graphs. We develop a vertex-oriented symbolic pattern matching algorithm that exploits the equivalence between the chromatic polynomial and the zero-temperature partition function of the Potts antiferromagnet on the same graph. Implementing this bottom-up algorithm using appropriate computer algebra, the new method outperforms standard top-down methods by several orders of magnitude, already for moderately sized graphs. As a first application, we compute chromatic polynomials of samples of the simple cubic lattice, for the first time computationally accessing three-dimensional lattices of physical relevance. The method offers straightforward generalizations to several other counting problems.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 12:49:26 GMT" } ]
2009-05-15T00:00:00
[ [ "Timme", "Marc", "" ], [ "van Bussel", "Frank", "" ], [ "Fliegner", "Denny", "" ], [ "Stolzenberg", "Sebastian", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0904.4030
Yong Yao
Yong Yao
Successive Difference Substitution Based on Column Stochastic Matrix and Mechanical Decision for Positive Semi-definite Forms
LaTeX; 18 pages
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory part of this paper is sketched as follows. Based on column stochastic average matrix $T_n$ selected as a basic substitution matrix, the method of advanced successive difference substitution is established. Then, a set of necessary and sufficient conditions for deciding positive semi-definite form on $\R^n_+$ is derived from this method. And furthermore, it is proved that the sequence of SDS sets of a positive definite form is positively terminating. Worked out according to these results, the Maple program TSDS3 not only automatically proves the polynomial inequalities, but also outputs counter examples for the false. Sometimes TSDS3 does not halt, but it is very useful by experimenting on so many examples.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 04:54:11 GMT" }, { "version": "v2", "created": "Tue, 14 Jul 2009 03:07:20 GMT" }, { "version": "v3", "created": "Fri, 2 Apr 2010 13:03:07 GMT" } ]
2010-04-05T00:00:00
[ [ "Yao", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0904.4041
Mario Nascimento
Jie Luo and Mario A. Nascimento
Content-Based Sub-Image Retrieval with Relevance Feedback
A preliminary version of this paper appeared in the Proceedings of the 1st ACM International Workshop on Multimedia Databases, p. 63-69. 2003
null
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The typical content-based image retrieval problem is to find images within a database that are similar to a given query image. This paper presents a solution to a different problem, namely that of content based sub-image retrieval, i.e., finding images from a database that contains another image. Note that this is different from finding a region in a (segmented) image that is similar to another image region given as a query. We present a technique for CBsIR that explores relevance feedback, i.e., the user's input on intermediary results, in order to improve retrieval efficiency. Upon modeling images as a set of overlapping and recursive tiles, we use a tile re-weighting scheme that assigns penalties to each tile of the database images and updates the tile penalties for all relevant images retrieved at each iteration using both the relevant and irrelevant images identified by the user. Each tile is modeled by means of its color content using a compact but very efficient method which can, indirectly, capture some notion of texture as well, despite the fact that only color information is maintained. Performance evaluation on a largely heterogeneous dataset of over 10,000 images shows that the system can achieve a stable average recall value of 70% within the top 20 retrieved (and presented) images after only 5 iterations, with each such iteration taking about 2 seconds on an off-the-shelf desktop computer.
[ { "version": "v1", "created": "Sun, 26 Apr 2009 17:50:33 GMT" } ]
2009-04-28T00:00:00
[ [ "Luo", "Jie", "" ], [ "Nascimento", "Mario A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0904.4048
Saloua Chettibi
Saloua Chettibi
Un protocole de routage \`a basse consommation d'\'energie pour les MANETs
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maximizing network lifetime is a very challenging issue in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by limited-capacity batteries. Furthermore, replacing or recharging batteries is often impossible in critical environments (e.g. battlefields, disaster areas, etc.). Energy consumption was considered for a long time equivalent to bandwidth consumption. However, recent works have shown that "energy" and "bandwidth" are substantially different metrics. Moreover, it was found that traditional routing policies such as "the shortest path" one can have a negative impact on energy consumption balance. Therefore, several new approaches have been proposed addressing energy efficiency explicitly. Our work is related to energy efficient routing for MANETs' problem. The proposed MEA-DSR (Multipath Energy-Aware on Demand Source Routing) protocol is based on a load sharing strategy between mobile nodes in order to maximize network lifetime. To achieve this goal, we used multipath routing; nodes' residual energies and paths length were also considered when making routing decisions. Simulation results have shown the efficiency of the proposed protocol under difficult scenarios characterised by high mobility, high density and important traffic load.
[ { "version": "v1", "created": "Sun, 26 Apr 2009 18:43:05 GMT" } ]
2009-04-28T00:00:00
[ [ "Chettibi", "Saloua", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0904.4057
Salah A. Aly
Zhenning Kong, Salah A. Aly, Emina Soljanin
Decentralized Coding Algorithms for Distributed Storage in Wireless Sensor Networks
Accepted for publication in IEEE JSAC, 2010
null
null
null
cs.IT cs.DS cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider large-scale wireless sensor networks with $n$ nodes, out of which k are in possession, (e.g., have sensed or collected in some other way) k information packets. In the scenarios in which network nodes are vulnerable because of, for example, limited energy or a hostile environment, it is desirable to disseminate the acquired information throughout the network so that each of the n nodes stores one (possibly coded) packet so that the original k source packets can be recovered, locally and in a computationally simple way from any k(1 + \epsilon) nodes for some small \epsilon > 0. We develop decentralized Fountain codes based algorithms to solve this problem. Unlike all previously developed schemes, our algorithms are truly distributed, that is, nodes do not know n, k or connectivity in the network, except in their own neighborhoods, and they do not maintain any routing tables.
[ { "version": "v1", "created": "Sun, 26 Apr 2009 20:51:56 GMT" }, { "version": "v2", "created": "Tue, 27 Oct 2009 16:11:07 GMT" } ]
2009-10-27T00:00:00
[ [ "Kong", "Zhenning", "" ], [ "Aly", "Salah A.", "" ], [ "Soljanin", "Emina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4058
Gregory Price
Jeff Arnold, Tim Abbott, Waseem Daher, Gregory Price, Nelson Elhage, Geoffrey Thomas, Anders Kaseorg
Security impact ratings considered harmful
HotOS 2009
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived security importance, in order to defer applying some updates, exposes systems to significant risk. We argue that OS vendors and security groups should not focus on security updates to the detriment of other updates, but should instead seek update technologies that make it feasible to distribute updates for all disclosed OS bugs in a timely manner.
[ { "version": "v1", "created": "Sun, 26 Apr 2009 20:57:42 GMT" } ]
2009-04-28T00:00:00
[ [ "Arnold", "Jeff", "" ], [ "Abbott", "Tim", "" ], [ "Daher", "Waseem", "" ], [ "Price", "Gregory", "" ], [ "Elhage", "Nelson", "" ], [ "Thomas", "Geoffrey", "" ], [ "Kaseorg", "Anders", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0904.4061
Zhifeng Sun
Agnes Chan, Rajmohan Rajaraman, Zhifeng Sun, Feng Zhu
Approximation Algorithms for Key Management in Secure Multicast
COCOON 2009
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many data dissemination and publish-subscribe systems that guarantee the privacy and authenticity of the participants rely on symmetric key cryptography. An important problem in such a system is to maintain the shared group key as the group membership changes. We consider the problem of determining a key hierarchy that minimizes the average communication cost of an update, given update frequencies of the group members and an edge-weighted undirected graph that captures routing costs. We first present a polynomial-time approximation scheme for minimizing the average number of multicast messages needed for an update. We next show that when routing costs are considered, the problem is NP-hard even when the underlying routing network is a tree network or even when every group member has the same update frequency. Our main result is a polynomial time constant-factor approximation algorithm for the general case where the routing network is an arbitrary weighted graph and group members have nonuniform update frequencies.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 15:28:58 GMT" } ]
2009-04-28T00:00:00
[ [ "Chan", "Agnes", "" ], [ "Rajaraman", "Rajmohan", "" ], [ "Sun", "Zhifeng", "" ], [ "Zhu", "Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0904.4064
Angelos Mantzaflaris
Ioannis Z. Emiris and Angelos Mantzaflaris
Multihomogeneous Resultant Formulae for Systems with Scaled Support
28 pages, 1 table
null
null
null
cs.SC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constructive methods for matrices of multihomogeneous (or multigraded) resultants for unmixed systems have been studied by Weyman, Zelevinsky, Sturmfels, Dickenstein and Emiris. We generalize these constructions to mixed systems, whose Newton polytopes are scaled copies of one polytope, thus taking a step towards systems with arbitrary supports. First, we specify matrices whose determinant equals the resultant and characterize the systems that admit such formulae. Bezout-type determinantal formulae do not exist, but we describe all possible Sylvester-type and hybrid formulae. We establish tight bounds for all corresponding degree vectors, and specify domains that will surely contain such vectors; the latter are new even for the unmixed case. Second, we make use of multiplication tables and strong duality theory to specify resultant matrices explicitly, for a general scaled system, thus including unmixed systems. The encountered matrices are classified; these include a new type of Sylvester-type matrix as well as Bezout-type matrices, known as partial Bezoutians. Our public-domain Maple implementation includes efficient storage of complexes in memory, and construction of resultant matrices.
