id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0904.3611 | Aubin Jarry | Florian Huc and Aubin Jarry | VRAC: Virtual Raw Anchor Coordinates Routing in Sensor Networks --
Concepts and Experimental Protocol | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to make full use of geographic routing techniques developed for
large scale networks, nodes must be localized. However, localization and
virtual localization techniques in sensor networks are dependent either on
expensive and sometimes unavailable hardware (e.g. GPS) or on sophisticated
localization calculus (e.g. triangulation) which are both error-prone and with
a costly overhead.
Instead of localizing nodes in a traditional 2-dimensional space, we intend
to use directly the raw distance to a set of anchors to route messages in the
multi-dimensional space. This should enable us to use any geographic routing
protocol in a robust and efficient manner in a very large range of scenarios.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 07:40:59 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Huc",
"Florian",
""
],
[
"Jarry",
"Aubin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.3612 | Martin Ziegler | Florentin Neumann, Andrea Reichenberger, Martin Ziegler | Variations of the Turing Test in the Age of Internet and Virtual Reality | null | pp.355-362 in Proc. 32nd Annual Conference on Artificial
Intelligence (KI2009), Springer LNCS/LNAI vol.5803 | 10.1007/978-3-642-04617-9_45 | null | cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inspired by Hofstadter's Coffee-House Conversation (1982) and by the science
fiction short story SAM by Schattschneider (1988), we propose and discuss
criteria for non-mechanical intelligence. Firstly, we emphasize the practical
need for such tests in view of massively multiuser online role-playing games
(MMORPGs) and virtual reality systems like Second Life. Secondly, we
demonstrate Second Life as a useful framework for implementing (some iterations
of) that test.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 07:56:11 GMT"
}
]
| 2010-05-10T00:00:00 | [
[
"Neumann",
"Florentin",
""
],
[
"Reichenberger",
"Andrea",
""
],
[
"Ziegler",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0904.3629 | Florentina Pintea | Diana Sophia Codat | Les technologies de l'information et de la communication au niveau
mondial et en Roumanie dans les dernieres annees | 10 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 21-30 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The level of development of the electronic communication market and of the
information technology, the indicators regarding the penetration of Internet
and the level of penetration of the connections in wide band, the integration
degree of the Tic application in the business area are crucial for the
development of an informational society and for the creation of a society based
on knowledge. Though the levels are still reduced their positive evolution
reflects the attenuation of the gaps by Romania, comparatively to other
countries.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 08:54:06 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 15:01:38 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Codat",
"Diana Sophia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3631 | Florentina Pintea | Ioan Despi, Lucian Luca | On the Ambiguity of Commercial Open Source | 10 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 31-40 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Open source and commercial applications used to be two separate worlds. The
former was the work of amateurs who had little interest in making a profit,
while the latter was only profit oriented and was produced by big companies.
Nowadays open source is a threat and an opportunity to serious businesses of
all kinds, generating good profits while delivering low costs products to
customers. The competition between commercial and open source software has
impacted the industry and the society as a whole. But in the last years, the
markets for commercial and open source software are converging rapidly and it
is interesting to resume and discuss the implications of this new paradigm,
taking into account arguments pro and against it.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 09:07:15 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Despi",
"Ioan",
""
],
[
"Luca",
"Lucian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3633 | Florentina Pintea | Alexandra Fortis | Business Process Modeling Notation - An Overview | 10 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 41-50 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | BPMN represents an industrial standard created to offer a common and user
friendly notation to all the participants to a business process. The present
paper aims to briefly present the main features of this notation as well as an
interpretation of some of the main patterns characterizing a business process
modeled by the working fluxes.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 09:11:50 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Fortis",
"Alexandra",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.3634 | Florentina Pintea | Florin Fortis, Alexandra Fortis | Tailored business solutions by workflow technologies | 12 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 51-62 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | VISP (Virtual Internet Service Provider) is an IST-STREP project, which is
conducting research in the field of these new technologies, targeted to
telecom/ISP companies. One of the first tasks of the VISP project is to
identify the most appropriate technologies in order to construct the VISP
platform. This paper presents the most significant results in the field of
choreography and orchestration, two key domains that must accompany process
modeling in the construction of a workflow environment.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 09:22:22 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Fortis",
"Florin",
""
],
[
"Fortis",
"Alexandra",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.3638 | Florentina Pintea | Vladimir Gotsulenko, Lyudmila Gaponova | On one method of boundary value problem regularization by passage to the
limit | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 63-68 | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For one class of boundary value problem depending on small parameter for
which numerical methods for their solution are actually inapplicable, procedure
of limiting problem acquisition which is much easier and which solution as much
as close to the initial solution is described.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 09:51:51 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Gotsulenko",
"Vladimir",
""
],
[
"Gaponova",
"Lyudmila",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0904.3642 | Farzan Haddadi | Farzan Haddadi, Mohammad Mahdi Nayebi, Mohammad Reza Aref | Direction-of-Arrival Estimation for Temporally Correlated Narrowband
Signals | IEEE Transactions on Signal Processing, vol. 57, pp. 600-609, Feb.
2009 | null | 10.1109/TSP.2008.2008220 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | signal direction-of-arrival estimation using an array of sensors has been the
subject of intensive research and development during the last two decades.
Efforts have been directed to both, better solutions for the general data model
and to develop more realistic models. So far, many authors have assumed the
data to be iid samples of a multivariate statistical model. Although this
assumption reduces the complexity of the model, it may not be true in certain
situations where signals show temporal correlation. Some results are available
on the temporally correlated signal model in the literature. The temporally
correlated stochastic Cramer-Rao bound (CRB) has been calculated and an
instrumental variable-based method called IV-SSF is introduced. Also, it has
been shown that temporally correlated CRB is lower bounded by the deterministic
CRB. In this paper, we show that temporally correlated CRB is also upper
bounded by the stochastic iid CRB. We investigate the effect of temporal
correlation of the signals on the best achievable performance. We also show
that the IV-SSF method is not efficient and based on an analysis of the CRB,
propose a variation in the method which boosts its performance. Simulation
results show the improved performance of the proposed method in terms of lower
bias and error variance.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 10:09:24 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Haddadi",
"Farzan",
""
],
[
"Nayebi",
"Mohammad Mahdi",
""
],
[
"Aref",
"Mohammad Reza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3648 | Florentina Pintea | Tiberiu Marius Karnyanszky, Mihai Titu | Computer Aided Optimization of the Unconventional Processing | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 85-90 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The unconventional technologies, currently applied at a certain category of
materials, difficult to be processed through usual techniques, have undergone
during the last 60 years all the stages, since their discovery to their use on
a large scale. They are based on elementary mechanisms which run the processing
through classic methods, yet, they use in addition the interconnections of
these methods. This leads to a plus in performance by increasing the outcomes
precision, reducing the processing time, increasing the quality of the finite
product, etc. This performance can be much increased by using the computer and
a software product in assisting the human operator in the processing by an
unconventional method such as; the electric or electro-chemical erosion, the
complex electric-electro-chemical erosion, the processing by a laser fascicle
and so on. The present work presents such an application based on a data base
combining the previous experimental results, which proposes a method of
optimization of the outcomes.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 10:38:24 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Karnyanszky",
"Tiberiu Marius",
""
],
[
"Titu",
"Mihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.3650 | Florentina Pintea | Dan L. Lacrama, Ioan Snep | The use of invariant moments in hand-written character recognition | 12 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 91-102 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to present the implementation of a Radial Basis
Function neural network with built-in knowledge to recognize hand-written
characters. The neural network includes in its architecture gates controlled by
an attraction/repulsion system of coefficients. These coefficients are derived
from a preprocessing stage which groups the characters according to their
ascendant, central, or descendent components. The neural network is trained
using data from invariant moment functions. Results are compared with those
obtained using a K nearest neighbor method on the same moment data.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 10:44:21 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Lacrama",
"Dan L.",
""
],
[
"Snep",
"Ioan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0904.3664 | Amnon Shashua | Amnon Shashua | Introduction to Machine Learning: Class Notes 67577 | 109 pages, class notes of Machine Learning course given at the Hebrew
University of Jerusalem | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Introduction to Machine learning covering Statistical Inference (Bayes, EM,
ML/MaxEnt duality), algebraic and spectral methods (PCA, LDA, CCA, Clustering),
and PAC learning (the Formal model, VC dimension, Double Sampling theorem).
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 11:40:57 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Shashua",
"Amnon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.3667 | Florentina Pintea | Alin Munteanu, Cristina Ofelia Sofran | Considerations upon the Machine Learning Technologies | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 133-138 | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial intelligence offers superior techniques and methods by which
problems from diverse domains may find an optimal solution. The Machine
Learning technologies refer to the domain of artificial intelligence aiming to
develop the techniques allowing the computers to "learn". Some systems based on
Machine Learning technologies tend to eliminate the necessity of the human
intelligence while the others adopt a man-machine collaborative approach.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 11:48:38 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Munteanu",
"Alin",
""
],
[
"Sofran",
"Cristina Ofelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0904.3669 | Florentina Pintea | Alin Munteanu, Cristina Ofelia Sofran | Collaborative systems and multiagent systems | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 139-144 | null | null | cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents some basic elements regarding the domain of the
collaborative systems, a domain of maximum actuality and also the multiagent
systems, developed as a result of a sound study on the one-agent systems.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 11:54:55 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Munteanu",
"Alin",
""
],
[
"Sofran",
"Cristina Ofelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0904.3677 | Arindam Mitra | Arindam Mitra | Quantum theory can be collectively verified | Pdf, 8 pages, content unchanged | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | No theory of physics has been collectively scientifically verified in an
experiment so far. It is pointed out that probabilistic structure of quantum
theory can be collectively scientifically verified in an experiment. It is also
argued that experimentalist point of view quantum theory is a complete theory.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 12:24:21 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2009 14:07:57 GMT"
}
]
| 2012-01-31T00:00:00 | [
[
"Mitra",
"Arindam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3693 | Florentina Pintea | Dieter Penteliuc Cotosman | The Multimedia Product - between Design and Information, Design and
Utility and Design and Entertainment | 28 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 167-194 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper investigates the possible coherent and effective alternatives to
solve the problems related to the communication needs of any multimedia
product. In essence, the presentation will focus on identifying the issues and
principles governing three types of the design - in fact, the multimedia design
in a broader sense - namely the information design - precisely aiming at ways
of organization and presentation of information in a useful and significant
form, the graphical user interface design, whose sub-domain consists of the
information displayed on the monitor screen and of interactivity between user,
computer and electronic devices, meaning, in fact, everything the user sees,
touches, hears and all the elements with which he interacts, the graphic
design, whose main concern is to create an aesthetic layout arrangement (from
the visual and perceptive) information.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 13:50:36 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Cotosman",
"Dieter Penteliuc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0904.3694 | Florentina Pintea | Dieter Penteliuc-Cotosman | The new multimedia educational technologies, used in open and distance
learning | 10 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 195-204 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper reviews and refers to the latest telematics technology that has
turned the open system learning and helped it to become an institutional
alternative to the face-to-face traditional one. Most technologies, briefly
presented here, will be implemented in the "ARTeFACt" project - telematic
system for vocational education system of open system learning, system which
will be officially launched at the end of 2006, in the institutional offer of
the Faculty of Arts of the University West of Timisoara. The scientific
coordination of the doctoral project "ARTeFACt" is done by Mr. Prof. Dr. Eng.
Savi G. George, representing the Department of Mechatronics Faculty of
Mechanical Engineering from the University "Politehnica" of Timisoara, Romania
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 13:57:23 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Penteliuc-Cotosman",
"Dieter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0904.3698 | Florentina Pintea | Rolf Andreas Rasenack, Karsten Wolke, Kostyantyn Yermashov, Karl Hayo
Siemsen | Semantic Linkage of Control Systems | 8 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 205-212 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Control systems are sets of interconnected hardware and software components
which regulate the behaviour of processes. The software of modern control
systems rises for some years by requirements regarding the flexibility and
functionality. Thus the force of innovation grows on enterprises, since ever
newer products in ever shorter time intervals must be made available.
