id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0905.0024 | Xiaoying Gan | Gan Xiaoying, Shan Da, Zhou Yuan, Zhang Wei, Qian Liang | Theoretical Analysis of Cyclic Frequency Domain Noise and Feature
Detection for Cognitive Radio Systems | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In cognitive radio systems, cyclostationary feature detection plays an
important role in spectrum sensing, especially in low SNR cases. To configure
the detection threshold under a certain noise level and a pre-set miss
detection probability Pf, it's important to derive the theoretical distribution
of the observation variable. In this paper, noise distribution in cyclic
frequency domain has been studied and Generalized Extreme Value (GEV)
distribution is found to be a precise match. Maximum likelihood estimation is
applied to estimate the parameters of GEV. Monte Carlo simulation has been
carried out to show that the simulated ROC curve is coincided with the
theoretical ROC curve, which proves the efficiency of the theoretical
distribution model.
| [
{
"version": "v1",
"created": "Thu, 30 Apr 2009 22:56:12 GMT"
}
]
| 2009-05-04T00:00:00 | [
[
"Xiaoying",
"Gan",
""
],
[
"Da",
"Shan",
""
],
[
"Yuan",
"Zhou",
""
],
[
"Wei",
"Zhang",
""
],
[
"Liang",
"Qian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0036 | Onur Ozan Koyluoglu | O. Ozan Koyluoglu and Hesham El Gamal | On the Secrecy Rate Region for the Interference Channel | Proceedings of the 2008 IEEE International Symposium on Personal,
Indoor and Mobile Radio Communications (PIMRC 2008), Cannes, France, Sept.
2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies interference channels with security constraints. The
existence of an external eavesdropper in a two-user interference channel is
assumed, where the network users would like to secure their messages from the
external eavesdropper. The cooperative binning and channel prefixing scheme is
proposed for this system model which allows users to cooperatively add
randomness to the channel in order to degrade the observations of the external
eavesdropper. This scheme allows users to add randomness to the channel in two
ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users
cooperatively exploit the channel prefixing technique. As an example, the
channel prefixing technique is exploited in the Gaussian case to transmit a
superposition signal consisting of binning codewords and independently
generated noise samples. Gains obtained form the cooperative binning and
channel prefixing scheme compared to the single user scenario reveals the
positive effect of interference in increasing the network security. Remarkably,
interference can be exploited to cooperatively add randomness into the network
in order to enhance the security.
| [
{
"version": "v1",
"created": "Fri, 1 May 2009 02:32:48 GMT"
}
]
| 2009-05-04T00:00:00 | [
[
"Koyluoglu",
"O. Ozan",
""
],
[
"Gamal",
"Hesham El",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0044 | Kiryung Lee | Kiryung Lee and Yoram Bresler | ADMiRA: Atomic Decomposition for Minimum Rank Approximation | A short version (arXiv:0901.1898) will be presented at ISIT'09 | null | null | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the inverse problem that arises in compressed sensing of a
low-rank matrix. Our approach is to pose the inverse problem as an
approximation problem with a specified target rank of the solution. A simple
search over the target rank then provides the minimum rank solution satisfying
a prescribed data approximation bound. We propose an atomic decomposition that
provides an analogy between parsimonious representations of a sparse vector and
a low-rank matrix. Efficient greedy algorithms to solve the inverse problem for
the vector case are extended to the matrix case through this atomic
decomposition. In particular, we propose an efficient and guaranteed algorithm
named ADMiRA that extends CoSaMP, its analogue for the vector case. The
performance guarantee is given in terms of the rank-restricted isometry
property and bounds both the number of iterations and the error in the
approximate solution for the general case where the solution is approximately
low-rank and the measurements are noisy. With a sparse measurement operator
such as the one arising in the matrix completion problem, the computation in
ADMiRA is linear in the number of measurements. The numerical experiments for
the matrix completion problem show that, although the measurement operator in
this case does not satisfy the rank-restricted isometry property, ADMiRA is a
competitive algorithm for matrix completion.
| [
{
"version": "v1",
"created": "Fri, 1 May 2009 03:55:00 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jun 2009 17:52:32 GMT"
}
]
| 2009-06-15T00:00:00 | [
[
"Lee",
"Kiryung",
""
],
[
"Bresler",
"Yoram",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0079 | Thorsten Hehn | Thorsten Hehn, Johannes B. Huber, Olgica Milenkovic, Stefan Laendner | Multiple-Bases Belief-Propagation Decoding of High-Density Cyclic Codes | This full paper accompanies a letter submitted to "IEEE Transactions
on Communications". It is intended to provide detailed information for
interested readers of the letter. 24 pages, 6 figures | null | 10.1109/TCOMM.2010.01.070468 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new method for decoding short and moderate length linear block
codes with dense parity-check matrix representations of cyclic form, termed
multiple-bases belief-propagation (MBBP). The proposed iterative scheme makes
use of the fact that a code has many structurally diverse parity-check
matrices, capable of detecting different error patterns. We show that this
inherent code property leads to decoding algorithms with significantly better
performance when compared to standard BP decoding. Furthermore, we describe how
to choose sets of parity-check matrices of cyclic form amenable for
multiple-bases decoding, based on analytical studies performed for the binary
erasure channel. For several cyclic and extended cyclic codes, the MBBP
decoding performance can be shown to closely follow that of maximum-likelihood
decoders.
| [
{
"version": "v1",
"created": "Fri, 1 May 2009 11:15:25 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Hehn",
"Thorsten",
""
],
[
"Huber",
"Johannes B.",
""
],
[
"Milenkovic",
"Olgica",
""
],
[
"Laendner",
"Stefan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0106 | R. Dean Malmgren | R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amaral, Duncan J. Watts | Characterizing Individual Communication Patterns | 9 pages, 6 figures, to appear in Proceedings of the 15th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining (KDD'09),
June 28-July 1, Paris, France | null | null | null | physics.soc-ph cs.CY physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing availability of electronic communication data, such as that
arising from e-mail exchange, presents social and information scientists with
new possibilities for characterizing individual behavior and, by extension,
identifying latent structure in human populations. Here, we propose a model of
individual e-mail communication that is sufficiently rich to capture meaningful
variability across individuals, while remaining simple enough to be
interpretable. We show that the model, a cascading non-homogeneous Poisson
process, can be formulated as a double-chain hidden Markov model, allowing us
to use an efficient inference algorithm to estimate the model parameters from
observed data. We then apply this model to two e-mail data sets consisting of
404 and 6,164 users, respectively, that were collected from two universities in
different countries and years. We find that the resulting best-estimate
parameter distributions for both data sets are surprisingly similar, indicating
that at least some features of communication dynamics generalize beyond
specific contexts. We also find that variability of individual behavior over
time is significantly less than variability across the population, suggesting
that individuals can be classified into persistent "types". We conclude that
communication patterns may prove useful as an additional class of attribute
data, complementing demographic and network data, for user classification and
outlier detection--a point that we illustrate with an interpretable clustering
of users based on their inferred model parameters.