[ { "version": "v1", "created": "Sun, 26 Apr 2009 21:51:10 GMT" }, { "version": "v2", "created": "Fri, 5 Jun 2009 19:14:31 GMT" }, { "version": "v3", "created": "Wed, 3 Feb 2010 10:51:44 GMT" } ]
2010-02-03T00:00:00
[ [ "Emiris", "Ioannis Z.", "" ], [ "Mantzaflaris", "Angelos", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0904.4073
Momtchil Peev
Solange Ghernaouti-Helie, Igli Tashi, Thomas Laenger, Christian Monyk
SECOQC Business White Paper
null
null
null
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In contemporary cryptographic systems, secret keys are usually exchanged by means of methods, which suffer from mathematical and technology inherent drawbacks. That could lead to unnoticed complete compromise of cryptographic systems, without a chance of control by its legitimate owners. Therefore a need for innovative solutions exists when truly and reliably secure transmission of secrets is required for dealing with critical data and applications. Quantum Cryptography (QC), in particular Quantum Key Distribution (QKD) can answer that need. The business white paper (BWP) summarizes how secret key establishment and distribution problems can be solved by quantum cryptography. It deals with several considerations related to how the quantum cryptography innovation could contribute to provide business effectiveness. It addresses advantages and also limitations of quantum cryptography, proposes a scenario case study, and invokes standardization related issues. In addition, it answers most frequently asked questions about quantum cryptography.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 01:49:40 GMT" } ]
2009-04-28T00:00:00
[ [ "Ghernaouti-Helie", "Solange", "" ], [ "Tashi", "Igli", "" ], [ "Laenger", "Thomas", "" ], [ "Monyk", "Christian", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0904.4094
Yang Jiansheng
Jiansheng Yang, Yunying Zhang
On the Upper Bounds of MDS Codes
8 Pages
null
null
null
math.CO cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Let $M_{q}(k)$ be the maximum length of MDS codes with parameters $q,k$. In this paper, the properties of $M_{q}(k)$ are studied, and some new upper bounds of $M_{q}(k)$ are obtained. Especially we obtain that $M_{q}(q-1)\leq q+2(q\equiv4(mod 6)), M_{q}(q-2)\leq q+1(q\equiv4(mod 6)), M_{q}(k)\leq q+k-3 (q=36(5s+1), s\in N$ and $ k=6,7).
[ { "version": "v1", "created": "Mon, 27 Apr 2009 06:47:15 GMT" } ]
2009-04-28T00:00:00
[ [ "Yang", "Jiansheng", "" ], [ "Zhang", "Yunying", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4119
Miko{\l}aj Boja\'nczyk
Mikolaj Bojanczyk
Two-Way Unary Temporal Logic over Trees
29 pages. Journal version of a LICS 07 paper
Logical Methods in Computer Science, Volume 5, Issue 3 (August 5, 2009) lmcs:917
10.2168/LMCS-5(3:5)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a temporal logic EF+F^-1 for unranked, unordered finite trees. The logic has two operators: EF\phi, which says "in some proper descendant \phi holds", and F^-1\phi, which says "in some proper ancestor \phi holds". We present an algorithm for deciding if a regular language of unranked finite trees can be expressed in EF+F^-1. The algorithm uses a characterization expressed in terms of forest algebras.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 09:33:44 GMT" }, { "version": "v2", "created": "Wed, 5 Aug 2009 18:19:12 GMT" } ]
2015-07-01T00:00:00
[ [ "Bojanczyk", "Mikolaj", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0904.4120
Ugo Dal Lago
Ugo Dal Lago and Simone Martini
On Constructor Rewrite Systems and the Lambda-Calculus (Long Version)
20 pages. Extended version of a paper in the proceedings of ICALP 2009, Track B
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that orthogonal constructor term rewrite systems and lambda-calculus with weak (i.e., no reduction is allowed under the scope of a lambda-abstraction) call-by-value reduction can simulate each other with a linear overhead. In particular, weak call-by-value beta-reduction can be simulated by an orthogonal constructor term rewrite system in the same number of reduction steps. Conversely, each reduction in a term rewrite system can be simulated by a constant number of beta-reduction steps. This is relevant to implicit computational complexity, because the number of beta steps to normal form is polynomially related to the actual cost (that is, as performed on a Turing machine) of normalization, under weak call-by-value reduction. Orthogonal constructor term rewrite systems and lambda-calculus are thus both polynomially related to Turing machines, taking as notion of cost their natural parameters.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 09:49:14 GMT" }, { "version": "v2", "created": "Sun, 5 Jul 2009 16:31:15 GMT" }, { "version": "v3", "created": "Tue, 20 Oct 2009 13:32:34 GMT" }, { "version": "v4", "created": "Thu, 2 Aug 2012 15:16:46 GMT" } ]
2012-08-03T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Martini", "Simone", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0904.4152
Danny van Dyk
Danny van Dyk, Markus Geveler, Sven Mallach, Dirk Ribbrock, Dominik Goeddeke, Carsten Gutwenger
HONEI: A collection of libraries for numerical computations targeting multiple processor architectures
19 pages, 7 figures
Computer Physics Communications 180(12), pp. 2534-2543, December 2009
10.1016/j.cpc.2009.04.018
DO-TH 09/05
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present HONEI, an open-source collection of libraries offering a hardware oriented approach to numerical calculations. HONEI abstracts the hardware, and applications written on top of HONEI can be executed on a wide range of computer architectures such as CPUs, GPUs and the Cell processor. We demonstrate the flexibility and performance of our approach with two test applications, a Finite Element multigrid solver for the Poisson problem and a robust and fast simulation of shallow water waves. By linking against HONEI's libraries, we achieve a twofold speedup over straight forward C++ code using HONEI's SSE backend, and additional 3-4 and 4-16 times faster execution on the Cell and a GPU. A second important aspect of our approach is that the full performance capabilities of the hardware under consideration can be exploited by adding optimised application-specific operations to the HONEI libraries. HONEI provides all necessary infrastructure for development and evaluation of such kernels, significantly simplifying their development.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 13:00:36 GMT" } ]
2010-06-28T00:00:00
[ [ "van Dyk", "Danny", "" ], [ "Geveler", "Markus", "" ], [ "Mallach", "Sven", "" ], [ "Ribbrock", "Dirk", "" ], [ "Goeddeke", "Dominik", "" ], [ "Gutwenger", "Carsten", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0904.4155
Jeong-woo Cho
Jeong-woo Cho, Yuming Jiang
Fundamentals of the Backoff Process in 802.11: Dichotomy of the Aggregation
15 pages, 4 figures; An abstract version of this paper was presented at ACM SIGMETRICS Workshop on MAthematical performance Modeling and Analysis (MAMA 2009)
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discovers fundamental principles of the backoff process that governs the performance of IEEE 802.11. A simplistic principle founded upon regular variation theory is that the backoff time has a truncated Pareto-type tail distribution with an exponent of $(\log \gamma)/\log m$ ($m$ is the multiplicative factor and $\gamma$ is the collision probability). This reveals that the per-node backoff process is heavy-tailed in the strict sense for $\gamma>1/m^2$, and paves the way for the following unifying result. The state-of-the-art theory on the superposition of the heavy-tailed processes is applied to establish a dichotomy exhibited by the aggregate backoff process, putting emphasis on the importance of time-scale on which we view the backoff processes. While the aggregation on normal time-scales leads to a Poisson process, it is approximated by a new limiting process possessing long-range dependence (LRD) on coarse time-scales. This dichotomy turns out to be instrumental in formulating short-term fairness, extending existing formulas to arbitrary population, and to elucidate the absence of LRD in practical situations. A refined wavelet analysis is conducted to strengthen this argument.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 13:33:06 GMT" }, { "version": "v2", "created": "Wed, 20 May 2009 17:02:30 GMT" }, { "version": "v3", "created": "Wed, 2 Dec 2009 05:40:09 GMT" }, { "version": "v4", "created": "Wed, 7 Apr 2010 11:40:23 GMT" }, { "version": "v5", "created": "Fri, 20 Aug 2010 14:01:27 GMT" } ]
2010-08-23T00:00:00
[ [ "Cho", "Jeong-woo", "" ], [ "Jiang", "Yuming", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0904.4174
Oleksii Ignatenko
O. Ignatenko
Denial of service attack in the Internet: agent-based intrusion detection and reaction
6 pages, 3 figures
null
null
null
cs.NI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with denial of service attack. Overview of the existing attacks and methods is proposed. Classification scheme is presented for a different denial of service attacks. There is considered agent-based intrusion detection systems architecture. Considered main components and working principles for a systems of such kind.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 14:33:57 GMT" } ]
2009-09-30T00:00:00
[ [ "Ignatenko", "O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0904.4176
Pierre-Francois Marteau
Nicolas Bonnel (VALORIA), Pierre-Fran\c{c}ois Marteau (VALORIA), Gildas G. M\'enier (VALORIA)
Parallel Random Apollonian Networks
Working paper
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present and study in this paper a simple algorithm that produces so called growing Parallel Random Apollonian Networks (P-RAN) in any dimension d. Analytical derivations show that these networks still exhibit small-word and scale-free characteristics. To characterize further the structure of P-RAN, we introduce new parameters that we refer to as the parallel degree and the parallel coefficient, that determine locally and in average the number of vertices inside the (d+1)-cliques composing the network. We provide analytical derivations for the computation of the degree and parallel degree distributions, parallel and clustering coefficients. We give an upper bound for the average path lengths for P-RAN and finally show that our derivations are in very good agreement with our simulations.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 14:45:26 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 09:08:22 GMT" } ]