Associated hereby is the crucial shortening of the product life cycle, whose
effects show up in reduced care of the software and the spares inventory. The
aim, the concept presented here and developed in a modeling environment, is
proved and ensures a minimum functionality of software components. Replacing
software components of a control system verified for functionality by a
framework at run-time and if necessary the software conditions will become
adapted. Quintessential point of this implementation is the usage of an
abstract syntax tree. Within its hierarchical structure meta information is
attached to nodes and processed by the framework. With the development of the
concept for semantic proving of software components the lifetime of
software-based products is increased.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 14:02:18 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Rasenack",
"Rolf Andreas",
""
],
[
"Wolke",
"Karsten",
""
],
[
"Yermashov",
"Kostyantyn",
""
],
[
"Siemsen",
"Karl Hayo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.3701 | Fabien Gandon | Guillaume Er\'et\'eo (INRIA Sophia Antipolis), Fabien Gandon (INRIA
Sophia Antipolis), Olivier Corby (INRIA Sophia Antipolis), Michel Buffa | Semantic Social Network Analysis | published in Web Science (2009) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Social Network Analysis (SNA) tries to understand and exploit the key
features of social networks in order to manage their life cycle and predict
their evolution. Increasingly popular web 2.0 sites are forming huge social
network. Classical methods from social network analysis (SNA) have been applied
to such online networks. In this paper, we propose leveraging semantic web
technologies to merge and exploit the best features of each domain. We present
how to facilitate and enhance the analysis of online social networks,
exploiting the power of semantic social network analysis.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 14:22:05 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Erétéo",
"Guillaume",
"",
"INRIA Sophia Antipolis"
],
[
"Gandon",
"Fabien",
"",
"INRIA\n Sophia Antipolis"
],
[
"Corby",
"Olivier",
"",
"INRIA Sophia Antipolis"
],
[
"Buffa",
"Michel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0904.3711 | Florentina Pintea | Mihai Timis | Output Width Signal Control In Asynchronous Digital Systems Using
External Clock Signal | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 237-242 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In present paper, I propose a method for resolving the timing delays for
output signals from an asynchronous sequential system. It will be used an
example of an asynchronous sequential system that will set up an output signal
when an input signal will be set up. The width of the output signal depends on
the input signal width, and in this case it is very short. There are many
synthesis methods, like using a RC group system, a monostable system in design
of the asynchronous digital system or using an external clock signal, CK. In
this paper will be used an external clock signal, CK.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 14:45:42 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Timis",
"Mihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3714 | Florentina Pintea | Mihai Timis | Output Width Signal Control In Asynchronous Digital Systems Using
Monostable Circuits | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 243-248 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In present paper, I propose a method for resolving the timing delays for
output signals from an asynchronous sequential system. It will be used an
example of an asynchronous sequential system that will set up an output signal
when an input signal will be set up. The width of the output signal depends on
the input signal width, and in this case it is very short. There are many
synthesis methods, like using a RC group system, a monostable system in design
of the asynchronous digital system or using an external clock signal, CK. In
this paper will be used a monostable circuit.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 14:50:31 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Timis",
"Mihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3715 | Florentina Pintea | Radu Vultur | Mesh | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 261-266 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Whether you just want to take a peek of a remote computer status, or you want
to install the latest version of a software on several workstations, you can do
all of this from your computer. The networks are growing, the time spent
administering the workstations increases and the number of repetitive tasks is
going sky high. But here comes MESH to take that load off your shoulders. And
because of SMS commands you can take this "command center" wherever you will
go. Just connect a GSM phone to the computer (using a cable, IrDA or Bluetooth)
and lock/restart/shutdown computers from your LAN with the push of a cell phone
button. You can even create your own SMS commands. This is MESH - the network
administrator's Swiss knife
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 14:56:47 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Vultur",
"Radu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0904.3716 | Florentina Pintea | Karsten Wolke, K. Yermashov, K. H. Siemsen, Rolf Andreas Rasenack | Failover of Software Services with State Replication | 10 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 267-276 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computing systems are becoming more and more complex and assuming more and
more responsibilities in all sectors of human activity. Applications do not run
locally on a single computer any more. A lot of today's applications are built
as distributed system; with services on different computers communicating with
each other. Distributed systems arise everywhere. The Internet is one of the
best-known distributed systems and used by nearly everyone today. It is obvious
that we are more and more dependent on computer services. Many people expect to
be able to buy things like clothing or electronic equipment even at night on
the Internet. Computers are expected to be operational and available 7 days a
week, 24 hours a day. Downtime, even for maintenance, is no longer acceptable.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 15:01:45 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Wolke",
"Karsten",
""
],
[
"Yermashov",
"K.",
""
],
[
"Siemsen",
"K. H.",
""
],
[
"Rasenack",
"Rolf Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.3718 | Florentina Pintea | K. Yermashov, K. H. Siemsen, K. Wolke, R.A. Rasenack | Architecture of the Neurath Basic Model View Controller | 6 pages,exposed on 1st "European Conference on Computer Sciences &
Applications" - XA2006, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series IV (2006), 277-282 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The idea of the Neurath Basic Model View Controller (NBMVC) appeared during
the discussion of the design of domain-specific modeling tools based on the
Neurath Modeling Language [Yer06]. The NBMVC is the core of the modeling
process within the modeling environment. It reduces complexity out of the
design process by providing domain-specific interfaces between the developer
and the model. These interfaces help to organize and manipulate the model. The
organization includes, for example, a layer with visual components to drop them
in and filter them out. The control routines includes, for example, model
transformations.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 15:05:01 GMT"
}
]
| 2009-04-24T00:00:00 | [
[
"Yermashov",
"K.",
""
],
[
"Siemsen",
"K. H.",
""
],
[
"Wolke",
"K.",
""
],
[
"Rasenack",
"R. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.3741 | David Eppstein | David Eppstein and Emma S. Spiro | The h-Index of a Graph and its Application to Dynamic Subgraph
Statistics | To appear at Algorithms and Data Structures Symposium, Banff, Canada,
August 2009. 18 pages, 4 figures. Includes six pages of appendices that will
not be included in the conference proceedings version | J. Graph Algorithms & Applications 16(2): 543-567, 2012 | 10.7155/jgaa.00273 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a data structure that maintains the number of triangles in a
dynamic undirected graph, subject to insertions and deletions of edges and of
degree-zero vertices. More generally it can be used to maintain the number of
copies of each possible three-vertex subgraph in time O(h) per update, where h
is the h-index of the graph, the maximum number such that the graph contains
$h$ vertices of degree at least h. We also show how to maintain the h-index
itself, and a collection of h high-degree vertices in the graph, in constant
time per update. Our data structure has applications in social network analysis
using the exponential random graph model (ERGM); its bound of O(h) time per
edge is never worse than the Theta(sqrt m) time per edge necessary to list all
triangles in a static graph, and is strictly better for graphs obeying a power
law degree distribution. In order to better understand the behavior of the
h-index statistic and its implications for the performance of our algorithms,
we also study the behavior of the h-index on a set of 136 real-world networks.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 18:37:36 GMT"
}
]
| 2015-07-16T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Spiro",
"Emma S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3756 | Michael Goodrich | Wenliang Du, David Eppstein, Michael T. Goodrich, George S. Lueker | On the Approximability of Geometric and Geographic Generalization and
the Min-Max Bin Covering Problem | 18 pages. Expanded version of paper appearing in 2009 Algorithms and
Data Structures Symposium (formerly WADS) | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of abstracting a table of data about individuals so that
no selection query can identify fewer than k individuals. We show that it is
impossible to achieve arbitrarily good polynomial-time approximations for a
number of natural variations of the generalization technique, unless P = NP,
even when the table has only a single quasi-identifying attribute that
represents a geographic or unordered attribute:
Zip-codes: nodes of a planar graph generalized into connected subgraphs
GPS coordinates: points in R2 generalized into non-overlapping rectangles
Unordered data: text labels that can be grouped arbitrarily. In addition to
impossibility results, we provide approximation algorithms for these difficult
single-attribute generalization problems, which, of course, apply to
multiple-attribute instances with one that is quasi-identifying. We show
theoretically and experimentally that our approximation algorithms can come
reasonably close to optimal solutions. Incidentally, the generalization problem
for unordered data can be viewed as a novel type of bin packing
problem--min-max bin covering--which may be of independent interest.
| [
{
"version": "v1",
"created": "Thu, 23 Apr 2009 21:06:58 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2009 22:59:44 GMT"
},
{
"version": "v3",
"created": "Tue, 12 May 2009 16:16:10 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Du",
"Wenliang",
""
],
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Lueker",
"George S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3761 | Charalampos Tsourakakis | Charalampos E. Tsourakakis, Mihail N. Kolountzakis, Gary L. Miller | Approximate Triangle Counting | 1) 16 pages, 2 figures, under submission 2) Removed the erroneous
random projection part. Thanks to Ioannis Koutis for pointing out the error.
3) Added experimental session | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Triangle counting is an important problem in graph mining. Clustering
coefficients of vertices and the transitivity ratio of the graph are two
metrics often used in complex network analysis. Furthermore, triangles have
been used successfully in several real-world applications. However, exact
triangle counting is an expensive computation. In this paper we present the
analysis of a practical sampling algorithm for counting triangles in graphs.
Our analysis yields optimal values for the sampling rate, thus resulting in
tremendous speedups ranging from \emph{2800}x to \emph{70000}x when applied to
real-world networks. At the same time the accuracy of the estimation is
excellent.
Our contributions include experimentation on graphs with several millions of
nodes and edges, where we show how practical our proposed method is. Finally,
our algorithm's implementation is a part of the \pegasus library (Code and
datasets are available at (http://www.cs.cmu.edu/~ctsourak/).) a Peta-Graph
Mining library implemented in Hadoop, the open source version of Mapreduce.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 14:21:13 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 09:02:34 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Tsourakakis",
"Charalampos E.",
""
],
[
"Kolountzakis",
"Mihail N.",
""
],
[
"Miller",
"Gary L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.3778 | Roy Timo | Roy Timo, Kim Blackmore and Leif Hanlen | Word-Valued Sources: an Ergodic Theorem, an AEP and the Conservation of
Entropy | 21 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A word-valued source $\mathbf{Y} = Y_1,Y_2,...$ is discrete random process
that is formed by sequentially encoding the symbols of a random process
$\mathbf{X} = X_1,X_2,...$ with codewords from a codebook $\mathscr{C}$. These
processes appear frequently in information theory (in particular, in the
analysis of source-coding algorithms), so it is of interest to give conditions
on $\mathbf{X}$ and $\mathscr{C}$ for which $\mathbf{Y}$ will satisfy an
ergodic theorem and possess an Asymptotic Equipartition Property (AEP). In this
correspondence, we prove the following: (1) if $\mathbf{X}$ is asymptotically
mean stationary, then $\mathbf{Y}$ will satisfy a pointwise ergodic theorem and
possess an AEP; and, (2) if the codebook $\mathscr{C}$ is prefix-free, then the
entropy rate of $\mathbf{Y}$ is equal to the entropy rate of $\mathbf{X}$
normalized by the average codeword length.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 01:56:14 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Timo",
"Roy",
""
],
[
"Blackmore",
"Kim",
""
],
[
"Hanlen",
"Leif",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3780 | Deanna Needell | Deanna Needell | Noisy Signal Recovery via Iterative Reweighted L1-Minimization | null | null | null | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed sensing has shown that it is possible to reconstruct sparse high
dimensional signals from few linear measurements. In many cases, the solution
can be obtained by solving an L1-minimization problem, and this method is
accurate even in the presence of noise. Recent a modified version of this
method, reweighted L1-minimization, has been suggested. Although no provable
results have yet been attained, empirical studies have suggested the reweighted
version outperforms the standard method. Here we analyze the reweighted
L1-minimization method in the noisy case, and provide provable results showing
an improvement in the error bound over the standard bounds.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 02:52:26 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Needell",
"Deanna",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3789 | Serguei Mokhov | Serguei A. Mokhov and Joey Paquet | Formally Specifying and Proving Operational Aspects of Forensic Lucid in
Isabelle | 23 pages, 3 listings, 3 figures, 1 table, 1 Appendix with theorems,
pp. 76--98. TPHOLs 2008 Emerging Trends Proceedings, August 18-21, Montreal,
Canada. Editors: Otmane Ait Mohamed and Cesar Munoz and Sofiene Tahar. The
individual paper's PDF is at
http://users.encs.concordia.ca/~tphols08/TPHOLs2008/ET/76-98.pdf | null | null | 2008-1-Ait Mohamed | cs.LO cs.CR cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Forensic Lucid intensional programming language has been proposed for
intensional cyberforensic analysis. In large part, the language is based on
various predecessor and codecessor Lucid dialects bound by the higher-order
intensional logic (HOIL) that is behind them. This work formally specifies the
operational aspects of the Forensic Lucid language and compiles a theory of its
constructs using Isabelle, a proof assistant system.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 03:30:20 GMT"
}
]
| 2009-05-08T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
],
[
"Paquet",
"Joey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0904.3797 | Reginald Smith | Reginald D. Smith | Internet Traffic Periodicities and Oscillations: A Brief Review | 10 pages 2 figures; submitted to Computer Networks | null | null | null | cs.NI | http://creativecommons.org/licenses/by/3.0/ | Internet traffic displays many persistent periodicities (oscillations) on a
large range of time scales. This paper describes the measurement methodology to
detect Internet traffic periodicities and also describes the main periodicities
in Internet traffic.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 12:35:01 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Apr 2009 11:45:55 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Smith",
"Reginald D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.3808 | Forrest Sheng Bao | Forrest Sheng Bao, Jue-Ming Gao, Jing Hu, Donald Y.-C. Lie, Yuanlin
Zhang and K. J. Oommen | Automated Epilepsy Diagnosis Using Interictal Scalp EEG | 5 pages, 4 figures, 3 tables, based on our IEEE ICTAI'08 paper,
submitted to IEEE EMBC'09 | null | null | null | cs.AI cs.CV | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Approximately over 50 million people worldwide suffer from epilepsy.