| [
{
"version": "v1",
"created": "Fri, 1 May 2009 15:37:34 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Malmgren",
"R. Dean",
""
],
[
"Hofman",
"Jake M.",
""
],
[
"Amaral",
"Luis A. N.",
""
],
[
"Watts",
"Duncan J.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0905.0192 | Gilles Champenois | Gilles Champenois | Fuzzy Mnesors | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A fuzzy mnesor space is a semimodule over the positive real numbers. It can
be used as theoretical framework for fuzzy sets. Hence we can prove a great
number of properties for fuzzy sets without refering to the membership
functions.
| [
{
"version": "v1",
"created": "Sat, 2 May 2009 09:23:33 GMT"
}
]
| 2009-05-05T00:00:00 | [
[
"Champenois",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.0197 | Victor Marek | V.W. Marek and J.B. Remmel | An Application of Proof-Theory in Answer Set Programming | 22 pages. Short version was published in ICLP08. New version slightly
shorter than the previous version | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We apply proof-theoretic techniques in answer Set Programming. The main
results include: 1. A characterization of continuity properties of
Gelfond-Lifschitz operator for logic program. 2. A propositional
characterization of stable models of logic programs (without referring to loop
formulas.
| [
{
"version": "v1",
"created": "Sat, 2 May 2009 10:43:30 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jan 2010 20:12:14 GMT"
}
]
| 2010-01-11T00:00:00 | [
[
"Marek",
"V. W.",
""
],
[
"Remmel",
"J. B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.0200 | Paul M. Aoki | Paul M. Aoki, R.J. Honicky, Alan Mainwaring, Chris Myers, Eric Paulos,
Sushmita Subramanian, Allison Woodruff | A Vehicle for Research: Using Street Sweepers to Explore the Landscape
of Environmental Community Action | 10 pages | Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems,
Boston, MA, Apr. 2009, 375-384. ACM Press | 10.1145/1518701.1518762 | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Researchers are developing mobile sensing platforms to facilitate public
awareness of environmental conditions. However, turning such awareness into
practical community action and political change requires more than just
collecting and presenting data. To inform research on mobile environmental
sensing, we conducted design fieldwork with government, private, and public
interest stakeholders. In parallel, we built an environmental air quality
sensing system and deployed it on street sweeping vehicles in a major U.S.
city; this served as a "research vehicle" by grounding our interviews and
affording us status as environmental action researchers. In this paper, we
present a qualitative analysis of the landscape of environmental action,
focusing on insights that will help researchers frame meaningful technological
interventions.
| [
{
"version": "v1",
"created": "Sat, 2 May 2009 11:42:50 GMT"
}
]
| 2016-09-05T00:00:00 | [
[
"Aoki",
"Paul M.",
""
],
[
"Honicky",
"R. J.",
""
],
[
"Mainwaring",
"Alan",
""
],
[
"Myers",
"Chris",
""
],
[
"Paulos",
"Eric",
""
],
[
"Subramanian",
"Sushmita",
""
],
[
"Woodruff",
"Allison",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0905.0203 | Paul M. Aoki | Rowena Luk, Matei Zaharia, Melissa Ho, Brian Levine, Paul M. Aoki | ICTD for Healthcare in Ghana: Two Parallel Case Studies | 11 pages | Proc. IEEE/ACM Conf. on Information and Communication Technologies
and Development, Doha, Qatar, Apr. 2009, 118-128. IEEE CS Press | 10.1109/ICTD.2009.5426714 | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper examines two parallel case studies to promote remote medical
consultation in Ghana. These projects, initiated independently by different
researchers in different organizations, both deployed ICT solutions in the same
medical community in the same year. The Ghana Consultation Network currently
has over 125 users running a Web-based application over a delay-tolerant
network of servers. OneTouch MedicareLine is currently providing 1700 doctors
in Ghana with free mobile phone calls and text messages to other members of the
medical community. We present the consequences of (1) the institutional context
and identity of the investigators, as well as specific decisions made with
respect to (2) partnerships formed, (3) perceptions of technological
infrastructure, and (4) high-level design decisions. In concluding, we discuss
lessons learned and high-level implications for future ICTD research agendas.
| [
{
"version": "v1",
"created": "Sat, 2 May 2009 11:54:52 GMT"
}
]
| 2016-09-02T00:00:00 | [
[
"Luk",
"Rowena",
""
],
[
"Zaharia",
"Matei",
""
],
[
"Ho",
"Melissa",
""
],
[
"Levine",
"Brian",
""
],
[
"Aoki",
"Paul M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0905.0233 | John Wright | John Wright, Arvind Ganesh, Shankar Rao, Yi Ma | Robust Principal Component Analysis: Exact Recovery of Corrupted
Low-Rank Matrices | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn due to a critical error near equation (71).
This error causes the entire argument of the paper to collapse.
Emmanuel Candes of Stanford discovered the error, and has suggested a correct
analysis, which will be reported in a separate publication.
| [
{
"version": "v1",
"created": "Sat, 2 May 2009 22:35:46 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2009 17:11:00 GMT"
}
]
| 2009-12-09T00:00:00 | [
[
"Wright",
"John",
""
],
[
"Ganesh",
"Arvind",
""
],
[
"Rao",
"Shankar",
""
],
[
"Ma",
"Yi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0266 | Ren\'e Pfitzner | Erik Aurell, Ren\'e Pfitzner | Gaussian Belief with dynamic data and in dynamic network | 5 pages, 7 figures | EPL (Europhysics Letters) 87, 68004, 2009 | 10.1209/0295-5075/87/68004 | null | cs.AI cond-mat.stat-mech cs.IT math.IT physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we analyse Belief Propagation over a Gaussian model in a
dynamic environment. Recently, this has been proposed as a method to average
local measurement values by a distributed protocol ("Consensus Propagation",
Moallemi & Van Roy, 2006), where the average is available for read-out at every
single node. In the case that the underlying network is constant but the values
to be averaged fluctuate ("dynamic data"), convergence and accuracy are
determined by the spectral properties of an associated Ruelle-Perron-Frobenius
operator. For Gaussian models on Erdos-Renyi graphs, numerical computation
points to a spectral gap remaining in the large-size limit, implying
exceptionally good scalability. In a model where the underlying network also
fluctuates ("dynamic network"), averaging is more effective than in the dynamic
data case. Altogether, this implies very good performance of these methods in
very large systems, and opens a new field of statistical physics of large (and
dynamic) information systems.
| [
{
"version": "v1",
"created": "Sun, 3 May 2009 15:26:43 GMT"
}
]
| 2012-08-10T00:00:00 | [
[
"Aurell",
"Erik",
""
],
[
"Pfitzner",
"René",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0905.0283 | Kevin Wortman | David Eppstein and Kevin A. Wortman | Optimal Embedding Into Star Metrics | 12 pages, 3 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an O(n^3 log^2 n)-time algorithm for the following problem: given
a finite metric space X, create a star-topology network with the points of X as
its leaves, such that the distances in the star are at least as large as in X,
with minimum dilation. As part of our algorithm, we solve in the same time
bound the parametric negative cycle detection problem: given a directed graph
with edge weights that are increasing linear functions of a parameter lambda,
find the smallest value of lambda such that the graph contains no
negative-weight cycles.
| [
{
"version": "v1",
"created": "Sun, 3 May 2009 19:21:52 GMT"
}
]
| 2009-05-05T00:00:00 | [
[
"Eppstein",
"David",
""
],
[
"Wortman",
"Kevin A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.0315 | Lahatra Rakotondrainibe | Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia
(IETR), Gha\"is El Zein (IETR) | Millimeter-Wave System for High Data Rate Indoor Communications | 5 pages | ISSCS 2009, Iasi : Roumanie (2009) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the realization of a wireless Gigabit Ethernet
communication system operating in the 60 GHz band. The system architecture uses
a single carrier modulation. A differential encoded binary phase shift keying
modulation and a differential demodulation scheme are adopted for the
intermediate frequency blocks. The baseband blocks use Reed- Solomon RS (255,
239) coding and decoding for channel forward error correction (FEC). First
results of bit error rate (BER) measurements at 875 Mbps, without channel
coding, are presented for different antennas.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 07:20:31 GMT"
}
]
| 2010-11-10T00:00:00 | [
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Kokar",
"Yvan",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.0316 | Lahatra Rakotondrainibe | Lahatra Rakotondrainibe (IETR), I. Siaud (FT R&D), Y. Kokar (IETR), G.