2009-04-30T00:00:00
[ [ "Bonnel", "Nicolas", "", "VALORIA" ], [ "Marteau", "Pierre-François", "", "VALORIA" ], [ "Ménier", "Gildas G.", "", "VALORIA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0904.4181
Husam Alustwani Mr
Husam Alustwani, Jacques M. Bahi, Ahmed Mostefaoui, Michel Salomon
Java Technology : a Strategic Solution for Interactive Distributed Applications
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a world demanding the best performance from financial investments, distributed applications occupy the first place among the proposed solutions. This particularity is due to their distributed architecture which is able to acheives high performance. Currently, many research works aim to develop tools that facilitate the implementation of such applications. The urgent need for such applications in all areas pushes researchers to accelerate this process. However, the lack of standardization results in the absence of strategic decisions taken by computer science community. In this article, we argue that Java technology represents an elegant compromise ahead of the list of the currently available solutions. In fact, by promoting the independence of hardware and software, Java technology makes it possible to overcome pitfalls that are inherent to the creation of distributed applications.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 15:16:32 GMT" } ]
2009-04-28T00:00:00
[ [ "Alustwani", "Husam", "" ], [ "Bahi", "Jacques M.", "" ], [ "Mostefaoui", "Ahmed", "" ], [ "Salomon", "Michel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0904.4193
Shahar Dobzinski
Shahar Dobzinski, Shaddin Dughmi
On the Power of Randomization in Algorithmic Mechanism Design
null
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many settings the power of truthful mechanisms is severely bounded. In this paper we use randomization to overcome this problem. In particular, we construct an FPTAS for multi-unit auctions that is truthful in expectation, whereas there is evidence that no polynomial-time truthful deterministic mechanism provides an approximation ratio better than 2. We also show for the first time that truthful in expectation polynomial-time mechanisms are \emph{provably} stronger than polynomial-time universally truthful mechanisms. Specifically, we show that there is a setting in which: (1) there is a non-polynomial time truthful mechanism that always outputs the optimal solution, and that (2) no universally truthful randomized mechanism can provide an approximation ratio better than 2 in polynomial time, but (3) an FPTAS that is truthful in expectation exists.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 15:58:08 GMT" }, { "version": "v2", "created": "Mon, 24 Aug 2009 18:30:27 GMT" } ]
2009-08-24T00:00:00
[ [ "Dobzinski", "Shahar", "" ], [ "Dughmi", "Shaddin", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0904.4202
Emmanuel Lochin
Pierre-Ugo Tournoux, Emmanuel Lochin, Jerome Lacan, Amine Bouabdallah, Vincent Roca
On-the-fly erasure coding for real-time video applications
null
null
10.1109/TMM.2011.2126564
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a robust point-to-point transmission scheme: Tetrys, that relies on a novel on-the-fly erasure coding concept which reduces the delay for recovering lost data at the receiver side. In current erasure coding schemes, the packets that are not rebuilt at the receiver side are either lost or delayed by at least one RTT before transmission to the application. The present contribution aims at demonstrating that Tetrys coding scheme can fill the gap between real-time applications requirements and full reliability. Indeed, we show that in several cases, Tetrys can recover lost packets below one RTT over lossy and best-effort networks. We also show that Tetrys allows to enable full reliability without delay compromise and as a result: significantly improves the performance of time constrained applications. For instance, our evaluations present that video-conferencing applications obtain a PSNR gain up to 7dB compared to classic block-based erasure codes.
[ { "version": "v1", "created": "Mon, 27 Apr 2009 16:09:33 GMT" }, { "version": "v2", "created": "Wed, 17 Feb 2010 07:23:23 GMT" }, { "version": "v3", "created": "Fri, 12 Nov 2010 09:03:43 GMT" }, { "version": "v4", "created": "Tue, 16 Nov 2010 12:41:51 GMT" } ]
2012-04-03T00:00:00
[ [ "Tournoux", "Pierre-Ugo", "" ], [ "Lochin", "Emmanuel", "" ], [ "Lacan", "Jerome", "" ], [ "Bouabdallah", "Amine", "" ], [ "Roca", "Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0904.4283
Cong Shen
Cong Shen and Michael P. Fitz
Opportunistic Spatial Orthogonalization and Its Application in Fading Cognitive Radio Networks
26 pages, 6 figures, submitted for journal publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Opportunistic Spatial Orthogonalization (OSO) is a cognitive radio scheme that allows the existence of secondary users and hence increases the system throughput, even if the primary user occupies all the frequency bands all the time. Notably, this throughput advantage is obtained without sacrificing the performance of the primary user, if the interference margin is carefully chosen. The key idea is to exploit the spatial dimensions to orthogonalize users and hence minimize interference. However, unlike the time and frequency dimensions, there is no universal basis for the set of all multi-dimensional spatial channels, which motivated the development of OSO. On one hand, OSO can be viewed as a multi-user diversity scheme that exploits the channel randomness and independence. On the other hand, OSO can be interpreted as an opportunistic interference alignment scheme, where the interference from multiple secondary users is opportunistically aligned at the direction that is orthogonal to the primary user's signal space. In the case of multiple-input multiple-output (MIMO) channels, the OSO scheme can be interpreted as "riding the peaks" over the eigen-channels, and ill-conditioned MIMO channel, which is traditionally viewed as detrimental, is shown to be beneficial with respect to the sum throughput. Throughput advantages are thoroughly studied, both analytically and numerically.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 00:11:22 GMT" } ]
2009-04-29T00:00:00
[ [ "Shen", "Cong", "" ], [ "Fitz", "Michael P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4312
David Eppstein
David Eppstein and Elena Mumford
Orientation-Constrained Rectangular Layouts
To appear at Algorithms and Data Structures Symposium, Banff, Canada, August 2009. 12 pages, 5 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct partitions of rectangles into smaller rectangles from an input consisting of a planar dual graph of the layout together with restrictions on the orientations of edges and junctions of the layout. Such an orientation-constrained layout, if it exists, may be constructed in polynomial time, and all orientation-constrained layouts may be listed in polynomial time per layout.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 06:01:53 GMT" } ]
2009-04-29T00:00:00
[ [ "Eppstein", "David", "" ], [ "Mumford", "Elena", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0904.4331
Prabhu Manyem
Prabhu Manyem
Lower Bounds on Syntactic Logic Expressions for Optimization Problems and Duality using Lagrangian Dual to characterize optimality conditions
An expansion of the previous version to include: a single call to a decision Turing machine to solve optimization problems obeying strong duality in polynomial time
null
null
null
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that simple syntactic expressions such as existential second order (ESO) universal Horn formulae can express NP-hard optimisation problems. There is a significant difference between the expressibilities of decision problems and optimisation problems. This is similar to the difference in computation times for the two classes of problems; for example, a 2SAT Horn formula can be satisfied in polynomial time, whereas the optimisation version in NP-hard. It is known that all polynomially solvable decision problems can be expressed as ESO universal ($\Pi_1$) Horn sentences in the presence of a successor relation. We show here that, on the other hand, if $P \neq NP$, optimisation problems defy such a characterisation, by demonstrating that even a $\Pi_0$ (quantifier free) Horn formula is unable to guarantee polynomial time solvability. Finally, by connecting concepts in optimisation duality with those in descriptive complexity, we will show a method by which optimisation problems can be solved by a single call to a "decision" Turing machine, as opposed to multiple calls using a classical binary search setting.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 08:28:11 GMT" }, { "version": "v2", "created": "Wed, 6 May 2009 04:08:41 GMT" }, { "version": "v3", "created": "Sun, 24 Jul 2011 09:15:16 GMT" } ]
2011-07-26T00:00:00
[ [ "Manyem", "Prabhu", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0904.4343
Roland Tresch
Roland Tresch, Maxime Guillaud, and Erwin Riegler
On the Achievability of Interference Alignment in the K-User Constant MIMO Interference Channel
submitted to IEEE Workshop on Statistical Signal Processing (SSP09)
null
10.1109/SSP.2009.5278586
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interference alignment in the K-user MIMO interference channel with constant channel coefficients is considered. A novel constructive method for finding the interference alignment solution is proposed for the case where the number of transmit antennas equals the number of receive antennas (NT = NR = N), the number of transmitter-receiver pairs equals K = N + 1, and all interference alignment multiplexing gains are one. The core of the method consists of solving an eigenvalue problem that incorporates the channel matrices of all interfering links. This procedure provides insight into the feasibility of signal vector spaces alignment schemes in finite dimensional MIMO interference channels.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 09:57:52 GMT" } ]
2016-11-18T00:00:00
[ [ "Tresch", "Roland", "" ], [ "Guillaud", "Maxime", "" ], [ "Riegler", "Erwin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4358
Maben Rabi