Traditional diagnosis of epilepsy relies on tedious visual screening by highly
trained clinicians from lengthy EEG recording that contains the presence of
seizure (ictal) activities. Nowadays, there are many automatic systems that can
recognize seizure-related EEG signals to help the diagnosis. However, it is
very costly and inconvenient to obtain long-term EEG data with seizure
activities, especially in areas short of medical resources. We demonstrate in
this paper that we can use the interictal scalp EEG data, which is much easier
to collect than the ictal data, to automatically diagnose whether a person is
epileptic. In our automated EEG recognition system, we extract three classes of
features from the EEG data and build Probabilistic Neural Networks (PNNs) fed
with these features. We optimize the feature extraction parameters and combine
these PNNs through a voting mechanism. As a result, our system achieves an
impressive 94.07% accuracy, which is very close to reported human recognition
accuracy by experienced medical professionals.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 07:15:49 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Apr 2009 20:27:43 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Bao",
"Forrest Sheng",
""
],
[
"Gao",
"Jue-Ming",
""
],
[
"Hu",
"Jing",
""
],
[
"Lie",
"Donald Y. -C.",
""
],
[
"Zhang",
"Yuanlin",
""
],
[
"Oommen",
"K. J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0904.3827 | Annick Valibouze | Annick Valibouze (LSTA, Lip6) | La R\'esolvante de Lagrange et ses Applications | 26 pages | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the changes of representations of a group are used in order to
describe its action as algebraic Galois group of an univariate polynomial on
the roots of factors of any Lagrange resolvent. By this way, the Galois group
of resolvent factors are pre-determinated. In follows, different applications
are exposed; in particular, some classical results of algebraic Galois theory.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 09:00:48 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Valibouze",
"Annick",
"",
"LSTA, Lip6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0904.3894 | J\"org B\"uhler | J. B\"uhler, G. Wunder | On Capacity Computation for the Two-User Binary Multiple-Access Channel | 5 pages, IEEE International Symposium on Information Theory (ISIT)
2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with the problem of computing the boundary of the capacity
region for the memoryless two-user binary-input binary-output multiple-access
channel ((2,2;2)-MAC), or equivalently, the computation of input probability
distributions maximizing weighted sum-rate. This is equivalent to solving a
difficult nonconvex optimization problem. For a restricted class of
(2,2;2)-MACs and weight vectors, it is shown that, depending on an ordering
property of the channel matrix, the optimal solution is located on the
boundary, or the objective function has at most one stationary point in the
interior of the domain. For this, the problem is reduced to a pseudoconcave
one-dimensional optimization and the single-user problem.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 19:22:33 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Apr 2009 20:13:11 GMT"
},
{
"version": "v3",
"created": "Thu, 30 Apr 2009 19:24:08 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Bühler",
"J.",
""
],
[
"Wunder",
"G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.3898 | Manfred Kufleitner | Mahmoud Fouz, Manfred Kufleitner, Bodo Manthey and Nima Zeini Jahromi | On Smoothed Analysis of Quicksort and Hoare's Find | To be presented at the 15th Int. Computing and Combinatorics
Conference (COCOON 2009) | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a smoothed analysis of Hoare's find algorithm and we revisit the
smoothed analysis of quicksort.
Hoare's find algorithm - often called quickselect - is an easy-to-implement
algorithm for finding the k-th smallest element of a sequence. While the
worst-case number of comparisons that Hoare's find needs is quadratic, the
average-case number is linear. We analyze what happens between these two
extremes by providing a smoothed analysis of the algorithm in terms of two
different perturbation models: additive noise and partial permutations.
Moreover, we provide lower bounds for the smoothed number of comparisons of
quicksort and Hoare's find for the median-of-three pivot rule, which usually
yields faster algorithms than always selecting the first element: The pivot is
the median of the first, middle, and last element of the sequence. We show that
median-of-three does not yield a significant improvement over the classic rule:
the lower bounds for the classic rule carry over to median-of-three.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 16:12:40 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Apr 2009 09:02:30 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Fouz",
"Mahmoud",
""
],
[
"Kufleitner",
"Manfred",
""
],
[
"Manthey",
"Bodo",
""
],
[
"Jahromi",
"Nima Zeini",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.3912 | Frank Ferraro | Frank Ferraro, Garrett Hall, Andrew Wood | Refutation of Aslam's Proof that NP = P | 13 pages, 2 figures, a response to Aslam's paper (arXiv:0812.1385v11)
and the underlying arguments (arXiv:0812.1385v9). Very minor content changes
and typos fixed | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aslam presents an algorithm he claims will count the number of perfect
matchings in any incomplete bipartite graph with an algorithm in the
function-computing version of NC, which is itself a subset of FP. Counting
perfect matchings is known to be #P-complete; therefore if Aslam's algorithm is
correct, then NP=P. However, we show that Aslam's algorithm does not correctly
count the number of perfect matchings and offer an incomplete bipartite graph
as a concrete counter-example.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 18:01:54 GMT"
},
{
"version": "v2",
"created": "Thu, 14 May 2009 22:52:47 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Ferraro",
"Frank",
""
],
[
"Hall",
"Garrett",
""
],
[
"Wood",
"Andrew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.3927 | Cole Brown | Andrew Keenan Richardson, Cole Arthur Brown | A Critique of "Solving the P/NP Problem Under Intrinsic Uncertainty",
arXiv:0811.0463 | 7 pages | null | null | null | cs.CC | http://creativecommons.org/licenses/by/3.0/ | Although whether P equals NP is an important, open problem in computer
science, and although Jaeger's 2008 paper, "Solving the P/NP Problem Under
Intrinsic Uncertainty" (arXiv:0811.0463) presents an attempt at tackling the
problem by discussing the possibility that all computation is uncertain to some
degree, there are a number of logical oversights present in that paper which
preclude it from serious consideration toward having resolved P-versus-NP.
There are several differences between the model of computation presented in
Jaeger's paper and the standard model, as well as several bold assumptions that
are not well supported in Jaeger's paper or in the literature. In addition, we
find several omissions of rigorous proof that ultimately weaken this paper to a
point where it cannot be considered a candidate solution to the P-versus-NP
problem.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 19:32:10 GMT"
}
]
| 2009-04-27T00:00:00 | [
[
"Richardson",
"Andrew Keenan",
""
],
[
"Brown",
"Cole Arthur",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.3941 | Sagarmoy Dutta | Sagarmoy Dutta and Piyush P Kurur | Representating groups on graphs | 13 pages, 2 figures | null | 10.1007/978-3-642-03816-7_26 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we formulate and study the problem of representing groups on
graphs. We show that with respect to polynomial time turing reducibility, both
abelian and solvable group representability are all equivalent to graph
isomorphism, even when the group is presented as a permutation group via
generators. On the other hand, the representability problem for general groups
on trees is equivalent to checking, given a group $G$ and $n$, whether a
nontrivial homomorphism from $G$ to $S_n$ exists. There does not seem to be a
polynomial time algorithm for this problem, in spite of the fact that tree
isomorphism has polynomial time algorithm.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 20:39:59 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Dutta",
"Sagarmoy",
""
],
[
"Kurur",
"Piyush P",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.3944 | Christopher Ward | Christopher O. Ward | Better Global Polynomial Approximation for Image Rectification | null | null | 10.2316/Journal.205.2008.3.205-4669 | null | cs.CV cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When using images to locate objects, there is the problem of correcting for
distortion and misalignment in the images. An elegant way of solving this
problem is to generate an error correcting function that maps points in an
image to their corrected locations. We generate such a function by fitting a
polynomial to a set of sample points. The objective is to identify a polynomial
that passes "sufficiently close" to these points with "good" approximation of
intermediate points. In the past, it has been difficult to achieve good global
polynomial approximation using only sample points. We report on the development
of a global polynomial approximation algorithm for solving this problem. Key
Words: Polynomial approximation, interpolation, image rectification.
| [
{
"version": "v1",
"created": "Fri, 24 Apr 2009 21:19:59 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Ward",
"Christopher O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0904.3953 | Victor Marek | V.W. Marek and J.B. Remmel | Guarded resolution for answer set programming | 13 pages, some results added. Accepted for publication at TPLP | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a variant of resolution rule of proof and show that it is
complete for stable semantics of logic programs. We show applications of this
result.
| [
{
"version": "v1",
"created": "Sat, 25 Apr 2009 00:28:07 GMT"
},
{
"version": "v2",
"created": "Sat, 2 May 2009 10:34:13 GMT"
},
{
"version": "v3",
"created": "Sat, 14 Nov 2009 22:59:07 GMT"
},
{
"version": "v4",
"created": "Sun, 21 Feb 2010 17:57:51 GMT"
}
]
| 2010-02-21T00:00:00 | [
[
"Marek",
"V. W.",
""
],
[
"Remmel",
"J. B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0904.4006 | Rajesh Ramachandran | R. Rajesh, Vinod Sharma and V. K. Varshenya | Joint Source-Channel Coding on a Multiple Access Channel with Side
Information | 29 pages, 3 figures. Submitted to IEEE Trans. Information theory | null | 10.1109/ISIT.2008.4595484 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of transmission of several distributed correlated
sources over a multiple access channel (MAC) with side information at the
sources and the decoder. Source-channel separation does not hold for this
channel. Sufficient conditions are provided for transmission of sources with a
given distortion. The source and/or the channel could have continuous alphabets
(thus Gaussian sources and Gaussian MACs are special cases). Various previous
results are obtained as special cases. We also provide several good joint
source-channel coding schemes for discrete sources and discrete/continuous
alphabet channel.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2009 04:43:59 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Rajesh",
"R.",
""
],
[
"Sharma",
"Vinod",
""
],
[
"Varshenya",
"V. K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4010 | Marc Timme | Marc Timme, Frank van Bussel, Denny Fliegner, and Sebastian
Stolzenberg | Counting Complex Disordered States by Efficient Pattern Matching:
Chromatic Polynomials and Potts Partition Functions | 7 pages, 4 figures | New J. Phys. 11:023001 (2009); freely available online | 10.1088/1367-2630/11/2/023001 | null | cond-mat.stat-mech cond-mat.dis-nn cs.SC math.CO | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Counting problems, determining the number of possible states of a large
system under certain constraints, play an important role in many areas of
science. They naturally arise for complex disordered systems in physics and
chemistry, in mathematical graph theory, and in computer science. Counting
problems, however, are among the hardest problems to access computationally.
Here, we suggest a novel method to access a benchmark counting problem, finding
chromatic polynomials of graphs. We develop a vertex-oriented symbolic pattern
matching algorithm that exploits the equivalence between the chromatic
polynomial and the zero-temperature partition function of the Potts
antiferromagnet on the same graph. Implementing this bottom-up algorithm using
appropriate computer algebra, the new method outperforms standard top-down
methods by several orders of magnitude, already for moderately sized graphs. As
a first application, we compute chromatic polynomials of samples of the simple
cubic lattice, for the first time computationally accessing three-dimensional
lattices of physical relevance. The method offers straightforward
generalizations to several other counting problems.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 12:49:26 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Timme",
"Marc",
""
],
[
"van Bussel",
"Frank",
""
],
[
"Fliegner",
"Denny",
""
],
[
"Stolzenberg",
"Sebastian",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0904.4030 | Yong Yao | Yong Yao | Successive Difference Substitution Based on Column Stochastic Matrix and
Mechanical Decision for Positive Semi-definite Forms | LaTeX; 18 pages | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The theory part of this paper is sketched as follows. Based on column
stochastic average matrix $T_n$ selected as a basic substitution matrix, the
method of advanced successive difference substitution is established. Then, a
set of necessary and sufficient conditions for deciding positive semi-definite
form on $\R^n_+$ is derived from this method. And furthermore, it is proved
that the sequence of SDS sets of a positive definite form is positively
terminating.
Worked out according to these results, the Maple program TSDS3 not only
automatically proves the polynomial inequalities, but also outputs counter
examples for the false. Sometimes TSDS3 does not halt, but it is very useful by
experimenting on so many examples.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 04:54:11 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jul 2009 03:07:20 GMT"
},
{
"version": "v3",
"created": "Fri, 2 Apr 2010 13:03:07 GMT"
}
]
| 2010-04-05T00:00:00 | [
[
"Yao",
"Yong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0904.4041 | Mario Nascimento | Jie Luo and Mario A. Nascimento | Content-Based Sub-Image Retrieval with Relevance Feedback | A preliminary version of this paper appeared in the Proceedings of
the 1st ACM International Workshop on Multimedia Databases, p. 63-69. 2003 | null | null | null | cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The typical content-based image retrieval problem is to find images within a
database that are similar to a given query image. This paper presents a
solution to a different problem, namely that of content based sub-image
retrieval, i.e., finding images from a database that contains another image.
Note that this is different from finding a region in a (segmented) image that
is similar to another image region given as a query. We present a technique for
CBsIR that explores relevance feedback, i.e., the user's input on intermediary
results, in order to improve retrieval efficiency. Upon modeling images as a
set of overlapping and recursive tiles, we use a tile re-weighting scheme that
assigns penalties to each tile of the database images and updates the tile
penalties for all relevant images retrieved at each iteration using both the
relevant and irrelevant images identified by the user. Each tile is modeled by
means of its color content using a compact but very efficient method which can,
indirectly, capture some notion of texture as well, despite the fact that only
color information is maintained. Performance evaluation on a largely
heterogeneous dataset of over 10,000 images shows that the system can achieve a
stable average recall value of 70% within the top 20 retrieved (and presented)
images after only 5 iterations, with each such iteration taking about 2 seconds
on an off-the-shelf desktop computer.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2009 17:50:33 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Luo",
"Jie",
""
],
[
"Nascimento",
"Mario A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0904.4048 | Saloua Chettibi | Saloua Chettibi | Un protocole de routage \`a basse consommation d'\'energie pour les
MANETs | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maximizing network lifetime is a very challenging issue in routing protocol
design for Mobile Ad-hoc NETworks (MANETs), since mobile nodes are powered by
limited-capacity batteries. Furthermore, replacing or recharging batteries is
often impossible in critical environments (e.g. battlefields, disaster areas,
etc.). Energy consumption was considered for a long time equivalent to
bandwidth consumption. However, recent works have shown that "energy" and
"bandwidth" are substantially different metrics. Moreover, it was found that
traditional routing policies such as "the shortest path" one can have a
negative impact on energy consumption balance. Therefore, several new
approaches have been proposed addressing energy efficiency explicitly. Our work
is related to energy efficient routing for MANETs' problem. The proposed
MEA-DSR (Multipath Energy-Aware on Demand Source Routing) protocol is based on
a load sharing strategy between mobile nodes in order to maximize network
lifetime. To achieve this goal, we used multipath routing; nodes' residual
energies and paths length were also considered when making routing decisions.