Zaharia (IETR), F. Brunet (FT R&D), E. Tanguy (IREENA), G. El Zein (IETR) | A low Complexity Wireless Gigabit Ethernet IFoF 60 GHz H/W Platform and
Issues | 6 pages | WWRF, Paris : France (2009) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a complete IFoF system architecture derived from
simplified IEEE802.15.3c PHY layer proposal to successfully ensure near 1 Gbps
on the air interface. The system architecture utilizes low complexity baseband
processing modules. The byte/frame synchronization technique is designed to
provide a high value of preamble detection probability and a very small value
of the false detection probability. Conventional Reed-Solomon RS (255, 239)
coding is used for Channel Forward Error Correction (FEC). Good communication
link quality and Bit Error Rate (BER) results at 875 Mbps are achieved with
directional antennas.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 07:21:18 GMT"
}
]
| 2010-11-10T00:00:00 | [
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Siaud",
"I.",
"",
"FT R&D"
],
[
"Kokar",
"Y.",
"",
"IETR"
],
[
"Zaharia",
"G.",
"",
"IETR"
],
[
"Brunet",
"F.",
"",
"FT R&D"
],
[
"Tanguy",
"E.",
"",
"IREENA"
],
[
"Zein",
"G. El",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.0317 | Lahatra Rakotondrainibe | Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia
(IETR), Gha\"is El Zein (IETR) | 60 GHz High Data Rate Wireless Communication System | 5 pages, | VTC Spring 2009, Barcelone : Espagne (2009) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the design and the realization of a 60 GHz wireless
Gigabit Ethernet communication system. A differential encoded binary phase
shift keying modulation (DBPSK) and differential demodulation schemes are
adopted for the IF blocks. The Gigabit Ethernet interface allows a high speed
transfer of multimedia files via a 60 GHz wireless link. First measurement
results are shown for 875 Mbps data rate.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 07:22:12 GMT"
}
]
| 2010-11-10T00:00:00 | [
[
"Rakotondrainibe",
"Lahatra",
"",
"IETR"
],
[
"Kokar",
"Yvan",
"",
"IETR"
],
[
"Zaharia",
"Gheorghe",
"",
"IETR"
],
[
"Zein",
"Ghaïs El",
"",
"IETR"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.0363 | Wojciech Mazurczyk | Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski | Hiding Information in Retransmissions | 12 pages, 12 figures, 6 tables | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a new steganographic method called RSTEG (Retransmission
Steganography), which is intended for a broad class of protocols that utilises
retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a
successfully received packet in order to intentionally invoke retransmission.
The retransmitted packet carries a steganogram instead of user data in the
payload field. RSTEG is presented in the broad context of network
steganography, and the utilisation of RSTEG for TCP (Transport Control
Protocol) retransmission mechanisms is described in detail. Simulation results
are also presented with the main aim to measure and compare the steganographic
bandwidth of the proposed method for different TCP retransmission mechanisms as
well as to determine the influence of RSTEG on the network retransmissions
level.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 12:18:32 GMT"
},
{
"version": "v2",
"created": "Tue, 5 May 2009 07:08:03 GMT"
},
{
"version": "v3",
"created": "Thu, 14 May 2009 20:58:34 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Smolarczyk",
"Milosz",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0905.0374 | Jatin Thukral | Jatin Thukral and Helmut Boelcskei | Interference Alignment with Limited Feedback | 5 pages, 0 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider single-antenna interference networks where M sources, each with
an average transmit power of P/M, communicate with M destinations over
frequency-selective channels (with L taps each) and each destination has
perfect knowledge of its channels from each of the sources. Assuming that there
exist error-free non-interfering broadcast feedback links from each destination
to all the nodes (i.e., sources and destinations) in the network, we show that
naive interference alignment, in conjunction with vector quantization of the
impulse response coefficients according to the scheme proposed in Mukkavilli et
al., IEEE Trans. IT, 2003, achieves full spatial multiplexing gain of M/2,
provided that the number of feedback bits broadcast by each destination is at
least M(L-1) log P.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 12:42:49 GMT"
},
{
"version": "v2",
"created": "Wed, 6 May 2009 13:56:26 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Thukral",
"Jatin",
""
],
[
"Boelcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0385 | Adnan Raja | Adnan Raja and Pramod Viswanath | Diversity-Multiplexing tradeoff of the Two-User Interference Channel | submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diversity-Multiplexing tradeoff (DMT) is a coarse high SNR approximation of
the fundamental tradeoff between data rate and reliability in a slow fading
channel. In this paper, we characterize the fundamental DMT of the two user
single antenna Gaussian interference channel. We show that the class of
multilevel superposition coding schemes universally achieves (for all fading
statistics) the DMT for the two-user interference channel. For the special case
of symmetric DMT, when the two users have identical rate and diversity gain
requirements, we characterize the DMT achieved by the Han-Kobayashi scheme,
which corresponds to two level superposition coding.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 14:11:08 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Sep 2009 04:56:47 GMT"
}
]
| 2009-09-08T00:00:00 | [
[
"Raja",
"Adnan",
""
],
[
"Viswanath",
"Pramod",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0397 | Nirmal Chakrabarti B | Nirmal B. Chakrabarti | A representation of non-uniformly sampled deterministic and random
signals and their reconstruction using sample values and derivatives | 9 pages, 7 figures, submitted to IEEE transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Shannon in his 1949 paper suggested the use of derivatives to increase the
W*T product of the sampled signal. Use of derivatives enables improved
reconstruction particularly in the case of non-uniformly sampled signals. An
FM-AM representation for Lagrange/Hermite type interpolation and a
reconstruction technique are discussed. The representation using a product of a
polynomial and exponential of a polynomial is extensible to two dimensions.