Maben Rabi, George V. Moustakides, John S. Baras
Adaptive sampling for linear state estimation
Submitted to the SIAM journal on control and optimization. 32 pages, 7 figures
null
null
IR-EE-RT 2009:019
math.OC cs.SY math.PR math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When a sensor has continuous measurements but sends limited messages over a data network to a supervisor which estimates the state, the available packet rate fixes the achievable quality of state estimation. When such rate limits turn stringent, the sensor's messaging policy should be designed anew. What are the good causal messaging policies ? What should message packets contain ? What is the lowest possible distortion in a causal estimate at the supervisor ? Is Delta sampling better than periodic sampling ? We answer these questions under an idealized model of the network and the assumption of perfect measurements at the sensor. For a scalar, linear diffusion process, we study the problem of choosing the causal sampling times that will give the lowest aggregate squared error distortion. We stick to finite-horizons and impose a hard upper bound on the number of allowed samples. We cast the design as a problem of choosing an optimal sequence of stopping times. We reduce this to a nested sequence of problems each asking for a single optimal stopping time. Under an unproven but natural assumption about the least-square estimate at the supervisor, each of these single stopping problems are of standard form. The optimal stopping times are random times when the estimation error exceeds designed envelopes. For the case where the state is a Brownian motion, we give analytically: the shape of the optimal sampling envelopes, the shape of the envelopes under optimal Delta sampling, and their performances. Surprisingly, we find that Delta sampling performs badly. Hence, when the rate constraint is a hard limit on the number of samples over a finite horizon, we should should not use Delta sampling.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 10:08:58 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2011 10:58:47 GMT" } ]
2011-07-21T00:00:00
[ [ "Rabi", "Maben", "" ], [ "Moustakides", "George V.", "" ], [ "Baras", "John S.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0904.4360
Arnab Bhattacharyya
Arnab Bhattacharyya and Bernhard Haeupler
Robust Regulatory Networks
null
null
null
null
q-bio.MN cs.CC q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the characteristic features of genetic networks is their inherent robustness, that is, their ability to retain functionality in spite of the introduction of random errors. In this paper, we seek to better understand how robustness is achieved and what functionalities can be maintained robustly. Our goal is to formalize some of the language used in biological discussions in a reasonable mathematical framework, where questions can be answered in a rigorous fashion. These results provide basic conceptual understanding of robust regulatory networks that should be valuable independent of the details of the formalism. We model the gene regulatory network as a boolean network, a general and well-established model introduced by Stuart Kauffman. A boolean network is said to be in a viable configuration if the node states of the network at its fixpoint satisfy some given constraint. We specify how mutations affect the behavior of the boolean network. A network is then said to be robust if most random mutations to the network reach a viable configuration. The main question investigated in our study is: given a constraint on the fixpoint configuration, does there exist a network that is robust with respect to it and, if so, what is its structure? We demonstrate both explicit constructions of robust networks as well as negative results disproving their existence.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 10:46:26 GMT" } ]
2009-04-29T00:00:00
[ [ "Bhattacharyya", "Arnab", "" ], [ "Haeupler", "Bernhard", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0904.4411
Jean-Philippe Auzelle
Jean-Philippe Auzelle (CRAN), Olivier Nartz (AIP), Jean-Yves Bron (CRAN, AIP)
Ing\'enierie syst\`eme d'un syst\`eme d'information d'entreprise centr\'e sur le produit bas\'ee sur un cadre de mod\'elisation multi-\'echelles : application \`a un cas d'\'etude de l'AIP lorrain
null
11\`eme Colloque National AIP PRIMECA, La Plagne : France (2009)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Through its projects, the ?Atelier Inter-\'etablissements de Productique Lorrain? (AIPL), as the owner and contractor of rank 1, is committed to provide his customers (teachers, training courses, students etc...) credible teaching materials at the scale of a real industrial flexible production of goods and services. In this changing context, its managerial team has chosen to suppress the CIM concept, which proposes an integrated enterprise, to steering distributed system information (SI), heterogeneous, autonomous and scalable depending on the ephemeral cooperation between industrial partners who now exchanges information and material flows. These aspects are studied in research on CRAN (Centre de Recherche en Automatique de Nancy ? Research Centre for Automatic Control) as part of a thesis based on the recursive aspect of systems and their models and their multi-scale aspects and multi-views, in a Model-Based-System-Engineering (MBSE) methodology proposal of an System-Engineering (SE) focused on the product. To validate this research, a MBSE has been implemented on a case study to AIPL: the "eLearning in eProduction? project.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 14:24:23 GMT" } ]
2009-04-29T00:00:00
[ [ "Auzelle", "Jean-Philippe", "", "CRAN" ], [ "Nartz", "Olivier", "", "AIP" ], [ "Bron", "Jean-Yves", "", "CRAN, AIP" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0904.4412
Anne Canteaut
Anne Canteaut (INRIA Rocquencourt), Maria Naya-Plasencia (INRIA Rocquencourt)
Computing the biases of parity-check relations
null
2009 IEEE International Symposium on Information Theory (ISIT2009), Seoul : Cor\'ee, R\'epublique de (2009)
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A divide-and-conquer cryptanalysis can often be mounted against some keystream generators composed of several (nonlinear) independent devices combined by a Boolean function. In particular, any parity-check relation derived from the periods of some constituent sequences usually leads to a distinguishing attack whose complexity is determined by the bias of the relation. However, estimating this bias is a difficult problem since the piling-up lemma cannot be used. Here, we give two exact expressions for this bias. Most notably, these expressions lead to a new algorithm for computing the bias of a parity-check relation, and they also provide some simple formulae for this bias in some particular cases which are commonly used in cryptography.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 14:25:48 GMT" } ]
2009-04-29T00:00:00
[ [ "Canteaut", "Anne", "", "INRIA Rocquencourt" ], [ "Naya-Plasencia", "Maria", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0904.4429
David Orden
David Orden, Pedro Ramos, Gelasio Salazar
The number of generalized balanced lines
6 pages, 3 figures, several typos fixed, reference added
Discrete and Computational Geometry 44:4 (2010), 805-811
10.1007/s00454-010-9253-4
null
math.CO cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $S$ be a set of $r$ red points and $b=r+2d$ blue points in general position in the plane, with $d\geq 0$. A line $\ell$ determined by them is said to be balanced if in each open half-plane bounded by $\ell$ the difference between the number of red points and blue points is $d$. We show that every set $S$ as above has at least $r$ balanced lines. The main techniques in the proof are rotations and a generalization, sliding rotations, introduced here.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 15:32:27 GMT" }, { "version": "v2", "created": "Sat, 2 May 2009 14:34:28 GMT" }, { "version": "v3", "created": "Fri, 22 May 2009 10:38:09 GMT" } ]
2020-07-21T00:00:00
[ [ "Orden", "David", "" ], [ "Ramos", "Pedro", "" ], [ "Salazar", "Gelasio", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0904.4449
Martin Loebl
Lukas Kencl, Martin Loebl
DNA-Inspired Information Concealing
null
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Protection of the sensitive content is crucial for extensive information sharing. We present a technique of information concealing, based on introduction and maintenance of families of repeats. Repeats in DNA constitute a basic obstacle for its reconstruction by hybridization.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 17:27:54 GMT" } ]
2009-04-29T00:00:00
[ [ "Kencl", "Lukas", "" ], [ "Loebl", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4458
Michael Goodrich
Michael T. Goodrich
Learning Character Strings via Mastermind Queries, with a Case Study Involving mtDNA
Full version of related paper appearing in IEEE Symposium on Security and Privacy 2009, "The Mastermind Attack on Genomic Data." This version corrects the proofs of what are now Theorems 2 and 4.
null
10.1109/TIT.2012.2208581
null
cs.DS cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the degree to which a character string, $Q$, leaks details about itself any time it engages in comparison protocols with a strings provided by a querier, Bob, even if those protocols are cryptographically guaranteed to produce no additional information other than the scores that assess the degree to which $Q$ matches strings offered by Bob. We show that such scenarios allow Bob to play variants of the game of Mastermind with $Q$ so as to learn the complete identity of $Q$. We show that there are a number of efficient implementations for Bob to employ in these Mastermind attacks, depending on knowledge he has about the structure of $Q$, which show how quickly he can determine $Q$. Indeed, we show that Bob can discover $Q$ using a number of rounds of test comparisons that is much smaller than the length of $Q$, under reasonable assumptions regarding the types of scores that are returned by the cryptographic protocols and whether he can use knowledge about the distribution that $Q$ comes from. We also provide the results of a case study we performed on a database of mitochondrial DNA, showing the vulnerability of existing real-world DNA data to the Mastermind attack.