Simulation results have shown the efficiency of the proposed protocol under
difficult scenarios characterised by high mobility, high density and important
traffic load.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2009 18:43:05 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Chettibi",
"Saloua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.4057 | Salah A. Aly | Zhenning Kong, Salah A. Aly, Emina Soljanin | Decentralized Coding Algorithms for Distributed Storage in Wireless
Sensor Networks | Accepted for publication in IEEE JSAC, 2010 | null | null | null | cs.IT cs.DS cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider large-scale wireless sensor networks with $n$ nodes, out of which
k are in possession, (e.g., have sensed or collected in some other way) k
information packets. In the scenarios in which network nodes are vulnerable
because of, for example, limited energy or a hostile environment, it is
desirable to disseminate the acquired information throughout the network so
that each of the n nodes stores one (possibly coded) packet so that the
original k source packets can be recovered, locally and in a computationally
simple way from any k(1 + \epsilon) nodes for some small \epsilon > 0. We
develop decentralized Fountain codes based algorithms to solve this problem.
Unlike all previously developed schemes, our algorithms are truly distributed,
that is, nodes do not know n, k or connectivity in the network, except in their
own neighborhoods, and they do not maintain any routing tables.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2009 20:51:56 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Oct 2009 16:11:07 GMT"
}
]
| 2009-10-27T00:00:00 | [
[
"Kong",
"Zhenning",
""
],
[
"Aly",
"Salah A.",
""
],
[
"Soljanin",
"Emina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4058 | Gregory Price | Jeff Arnold, Tim Abbott, Waseem Daher, Gregory Price, Nelson Elhage,
Geoffrey Thomas, Anders Kaseorg | Security impact ratings considered harmful | HotOS 2009 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we question the common practice of assigning security impact
ratings to OS updates. Specifically, we present evidence that ranking updates
by their perceived security importance, in order to defer applying some
updates, exposes systems to significant risk.
We argue that OS vendors and security groups should not focus on security
updates to the detriment of other updates, but should instead seek update
technologies that make it feasible to distribute updates for all disclosed OS
bugs in a timely manner.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2009 20:57:42 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Arnold",
"Jeff",
""
],
[
"Abbott",
"Tim",
""
],
[
"Daher",
"Waseem",
""
],
[
"Price",
"Gregory",
""
],
[
"Elhage",
"Nelson",
""
],
[
"Thomas",
"Geoffrey",
""
],
[
"Kaseorg",
"Anders",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.4061 | Zhifeng Sun | Agnes Chan, Rajmohan Rajaraman, Zhifeng Sun, Feng Zhu | Approximation Algorithms for Key Management in Secure Multicast | COCOON 2009 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many data dissemination and publish-subscribe systems that guarantee the
privacy and authenticity of the participants rely on symmetric key
cryptography. An important problem in such a system is to maintain the shared
group key as the group membership changes. We consider the problem of
determining a key hierarchy that minimizes the average communication cost of an
update, given update frequencies of the group members and an edge-weighted
undirected graph that captures routing costs. We first present a
polynomial-time approximation scheme for minimizing the average number of
multicast messages needed for an update. We next show that when routing costs
are considered, the problem is NP-hard even when the underlying routing network
is a tree network or even when every group member has the same update
frequency. Our main result is a polynomial time constant-factor approximation
algorithm for the general case where the routing network is an arbitrary
weighted graph and group members have nonuniform update frequencies.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 15:28:58 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Chan",
"Agnes",
""
],
[
"Rajaraman",
"Rajmohan",
""
],
[
"Sun",
"Zhifeng",
""
],
[
"Zhu",
"Feng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.4064 | Angelos Mantzaflaris | Ioannis Z. Emiris and Angelos Mantzaflaris | Multihomogeneous Resultant Formulae for Systems with Scaled Support | 28 pages, 1 table | null | null | null | cs.SC math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constructive methods for matrices of multihomogeneous (or multigraded)
resultants for unmixed systems have been studied by Weyman, Zelevinsky,
Sturmfels, Dickenstein and Emiris. We generalize these constructions to mixed
systems, whose Newton polytopes are scaled copies of one polytope, thus taking
a step towards systems with arbitrary supports. First, we specify matrices
whose determinant equals the resultant and characterize the systems that admit
such formulae. Bezout-type determinantal formulae do not exist, but we describe
all possible Sylvester-type and hybrid formulae. We establish tight bounds for
all corresponding degree vectors, and specify domains that will surely contain
such vectors; the latter are new even for the unmixed case. Second, we make use
of multiplication tables and strong duality theory to specify resultant
matrices explicitly, for a general scaled system, thus including unmixed
systems. The encountered matrices are classified; these include a new type of
Sylvester-type matrix as well as Bezout-type matrices, known as partial
Bezoutians. Our public-domain Maple implementation includes efficient storage
of complexes in memory, and construction of resultant matrices.
| [
{
"version": "v1",
"created": "Sun, 26 Apr 2009 21:51:10 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2009 19:14:31 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Feb 2010 10:51:44 GMT"
}
]
| 2010-02-03T00:00:00 | [
[
"Emiris",
"Ioannis Z.",
""
],
[
"Mantzaflaris",
"Angelos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
]
|
0904.4073 | Momtchil Peev | Solange Ghernaouti-Helie, Igli Tashi, Thomas Laenger, Christian Monyk | SECOQC Business White Paper | null | null | null | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In contemporary cryptographic systems, secret keys are usually exchanged by
means of methods, which suffer from mathematical and technology inherent
drawbacks. That could lead to unnoticed complete compromise of cryptographic
systems, without a chance of control by its legitimate owners. Therefore a need
for innovative solutions exists when truly and reliably secure transmission of
secrets is required for dealing with critical data and applications. Quantum
Cryptography (QC), in particular Quantum Key Distribution (QKD) can answer that
need.
The business white paper (BWP) summarizes how secret key establishment and
distribution problems can be solved by quantum cryptography. It deals with
several considerations related to how the quantum cryptography innovation could
contribute to provide business effectiveness. It addresses advantages and also
limitations of quantum cryptography, proposes a scenario case study, and
invokes standardization related issues. In addition, it answers most frequently
asked questions about quantum cryptography.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 01:49:40 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Ghernaouti-Helie",
"Solange",
""
],
[
"Tashi",
"Igli",
""
],
[
"Laenger",
"Thomas",
""
],
[
"Monyk",
"Christian",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.4094 | Yang Jiansheng | Jiansheng Yang, Yunying Zhang | On the Upper Bounds of MDS Codes | 8 Pages | null | null | null | math.CO cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | Let $M_{q}(k)$ be the maximum length of MDS codes with parameters $q,k$. In
this paper, the properties of $M_{q}(k)$ are studied, and some new upper bounds
of $M_{q}(k)$ are obtained. Especially we obtain that $M_{q}(q-1)\leq
q+2(q\equiv4(mod 6)), M_{q}(q-2)\leq q+1(q\equiv4(mod 6)), M_{q}(k)\leq q+k-3
(q=36(5s+1), s\in N$ and $ k=6,7).
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 06:47:15 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Yang",
"Jiansheng",
""
],
[
"Zhang",
"Yunying",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4119 | Miko{\l}aj Boja\'nczyk | Mikolaj Bojanczyk | Two-Way Unary Temporal Logic over Trees | 29 pages. Journal version of a LICS 07 paper | Logical Methods in Computer Science, Volume 5, Issue 3 (August 5,
2009) lmcs:917 | 10.2168/LMCS-5(3:5)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a temporal logic EF+F^-1 for unranked, unordered finite trees.
The logic has two operators: EF\phi, which says "in some proper descendant \phi
holds", and F^-1\phi, which says "in some proper ancestor \phi holds". We
present an algorithm for deciding if a regular language of unranked finite
trees can be expressed in EF+F^-1. The algorithm uses a characterization
expressed in terms of forest algebras.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 09:33:44 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Aug 2009 18:19:12 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Bojanczyk",
"Mikolaj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.4120 | Ugo Dal Lago | Ugo Dal Lago and Simone Martini | On Constructor Rewrite Systems and the Lambda-Calculus (Long Version) | 20 pages. Extended version of a paper in the proceedings of ICALP
2009, Track B | null | null | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that orthogonal constructor term rewrite systems and lambda-calculus
with weak (i.e., no reduction is allowed under the scope of a
lambda-abstraction) call-by-value reduction can simulate each other with a
linear overhead. In particular, weak call-by-value beta-reduction can be
simulated by an orthogonal constructor term rewrite system in the same number
of reduction steps. Conversely, each reduction in a term rewrite system can be
simulated by a constant number of beta-reduction steps. This is relevant to
implicit computational complexity, because the number of beta steps to normal
form is polynomially related to the actual cost (that is, as performed on a
Turing machine) of normalization, under weak call-by-value reduction.
Orthogonal constructor term rewrite systems and lambda-calculus are thus both
polynomially related to Turing machines, taking as notion of cost their natural
parameters.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 09:49:14 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Jul 2009 16:31:15 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Oct 2009 13:32:34 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Aug 2012 15:16:46 GMT"
}
]
| 2012-08-03T00:00:00 | [
[
"Lago",
"Ugo Dal",
""
],
[
"Martini",
"Simone",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.4152 | Danny van Dyk | Danny van Dyk, Markus Geveler, Sven Mallach, Dirk Ribbrock, Dominik
Goeddeke, Carsten Gutwenger | HONEI: A collection of libraries for numerical computations targeting
multiple processor architectures | 19 pages, 7 figures | Computer Physics Communications 180(12), pp. 2534-2543, December
2009 | 10.1016/j.cpc.2009.04.018 | DO-TH 09/05 | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present HONEI, an open-source collection of libraries offering a hardware
oriented approach to numerical calculations. HONEI abstracts the hardware, and
applications written on top of HONEI can be executed on a wide range of
computer architectures such as CPUs, GPUs and the Cell processor. We
demonstrate the flexibility and performance of our approach with two test
applications, a Finite Element multigrid solver for the Poisson problem and a
robust and fast simulation of shallow water waves. By linking against HONEI's
libraries, we achieve a twofold speedup over straight forward C++ code using
HONEI's SSE backend, and additional 3-4 and 4-16 times faster execution on the
Cell and a GPU. A second important aspect of our approach is that the full
performance capabilities of the hardware under consideration can be exploited
by adding optimised application-specific operations to the HONEI libraries.
HONEI provides all necessary infrastructure for development and evaluation of
such kernels, significantly simplifying their development.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 13:00:36 GMT"
}
]
| 2010-06-28T00:00:00 | [
[
"van Dyk",
"Danny",
""
],
[
"Geveler",
"Markus",
""
],
[
"Mallach",
"Sven",
""
],
[
"Ribbrock",
"Dirk",
""
],
[
"Goeddeke",
"Dominik",
""
],
[
"Gutwenger",
"Carsten",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0904.4155 | Jeong-woo Cho | Jeong-woo Cho, Yuming Jiang | Fundamentals of the Backoff Process in 802.11: Dichotomy of the
Aggregation | 15 pages, 4 figures; An abstract version of this paper was presented
at ACM SIGMETRICS Workshop on MAthematical performance Modeling and Analysis
(MAMA 2009) | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discovers fundamental principles of the backoff process that
governs the performance of IEEE 802.11. A simplistic principle founded upon
regular variation theory is that the backoff time has a truncated Pareto-type
tail distribution with an exponent of $(\log \gamma)/\log m$ ($m$ is the
multiplicative factor and $\gamma$ is the collision probability). This reveals
that the per-node backoff process is heavy-tailed in the strict sense for
$\gamma>1/m^2$, and paves the way for the following unifying result.
The state-of-the-art theory on the superposition of the heavy-tailed
processes is applied to establish a dichotomy exhibited by the aggregate
backoff process, putting emphasis on the importance of time-scale on which we
view the backoff processes. While the aggregation on normal time-scales leads
to a Poisson process, it is approximated by a new limiting process possessing
long-range dependence (LRD) on coarse time-scales. This dichotomy turns out to
be instrumental in formulating short-term fairness, extending existing formulas
to arbitrary population, and to elucidate the absence of LRD in practical
situations. A refined wavelet analysis is conducted to strengthen this
argument.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 13:33:06 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2009 17:02:30 GMT"
},
{
"version": "v3",
"created": "Wed, 2 Dec 2009 05:40:09 GMT"
},
{
"version": "v4",
"created": "Wed, 7 Apr 2010 11:40:23 GMT"
},
{
"version": "v5",
"created": "Fri, 20 Aug 2010 14:01:27 GMT"
}
]
| 2010-08-23T00:00:00 | [
[
"Cho",
"Jeong-woo",
""
],
[
"Jiang",
"Yuming",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0904.4174 | Oleksii Ignatenko | O. Ignatenko | Denial of service attack in the Internet: agent-based intrusion
detection and reaction | 6 pages, 3 figures | null | null | null | cs.NI cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper deals with denial of service attack. Overview of the existing
attacks and methods is proposed. Classification scheme is presented for a
different denial of service attacks. There is considered agent-based intrusion
detection systems architecture. Considered main components and working
principles for a systems of such kind.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 14:33:57 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Ignatenko",
"O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0904.4176 | Pierre-Francois Marteau | Nicolas Bonnel (VALORIA), Pierre-Fran\c{c}ois Marteau (VALORIA),
Gildas G. M\'enier (VALORIA) | Parallel Random Apollonian Networks | Working paper | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present and study in this paper a simple algorithm that produces so called
growing Parallel Random Apollonian Networks (P-RAN) in any dimension d.