When the directly available information is inadequate, estimation of the
signal and its derivative based on the correlation characteristics of Gaussian
filtered noise has been studied. This requires computation of incomplete normal
integrals. Reduction methods for reducing multivariate normal variables include
multistage partitioning, dynamic path integral and Hermite expansion for
computing the probability integrals necessary for estimating the mean of the
signal and its derivative at points intermediate between zero or threshold
crossings. The signals and their derivatives as measured or estimated are
utilized to reconstruct the signal at a desired sampling rate.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 14:59:53 GMT"
}
]
| 2009-05-05T00:00:00 | [
[
"Chakrabarti",
"Nirmal B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0417 | N. Prasanth Anthapadmanabhan | N. Prasanth Anthapadmanabhan and Alexander Barg | Two-Level Fingerprinting Codes | 5 pages, 1 figure, Proc. 2009 IEEE International Symposium on
Information Theory (ISIT 2009), Seoul, Korea, June 28 - July 3, 2009 | null | null | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the notion of two-level fingerprinting and traceability codes.
In this setting, the users are organized in a hierarchical manner by
classifying them into various groups; for instance, by dividing the
distribution area into several geographic regions, and collecting users from
the same region into one group. Two-level fingerprinting and traceability codes
have the following property: As in traditional (one-level) codes, when given an
illegal copy produced by a coalition of users, the decoder identifies one of
the guilty users if the coalition size is less than a certain threshold $t$.
Moreover, even when the coalition is of a larger size $s$ $(> t)$, the decoder
still provides partial information by tracing one of the groups containing a
guilty user.
We establish sufficient conditions for a code to possess the two-level
traceability property. In addition, we also provide constructions for two-level
fingerprinting codes and characterize the corresponding set of achievable
rates.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 16:26:27 GMT"
}
]
| 2009-05-05T00:00:00 | [
[
"Anthapadmanabhan",
"N. Prasanth",
""
],
[
"Barg",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0440 | Willie Harrison | Willie K Harrison and Steven W. McLaughlin | Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis | 11 pages, 5 figures, accepted at 2009 IEEE International Symposium on
Information Theory (ISIT 2009) | null | 10.1109/ISIT.2009.5205606 | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditional cryptography assumes an eavesdropper receives an error-free copy
of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at
the physical layer both the intended receiver and the passive eavesdropper
inevitably receive an error-prone version of the transmitted message which must
be corrected prior to decryption. This paper considers the implications of
using both channel and cryptographic codes under the wiretap channel model in a
way that enhances the \emph{information-theoretic} security for the friendly
parties by keeping the information transfer to the eavesdropper small. We
consider a secret-key cryptographic system with a linear feedback shift
register (LFSR)-based keystream generator and observe the mutual information
between an LFSR-generated sequence and the received noise-corrupted ciphertext
sequence under a known-plaintext scenario. The effectiveness of a noniterative
fast correlation attack, which reduces the search time in a brute-force attack,
is shown to be correlated with this mutual information. For an iterative fast
correlation attack on this cryptographic system, it is shown that an EXIT chart
and mutual information are very good predictors of decoding success and failure
by a passive eavesdropper.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 17:54:18 GMT"
}
]
| 2015-09-24T00:00:00 | [
[
"Harrison",
"Willie K",
""
],
[
"McLaughlin",
"Steven W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0451 | Yahav Nussbaum | Haim Kaplan and Yahav Nussbaum | Maximum Flow in Directed Planar Graphs with Vertex Capacities | 12 pages, 5 figures | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present an O(n log n) algorithm for finding a maximum flow
in a directed planar graph, where the vertices are subject to capacity
constraints, in addition to the arcs. If the source and the sink are on the
same face, then our algorithm can be implemented in O(n) time.
For general (not planar) graphs, vertex capacities do not make the problem
more difficult, as there is a simple reduction that eliminates vertex
capacities. However, this reduction does not preserve the planarity of the
graph. The essence of our algorithm is a different reduction that does preserve
the planarity, and can be implemented in linear time. For the special case of
undirected planar graph, an algorithm with the same time complexity was
recently claimed, but we show that it has a flaw.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 18:55:56 GMT"
}
]
| 2009-05-05T00:00:00 | [
[
"Kaplan",
"Haim",
""
],
[
"Nussbaum",
"Yahav",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.0484 | Anton Zinoviev | Anton Zinoviev | Extended Bulgarian keyboard layouts | 32 pages, in Bulgarian | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The old Bulgarian keyboard standard BDS 5237-78 was developed for use mostly
on typewriter machines. The wide distribution of the computers forced the
update of this standard. On one hand this is because of the need to support
symbols such as the Bulgarian quotation marks, the Cyrillic letter I with grave
accent, the long dash, etc. On the other hand the so called "phonetic layout"
became popular and this layout is not standartized by BDS. In this work we are
analyzing the possibilities to improve the keyboard layout according to BDS
5237-78, as well as the traditional phonetic layout. At the same time we are
making a comparison with the new proposed Bulgarian keyboard layout standard
BDS 5237:2006. We are proposing an algorithm for placement of additional
symbols on the keys of the keyboard in a way that makes easy for the users to
find the symbols even when they are not inscripted on the keys. We are giving
formal definitions and illustrations of four keyboard layouts - three extended
keyboard layouts for typing in "Cyrillic" mode (BDS, traditional phonetic and
phonetic according to the new proposed BDS 5237:2006) and one extended layout
for typing in "Latin" mode.
| [
{
"version": "v1",
"created": "Mon, 4 May 2009 20:32:22 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Zinoviev",
"Anton",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0905.0541 | Teng Li | Teng Li and Oliver M. Collins | Design and Analysis of Successive Decoding with Finite Levels for the
Markov Channel | Accepted for publication at IEEE transaction on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a practical successive decoding scheme with finite levels
for the finite-state Markov channels where there is no a priori state
information at the transmitter or the receiver. The design employs either a
random interleaver or a deterministic interleaver with an irregular pattern and
an optional iterative estimation and decoding procedure within each level. The
interleaver design criteria may be the achievable rate or the extrinsic
information transfer (EXIT) chart, depending on the receiver type. For random
interleavers, the optimization problem is solved efficiently using a
pilot-utility function, while for deterministic interleavers, a good
construction is given using empirical rules. Simulation results demonstrate
that the new successive decoding scheme combined with irregular low-density
parity-check codes can approach the identically and uniformly distributed
(i.u.d.) input capacity on the Markov-fading channel using only a few levels.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 07:43:33 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Li",
"Teng",
""
],
[
"Collins",
"Oliver M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0564 | Diomidis Michalopoulos | Diomidis S. Michalopoulos, Athanasios S. Lioumpas, George K.
Karagiannidis, and Robert Schober | Selective Cooperative Relaying over Time-Varying Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In selective cooperative relaying only a single relay out of the set of
available relays is activated, hence the available power and bandwidth
resources are efficiently utilized. However, implementing selective cooperative
relaying in time-varying channels may cause frequent relay switchings that
deteriorate the overall performance. In this paper, we study the rate at which
a relay switching occurs in selective cooperative relaying applications in
time-varying fading channels. In particular, we derive closed-form expressions
for the relay switching rate (measured in Hz) for opportunistic relaying (OR)
and distributed switch and stay combining (DSSC). Additionally, expressions for
the average relay activation time for both of the considered schemes are also
provided, reflecting the average time that a selected relay remains active
until a switching occurs. Numerical results manifest that DSSC yields
considerably lower relay switching rates than OR, along with larger average
relay activation times, rendering it a better candidate for implementation of
relay selection in fast fading environments.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 09:28:58 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2009 10:32:45 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Michalopoulos",
"Diomidis S.",
""
],
[
"Lioumpas",
"Athanasios S.",
""
],
[
"Karagiannidis",
"George K.",
""
],
[
"Schober",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0567 | Serge Gaspers | Serge Gaspers and Matthias Mnich | Feedback Vertex Sets in Tournaments | null | null | null | null | cs.DM cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study combinatorial and algorithmic questions around minimal feedback
vertex sets in tournament graphs.