[ { "version": "v1", "created": "Tue, 28 Apr 2009 18:12:24 GMT" }, { "version": "v2", "created": "Tue, 13 Apr 2010 05:31:22 GMT" } ]
2016-11-15T00:00:00
[ [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4512
Andr\'as Salamon
Andr\'as Z. Salamon and Vashti Galpin
Bounds on series-parallel slowdown
12 pages, 4 figures
null
null
null
cs.DC cs.CC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use activity networks (task graphs) to model parallel programs and consider series-parallel extensions of these networks. Our motivation is two-fold: the benefits of series-parallel activity networks and the modelling of programming constructs, such as those imposed by current parallel computing environments. Series-parallelisation adds precedence constraints to an activity network, usually increasing its makespan (execution time). The slowdown ratio describes how additional constraints affect the makespan. We disprove an existing conjecture positing a bound of two on the slowdown when workload is not considered. Where workload is known, we conjecture that 4/3 slowdown is always achievable, and prove our conjecture for small networks using max-plus algebra. We analyse a polynomial-time algorithm showing that achieving 4/3 slowdown is in exp-APX. Finally, we discuss the implications of our results.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 01:39:57 GMT" } ]
2009-04-30T00:00:00
[ [ "Salamon", "András Z.", "" ], [ "Galpin", "Vashti", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0904.4525
Paul Tune PT
Paul Tune, Sibiraj Bhaskaran Pillai and Stephen Hanly
Number of Measurements in Sparse Signal Recovery
6 pages, 1 figure. Extended from conference version with proofs included
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the asymptotic performance of sparse signal recovery from noisy measurements. In particular, we generalize some of the existing results for the Gaussian case to subgaussian and other ensembles. An achievable result is presented for the linear sparsity regime. A converse on the number of required measurements in the sub-linear regime is also presented, which cover many of the widely used measurement ensembles. Our converse idea makes use of a correspondence between compressed sensing ideas and compound channels in information theory.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 02:27:31 GMT" } ]
2009-04-30T00:00:00
[ [ "Tune", "Paul", "" ], [ "Pillai", "Sibiraj Bhaskaran", "" ], [ "Hanly", "Stephen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4526
Syed Jafar
Cenk M. Yetis, Syed A. Jafar, Ahmet H. Kayran
Feasibility Conditions for Interference Alignment
6 pages. Submitted to IEEE Globecom March 31 2009
IEEE Transactions on Signal Processing, Sep. 2010, Vol. 58, Issue: 9, Pages: 4771-4782
10.1109/TSP.2010.2050480
null
cs.IT cs.AR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The degrees of freedom of MIMO interference networks with constant channel coefficients are not known in general. Determining the feasibility of a linear interference alignment solution is a key step toward solving this open problem. Our approach in this paper is to view the alignment problem as a system of bilinear equations and determine its solvability by comparing the number of equations and the number of variables. To this end, we divide interference alignment problems into two classes - proper and improper. An interference alignment problem is called proper if the number of equations does not exceed the number of variables. Otherwise, it is called improper. Examples are presented to support the intuition that for generic channel matrices, proper systems are almost surely feasible and improper systems are almost surely infeasible.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 03:11:52 GMT" } ]
2015-05-13T00:00:00
[ [ "Yetis", "Cenk M.", "" ], [ "Jafar", "Syed A.", "" ], [ "Kayran", "Ahmet H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4527
Marcus Hutter
Alberto Piatti and Marco Zaffalon and Fabio Trojani and Marcus Hutter
Limits of Learning about a Categorical Latent Variable under Prior Near-Ignorance
27 LaTeX pages
International Journal of Approximate Reasoning, 50:4 (2009) pages 597-611
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the coherent theory of (epistemic) uncertainty of Walley, in which beliefs are represented through sets of probability distributions, and we focus on the problem of modeling prior ignorance about a categorical random variable. In this setting, it is a known result that a state of prior ignorance is not compatible with learning. To overcome this problem, another state of beliefs, called \emph{near-ignorance}, has been proposed. Near-ignorance resembles ignorance very closely, by satisfying some principles that can arguably be regarded as necessary in a state of ignorance, and allows learning to take place. What this paper does, is to provide new and substantial evidence that also near-ignorance cannot be really regarded as a way out of the problem of starting statistical inference in conditions of very weak beliefs. The key to this result is focusing on a setting characterized by a variable of interest that is \emph{latent}. We argue that such a setting is by far the most common case in practice, and we provide, for the case of categorical latent variables (and general \emph{manifest} variables) a condition that, if satisfied, prevents learning to take place under prior near-ignorance. This condition is shown to be easily satisfied even in the most common statistical problems. We regard these results as a strong form of evidence against the possibility to adopt a condition of prior near-ignorance in real statistical problems.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 03:16:20 GMT" } ]
2014-07-15T00:00:00
[ [ "Piatti", "Alberto", "" ], [ "Zaffalon", "Marco", "" ], [ "Trojani", "Fabio", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0904.4530
Fei Li
Fei Li, Zhi Zhang
Online Maximizing Weighted Throughput In A Fading Channel
9 pages, appears in ISIT 2009
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider online scheduling weighted packets with time constraints over a fading channel. Packets arrive at the transmitter in an online manner. Each packet has a value and a deadline by which it should be sent. The fade state of the channel determines the throughput obtained per unit of time and the channel's quality may change over time. In this paper, we design online algorithms to maximize weighted throughput, defined as the total value of the packets sent by their respective deadlines. Competitive ratio is employed to measure an online algorithm's performance. For this problem and one of its variants, we present two online algorithms with competitive ratios 2.618 and 2 respectively.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 04:11:35 GMT" } ]
2009-09-30T00:00:00
[ [ "Li", "Fei", "" ], [ "Zhang", "Zhi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4541
Amin Gohari
Amin Aminzadeh Gohari and Venkat Anantharam
Evaluation of Marton's Inner Bound for the General Broadcast Channel
29 pages, 2 figures. Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The best known inner bound on the two-receiver general broadcast channel without a common message is due to Marton [3]. This result was subsequently generalized in [p. 391, Problem 10(c) 2] and [4] to broadcast channels with a common message. However the latter region is not computable (except in certain special cases) as no bounds on the cardinality of its auxiliary random variables exist. Nor is it even clear that the inner bound is a closed set. The main obstacle in proving cardinality bounds is the fact that the traditional use of the Carath\'{e}odory theorem, the main known tool for proving cardinality bounds, does not yield a finite cardinality result. One of the main contributions of this paper is the introduction of a new tool based on an identity that relates the second derivative of the Shannon entropy of a discrete random variable (under a certain perturbation) to the corresponding Fisher information. In order to go beyond the traditional Carath\'{e}odory type arguments, we identify certain properties that the auxiliary random variables corresponding to the extreme points of the inner bound need to satisfy. These properties are then used to establish cardinality bounds on the auxiliary random variables of the inner bound, thereby proving the computability of the region, and its closedness. Lastly, we establish a conjecture of \cite{NairZizhou} that Marton's inner bound and the recent outer bound of Nair and El Gamal do not match in general.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 06:50:00 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 04:09:50 GMT" }, { "version": "v3", "created": "Sat, 28 May 2011 12:26:06 GMT" } ]
2011-05-31T00:00:00
[ [ "Gohari", "Amin Aminzadeh", "" ], [ "Anantharam", "Venkat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4542
Amin Gohari
Amin Aminzadeh Gohari and Venkat Anantharam
A Generalized Cut-Set Bound
22 pages, 1 figure, a short version of it appears in ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we generalize the well known cut-set bound to the problem of lossy transmission of functions of arbitrarily correlated sources over a discrete memoryless multiterminal network.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 07:00:57 GMT" } ]
2009-04-30T00:00:00
[ [ "Gohari", "Amin Aminzadeh", "" ], [ "Anantharam", "Venkat", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4587
Juan-Manuel Torres-Moreno
Juan-Manuel Torres-Moreno and Mirta B. Gordon
Adaptive Learning with Binary Neurons
29 pages, 7 figures
null
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A efficient incremental learning algorithm for classification tasks, called NetLines, well adapted for both binary and real-valued input patterns is presented. It generates small compact feedforward neural networks with one hidden layer of binary units and binary output units. A convergence theorem ensures that solutions with a finite number of hidden units exist for both binary and real-valued input patterns. An implementation for problems with more than two classes, valid for any binary classifier, is proposed. The generalization error and the size of the resulting networks are compared to the best published results on well-known classification benchmarks. Early stopping is shown to decrease overfitting, without improving the generalization performance.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 11:49:45 GMT" } ]
2009-04-30T00:00:00
[ [ "Torres-Moreno", "Juan-Manuel", "" ], [ "Gordon", "Mirta B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0904.4600
Tommy F\"arnqvist
Robert Engstr\"om, Tommy F\"arnqvist, Peter Jonsson and Johan Thapper
Graph Homomorphisms, Circular Colouring, and Fractional Covering by H-cuts
24 pages, 1 figure Corrected the statements of Lemma 4.3 and 4.4