Analytical derivations show that these networks still exhibit small-word and
scale-free characteristics. To characterize further the structure of P-RAN, we
introduce new parameters that we refer to as the parallel degree and the
parallel coefficient, that determine locally and in average the number of
vertices inside the (d+1)-cliques composing the network. We provide analytical
derivations for the computation of the degree and parallel degree
distributions, parallel and clustering coefficients. We give an upper bound for
the average path lengths for P-RAN and finally show that our derivations are in
very good agreement with our simulations.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 14:45:26 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2009 09:08:22 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Bonnel",
"Nicolas",
"",
"VALORIA"
],
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
],
[
"Ménier",
"Gildas G.",
"",
"VALORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.4181 | Husam Alustwani Mr | Husam Alustwani, Jacques M. Bahi, Ahmed Mostefaoui, Michel Salomon | Java Technology : a Strategic Solution for Interactive Distributed
Applications | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a world demanding the best performance from financial investments,
distributed applications occupy the first place among the proposed solutions.
This particularity is due to their distributed architecture which is able to
acheives high performance. Currently, many research works aim to develop tools
that facilitate the implementation of such applications. The urgent need for
such applications in all areas pushes researchers to accelerate this process.
However, the lack of standardization results in the absence of strategic
decisions taken by computer science community. In this article, we argue that
Java technology represents an elegant compromise ahead of the list of the
currently available solutions. In fact, by promoting the independence of
hardware and software, Java technology makes it possible to overcome pitfalls
that are inherent to the creation of distributed applications.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 15:16:32 GMT"
}
]
| 2009-04-28T00:00:00 | [
[
"Alustwani",
"Husam",
""
],
[
"Bahi",
"Jacques M.",
""
],
[
"Mostefaoui",
"Ahmed",
""
],
[
"Salomon",
"Michel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0904.4193 | Shahar Dobzinski | Shahar Dobzinski, Shaddin Dughmi | On the Power of Randomization in Algorithmic Mechanism Design | null | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In many settings the power of truthful mechanisms is severely bounded. In
this paper we use randomization to overcome this problem. In particular, we
construct an FPTAS for multi-unit auctions that is truthful in expectation,
whereas there is evidence that no polynomial-time truthful deterministic
mechanism provides an approximation ratio better than 2.
We also show for the first time that truthful in expectation polynomial-time
mechanisms are \emph{provably} stronger than polynomial-time universally
truthful mechanisms. Specifically, we show that there is a setting in which:
(1) there is a non-polynomial time truthful mechanism that always outputs the
optimal solution, and that (2) no universally truthful randomized mechanism can
provide an approximation ratio better than 2 in polynomial time, but (3) an
FPTAS that is truthful in expectation exists.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 15:58:08 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Aug 2009 18:30:27 GMT"
}
]
| 2009-08-24T00:00:00 | [
[
"Dobzinski",
"Shahar",
""
],
[
"Dughmi",
"Shaddin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0904.4202 | Emmanuel Lochin | Pierre-Ugo Tournoux, Emmanuel Lochin, Jerome Lacan, Amine Bouabdallah,
Vincent Roca | On-the-fly erasure coding for real-time video applications | null | null | 10.1109/TMM.2011.2126564 | null | cs.NI cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a robust point-to-point transmission scheme: Tetrys,
that relies on a novel on-the-fly erasure coding concept which reduces the
delay for recovering lost data at the receiver side. In current erasure coding
schemes, the packets that are not rebuilt at the receiver side are either lost
or delayed by at least one RTT before transmission to the application. The
present contribution aims at demonstrating that Tetrys coding scheme can fill
the gap between real-time applications requirements and full reliability.
Indeed, we show that in several cases, Tetrys can recover lost packets below
one RTT over lossy and best-effort networks. We also show that Tetrys allows to
enable full reliability without delay compromise and as a result: significantly
improves the performance of time constrained applications. For instance, our
evaluations present that video-conferencing applications obtain a PSNR gain up
to 7dB compared to classic block-based erasure codes.
| [
{
"version": "v1",
"created": "Mon, 27 Apr 2009 16:09:33 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Feb 2010 07:23:23 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Nov 2010 09:03:43 GMT"
},
{
"version": "v4",
"created": "Tue, 16 Nov 2010 12:41:51 GMT"
}
]
| 2012-04-03T00:00:00 | [
[
"Tournoux",
"Pierre-Ugo",
""
],
[
"Lochin",
"Emmanuel",
""
],
[
"Lacan",
"Jerome",
""
],
[
"Bouabdallah",
"Amine",
""
],
[
"Roca",
"Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0904.4283 | Cong Shen | Cong Shen and Michael P. Fitz | Opportunistic Spatial Orthogonalization and Its Application in Fading
Cognitive Radio Networks | 26 pages, 6 figures, submitted for journal publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Opportunistic Spatial Orthogonalization (OSO) is a cognitive radio scheme
that allows the existence of secondary users and hence increases the system
throughput, even if the primary user occupies all the frequency bands all the
time. Notably, this throughput advantage is obtained without sacrificing the
performance of the primary user, if the interference margin is carefully
chosen. The key idea is to exploit the spatial dimensions to orthogonalize
users and hence minimize interference. However, unlike the time and frequency
dimensions, there is no universal basis for the set of all multi-dimensional
spatial channels, which motivated the development of OSO. On one hand, OSO can
be viewed as a multi-user diversity scheme that exploits the channel randomness
and independence. On the other hand, OSO can be interpreted as an opportunistic
interference alignment scheme, where the interference from multiple secondary
users is opportunistically aligned at the direction that is orthogonal to the
primary user's signal space. In the case of multiple-input multiple-output
(MIMO) channels, the OSO scheme can be interpreted as "riding the peaks" over
the eigen-channels, and ill-conditioned MIMO channel, which is traditionally
viewed as detrimental, is shown to be beneficial with respect to the sum
throughput. Throughput advantages are thoroughly studied, both analytically and
numerically.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 00:11:22 GMT"
}
]
| 2009-04-29T00:00:00 | [
[
"Shen",
"Cong",
""
],
[
"Fitz",
"Michael P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4312 | David Eppstein | David Eppstein and Elena Mumford | Orientation-Constrained Rectangular Layouts | To appear at Algorithms and Data Structures Symposium, Banff, Canada,
August 2009. 12 pages, 5 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct partitions of rectangles into smaller rectangles from an input
consisting of a planar dual graph of the layout together with restrictions on
the orientations of edges and junctions of the layout. Such an
orientation-constrained layout, if it exists, may be constructed in polynomial
time, and all orientation-constrained layouts may be listed in polynomial time
per layout.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 06:01:53 GMT"
}
]
| 2009-04-29T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Mumford",
"Elena",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.4331 | Prabhu Manyem | Prabhu Manyem | Lower Bounds on Syntactic Logic Expressions for Optimization Problems
and Duality using Lagrangian Dual to characterize optimality conditions | An expansion of the previous version to include: a single call to a
decision Turing machine to solve optimization problems obeying strong duality
in polynomial time | null | null | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that simple syntactic expressions such as existential second order
(ESO) universal Horn formulae can express NP-hard optimisation problems. There
is a significant difference between the expressibilities of decision problems
and optimisation problems. This is similar to the difference in computation
times for the two classes of problems; for example, a 2SAT Horn formula can be
satisfied in polynomial time, whereas the optimisation version in NP-hard. It
is known that all polynomially solvable decision problems can be expressed as
ESO universal ($\Pi_1$) Horn sentences in the presence of a successor relation.
We show here that, on the other hand, if $P \neq NP$, optimisation problems
defy such a characterisation, by demonstrating that even a $\Pi_0$ (quantifier
free) Horn formula is unable to guarantee polynomial time solvability. Finally,
by connecting concepts in optimisation duality with those in descriptive
complexity, we will show a method by which optimisation problems can be solved
by a single call to a "decision" Turing machine, as opposed to multiple calls
using a classical binary search setting.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 08:28:11 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2009 04:08:41 GMT"
},
{
"version": "v3",
"created": "Sun, 24 Jul 2011 09:15:16 GMT"
}
]
| 2011-07-26T00:00:00 | [
[
"Manyem",
"Prabhu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.4343 | Roland Tresch | Roland Tresch, Maxime Guillaud, and Erwin Riegler | On the Achievability of Interference Alignment in the K-User Constant
MIMO Interference Channel | submitted to IEEE Workshop on Statistical Signal Processing (SSP09) | null | 10.1109/SSP.2009.5278586 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interference alignment in the K-user MIMO interference channel with constant
channel coefficients is considered. A novel constructive method for finding the
interference alignment solution is proposed for the case where the number of
transmit antennas equals the number of receive antennas (NT = NR = N), the
number of transmitter-receiver pairs equals K = N + 1, and all interference
alignment multiplexing gains are one. The core of the method consists of
solving an eigenvalue problem that incorporates the channel matrices of all
interfering links. This procedure provides insight into the feasibility of
signal vector spaces alignment schemes in finite dimensional MIMO interference
channels.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 09:57:52 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Tresch",
"Roland",
""
],
[
"Guillaud",
"Maxime",
""
],
[
"Riegler",
"Erwin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4358 | Maben Rabi | Maben Rabi, George V. Moustakides, John S. Baras | Adaptive sampling for linear state estimation | Submitted to the SIAM journal on control and optimization. 32 pages,
7 figures | null | null | IR-EE-RT 2009:019 | math.OC cs.SY math.PR math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When a sensor has continuous measurements but sends limited messages over a
data network to a supervisor which estimates the state, the available packet
rate fixes the achievable quality of state estimation. When such rate limits
turn stringent, the sensor's messaging policy should be designed anew. What are
the good causal messaging policies ? What should message packets contain ? What
is the lowest possible distortion in a causal estimate at the supervisor ? Is
Delta sampling better than periodic sampling ? We answer these questions under
an idealized model of the network and the assumption of perfect measurements at
the sensor. For a scalar, linear diffusion process, we study the problem of
choosing the causal sampling times that will give the lowest aggregate squared
error distortion. We stick to finite-horizons and impose a hard upper bound on
the number of allowed samples. We cast the design as a problem of choosing an
optimal sequence of stopping times. We reduce this to a nested sequence of
problems each asking for a single optimal stopping time. Under an unproven but
natural assumption about the least-square estimate at the supervisor, each of
these single stopping problems are of standard form. The optimal stopping times
are random times when the estimation error exceeds designed envelopes. For the
case where the state is a Brownian motion, we give analytically: the shape of
the optimal sampling envelopes, the shape of the envelopes under optimal Delta
sampling, and their performances. Surprisingly, we find that Delta sampling
performs badly. Hence, when the rate constraint is a hard limit on the number
of samples over a finite horizon, we should should not use Delta sampling.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 10:08:58 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jul 2011 10:58:47 GMT"
}
]
| 2011-07-21T00:00:00 | [
[
"Rabi",
"Maben",
""
],
[
"Moustakides",
"George V.",
""
],
[
"Baras",
"John S.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0904.4360 | Arnab Bhattacharyya | Arnab Bhattacharyya and Bernhard Haeupler | Robust Regulatory Networks | null | null | null | null | q-bio.MN cs.CC q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the characteristic features of genetic networks is their inherent
robustness, that is, their ability to retain functionality in spite of the
introduction of random errors. In this paper, we seek to better understand how
robustness is achieved and what functionalities can be maintained robustly. Our
goal is to formalize some of the language used in biological discussions in a
reasonable mathematical framework, where questions can be answered in a
rigorous fashion. These results provide basic conceptual understanding of
robust regulatory networks that should be valuable independent of the details
of the formalism.