On the combinatorial side, we derive strong upper and lower bounds on the
maximum number of minimal feedback vertex sets in an n-vertex tournament. We
prove that every tournament on n vertices has at most 1.6740^n minimal feedback
vertex sets, and that there is an infinite family of tournaments, all having at
least 1.5448^n minimal feedback vertex sets. This improves and extends the
bounds of Moon (1971).
On the algorithmic side, we design the first polynomial space algorithm that
enumerates the minimal feedback vertex sets of a tournament with polynomial
delay. The combination of our results yields the fastest known algorithm for
finding a minimum size feedback vertex set in a tournament.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 09:45:24 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Jun 2010 22:03:31 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Oct 2011 12:07:02 GMT"
}
]
| 2011-10-20T00:00:00 | [
[
"Gaspers",
"Serge",
""
],
[
"Mnich",
"Matthias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0905.0586 | Mohamed Abouelhoda | Mohamed Abouelhoda and Hisham Mohamed | WinBioinfTools: Bioinformatics Tools for Windows High Performance
Computing Server 2008 | null | null | null | null | cs.MS cs.CE q-bio.QM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Open source bioinformatics tools running under MS Windows are rare to find,
and those running under Windows HPC cluster are almost non-existing. This is
despite the fact that the Windows is the most popular operating system used
among life scientists. Therefore, we introduce in this initiative
WinBioinfTools, a toolkit containing a number of bioinformatics tools running
under Windows High Performance Computing Server 2008. It is an open source code
package, where users and developers can share and add to. We currently start
with three programs from the area of sequence analysis: 1) CoCoNUT for pairwise
genome comparison, 2) parallel BLAST for biological database search, and 3)
parallel global pairwise sequence alignment. In this report, we focus on
technical aspects concerning how some components of these tools were ported
from Linux/Unix environment to run under Windows. We also show the advantages
of using the Windows HPC Cluster 2008. We demonstrate by experiments the
performance gain achieved when using a computer cluster against a single
machine. Furthermore, we show the results of comparing the performance of
WinBioinfTools on the Windows and Linux Cluster.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 12:04:12 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Abouelhoda",
"Mohamed",
""
],
[
"Mohamed",
"Hisham",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0905.0602 | Michael Elberfeld | Michael Elberfeld | Perfect Phylogeny Haplotyping is Complete for Logspace | null | null | null | null | cs.CC q-bio.GN q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Haplotyping is the bioinformatics problem of predicting likely haplotypes
based on given genotypes. It can be approached using Gusfield's perfect
phylogeny haplotyping (PPH) method for which polynomial and linear time
algorithms exist. These algorithm use sophisticated data structures or do a
stepwise transformation of the genotype data into haplotype data and,
therefore, need a linear amount of space. We are interested in the exact
computational complexity of PPH and show that it can be solved
space-efficiently by an algorithm that needs only a logarithmic amount of
space. Together with the recently proved L-hardness of PPH, we establish
L-completeness. Our algorithm relies on a new characterization for PPH in terms
of bipartite graphs, which can be used both to decide and construct perfect
phylogenies for genotypes efficiently.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 13:24:50 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Elberfeld",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0905.0606 | Clemens Novak | Clemens Novak, Peter Fertl, and Gerald Matz | Quantization for Soft-Output Demodulators in Bit-Interleaved Coded
Modulation Systems | to be published at ISIT-2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study quantization of log-likelihood ratios (LLR) in bit-interleaved coded
modulation (BICM) systems in terms of an equivalent discrete channel. We
propose to design the quantizer such that the quantizer outputs become
equiprobable. We investigate semi-analytically and numerically the ergodic and
outage capacity over single- and multiple-antenna channels for different
quantizers. Finally, we show bit error rate simulations for BICM systems with
LLR quantization using a rate 1/2 low-density parity-check code.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 13:50:33 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Novak",
"Clemens",
""
],
[
"Fertl",
"Peter",
""
],
[
"Matz",
"Gerald",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0619 | Giuseppe Durisi | Giuseppe Durisi, Veniamin I. Morgenshtern, and Helmut B\"olcskei | On the Sensitivity of Noncoherent Capacity to the Channel Model | To be presented at IEEE Int. Symp. Inf. Theory 2009, Seoul, Korea | null | 10.1109/ISIT.2009.5205806 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The noncoherent capacity of stationary discrete-time fading channels is known
to be very sensitive to the fine details of the channel model. More
specifically, the measure of the set of harmonics where the power spectral
density of the fading process is nonzero determines if capacity grows
logarithmically in SNR or slower than logarithmically. An engineering-relevant
problem is to characterize the SNR value at which this sensitivity starts to
matter.
In this paper, we consider the general class of continuous-time
Rayleigh-fading channels that satisfy the wide-sense stationary
uncorrelated-scattering (WSSUS) assumption and are, in addition, underspread.
For this class of channels, we show that the noncoherent capacity is close to
the AWGN capacity for all SNR values of practical interest, independently of
whether the scattering function is compactly supported or not. As a byproduct
of our analysis, we obtain an information-theoretic pulse-design criterion for
orthogonal frequency-division multiplexing systems.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 14:58:01 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Durisi",
"Giuseppe",
""
],
[
"Morgenshtern",
"Veniamin I.",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0642 | Martin Wainwright | S. Negahban, M. J. Wainwright | Simultaneous support recovery in high dimensions: Benefits and perils of
block $\ell_1/\ell_\infty$-regularization | Presented in part at NIPS 2008 conference, Vancouver, Canada,
December 2008 | null | null | null | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider the use of $\ell_{1}/\ell_{\infty}$-regularized regression for joint
estimation of a $\pdim \times \numreg$ matrix of regression coefficients. We
analyze the high-dimensional scaling of $\ell_1/\ell_\infty$-regularized
quadratic programming, considering both consistency in $\ell_\infty$-norm, and
variable selection. We begin by establishing bounds on the $\ell_\infty$-error
as well sufficient conditions for exact variable selection for fixed and random
designs. Our second set of results applies to $\numreg = 2$ linear regression
problems with standard Gaussian designs whose supports overlap in a fraction
$\alpha \in [0,1]$ of their entries: for this problem class, we prove that the
$\ell_{1}/\ell_{\infty}$-regularized method undergoes a phase transition--that
is, a sharp change from failure to success--characterized by the rescaled
sample size $\theta_{1,\infty}(n, p, s, \alpha) = n/\{(4 - 3 \alpha) s
\log(p-(2- \alpha) s)\}$. An implication of this threshold is that use of
$\ell_1 / \ell_{\infty}$-regularization yields improved statistical efficiency
if the overlap parameter is large enough ($\alpha > 2/3$), but has \emph{worse}
statistical efficiency than a naive Lasso-based approach for moderate to small
overlap ($\alpha < 2/3$). These results indicate that some caution needs to be
exercised in the application of $\ell_1/\ell_\infty$ block regularization: if
the data does not match its structure closely enough, it can impair statistical
performance relative to computationally less expensive schemes.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 16:28:50 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Negahban",
"S.",
""
],
[
"Wainwright",
"M. J.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0905.0677 | Ivan Yu. Tyukin | Ivan Tyukin and Danil Prokhorov | Feasibility of random basis function approximators for modeling and
control | null | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss the role of random basis function approximators in modeling and
control. We analyze the published work on random basis function approximators
and demonstrate that their favorable error rate of convergence O(1/n) is
guaranteed only with very substantial computational resources. We also discuss
implications of our analysis for applications of neural networks in modeling
and control.