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph homomorphism is a vertex map which carries edges from a source graph to edges in a target graph. The instances of the Weighted Maximum H-Colourable Subgraph problem (MAX H-COL) are edge-weighted graphs G and the objective is to find a subgraph of G that has maximal total edge weight, under the condition that the subgraph has a homomorphism to H; note that for H=K_k this problem is equivalent to MAX k-CUT. Farnqvist et al. have introduced a parameter on the space of graphs that allows close study of the approximability properties of MAX H-COL. Specifically, it can be used to extend previously known (in)approximability results to larger classes of graphs. Here, we investigate the properties of this parameter on circular complete graphs K_{p/q}, where 2 <= p/q <= 3. The results are extended to K_4-minor-free graphs and graphs with bounded maximum average degree. We also consider connections with Samal's work on fractional covering by cuts: we address, and decide, two conjectures concerning cubical chromatic numbers.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 12:50:46 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 07:54:28 GMT" }, { "version": "v3", "created": "Wed, 18 Nov 2009 13:46:15 GMT" } ]
2009-11-18T00:00:00
[ [ "Engström", "Robert", "" ], [ "Färnqvist", "Tommy", "" ], [ "Jonsson", "Peter", "" ], [ "Thapper", "Johan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0904.4608
Srivatsan Laxman
Srivatsan Laxman, Basel Shadid, P. S. Sastry and K. P. Unnikrishnan
Temporal data mining for root-cause analysis of machine faults in automotive assembly lines
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Engine assembly is a complex and heavily automated distributed-control process, with large amounts of faults data logged everyday. We describe an application of temporal data mining for analyzing fault logs in an engine assembly plant. Frequent episode discovery framework is a model-free method that can be used to deduce (temporal) correlations among events from the logs in an efficient manner. In addition to being theoretically elegant and computationally efficient, frequent episodes are also easy to interpret in the form actionable recommendations. Incorporation of domain-specific information is critical to successful application of the method for analyzing fault logs in the manufacturing domain. We show how domain-specific knowledge can be incorporated using heuristic rules that act as pre-filters and post-filters to frequent episode discovery. The system described here is currently being used in one of the engine assembly plants of General Motors and is planned for adaptation in other plants. To the best of our knowledge, this paper presents the first real, large-scale application of temporal data mining in the manufacturing domain. We believe that the ideas presented in this paper can help practitioners engineer tools for analysis in other similar or related application domains as well.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 13:17:31 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2009 17:02:30 GMT" } ]
2009-04-30T00:00:00
[ [ "Laxman", "Srivatsan", "" ], [ "Shadid", "Basel", "" ], [ "Sastry", "P. S.", "" ], [ "Unnikrishnan", "K. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0904.4615
Maria Potop-Butucaru
Swan Dubois (INRIA Rocquencourt, LIP6), Maria Potop-Butucaru (INRIA Rocquencourt, LIP6), S\'ebastien Tixeuil (LIP6)
Dynamic FTSS in Asynchronous Systems: the Case of Unison
null
null
null
null
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed fault-tolerance can mask the effect of a limited number of permanent faults, while self-stabilization provides forward recovery after an arbitrary number of transient fault hit the system. FTSS protocols combine the best of both worlds since they are simultaneously fault-tolerant and self-stabilizing. To date, FTSS solutions either consider static (i.e. fixed point) tasks, or assume synchronous scheduling of the system components. In this paper, we present the first study of dynamic tasks in asynchronous systems, considering the unison problem as a benchmark. Unison can be seen as a local clock synchronization problem as neighbors must maintain digital clocks at most one time unit away from each other, and increment their own clock value infinitely often. We present many impossibility results for this difficult problem and propose a FTSS solution when the problem is solvable that exhibits optimal fault containment.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 14:04:59 GMT" }, { "version": "v2", "created": "Thu, 10 Feb 2011 16:21:28 GMT" } ]
2011-02-11T00:00:00
[ [ "Dubois", "Swan", "", "INRIA Rocquencourt, LIP6" ], [ "Potop-Butucaru", "Maria", "", "INRIA\n Rocquencourt, LIP6" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0904.4670
Michael Goodrich
Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas Polu
Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima Searching, and 2-d Nearest Neighbors in Any Minkowski Metric
Expanded version of a paper that appeared in WADS 2007
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies a discrepancy-sensitive approach to dynamic fractional cascading. We provide an efficient data structure for dominated maxima searching in a dynamic set of points in the plane, which in turn leads to an efficient dynamic data structure that can answer queries for nearest neighbors using any Minkowski metric. We provide an efficient data structure for dominated maxima searching in a dynamic set of points in the plane, which in turn leads to an efficient dynamic data structure that can answer queries for nearest neighbors using any Minkowski metric.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 18:15:55 GMT" } ]
2009-04-30T00:00:00
[ [ "Atallah", "Mikhail J.", "" ], [ "Blanton", "Marina", "" ], [ "Goodrich", "Michael T.", "" ], [ "Polu", "Stanislas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0904.4686
Cyril Allauzen
Cyril Allauzen and Mehryar Mohri
Linear-Space Computation of the Edit-Distance between a String and a Finite Automaton
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of computing the edit-distance between a string and a finite automaton arises in a variety of applications in computational biology, text processing, and speech recognition. This paper presents linear-space algorithms for computing the edit-distance between a string and an arbitrary weighted automaton over the tropical semiring, or an unambiguous weighted automaton over an arbitrary semiring. It also gives an efficient linear-space algorithm for finding an optimal alignment of a string and such a weighted automaton.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 19:32:53 GMT" } ]
2009-04-30T00:00:00
[ [ "Allauzen", "Cyril", "" ], [ "Mohri", "Mehryar", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0904.4708
George Tsatsaronis
George Tsatsaronis, Maria Halkidi, Emmanouel A. Giakoumakis
Quality Classifiers for Open Source Software Repositories
10 pages, 2 Tables, 7 equations, 13 references. Appeared in 2nd Artificial Intelligence Techniques in Software Engineering Workshop, AIAI 2009
2nd Artificial Intelligence Techniques in Software Engineering Workshop, 5th IFIP Conference on Artificial Intelligence Applications and Innovations, April 23-25, 2009, Thessaloniki, Greece
null
null
cs.SE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Open Source Software (OSS) often relies on large repositories, like SourceForge, for initial incubation. The OSS repositories offer a large variety of meta-data providing interesting information about projects and their success. In this paper we propose a data mining approach for training classifiers on the OSS meta-data provided by such data repositories. The classifiers learn to predict the successful continuation of an OSS project. The `successfulness' of projects is defined in terms of the classifier confidence with which it predicts that they could be ported in popular OSS projects (such as FreeBSD, Gentoo Portage).
[ { "version": "v1", "created": "Wed, 29 Apr 2009 21:33:39 GMT" } ]
2009-05-01T00:00:00
[ [ "Tsatsaronis", "George", "" ], [ "Halkidi", "Maria", "" ], [ "Giakoumakis", "Emmanouel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0904.4709
Dirk Beyer
Dirk Beyer, Alessandro Cimatti, Alberto Griggio, M. Erkan Keremoglu, Roberto Sebastiani
Software Model Checking via Large-Block Encoding
13 pages (11 without cover), 4 figures, 5 tables
null
null
SFU-CS-2009-09
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The construction and analysis of an abstract reachability tree (ART) are the basis for a successful method for software verification. The ART represents unwindings of the control-flow graph of the program. Traditionally, a transition of the ART represents a single block of the program, and therefore, we call this approach single-block encoding (SBE). SBE may result in a huge number of program paths to be explored, which constitutes a fundamental source of inefficiency. We propose a generalization of the approach, in which transitions of the ART represent larger portions of the program; we call this approach large-block encoding (LBE). LBE may reduce the number of paths to be explored up to exponentially. Within this framework, we also investigate symbolic representations: for representing abstract states, in addition to conjunctions as used in SBE, we investigate the use of arbitrary Boolean formulas; for computing abstract-successor states, in addition to Cartesian predicate abstraction as used in SBE, we investigate the use of Boolean predicate abstraction. The new encoding leverages the efficiency of state-of-the-art SMT solvers, which can symbolically compute abstract large-block successors. Our experiments on benchmark C programs show that the large-block encoding outperforms the single-block encoding.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 21:53:56 GMT" } ]
2009-05-01T00:00:00
[ [ "Beyer", "Dirk", "" ], [ "Cimatti", "Alessandro", "" ], [ "Griggio", "Alberto", "" ], [ "Keremoglu", "M. Erkan", "" ], [ "Sebastiani", "Roberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0904.4717
Aram Galstyan
Aram Galstyan
Continuous Strategy Replicator Dynamics for Multi--Agent Learning
12 pages, 15 figures, accepted for publication in JAAMAS
null
10.1007/s10458-011-9181-6
null
cs.LG cs.AI cs.GT nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of multi-agent learning and adaptation has attracted a great deal of attention in recent years. It has been suggested that the dynamics of multi agent learning can be studied using replicator equations from population biology. Most existing studies so far have been limited to discrete strategy spaces with a small number of available actions. In many cases, however, the choices available to agents are better characterized by continuous spectra. This paper suggests a generalization of the replicator framework that allows to study the adaptive dynamics of Q-learning agents with continuous strategy spaces. Instead of probability vectors, agents strategies are now characterized by probability measures over continuous variables. As a result, the ordinary differential equations for the discrete case are replaced by a system of coupled integral--differential replicator equations that describe the mutual evolution of individual agent strategies. We derive a set of functional equations describing the steady state of the replicator dynamics, examine their solutions for several two-player games, and confirm our analytical results using simulations.