We model the gene regulatory network as a boolean network, a general and
well-established model introduced by Stuart Kauffman. A boolean network is said
to be in a viable configuration if the node states of the network at its
fixpoint satisfy some given constraint. We specify how mutations affect the
behavior of the boolean network. A network is then said to be robust if most
random mutations to the network reach a viable configuration. The main question
investigated in our study is: given a constraint on the fixpoint configuration,
does there exist a network that is robust with respect to it and, if so, what
is its structure? We demonstrate both explicit constructions of robust networks
as well as negative results disproving their existence.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 10:46:26 GMT"
}
]
| 2009-04-29T00:00:00 | [
[
"Bhattacharyya",
"Arnab",
""
],
[
"Haeupler",
"Bernhard",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0904.4411 | Jean-Philippe Auzelle | Jean-Philippe Auzelle (CRAN), Olivier Nartz (AIP), Jean-Yves Bron
(CRAN, AIP) | Ing\'enierie syst\`eme d'un syst\`eme d'information d'entreprise
centr\'e sur le produit bas\'ee sur un cadre de mod\'elisation
multi-\'echelles : application \`a un cas d'\'etude de l'AIP lorrain | null | 11\`eme Colloque National AIP PRIMECA, La Plagne : France (2009) | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Through its projects, the ?Atelier Inter-\'etablissements de Productique
Lorrain? (AIPL), as the owner and contractor of rank 1, is committed to provide
his customers (teachers, training courses, students etc...) credible teaching
materials at the scale of a real industrial flexible production of goods and
services. In this changing context, its managerial team has chosen to suppress
the CIM concept, which proposes an integrated enterprise, to steering
distributed system information (SI), heterogeneous, autonomous and scalable
depending on the ephemeral cooperation between industrial partners who now
exchanges information and material flows. These aspects are studied in research
on CRAN (Centre de Recherche en Automatique de Nancy ? Research Centre for
Automatic Control) as part of a thesis based on the recursive aspect of systems
and their models and their multi-scale aspects and multi-views, in a
Model-Based-System-Engineering (MBSE) methodology proposal of an
System-Engineering (SE) focused on the product. To validate this research, a
MBSE has been implemented on a case study to AIPL: the "eLearning in
eProduction? project.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 14:24:23 GMT"
}
]
| 2009-04-29T00:00:00 | [
[
"Auzelle",
"Jean-Philippe",
"",
"CRAN"
],
[
"Nartz",
"Olivier",
"",
"AIP"
],
[
"Bron",
"Jean-Yves",
"",
"CRAN, AIP"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0904.4412 | Anne Canteaut | Anne Canteaut (INRIA Rocquencourt), Maria Naya-Plasencia (INRIA
Rocquencourt) | Computing the biases of parity-check relations | null | 2009 IEEE International Symposium on Information Theory
(ISIT2009), Seoul : Cor\'ee, R\'epublique de (2009) | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A divide-and-conquer cryptanalysis can often be mounted against some
keystream generators composed of several (nonlinear) independent devices
combined by a Boolean function. In particular, any parity-check relation
derived from the periods of some constituent sequences usually leads to a
distinguishing attack whose complexity is determined by the bias of the
relation. However, estimating this bias is a difficult problem since the
piling-up lemma cannot be used. Here, we give two exact expressions for this
bias. Most notably, these expressions lead to a new algorithm for computing the
bias of a parity-check relation, and they also provide some simple formulae for
this bias in some particular cases which are commonly used in cryptography.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 14:25:48 GMT"
}
]
| 2009-04-29T00:00:00 | [
[
"Canteaut",
"Anne",
"",
"INRIA Rocquencourt"
],
[
"Naya-Plasencia",
"Maria",
"",
"INRIA\n Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0904.4429 | David Orden | David Orden, Pedro Ramos, Gelasio Salazar | The number of generalized balanced lines | 6 pages, 3 figures, several typos fixed, reference added | Discrete and Computational Geometry 44:4 (2010), 805-811 | 10.1007/s00454-010-9253-4 | null | math.CO cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $S$ be a set of $r$ red points and $b=r+2d$ blue points in general
position in the plane, with $d\geq 0$. A line $\ell$ determined by them is said
to be balanced if in each open half-plane bounded by $\ell$ the difference
between the number of red points and blue points is $d$. We show that every set
$S$ as above has at least $r$ balanced lines. The main techniques in the proof
are rotations and a generalization, sliding rotations, introduced here.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 15:32:27 GMT"
},
{
"version": "v2",
"created": "Sat, 2 May 2009 14:34:28 GMT"
},
{
"version": "v3",
"created": "Fri, 22 May 2009 10:38:09 GMT"
}
]
| 2020-07-21T00:00:00 | [
[
"Orden",
"David",
""
],
[
"Ramos",
"Pedro",
""
],
[
"Salazar",
"Gelasio",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.4449 | Martin Loebl | Lukas Kencl, Martin Loebl | DNA-Inspired Information Concealing | null | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Protection of the sensitive content is crucial for extensive information
sharing. We present a technique of information concealing, based on
introduction and maintenance of families of repeats. Repeats in DNA constitute
a basic obstacle for its reconstruction by hybridization.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 17:27:54 GMT"
}
]
| 2009-04-29T00:00:00 | [
[
"Kencl",
"Lukas",
""
],
[
"Loebl",
"Martin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4458 | Michael Goodrich | Michael T. Goodrich | Learning Character Strings via Mastermind Queries, with a Case Study
Involving mtDNA | Full version of related paper appearing in IEEE Symposium on Security
and Privacy 2009, "The Mastermind Attack on Genomic Data." This version
corrects the proofs of what are now Theorems 2 and 4. | null | 10.1109/TIT.2012.2208581 | null | cs.DS cs.CR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the degree to which a character string, $Q$, leaks details about
itself any time it engages in comparison protocols with a strings provided by a
querier, Bob, even if those protocols are cryptographically guaranteed to
produce no additional information other than the scores that assess the degree
to which $Q$ matches strings offered by Bob. We show that such scenarios allow
Bob to play variants of the game of Mastermind with $Q$ so as to learn the
complete identity of $Q$. We show that there are a number of efficient
implementations for Bob to employ in these Mastermind attacks, depending on
knowledge he has about the structure of $Q$, which show how quickly he can
determine $Q$. Indeed, we show that Bob can discover $Q$ using a number of
rounds of test comparisons that is much smaller than the length of $Q$, under
reasonable assumptions regarding the types of scores that are returned by the
cryptographic protocols and whether he can use knowledge about the distribution
that $Q$ comes from. We also provide the results of a case study we performed
on a database of mitochondrial DNA, showing the vulnerability of existing
real-world DNA data to the Mastermind attack.
| [
{
"version": "v1",
"created": "Tue, 28 Apr 2009 18:12:24 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Apr 2010 05:31:22 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Goodrich",
"Michael T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4512 | Andr\'as Salamon | Andr\'as Z. Salamon and Vashti Galpin | Bounds on series-parallel slowdown | 12 pages, 4 figures | null | null | null | cs.DC cs.CC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We use activity networks (task graphs) to model parallel programs and
consider series-parallel extensions of these networks. Our motivation is
two-fold: the benefits of series-parallel activity networks and the modelling
of programming constructs, such as those imposed by current parallel computing
environments. Series-parallelisation adds precedence constraints to an activity
network, usually increasing its makespan (execution time). The slowdown ratio
describes how additional constraints affect the makespan. We disprove an
existing conjecture positing a bound of two on the slowdown when workload is
not considered. Where workload is known, we conjecture that 4/3 slowdown is
always achievable, and prove our conjecture for small networks using max-plus
algebra. We analyse a polynomial-time algorithm showing that achieving 4/3
slowdown is in exp-APX. Finally, we discuss the implications of our results.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 01:39:57 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Salamon",
"András Z.",
""
],
[
"Galpin",
"Vashti",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0904.4525 | Paul Tune PT | Paul Tune, Sibiraj Bhaskaran Pillai and Stephen Hanly | Number of Measurements in Sparse Signal Recovery | 6 pages, 1 figure. Extended from conference version with proofs
included | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the asymptotic performance of sparse signal recovery from noisy
measurements. In particular, we generalize some of the existing results for the
Gaussian case to subgaussian and other ensembles. An achievable result is
presented for the linear sparsity regime. A converse on the number of required
measurements in the sub-linear regime is also presented, which cover many of
the widely used measurement ensembles. Our converse idea makes use of a
correspondence between compressed sensing ideas and compound channels in
information theory.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 02:27:31 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Tune",
"Paul",
""
],
[
"Pillai",
"Sibiraj Bhaskaran",
""
],
[
"Hanly",
"Stephen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4526 | Syed Jafar | Cenk M. Yetis, Syed A. Jafar, Ahmet H. Kayran | Feasibility Conditions for Interference Alignment | 6 pages. Submitted to IEEE Globecom March 31 2009 | IEEE Transactions on Signal Processing, Sep. 2010, Vol. 58, Issue:
9, Pages: 4771-4782 | 10.1109/TSP.2010.2050480 | null | cs.IT cs.AR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The degrees of freedom of MIMO interference networks with constant channel
coefficients are not known in general. Determining the feasibility of a linear
interference alignment solution is a key step toward solving this open problem.
Our approach in this paper is to view the alignment problem as a system of
bilinear equations and determine its solvability by comparing the number of
equations and the number of variables. To this end, we divide interference
alignment problems into two classes - proper and improper. An interference
alignment problem is called proper if the number of equations does not exceed
the number of variables. Otherwise, it is called improper. Examples are
presented to support the intuition that for generic channel matrices, proper
systems are almost surely feasible and improper systems are almost surely
infeasible.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 03:11:52 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Yetis",
"Cenk M.",
""
],
[
"Jafar",
"Syed A.",
""
],
[
"Kayran",
"Ahmet H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4527 | Marcus Hutter | Alberto Piatti and Marco Zaffalon and Fabio Trojani and Marcus Hutter | Limits of Learning about a Categorical Latent Variable under Prior
Near-Ignorance | 27 LaTeX pages | International Journal of Approximate Reasoning, 50:4 (2009) pages
597-611 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider the coherent theory of (epistemic) uncertainty of
Walley, in which beliefs are represented through sets of probability
distributions, and we focus on the problem of modeling prior ignorance about a
categorical random variable. In this setting, it is a known result that a state
of prior ignorance is not compatible with learning. To overcome this problem,
another state of beliefs, called \emph{near-ignorance}, has been proposed.
Near-ignorance resembles ignorance very closely, by satisfying some principles
that can arguably be regarded as necessary in a state of ignorance, and allows
learning to take place. What this paper does, is to provide new and substantial
evidence that also near-ignorance cannot be really regarded as a way out of the
problem of starting statistical inference in conditions of very weak beliefs.
The key to this result is focusing on a setting characterized by a variable of
interest that is \emph{latent}. We argue that such a setting is by far the most
common case in practice, and we provide, for the case of categorical latent
variables (and general \emph{manifest} variables) a condition that, if
satisfied, prevents learning to take place under prior near-ignorance. This
condition is shown to be easily satisfied even in the most common statistical
problems. We regard these results as a strong form of evidence against the
possibility to adopt a condition of prior near-ignorance in real statistical
problems.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 03:16:20 GMT"
}
]
| 2014-07-15T00:00:00 | [
[
"Piatti",
"Alberto",
""
],
[
"Zaffalon",
"Marco",
""
],
[
"Trojani",
"Fabio",
""
],
[
"Hutter",
"Marcus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.4530 | Fei Li | Fei Li, Zhi Zhang | Online Maximizing Weighted Throughput In A Fading Channel | 9 pages, appears in ISIT 2009 | null | null | null | cs.IT cs.DS math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider online scheduling weighted packets with time constraints over a
fading channel. Packets arrive at the transmitter in an online manner. Each
packet has a value and a deadline by which it should be sent. The fade state of
the channel determines the throughput obtained per unit of time and the
channel's quality may change over time. In this paper, we design online
algorithms to maximize weighted throughput, defined as the total value of the
packets sent by their respective deadlines. Competitive ratio is employed to
measure an online algorithm's performance. For this problem and one of its
variants, we present two online algorithms with competitive ratios 2.618 and 2
respectively.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 04:11:35 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Li",
"Fei",
""
],
[
"Zhang",
"Zhi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4541 | Amin Gohari | Amin Aminzadeh Gohari and Venkat Anantharam | Evaluation of Marton's Inner Bound for the General Broadcast Channel | 29 pages, 2 figures. Submitted to the IEEE Transactions on
Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The best known inner bound on the two-receiver general broadcast channel
without a common message is due to Marton [3]. This result was subsequently
generalized in [p. 391, Problem 10(c) 2] and [4] to broadcast channels with a
common message. However the latter region is not computable (except in certain
special cases) as no bounds on the cardinality of its auxiliary random
variables exist. Nor is it even clear that the inner bound is a closed set. The
main obstacle in proving cardinality bounds is the fact that the traditional
use of the Carath\'{e}odory theorem, the main known tool for proving
cardinality bounds, does not yield a finite cardinality result. One of the main
contributions of this paper is the introduction of a new tool based on an
identity that relates the second derivative of the Shannon entropy of a
discrete random variable (under a certain perturbation) to the corresponding
Fisher information. In order to go beyond the traditional Carath\'{e}odory type
arguments, we identify certain properties that the auxiliary random variables
corresponding to the extreme points of the inner bound need to satisfy. These
properties are then used to establish cardinality bounds on the auxiliary
random variables of the inner bound, thereby proving the computability of the
region, and its closedness.