| [
{
"version": "v1",
"created": "Tue, 5 May 2009 19:45:13 GMT"
}
]
| 2009-05-06T00:00:00 | [
[
"Tyukin",
"Ivan",
""
],
[
"Prokhorov",
"Danil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.0721 | Cemal Akcaba | Cemal Akcaba and Helmut Boelcskei | Diversity-Multiplexing Tradeoff in Fading Interference Channels | 51 pages, submitted to IEEE Trans. Inf. Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze two-user single-antenna fading interference channels with perfect
receive channel state information (CSI) and no transmit CSI. We compute the
diversity-multiplexing tradeoff (DMT) region of a fixed-power-split Han and
Kobayashi (HK)-type superposition coding scheme and provide design criteria for
the corresponding superposition codes. We demonstrate that this scheme is
DMT-optimal under moderate, strong, and very strong interference by showing
that it achieves a DMT outer bound that we derive. Further, under very strong
interference, we show that a joint decoder is DMT-optimal and "decouples" the
fading interference channel, i.e., from a DMT perspective, it is possible to
transmit as if the interfering user were not present. In addition, we show
that, under very strong interference, decoding interference while treating the
intended signal as noise, subtracting the result out, and then decoding the
desired signal, a process known as "stripping", achieves the optimal DMT
region. Our proofs are constructive in the sense that code design criteria for
achieving DMT-optimality (in the cases where we can demonstrate it) are
provided.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 13:29:04 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Akcaba",
"Cemal",
""
],
[
"Boelcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0737 | Ignacio Vega-Paez M en C | Ignacio Vega-Paez, Jose Angel Ortega, Georgina G. Pulido | REC language is a live on IBM1130 simulator, EL lenguaje REC esta vivo
en el simulador de la IBM 1130 | This work is archaeological reconstruction of REC/A language | null | null | IBP-TR2009-04 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | REC (Regular Expression Compiler) is a concise programming language
development in mayor Mexican Universities at end of 60s which allows students
to write programs without knowledge of the complicated syntax of languages like
FORTRAN and ALGOL. The language is recursive and contains only four elements
for control. This paper describes use of the interpreter of REC written in
FORTRAN on IBM1130 Simulator from -Computer History Simulation- Project.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 04:21:15 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Vega-Paez",
"Ignacio",
""
],
[
"Ortega",
"Jose Angel",
""
],
[
"Pulido",
"Georgina G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0905.0740 | Ignacio Vega-Paez M en C | Gerardo Cisneros | A FORTRAN coded regular expression Compiler for IBM 1130 Computing
System | This version of REC is archaeological reconstruction of REC/A
language on IBM1130 Simulator (SIMH IBM 1130 Emulator and Disk Monitor System
R2V12) from Computer History Simulation Project (www.ibm1130.org), also see
REC language is a live for Ignacio Vega-Paez | Acta Mexicana de Ciencia y Tecnologia Vol. IV No. 1, page 30-86,
1970 | null | IBP-Memo 2008-12 | cs.CL cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | REC (Regular Expression Compiler) is a concise programming language which
allows students to write programs without knowledge of the complicated syntax
of languages like FORTRAN and ALGOL. The language is recursive and contains
only four elements for control. This paper describes an interpreter of REC
written in FORTRAN.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 04:29:51 GMT"
}
]
| 2011-07-12T00:00:00 | [
[
"Cisneros",
"Gerardo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0905.0744 | Hongkun Yang | Hongkun Yang, Bin Liu | Optimization of Energy Efficient Transmission in Underwater Sensor
Networks | 16 pages, 8 figures, in submission to Globecom'09 | null | null | null | cs.NI | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Underwater communication is a challenging topic due to its singular channel
characteristics. Most protocols used in terrestrial wireless communication can
not be directly applied in the underwater world. In this paper, we focus on the
issue of energy efficient transmission in underwater sensor networks (UWSNs)
and analyze this problem in a rigorous and theoretical way. We formalize an
optimization problem which aims to minimize energy consumption and
simultaneously accounts for other performance metrics such as the data
reliability and the communication delay. With the help of Karush-Kuhn-Tucker
conditions (KKT conditions), we derive a simple and explicit, but nevertheless
accurate, approximate solution under reasonable assumptions. This approximate
solution provides theoretical guidelines for designing durable and reliable
UWSNs. Our result also shows that reliability and communication delay are
crucial factors to the energy consumption for transmission.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 05:42:08 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Yang",
"Hongkun",
""
],
[
"Liu",
"Bin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.0747 | Yoann Dieudonne | Yoann Dieudonn\'e (LaRIA, MIS), Franck Petit (LaRIA, LIP, INRIA
Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme) | Self-stabilizing Determinsitic Gathering | null | null | null | null | cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the possibility to deterministically solve the
gathering problem (GP) with weak robots (anonymous, autonomous, disoriented,
deaf and dumb, and oblivious). We introduce strong multiplicity detection as
the ability for the robots to detect the exact number of robots located at a
given position. We show that with strong multiplicity detection, there exists a
deterministic self-stabilizing algorithm solving GP for n robots if, and only
if, n is odd.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 06:11:29 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Dieudonné",
"Yoann",
"",
"LaRIA, MIS"
],
[
"Petit",
"Franck",
"",
"LaRIA, LIP, INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme"
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0905.0749 | Daniel Sidobre | Xavier Broqu\`ere (LAAS), Daniel Sidobre (LAAS), Ignacio
Herrera-Aguilar (LAAS) | Soft Motion Trajectory Planner for Service Manipulator Robot | null | International Conference on Intelligent Robots and Systems, IROS
2008. IEEE/RSJ, Nice : France (2008) | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human interaction introduces two main constraints: Safety and Comfort.
Therefore service robot manipulator can't be controlled like industrial robotic
manipulator where personnel is isolated from the robot's work envelope. In this
paper, we present a soft motion trajectory planner to try to ensure that these
constraints are satisfied. This planner can be used on-line to establish visual
and force control loop suitable in presence of human. The cubic trajectories
build by this planner are good candidates as output of a manipulation task
planner. The obtained system is then homogeneous from task planning to robot
control. The soft motion trajectory planner limits jerk, acceleration and
velocity in cartesian space using quaternion. Experimental results carried out
on a Mitsubishi PA10-6CE arm are presented.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 06:12:28 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Broquère",
"Xavier",
"",
"LAAS"
],
[
"Sidobre",
"Daniel",
"",
"LAAS"
],
[
"Herrera-Aguilar",
"Ignacio",
"",
"LAAS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0905.0768 | Kunihiko Sadakane | Gonzalo Navarro, Kunihiko Sadakane | Fully-Functional Static and Dynamic Succinct Trees | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose new succinct representations of ordinal trees, which have been
studied extensively. It is known that any $n$-node static tree can be
represented in $2n + o(n)$ bits and a number of operations on the tree can be
supported in constant time under the word-RAM model. However the data
structures are complicated and difficult to dynamize. We propose a simple and
flexible data structure, called the range min-max tree, that reduces the large
number of relevant tree operations considered in the literature to a few
primitives that are carried out in constant time on sufficiently small trees.