[ { "version": "v1", "created": "Wed, 29 Apr 2009 23:00:03 GMT" }, { "version": "v2", "created": "Thu, 22 Sep 2011 20:32:36 GMT" } ]
2011-09-26T00:00:00
[ [ "Galstyan", "Aram", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0904.4727
Yi-Dong Shen
Yi-Dong Shen, Jia-Huai You, Li-Yan Yuan
Characterizations of Stable Model Semantics for Logic Programs with Arbitrary Constraint Atoms
34 pages. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.AI cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the stable model semantics of logic programs with (abstract) constraint atoms and their properties. We introduce a succinct abstract representation of these constraint atoms in which a constraint atom is represented compactly. We show two applications. First, under this representation of constraint atoms, we generalize the Gelfond-Lifschitz transformation and apply it to define stable models (also called answer sets) for logic programs with arbitrary constraint atoms. The resulting semantics turns out to coincide with the one defined by Son et al., which is based on a fixpoint approach. One advantage of our approach is that it can be applied, in a natural way, to define stable models for disjunctive logic programs with constraint atoms, which may appear in the disjunctive head as well as in the body of a rule. As a result, our approach to the stable model semantics for logic programs with constraint atoms generalizes a number of previous approaches. Second, we show that our abstract representation of constraint atoms provides a means to characterize dependencies of atoms in a program with constraint atoms, so that some standard characterizations and properties relying on these dependencies in the past for logic programs with ordinary atoms can be extended to logic programs with constraint atoms.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 01:15:51 GMT" } ]
2009-05-01T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "You", "Jia-Huai", "" ], [ "Yuan", "Li-Yan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0904.4735
Ghadamali Bagherikaram
Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani
The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast Channel
5 Pages, 1 Figure, To be Presented at the ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a scenario where a source node wishes to broadcast two confidential messages for two respective receivers via a Gaussian MIMO broadcast channel. A wire-tapper also receives the transmitted signal via another MIMO channel. It is assumed that the channels are degraded and the wire-tapper has the worst channel. We establish the capacity region of this scenario. Our achievability scheme is a combination of the superposition of Gaussian codes and randomization within the layers which we will refer to as Secret Superposition Coding. For the outerbound, we use the notion of enhanced channel to show that the secret superposition of Gaussian codes is optimal. It is shown that we only need to enhance the channels of the legitimate receivers, and the channel of the eavesdropper remains unchanged.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 03:14:42 GMT" } ]
2009-05-01T00:00:00
[ [ "Bagherikaram", "Ghadamali", "" ], [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4741
Brian Kurkoski
Brian M. Kurkoski and Justin Dauwels
Belief-Propagation Decoding of Lattices Using Gaussian Mixtures
7 pages, 5 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A belief-propagation decoder for low-density lattice codes is given which represents messages explicitly as a mixture of Gaussians functions. The key component is an algorithm for approximating a mixture of several Gaussians with another mixture with a smaller number of Gaussians. This Gaussian mixture reduction algorithm iteratively reduces the number of Gaussians by minimizing the distance between the original mixture and an approximation with one fewer Gaussians. Error rates and noise thresholds of this decoder are compared with those for the previously-proposed decoder which discretely quantizes the messages. The error rates are indistinguishable for dimension 1000 and 10000 lattices, and the Gaussian-mixture decoder has a 0.2 dB loss for dimension 100 lattices. The Gaussian-mixture decoder has a loss of about 0.03 dB in the noise threshold, which is evaluated via Monte Carlo density evolution. Further, the Gaussian-mixture decoder uses far less storage for the messages.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 05:10:56 GMT" } ]
2009-05-01T00:00:00
[ [ "Kurkoski", "Brian M.", "" ], [ "Dauwels", "Justin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4756
Giulio Manzonetto
Giulio Manzonetto (INRIA Rocquencourt)
Models and theories of lambda calculus
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we briefly summarize the contents of Manzonetto's PhD thesis which concerns denotational semantics and equational/order theories of the pure untyped lambda-calculus. The main research achievements include: (i) a general construction of lambda-models from reflexive objects in (possibly non-well-pointed) categories; (ii) a Stone-style representation theorem for combinatory algebras; (iii) a proof that no effective lambda-model can have lambda-beta or lambda-beta-eta as its equational theory (this can be seen as a partial answer to an open problem introduced by Honsell-Ronchi Della Rocca in 1984).
[ { "version": "v1", "created": "Thu, 30 Apr 2009 08:27:38 GMT" } ]
2009-05-01T00:00:00
[ [ "Manzonetto", "Giulio", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0904.4774
Karin Schnass
Remi Gribonval, Karin Schnass
Dictionary Identification - Sparse Matrix-Factorisation via $\ell_1$-Minimisation
32 pages (IEEE draft format), 8 figures, submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article treats the problem of learning a dictionary providing sparse representations for a given signal class, via $\ell_1$-minimisation. The problem can also be seen as factorising a $\ddim \times \nsig$ matrix $Y=(y_1 >... y_\nsig), y_n\in \R^\ddim$ of training signals into a $\ddim \times \natoms$ dictionary matrix $\dico$ and a $\natoms \times \nsig$ coefficient matrix $\X=(x_1... x_\nsig), x_n \in \R^\natoms$, which is sparse. The exact question studied here is when a dictionary coefficient pair $(\dico,\X)$ can be recovered as local minimum of a (nonconvex) $\ell_1$-criterion with input $Y=\dico \X$. First, for general dictionaries and coefficient matrices, algebraic conditions ensuring local identifiability are derived, which are then specialised to the case when the dictionary is a basis. Finally, assuming a random Bernoulli-Gaussian sparse model on the coefficient matrix, it is shown that sufficiently incoherent bases are locally identifiable with high probability. The perhaps surprising result is that the typically sufficient number of training samples $\nsig$ grows up to a logarithmic factor only linearly with the signal dimension, i.e. $\nsig \approx C \natoms \log \natoms$, in contrast to previous approaches requiring combinatorially many samples.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 10:04:09 GMT" }, { "version": "v2", "created": "Mon, 1 Mar 2010 11:28:31 GMT" } ]
2010-03-01T00:00:00
[ [ "Gribonval", "Remi", "" ], [ "Schnass", "Karin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4789
Tarik Ait-Idir
Houda Chafnaji, Tarik Ait-Idir, Samir Saoudi, and Athanasios V. Vasilakos
Frequency Domain Hybrid-ARQ Chase Combining for Broadband MIMO CDMA Systems
Submitted to IEEE Transactions on Vehicular Technology (Apr 2009)
null
10.1186/1687-1499-2012-134
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider high-speed wireless packet access using code division multiple access (CDMA) and multiple-input multiple-output (MIMO). Current wireless standards, such as high speed packet access (HSPA), have adopted multi-code transmission and hybrid-automatic repeat request (ARQ) as major technologies for delivering high data rates. The key technique in hybrid-ARQ, is that erroneous data packets are kept in the receiver to detect/decode retransmitted ones. This strategy is refereed to as packet combining. In CDMA MIMO-based wireless packet access, multi-code transmission suffers from severe performance degradation due to the loss of code orthogonality caused by both interchip interference (ICI) and co-antenna interference (CAI). This limitation results in large transmission delays when an ARQ mechanism is used in the link layer. In this paper, we investigate efficient minimum mean square error (MMSE) frequency domain equalization (FDE)-based iterative (turbo) packet combining for cyclic prefix (CP)-CDMA MIMO with Chase-type ARQ. We introduce two turbo packet combining schemes: i) In the first scheme, namely "chip-level turbo packet combining", MMSE FDE and packet combining are jointly performed at the chip-level. ii) In the second scheme, namely "symbol-level turbo packet combining", chip-level MMSE FDE and despreading are separately carried out for each transmission, then packet combining is performed at the level of the soft demapper. The computational complexity and memory requirements of both techniques are quite insensitive to the ARQ delay, i.e., maximum number of ARQ rounds. The throughput is evaluated for some representative antenna configurations and load factors to show the gains offered by the proposed techniques.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 13:22:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Chafnaji", "Houda", "" ], [ "Ait-Idir", "Tarik", "" ], [ "Saoudi", "Samir", "" ], [ "Vasilakos", "Athanasios V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4819