Lastly, we establish a conjecture of \cite{NairZizhou} that Marton's inner
bound and the recent outer bound of Nair and El Gamal do not match in general.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 06:50:00 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 04:09:50 GMT"
},
{
"version": "v3",
"created": "Sat, 28 May 2011 12:26:06 GMT"
}
]
| 2011-05-31T00:00:00 | [
[
"Gohari",
"Amin Aminzadeh",
""
],
[
"Anantharam",
"Venkat",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4542 | Amin Gohari | Amin Aminzadeh Gohari and Venkat Anantharam | A Generalized Cut-Set Bound | 22 pages, 1 figure, a short version of it appears in ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we generalize the well known cut-set bound to the problem of
lossy transmission of functions of arbitrarily correlated sources over a
discrete memoryless multiterminal network.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 07:00:57 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Gohari",
"Amin Aminzadeh",
""
],
[
"Anantharam",
"Venkat",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4587 | Juan-Manuel Torres-Moreno | Juan-Manuel Torres-Moreno and Mirta B. Gordon | Adaptive Learning with Binary Neurons | 29 pages, 7 figures | null | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A efficient incremental learning algorithm for classification tasks, called
NetLines, well adapted for both binary and real-valued input patterns is
presented. It generates small compact feedforward neural networks with one
hidden layer of binary units and binary output units. A convergence theorem
ensures that solutions with a finite number of hidden units exist for both
binary and real-valued input patterns. An implementation for problems with more
than two classes, valid for any binary classifier, is proposed. The
generalization error and the size of the resulting networks are compared to the
best published results on well-known classification benchmarks. Early stopping
is shown to decrease overfitting, without improving the generalization
performance.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 11:49:45 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Torres-Moreno",
"Juan-Manuel",
""
],
[
"Gordon",
"Mirta B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0904.4600 | Tommy F\"arnqvist | Robert Engstr\"om, Tommy F\"arnqvist, Peter Jonsson and Johan Thapper | Graph Homomorphisms, Circular Colouring, and Fractional Covering by
H-cuts | 24 pages, 1 figure Corrected the statements of Lemma 4.3 and 4.4 | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graph homomorphism is a vertex map which carries edges from a source graph
to edges in a target graph. The instances of the Weighted Maximum H-Colourable
Subgraph problem (MAX H-COL) are edge-weighted graphs G and the objective is to
find a subgraph of G that has maximal total edge weight, under the condition
that the subgraph has a homomorphism to H; note that for H=K_k this problem is
equivalent to MAX k-CUT. Farnqvist et al. have introduced a parameter on the
space of graphs that allows close study of the approximability properties of
MAX H-COL. Specifically, it can be used to extend previously known
(in)approximability results to larger classes of graphs. Here, we investigate
the properties of this parameter on circular complete graphs K_{p/q}, where 2
<= p/q <= 3. The results are extended to K_4-minor-free graphs and graphs with
bounded maximum average degree. We also consider connections with Samal's work
on fractional covering by cuts: we address, and decide, two conjectures
concerning cubical chromatic numbers.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 12:50:46 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2009 07:54:28 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Nov 2009 13:46:15 GMT"
}
]
| 2009-11-18T00:00:00 | [
[
"Engström",
"Robert",
""
],
[
"Färnqvist",
"Tommy",
""
],
[
"Jonsson",
"Peter",
""
],
[
"Thapper",
"Johan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.4608 | Srivatsan Laxman | Srivatsan Laxman, Basel Shadid, P. S. Sastry and K. P. Unnikrishnan | Temporal data mining for root-cause analysis of machine faults in
automotive assembly lines | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Engine assembly is a complex and heavily automated distributed-control
process, with large amounts of faults data logged everyday. We describe an
application of temporal data mining for analyzing fault logs in an engine
assembly plant. Frequent episode discovery framework is a model-free method
that can be used to deduce (temporal) correlations among events from the logs
in an efficient manner. In addition to being theoretically elegant and
computationally efficient, frequent episodes are also easy to interpret in the
form actionable recommendations. Incorporation of domain-specific information
is critical to successful application of the method for analyzing fault logs in
the manufacturing domain. We show how domain-specific knowledge can be
incorporated using heuristic rules that act as pre-filters and post-filters to
frequent episode discovery. The system described here is currently being used
in one of the engine assembly plants of General Motors and is planned for
adaptation in other plants. To the best of our knowledge, this paper presents
the first real, large-scale application of temporal data mining in the
manufacturing domain. We believe that the ideas presented in this paper can
help practitioners engineer tools for analysis in other similar or related
application domains as well.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 13:17:31 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Apr 2009 17:02:30 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Laxman",
"Srivatsan",
""
],
[
"Shadid",
"Basel",
""
],
[
"Sastry",
"P. S.",
""
],
[
"Unnikrishnan",
"K. P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0904.4615 | Maria Potop-Butucaru | Swan Dubois (INRIA Rocquencourt, LIP6), Maria Potop-Butucaru (INRIA
Rocquencourt, LIP6), S\'ebastien Tixeuil (LIP6) | Dynamic FTSS in Asynchronous Systems: the Case of Unison | null | null | null | null | cs.DS cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed fault-tolerance can mask the effect of a limited number of
permanent faults, while self-stabilization provides forward recovery after an
arbitrary number of transient fault hit the system. FTSS protocols combine the
best of both worlds since they are simultaneously fault-tolerant and
self-stabilizing. To date, FTSS solutions either consider static (i.e. fixed
point) tasks, or assume synchronous scheduling of the system components. In
this paper, we present the first study of dynamic tasks in asynchronous
systems, considering the unison problem as a benchmark. Unison can be seen as a
local clock synchronization problem as neighbors must maintain digital clocks
at most one time unit away from each other, and increment their own clock value
infinitely often. We present many impossibility results for this difficult
problem and propose a FTSS solution when the problem is solvable that exhibits
optimal fault containment.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 14:04:59 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Feb 2011 16:21:28 GMT"
}
]
| 2011-02-11T00:00:00 | [
[
"Dubois",
"Swan",
"",
"INRIA Rocquencourt, LIP6"
],
[
"Potop-Butucaru",
"Maria",
"",
"INRIA\n Rocquencourt, LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0904.4670 | Michael Goodrich | Mikhail J. Atallah, Marina Blanton, Michael T. Goodrich, Stanislas
Polu | Discrepancy-Sensitive Dynamic Fractional Cascading, Dominated Maxima
Searching, and 2-d Nearest Neighbors in Any Minkowski Metric | Expanded version of a paper that appeared in WADS 2007 | null | null | null | cs.DS cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies a discrepancy-sensitive approach to dynamic fractional
cascading. We provide an efficient data structure for dominated maxima
searching in a dynamic set of points in the plane, which in turn leads to an
efficient dynamic data structure that can answer queries for nearest neighbors
using any Minkowski metric. We provide an efficient data structure for
dominated maxima searching in a dynamic set of points in the plane, which in
turn leads to an efficient dynamic data structure that can answer queries for
nearest neighbors using any Minkowski metric.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 18:15:55 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Atallah",
"Mikhail J.",
""
],
[
"Blanton",
"Marina",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Polu",
"Stanislas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0904.4686 | Cyril Allauzen | Cyril Allauzen and Mehryar Mohri | Linear-Space Computation of the Edit-Distance between a String and a
Finite Automaton | null | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of computing the edit-distance between a string and a finite
automaton arises in a variety of applications in computational biology, text
processing, and speech recognition. This paper presents linear-space algorithms
for computing the edit-distance between a string and an arbitrary weighted
automaton over the tropical semiring, or an unambiguous weighted automaton over
an arbitrary semiring. It also gives an efficient linear-space algorithm for
finding an optimal alignment of a string and such a weighted automaton.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 19:32:53 GMT"
}
]
| 2009-04-30T00:00:00 | [
[
"Allauzen",
"Cyril",
""
],
[
"Mohri",
"Mehryar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0904.4708 | George Tsatsaronis | George Tsatsaronis, Maria Halkidi, Emmanouel A. Giakoumakis | Quality Classifiers for Open Source Software Repositories | 10 pages, 2 Tables, 7 equations, 13 references. Appeared in 2nd
Artificial Intelligence Techniques in Software Engineering Workshop, AIAI
2009 | 2nd Artificial Intelligence Techniques in Software Engineering
Workshop, 5th IFIP Conference on Artificial Intelligence Applications and
Innovations, April 23-25, 2009, Thessaloniki, Greece | null | null | cs.SE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Open Source Software (OSS) often relies on large repositories, like
SourceForge, for initial incubation. The OSS repositories offer a large variety
of meta-data providing interesting information about projects and their
success. In this paper we propose a data mining approach for training
classifiers on the OSS meta-data provided by such data repositories. The
classifiers learn to predict the successful continuation of an OSS project. The
`successfulness' of projects is defined in terms of the classifier confidence
with which it predicts that they could be ported in popular OSS projects (such
as FreeBSD, Gentoo Portage).
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 21:33:39 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Tsatsaronis",
"George",
""
],
[
"Halkidi",
"Maria",
""
],
[
"Giakoumakis",
"Emmanouel A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0904.4709 | Dirk Beyer | Dirk Beyer, Alessandro Cimatti, Alberto Griggio, M. Erkan Keremoglu,
Roberto Sebastiani | Software Model Checking via Large-Block Encoding | 13 pages (11 without cover), 4 figures, 5 tables | null | null | SFU-CS-2009-09 | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The construction and analysis of an abstract reachability tree (ART) are the
basis for a successful method for software verification. The ART represents
unwindings of the control-flow graph of the program. Traditionally, a
transition of the ART represents a single block of the program, and therefore,
we call this approach single-block encoding (SBE). SBE may result in a huge
number of program paths to be explored, which constitutes a fundamental source
of inefficiency. We propose a generalization of the approach, in which
transitions of the ART represent larger portions of the program; we call this
approach large-block encoding (LBE). LBE may reduce the number of paths to be
explored up to exponentially. Within this framework, we also investigate
symbolic representations: for representing abstract states, in addition to
conjunctions as used in SBE, we investigate the use of arbitrary Boolean
formulas; for computing abstract-successor states, in addition to Cartesian
predicate abstraction as used in SBE, we investigate the use of Boolean
predicate abstraction. The new encoding leverages the efficiency of
state-of-the-art SMT solvers, which can symbolically compute abstract
large-block successors. Our experiments on benchmark C programs show that the
large-block encoding outperforms the single-block encoding.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 21:53:56 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Beyer",
"Dirk",
""
],
[
"Cimatti",
"Alessandro",
""
],
[
"Griggio",
"Alberto",
""
],
[
"Keremoglu",
"M. Erkan",
""
],
[
"Sebastiani",
"Roberto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0904.4717 | Aram Galstyan | Aram Galstyan | Continuous Strategy Replicator Dynamics for Multi--Agent Learning | 12 pages, 15 figures, accepted for publication in JAAMAS | null | 10.1007/s10458-011-9181-6 | null | cs.LG cs.AI cs.GT nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of multi-agent learning and adaptation has attracted a great deal
of attention in recent years. It has been suggested that the dynamics of multi
agent learning can be studied using replicator equations from population
biology. Most existing studies so far have been limited to discrete strategy
spaces with a small number of available actions. In many cases, however, the
choices available to agents are better characterized by continuous spectra.
This paper suggests a generalization of the replicator framework that allows to
study the adaptive dynamics of Q-learning agents with continuous strategy
spaces. Instead of probability vectors, agents strategies are now characterized
by probability measures over continuous variables. As a result, the ordinary
differential equations for the discrete case are replaced by a system of
coupled integral--differential replicator equations that describe the mutual
evolution of individual agent strategies. We derive a set of functional
equations describing the steady state of the replicator dynamics, examine their
solutions for several two-player games, and confirm our analytical results
using simulations.
| [
{
"version": "v1",
"created": "Wed, 29 Apr 2009 23:00:03 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Sep 2011 20:32:36 GMT"
}
]
| 2011-09-26T00:00:00 | [
[
"Galstyan",
"Aram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
]
|
0904.4727 | Yi-Dong Shen | Yi-Dong Shen, Jia-Huai You, Li-Yan Yuan | Characterizations of Stable Model Semantics for Logic Programs with
Arbitrary Constraint Atoms | 34 pages. To appear in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.AI cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the stable model semantics of logic programs with
(abstract) constraint atoms and their properties. We introduce a succinct
abstract representation of these constraint atoms in which a constraint atom is
represented compactly. We show two applications. First, under this
representation of constraint atoms, we generalize the Gelfond-Lifschitz
transformation and apply it to define stable models (also called answer sets)
for logic programs with arbitrary constraint atoms. The resulting semantics
turns out to coincide with the one defined by Son et al., which is based on a
fixpoint approach. One advantage of our approach is that it can be applied, in
a natural way, to define stable models for disjunctive logic programs with
constraint atoms, which may appear in the disjunctive head as well as in the
body of a rule. As a result, our approach to the stable model semantics for
logic programs with constraint atoms generalizes a number of previous
approaches. Second, we show that our abstract representation of constraint
atoms provides a means to characterize dependencies of atoms in a program with
constraint atoms, so that some standard characterizations and properties
relying on these dependencies in the past for logic programs with ordinary
atoms can be extended to logic programs with constraint atoms.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 01:15:51 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"You",
"Jia-Huai",
""
],
[
"Yuan",
"Li-Yan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0904.4735 | Ghadamali Bagherikaram | Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani | The Secrecy Capacity Region of the Degraded Vector Gaussian Broadcast
Channel | 5 Pages, 1 Figure, To be Presented at the ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider a scenario where a source node wishes to broadcast
two confidential messages for two respective receivers via a Gaussian MIMO
broadcast channel. A wire-tapper also receives the transmitted signal via
another MIMO channel. It is assumed that the channels are degraded and the
wire-tapper has the worst channel. We establish the capacity region of this
scenario. Our achievability scheme is a combination of the superposition of
Gaussian codes and randomization within the layers which we will refer to as
Secret Superposition Coding. For the outerbound, we use the notion of enhanced
channel to show that the secret superposition of Gaussian codes is optimal. It
is shown that we only need to enhance the channels of the legitimate receivers,
and the channel of the eavesdropper remains unchanged.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 03:14:42 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Bagherikaram",
"Ghadamali",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4741 | Brian Kurkoski | Brian M. Kurkoski and Justin Dauwels | Belief-Propagation Decoding of Lattices Using Gaussian Mixtures | 7 pages, 5 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A belief-propagation decoder for low-density lattice codes is given which
represents messages explicitly as a mixture of Gaussians functions. The key
component is an algorithm for approximating a mixture of several Gaussians with
another mixture with a smaller number of Gaussians. This Gaussian mixture
reduction algorithm iteratively reduces the number of Gaussians by minimizing
the distance between the original mixture and an approximation with one fewer
Gaussians.