The result is extended to trees of arbitrary size, achieving $2n + O(n
/\polylog(n))$ bits of space. The redundancy is significantly lower than any
previous proposal. Our data structure builds on the range min-max tree to
achieve $2n+O(n/\log n)$ bits of space and $O(\log n)$ time for all the
operations. We also propose an improved data structure using $2n+O(n\log\log
n/\log n)$ bits and improving the time to the optimal $O(\log n/\log \log n)$
for most operations. Furthermore, we support sophisticated operations that
allow attaching and detaching whole subtrees, in time $\Order(\log^{1+\epsilon}
n / \log\log n)$. Our techniques are of independent interest. One allows
representing dynamic bitmaps and sequences supporting rank/select and indels,
within zero-order entropy bounds and optimal time $O(\log n / \log\log n)$ for
all operations on bitmaps and polylog-sized alphabets, and $O(\log n \log
\sigma / (\log\log n)^2)$ on larger alphabet sizes $\sigma$. This improves upon
the best existing bounds for entropy-bounded storage of dynamic sequences,
compressed full-text self-indexes, and compressed-space construction of the
Burrows-Wheeler transform.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 07:56:38 GMT"
},
{
"version": "v2",
"created": "Fri, 15 May 2009 03:21:25 GMT"
},
{
"version": "v3",
"created": "Wed, 26 May 2010 13:24:23 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Jun 2010 14:28:20 GMT"
},
{
"version": "v5",
"created": "Fri, 24 Sep 2010 01:49:11 GMT"
}
]
| 2010-09-27T00:00:00 | [
[
"Navarro",
"Gonzalo",
""
],
[
"Sadakane",
"Kunihiko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.0792 | Jan Treibig | Jan Treibig, Georg Hager | Introducing a Performance Model for Bandwidth-Limited Loop Kernels | 8 pages | null | null | null | cs.PF cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a performance model for bandwidth limited loop kernels which is
founded on the analysis of modern cache based microarchitectures. This model
allows an accurate performance prediction and evaluation for existing
instruction codes. It provides an in-depth understanding of how performance for
different memory hierarchy levels is made up. The performance of raw memory
load, store and copy operations and a stream vector triad are analyzed and
benchmarked on three modern x86-type quad-core architectures in order to
demonstrate the capabilities of the model.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 10:55:04 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Treibig",
"Jan",
""
],
[
"Hager",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0905.0794 | Weiguo Zhang | WeiGuo Zhang and GuoZhen Xiao | Constructions of Almost Optimal Resilient Boolean Functions on Large
Even Number of Variables | 14 pages, 2 tables | IEEE Transactions on Information Theory, vol. 55, no. 12, pp.
5822-5831, December 2009 | 10.1109/TIT.2009.2032736 | null | cs.IT cs.CR math.IT | http://creativecommons.org/licenses/by/3.0/ | In this paper, a technique on constructing nonlinear resilient Boolean
functions is described. By using several sets of disjoint spectra functions on
a small number of variables, an almost optimal resilient function on a large
even number of variables can be constructed. It is shown that given any $m$,
one can construct infinitely many $n$-variable ($n$ even), $m$-resilient
functions with nonlinearity $>2^{n-1}-2^{n/2}$. A large class of highly
nonlinear resilient functions which were not known are obtained. Then one
method to optimize the degree of the constructed functions is proposed. Last,
an improved version of the main construction is given.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 10:05:40 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Aug 2009 07:07:12 GMT"
},
{
"version": "v3",
"created": "Sun, 25 Oct 2009 02:41:04 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Oct 2009 03:25:41 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Nov 2009 08:31:13 GMT"
}
]
| 2009-11-18T00:00:00 | [
[
"Zhang",
"WeiGuo",
""
],
[
"Xiao",
"GuoZhen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0838 | Nihar Jindal | Nihar Jindal, Angel Lozano, Thomas L. Marzetta | What is the Value of Joint Processing of Pilots and Data in Block-Fading
Channels? | To appear at IEEE Int. Symposium on Information Theory; 5 pages | null | 10.1109/ISIT.2009.5205818 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The spectral efficiency achievable with joint processing of pilot and data
symbol observations is compared with that achievable through the conventional
(separate) approach of first estimating the channel on the basis of the pilot
symbols alone, and subsequently detecting the data symbols. Studied on the
basis of a mutual information lower bound, joint processing is found to provide
a non-negligible advantage relative to separate processing, particularly for
fast fading. It is shown that, regardless of the fading rate, only a very small
number of pilot symbols (at most one per transmit antenna and per channel
coherence interval) should be transmitted if joint processing is allowed.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 14:19:11 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Jindal",
"Nihar",
""
],
[
"Lozano",
"Angel",
""
],
[
"Marzetta",
"Thomas L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0848 | Sylvain Boussier | Sylvain Boussier (LIA), Michel Vasquez (LGI2P, EMA), Yannick Vimont
(LGI2P), Said Hanafi (LAMIH), Philippe Michelon (LIA) | Solving the 0-1 Multidimensional Knapsack Problem with Resolution Search | null | VI ALIO/EURO Workshop on Applied Combinatorial Optimization,
Buenos Aires : Argentine (2008) | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose an exact method which combines the resolution search and branch &
bound algorithms for solving the 0?1 Multidimensional Knapsack Problem. This
algorithm is able to prove large?scale strong correlated instances. The optimal
values of the 10 constraint, 500 variable instances of the OR-Library are
exposed. These values were previously unknown.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 14:58:02 GMT"
}
]
| 2009-05-07T00:00:00 | [
[
"Boussier",
"Sylvain",
"",
"LIA"
],
[
"Vasquez",
"Michel",
"",
"LGI2P, EMA"
],
[
"Vimont",
"Yannick",
"",
"LGI2P"
],
[
"Hanafi",
"Said",
"",
"LAMIH"
],
[
"Michelon",
"Philippe",
"",
"LIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.0869 | Carlos P. Roca | Carlos P. Roca, Jos\'e A. Cuesta and Angel S\'anchez | Imperfect Imitation Can Enhance Cooperation | 4 pages, 4 figures | Europhysics Letters 87, 48005 (2009) | 10.1209/0295-5075/87/48005 | null | q-bio.PE cs.GT physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The promotion of cooperation on spatial lattices is an important issue in
evolutionary game theory. This effect clearly depends on the update rule: it
diminishes with stochastic imitative rules whereas it increases with
unconditional imitation. To study the transition between both regimes, we
propose a new evolutionary rule, which stochastically combines unconditional
imitation with another imitative rule. We find that, surprinsingly, in many
social dilemmas this rule yields higher cooperative levels than any of the two
original ones. This nontrivial effect occurs because the basic rules induce a
separation of timescales in the microscopic processes at cluster interfaces.