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
The independence polynomial of a graph at -1
16 pages; 13 figures
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If alpha=alpha(G) is the maximum size of an independent set and s_{k} equals the number of stable sets of cardinality k in graph G, then I(G;x)=s_{0}+s_{1}x+...+s_{alpha}x^{alpha} is the independence polynomial of G. In this paper we prove that: 1. I(T;-1) equels either -1 or 0 or 1 for every tree T; 2. I(G;-1)=0 for every connected well-covered graph G of girth > 5, non-isomorphic to C_{7} or K_{2}; 3. the absolute value of I(G;-1) is not greater than 2^nu(G), for every graph G, where nu(G) is its cyclomatic number.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 13:12:01 GMT" } ]
2011-01-25T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0904.4836
Nikolaos Mavridis
Nikolaos Mavridis, Shervin Emami, Chandan Datta, Wajahat Kamzi, Chiraz BenAbdelkader, Panos Toulis, Andry Tanoto, Tamer Rabie
FaceBots: Steps Towards Enhanced Long-Term Human-Robot Interaction by Utilizing and Publishing Online Social Information
null
null
null
null
cs.RO cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our project aims at supporting the creation of sustainable and meaningful longer-term human-robot relationships through the creation of embodied robots with face recognition and natural language dialogue capabilities, which exploit and publish social information available on the web (Facebook). Our main underlying experimental hypothesis is that such relationships can be significantly enhanced if the human and the robot are gradually creating a pool of shared episodic memories that they can co-refer to (shared memories), and if they are both embedded in a social web of other humans and robots they both know and encounter (shared friends). In this paper, we are presenting such a robot, which as we will see achieves two significant novelties.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 13:02:35 GMT" } ]
2009-05-01T00:00:00
[ [ "Mavridis", "Nikolaos", "" ], [ "Emami", "Shervin", "" ], [ "Datta", "Chandan", "" ], [ "Kamzi", "Wajahat", "" ], [ "BenAbdelkader", "Chiraz", "" ], [ "Toulis", "Panos", "" ], [ "Tanoto", "Andry", "" ], [ "Rabie", "Tamer", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0904.4863
Paul Slater
Paul B. Slater
A two-stage algorithm for extracting the multiscale backbone of complex weighted networks
1 page, letter accepted by PNAS in response to the article by MA Serrano, M Boguna, and A Vespignani, "Extracting the multiscale backbone of complex weighted networks", Proc Natl Acad Sci 106:6483-6488 (2009)
PNAS June 30, 2009 vol. 106 no. 26 E66
10.1073/pnas.0904725106
null
physics.soc-ph cs.SI physics.data-an stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The central problem of concern to Serrano, Boguna and Vespignani ("Extracting the multiscale backbone of complex weighted networks", Proc Natl Acad Sci 106:6483-6488 [2009]) can be effectively and elegantly addressed using a well-established two-stage algorithm that has been applied to internal migration flows for numerous nations and several other forms of "transaction flow data".
[ { "version": "v1", "created": "Thu, 30 Apr 2009 15:29:37 GMT" }, { "version": "v2", "created": "Thu, 4 Jun 2009 22:36:49 GMT" } ]
2012-07-03T00:00:00
[ [ "Slater", "Paul B.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0904.4900
Miquel Payar\'o
Miquel Payar\'o and Daniel P. Palomar
On optimal precoding in linear vector Gaussian channels with arbitrary input distribution
Proceedings of the 2009 IEEE International Symposium on Information Theory, Seoul, Korea, June 28 - July 3, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of the precoder the maximizes the mutual information in linear vector Gaussian channels with an arbitrary input distribution is studied. Precisely, the precoder optimal left singular vectors and singular values are derived. The characterization of the right singular vectors is left, in general, as an open problem whose computational complexity is then studied in three cases: Gaussian signaling, low SNR, and high SNR. For the Gaussian signaling case and the low SNR regime, the dependence of the mutual information on the right singular vectors vanishes, making the optimal precoder design problem easy to solve. In the high SNR regime, however, the dependence on the right singular vectors cannot be avoided and we show the difficulty of computing the optimal precoder through an NP-hardness analysis.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 17:45:30 GMT" } ]
2009-05-01T00:00:00
[ [ "Payaró", "Miquel", "" ], [ "Palomar", "Daniel P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4902
Tal Lev-Ami
Tal Lev-Ami, Neil Immerman, Thomas Reps, Mooly Sagiv, Siddharth Srivastava, Greta Yorsh
Simulating reachability using first-order logic with applications to verification of linked data structures
30 pages, LMCS
Logical Methods in Computer Science, Volume 5, Issue 2 (May 28, 2009) lmcs:680
10.2168/LMCS-5(2:12)2009
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper shows how to harness existing theorem provers for first-order logic to automatically verify safety properties of imperative programs that perform dynamic storage allocation and destructive updating of pointer-valued structure fields. One of the main obstacles is specifying and proving the (absence) of reachability properties among dynamically allocated cells. The main technical contributions are methods for simulating reachability in a conservative way using first-order formulas--the formulas describe a superset of the set of program states that would be specified if one had a precise way to express reachability. These methods are employed for semi-automatic program verification (i.e., using programmer-supplied loop invariants) on programs such as mark-and-sweep garbage collection and destructive reversal of a singly linked list. (The mark-and-sweep example has been previously reported as being beyond the capabilities of ESC/Java.)
[ { "version": "v1", "created": "Thu, 30 Apr 2009 17:54:54 GMT" }, { "version": "v2", "created": "Wed, 27 May 2009 22:05:51 GMT" } ]
2015-07-01T00:00:00
[ [ "Lev-Ami", "Tal", "" ], [ "Immerman", "Neil", "" ], [ "Reps", "Thomas", "" ], [ "Sagiv", "Mooly", "" ], [ "Srivastava", "Siddharth", "" ], [ "Yorsh", "Greta", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0904.4911
Michael Goodrich
Michael T. Goodrich
On the Algorithmic Complexity of the Mastermind Game with Black-Peg Results
Expanded version with a figure showing the Mastermind game
Information Processing Letters, Volume 109, 675-678, 2009
10.1016/j.ipl.2009.02.021
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the algorithmic complexity of the Mastermind game, where results are single-color black pegs. This differs from the usual dual-color version of the game, but better corresponds to applications in genetics. We show that it is NP-complete to determine if a sequence of single-color Mastermind results have a satisfying vector. We also show how to devise efficient algorithms for discovering a hidden vector through single-color queries. Indeed, our algorithm improves a previous method of Chvatal by almost a factor of 2.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 18:31:15 GMT" } ]
2009-05-13T00:00:00
[ [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0904.4921
Yu. I. Manin
Yuri I. Manin
Renormalization and computation I: motivation and background
49 pages, 1 figure In the new version typos are fixed, minor corrections made, dedication added, reference to Part II added
null
null
null
math.QA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper I argue that infinities in the classical computation theory such as the unsolvability of the Halting Problem can be addressed in the same way as Feynman divergences in Quantum Field Theory, and that meaningful versions of renormalization in this context can be devised. Connections with quantum computation are also touched upon.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 19:23:52 GMT" }, { "version": "v2", "created": "Tue, 25 Aug 2009 13:48:17 GMT" } ]
2009-08-25T00:00:00
[ [ "Manin", "Yuri I.", "" ] ]
[ { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0904.4926
Athanasios Lioumpas S.
Athanasios S. Lioumpas and George K. Karagiannidis
Variable-Rate M-PSK Communications without Channel Amplitude Estimation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel estimation at the receiver side is essential to adaptive modulation schemes, prohibiting low complexity systems from using variable rate and/or variable power transmissions. Towards providing a solution to this problem, we introduce a variable-rate (VR) M-PSK modulation scheme, for communications over fading channels, in the absence of channel gain estimation at the receiver. The choice of the constellation size is based on the signal-plus-noise (S+N) sampling value rather than on the signal-to-noise ratio (S/N). It is analytically shown that S+N can serve as an excellent simpler criterion, alternative to S/N, for determining the modulation order in VR systems. In this way, low complexity transceivers can use VR transmissions in order to increase their spectral efficiency under an error performance constraint. As an application, we utilize the proposed VR modulation scheme in equal gain combining (EGC) diversity receivers.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 19:35:17 GMT" } ]
2009-05-01T00:00:00
[ [ "Lioumpas", "Athanasios S.", "" ], [ "Karagiannidis", "George K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]