Error rates and noise thresholds of this decoder are compared with those for
the previously-proposed decoder which discretely quantizes the messages. The
error rates are indistinguishable for dimension 1000 and 10000 lattices, and
the Gaussian-mixture decoder has a 0.2 dB loss for dimension 100 lattices. The
Gaussian-mixture decoder has a loss of about 0.03 dB in the noise threshold,
which is evaluated via Monte Carlo density evolution. Further, the
Gaussian-mixture decoder uses far less storage for the messages.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 05:10:56 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Kurkoski",
"Brian M.",
""
],
[
"Dauwels",
"Justin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4756 | Giulio Manzonetto | Giulio Manzonetto (INRIA Rocquencourt) | Models and theories of lambda calculus | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we briefly summarize the contents of Manzonetto's PhD thesis
which concerns denotational semantics and equational/order theories of the pure
untyped lambda-calculus. The main research achievements include: (i) a general
construction of lambda-models from reflexive objects in (possibly
non-well-pointed) categories; (ii) a Stone-style representation theorem for
combinatory algebras; (iii) a proof that no effective lambda-model can have
lambda-beta or lambda-beta-eta as its equational theory (this can be seen as a
partial answer to an open problem introduced by Honsell-Ronchi Della Rocca in
1984).
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 08:27:38 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Manzonetto",
"Giulio",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0904.4774 | Karin Schnass | Remi Gribonval, Karin Schnass | Dictionary Identification - Sparse Matrix-Factorisation via
$\ell_1$-Minimisation | 32 pages (IEEE draft format), 8 figures, submitted to IEEE Trans.
Inf. Theory | null | null | null | cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article treats the problem of learning a dictionary providing sparse
representations for a given signal class, via $\ell_1$-minimisation. The
problem can also be seen as factorising a $\ddim \times \nsig$ matrix $Y=(y_1
>... y_\nsig), y_n\in \R^\ddim$ of training signals into a $\ddim \times
\natoms$ dictionary matrix $\dico$ and a $\natoms \times \nsig$ coefficient
matrix $\X=(x_1... x_\nsig), x_n \in \R^\natoms$, which is sparse. The exact
question studied here is when a dictionary coefficient pair $(\dico,\X)$ can be
recovered as local minimum of a (nonconvex) $\ell_1$-criterion with input
$Y=\dico \X$. First, for general dictionaries and coefficient matrices,
algebraic conditions ensuring local identifiability are derived, which are then
specialised to the case when the dictionary is a basis. Finally, assuming a
random Bernoulli-Gaussian sparse model on the coefficient matrix, it is shown
that sufficiently incoherent bases are locally identifiable with high
probability. The perhaps surprising result is that the typically sufficient
number of training samples $\nsig$ grows up to a logarithmic factor only
linearly with the signal dimension, i.e. $\nsig \approx C \natoms \log
\natoms$, in contrast to previous approaches requiring combinatorially many
samples.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 10:04:09 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Mar 2010 11:28:31 GMT"
}
]
| 2010-03-01T00:00:00 | [
[
"Gribonval",
"Remi",
""
],
[
"Schnass",
"Karin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4789 | Tarik Ait-Idir | Houda Chafnaji, Tarik Ait-Idir, Samir Saoudi, and Athanasios V.
Vasilakos | Frequency Domain Hybrid-ARQ Chase Combining for Broadband MIMO CDMA
Systems | Submitted to IEEE Transactions on Vehicular Technology (Apr 2009) | null | 10.1186/1687-1499-2012-134 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider high-speed wireless packet access using code
division multiple access (CDMA) and multiple-input multiple-output (MIMO).
Current wireless standards, such as high speed packet access (HSPA), have
adopted multi-code transmission and hybrid-automatic repeat request (ARQ) as
major technologies for delivering high data rates. The key technique in
hybrid-ARQ, is that erroneous data packets are kept in the receiver to
detect/decode retransmitted ones. This strategy is refereed to as packet
combining. In CDMA MIMO-based wireless packet access, multi-code transmission
suffers from severe performance degradation due to the loss of code
orthogonality caused by both interchip interference (ICI) and co-antenna
interference (CAI). This limitation results in large transmission delays when
an ARQ mechanism is used in the link layer. In this paper, we investigate
efficient minimum mean square error (MMSE) frequency domain equalization
(FDE)-based iterative (turbo) packet combining for cyclic prefix (CP)-CDMA MIMO
with Chase-type ARQ. We introduce two turbo packet combining schemes: i) In the
first scheme, namely "chip-level turbo packet combining", MMSE FDE and packet
combining are jointly performed at the chip-level. ii) In the second scheme,
namely "symbol-level turbo packet combining", chip-level MMSE FDE and
despreading are separately carried out for each transmission, then packet
combining is performed at the level of the soft demapper. The computational
complexity and memory requirements of both techniques are quite insensitive to
the ARQ delay, i.e., maximum number of ARQ rounds. The throughput is evaluated
for some representative antenna configurations and load factors to show the
gains offered by the proposed techniques.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 13:22:44 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Chafnaji",
"Houda",
""
],
[
"Ait-Idir",
"Tarik",
""
],
[
"Saoudi",
"Samir",
""
],
[
"Vasilakos",
"Athanasios V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4819 | Vadim E. Levit | Vadim E. Levit and Eugen Mandrescu | The independence polynomial of a graph at -1 | 16 pages; 13 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If alpha=alpha(G) is the maximum size of an independent set and s_{k} equals
the number of stable sets of cardinality k in graph G, then
I(G;x)=s_{0}+s_{1}x+...+s_{alpha}x^{alpha} is the independence polynomial of G.
In this paper we prove that: 1. I(T;-1) equels either -1 or 0 or 1 for every
tree T; 2. I(G;-1)=0 for every connected well-covered graph G of girth > 5,
non-isomorphic to C_{7} or K_{2}; 3. the absolute value of I(G;-1) is not
greater than 2^nu(G), for every graph G, where nu(G) is its cyclomatic number.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 13:12:01 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0904.4836 | Nikolaos Mavridis | Nikolaos Mavridis, Shervin Emami, Chandan Datta, Wajahat Kamzi, Chiraz
BenAbdelkader, Panos Toulis, Andry Tanoto, Tamer Rabie | FaceBots: Steps Towards Enhanced Long-Term Human-Robot Interaction by
Utilizing and Publishing Online Social Information | null | null | null | null | cs.RO cs.AI cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our project aims at supporting the creation of sustainable and meaningful
longer-term human-robot relationships through the creation of embodied robots
with face recognition and natural language dialogue capabilities, which exploit
and publish social information available on the web (Facebook). Our main
underlying experimental hypothesis is that such relationships can be
significantly enhanced if the human and the robot are gradually creating a pool
of shared episodic memories that they can co-refer to (shared memories), and if
they are both embedded in a social web of other humans and robots they both
know and encounter (shared friends). In this paper, we are presenting such a
robot, which as we will see achieves two significant novelties.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 13:02:35 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Mavridis",
"Nikolaos",
""
],
[
"Emami",
"Shervin",
""
],
[
"Datta",
"Chandan",
""
],
[
"Kamzi",
"Wajahat",
""
],
[
"BenAbdelkader",
"Chiraz",
""
],
[
"Toulis",
"Panos",
""
],
[
"Tanoto",
"Andry",
""
],
[
"Rabie",
"Tamer",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0904.4863 | Paul Slater | Paul B. Slater | A two-stage algorithm for extracting the multiscale backbone of complex
weighted networks | 1 page, letter accepted by PNAS in response to the article by MA
Serrano, M Boguna, and A Vespignani, "Extracting the multiscale backbone of
complex weighted networks", Proc Natl Acad Sci 106:6483-6488 (2009) | PNAS June 30, 2009 vol. 106 no. 26 E66 | 10.1073/pnas.0904725106 | null | physics.soc-ph cs.SI physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The central problem of concern to Serrano, Boguna and Vespignani ("Extracting
the multiscale backbone of complex weighted networks", Proc Natl Acad Sci
106:6483-6488 [2009]) can be effectively and elegantly addressed using a
well-established two-stage algorithm that has been applied to internal
migration flows for numerous nations and several other forms of "transaction
flow data".
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 15:29:37 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2009 22:36:49 GMT"
}
]
| 2012-07-03T00:00:00 | [
[
"Slater",
"Paul B.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0904.4900 | Miquel Payar\'o | Miquel Payar\'o and Daniel P. Palomar | On optimal precoding in linear vector Gaussian channels with arbitrary
input distribution | Proceedings of the 2009 IEEE International Symposium on Information
Theory, Seoul, Korea, June 28 - July 3, 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The design of the precoder the maximizes the mutual information in linear
vector Gaussian channels with an arbitrary input distribution is studied.
Precisely, the precoder optimal left singular vectors and singular values are
derived. The characterization of the right singular vectors is left, in
general, as an open problem whose computational complexity is then studied in
three cases: Gaussian signaling, low SNR, and high SNR. For the Gaussian
signaling case and the low SNR regime, the dependence of the mutual information
on the right singular vectors vanishes, making the optimal precoder design
problem easy to solve. In the high SNR regime, however, the dependence on the
right singular vectors cannot be avoided and we show the difficulty of
computing the optimal precoder through an NP-hardness analysis.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 17:45:30 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Payaró",
"Miquel",
""
],
[
"Palomar",
"Daniel P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4902 | Tal Lev-Ami | Tal Lev-Ami, Neil Immerman, Thomas Reps, Mooly Sagiv, Siddharth
Srivastava, Greta Yorsh | Simulating reachability using first-order logic with applications to
verification of linked data structures | 30 pages, LMCS | Logical Methods in Computer Science, Volume 5, Issue 2 (May 28,
2009) lmcs:680 | 10.2168/LMCS-5(2:12)2009 | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper shows how to harness existing theorem provers for first-order
logic to automatically verify safety properties of imperative programs that
perform dynamic storage allocation and destructive updating of pointer-valued
structure fields. One of the main obstacles is specifying and proving the
(absence) of reachability properties among dynamically allocated cells.
The main technical contributions are methods for simulating reachability in a
conservative way using first-order formulas--the formulas describe a superset
of the set of program states that would be specified if one had a precise way
to express reachability. These methods are employed for semi-automatic program
verification (i.e., using programmer-supplied loop invariants) on programs such
as mark-and-sweep garbage collection and destructive reversal of a singly
linked list. (The mark-and-sweep example has been previously reported as being
beyond the capabilities of ESC/Java.)
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 17:54:54 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2009 22:05:51 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Lev-Ami",
"Tal",
""
],
[
"Immerman",
"Neil",
""
],
[
"Reps",
"Thomas",
""
],
[
"Sagiv",
"Mooly",
""
],
[
"Srivastava",
"Siddharth",
""
],
[
"Yorsh",
"Greta",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0904.4911 | Michael Goodrich | Michael T. Goodrich | On the Algorithmic Complexity of the Mastermind Game with Black-Peg
Results | Expanded version with a figure showing the Mastermind game | Information Processing Letters, Volume 109, 675-678, 2009 | 10.1016/j.ipl.2009.02.021 | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the algorithmic complexity of the Mastermind game,
where results are single-color black pegs. This differs from the usual
dual-color version of the game, but better corresponds to applications in
genetics. We show that it is NP-complete to determine if a sequence of
single-color Mastermind results have a satisfying vector. We also show how to
devise efficient algorithms for discovering a hidden vector through
single-color queries. Indeed, our algorithm improves a previous method of
Chvatal by almost a factor of 2.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 18:31:15 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Goodrich",
"Michael T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0904.4921 | Yu. I. Manin | Yuri I. Manin | Renormalization and computation I: motivation and background | 49 pages, 1 figure In the new version typos are fixed, minor
corrections made, dedication added, reference to Part II added | null | null | null | math.QA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper I argue that infinities in the classical computation theory
such as the unsolvability of the Halting Problem can be addressed in the same
way as Feynman divergences in Quantum Field Theory, and that meaningful
versions of renormalization in this context can be devised. Connections with
quantum computation are also touched upon.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 19:23:52 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Aug 2009 13:48:17 GMT"
}
]
| 2009-08-25T00:00:00 | [
[
"Manin",
"Yuri I.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0904.4926 | Athanasios Lioumpas S. | Athanasios S. Lioumpas and George K. Karagiannidis | Variable-Rate M-PSK Communications without Channel Amplitude Estimation | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Channel estimation at the receiver side is essential to adaptive modulation
schemes, prohibiting low complexity systems from using variable rate and/or
variable power transmissions. Towards providing a solution to this problem, we
introduce a variable-rate (VR) M-PSK modulation scheme, for communications over
fading channels, in the absence of channel gain estimation at the receiver. The
choice of the constellation size is based on the signal-plus-noise (S+N)
sampling value rather than on the signal-to-noise ratio (S/N). It is
analytically shown that S+N can serve as an excellent simpler criterion,
alternative to S/N, for determining the modulation order in VR systems. In this
way, low complexity transceivers can use VR transmissions in order to increase
their spectral efficiency under an error performance constraint. As an
application, we utilize the proposed VR modulation scheme in equal gain
combining (EGC) diversity receivers.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 19:35:17 GMT"
}
]
| 2009-05-01T00:00:00 | [
[
"Lioumpas",
"Athanasios S.",
""
],
[
"Karagiannidis",
"George K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.