The result is robust in the space of 2x2 symmetric games, on regular lattices
and on scale-free networks.
| [
{
"version": "v1",
"created": "Wed, 6 May 2009 16:35:54 GMT"
}
]
| 2009-11-07T00:00:00 | [
[
"Roca",
"Carlos P.",
""
],
[
"Cuesta",
"José A.",
""
],
[
"Sánchez",
"Angel",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0905.0940 | Vincent Tan | Vincent Y. F. Tan, Animashree Anandkumar, Lang Tong and Alan S.
Willsky | A Large-Deviation Analysis of the Maximum-Likelihood Learning of Markov
Tree Structures | Accepted to the IEEE Transactions on Information Theory on Nov 18,
2010 | null | 10.1109/TIT.2011.2104513 | null | stat.ML cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of maximum-likelihood (ML) estimation of discrete tree-structured
distributions is considered. Chow and Liu established that ML-estimation
reduces to the construction of a maximum-weight spanning tree using the
empirical mutual information quantities as the edge weights. Using the theory
of large-deviations, we analyze the exponent associated with the error
probability of the event that the ML-estimate of the Markov tree structure
differs from the true tree structure, given a set of independently drawn
samples. By exploiting the fact that the output of ML-estimation is a tree, we
establish that the error exponent is equal to the exponential rate of decay of
a single dominant crossover event. We prove that in this dominant crossover
event, a non-neighbor node pair replaces a true edge of the distribution that
is along the path of edges in the true tree graph connecting the nodes in the
non-neighbor pair. Using ideas from Euclidean information theory, we then
analyze the scenario of ML-estimation in the very noisy learning regime and
show that the error exponent can be approximated as a ratio, which is
interpreted as the signal-to-noise ratio (SNR) for learning tree distributions.
We show via numerical experiments that in this regime, our SNR approximation is
accurate.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 01:40:10 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Oct 2010 03:40:08 GMT"
},
{
"version": "v3",
"created": "Sun, 21 Nov 2010 16:27:58 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Tan",
"Vincent Y. F.",
""
],
[
"Anandkumar",
"Animashree",
""
],
[
"Tong",
"Lang",
""
],
[
"Willsky",
"Alan S.",
""
]
]
| [
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.0976 | Vinko Zlati\'c | Vinko Zlati\'c, Gourab Ghoshal, Guido Caldarelli | Hypergraph topological quantities for tagged social networks | 8 pages, 9 figures, revtex | Phys. Rev. E 80, 036118 (2009) | 10.1103/PhysRevE.80.036118 | null | physics.soc-ph cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent years have witnessed the emergence of a new class of social networks,
that require us to move beyond previously employed representations of complex
graph structures. A notable example is that of the folksonomy, an online
process where users collaboratively employ tags to resources to impart
structure to an otherwise undifferentiated database. In a recent paper[1] we
proposed a mathematical model that represents these structures as tripartite
hypergraphs and defined basic topological quantities of interest. In this paper
we extend our model by defining additional quantities such as edge
distributions, vertex similarity and correlations as well as clustering. We
then empirically measure these quantities on two real life folksonomies, the
popular online photo sharing site Flickr and the bookmarking site CiteULike. We
find that these systems share similar qualitative features with the majority of
complex networks that have been previously studied. We propose that the
quantities and methodology described here can be used as a standard tool in
measuring the structure of tagged networks.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 09:52:31 GMT"
}
]
| 2011-05-23T00:00:00 | [
[
"Zlatić",
"Vinko",
""
],
[
"Ghoshal",
"Gourab",
""
],
[
"Caldarelli",
"Guido",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0905.1024 | Vadim E. Levit | Vadim E. Levit and Eugen Mandrescu | Greedoids on Vertex Sets of Unicycle Graphs | 9 pages; 4 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A maximum stable set in a graph G is a stable set of maximum cardinality. S
is a local maximum stable set of G, if S is a maximum stable set of the
subgraph induced by its closed neighborhood.
It is known that the family of all local maximum stable sets of a forest
forms a greedoid on its vertex set. Bipartite, triangle-free, and well-covered
graphs whose families of local maximum stable sets form greedoids have been
analyzed as well.
A unicycle graph owns only one cycle. In this paper we characterize the
unicycle graphs whose families of local maximum stable sets form greedoids.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 13:10:20 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.1039 | Zurab Silagadze | Z.K. Silagadze | Citation entropy and research impact estimation | 9 pages, 3 figures, significantly changed, version to by published in
Acta Phys. Polon. B | Acta Phys. Polon. B41 (2010), 2325-2333 | null | null | physics.soc-ph cond-mat.stat-mech cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new indicator, a real valued $s$-index, is suggested to characterize a
quality and impact of the scientific research output. It is expected to be at
least as useful as the notorious $h$-index, at the same time avoiding some its
obvious drawbacks. However, surprisingly, the $h$-index is found to be quite a
good indicator for majority of real-life citation data with their alleged
Zipfian behaviour for which these drawbacks do not show up. The style of the
paper was chosen deliberately somewhat frivolous to indicate that any attempt
to characterize the scientific output of a researcher by just one number always
has an element of a grotesque game in it and should not be taken too seriously.
I hope this frivolous style will be perceived as a funny decoration only.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 15:01:38 GMT"
},
{
"version": "v2",
"created": "Sat, 18 Sep 2010 13:27:00 GMT"
}
]
| 2010-11-01T00:00:00 | [
[
"Silagadze",
"Z. K.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0905.1045 | Giovanni Pighizzini | Andreas Malcher and Giovanni Pighizzini | Descriptional complexity of bounded context-free languages | 31 pages, 1 figure. A preliminary version was presented at DLT 2007.
The full version is submitted to a journal | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Finite-turn pushdown automata (PDA) are investigated concerning their
descriptional complexity. It is known that they accept exactly the class of
ultralinear context-free languages. Furthermore, the increase in size when
converting arbitrary PDAs accepting ultralinear languages to finite-turn PDAs
cannot be bounded by any recursive function. The latter phenomenon is known as
non-recursive trade-off. In this paper, finite-turn PDAs accepting bounded
languages are considered. First, letter-bounded languages are studied. We prove
that in this case the non-recursive trade-off is reduced to a recursive
trade-off, more precisely, to an exponential trade-off. A conversion algorithm
is presented and the optimality of the construction is shown by proving tight
lower bounds. Furthermore, the question of reducing the number of turns of a
given finite-turn PDA is studied. Again, a conversion algorithm is provided
which shows that in this case the trade-off is at most polynomial. Finally, the
more general case of word-bounded languages is investigated. We show how the
results obtained for letter-bounded languages can be extended to word-bounded
languages.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 15:18:10 GMT"
},
{
"version": "v2",
"created": "Fri, 8 May 2009 14:20:09 GMT"
}
]
| 2009-05-08T00:00:00 | [
[
"Malcher",
"Andreas",
""
],
[
"Pighizzini",
"Giovanni",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.1056 | Ivan Soprunov | Ivan Soprunov, Evgenia Soprunova | Bringing Toric Codes to the next dimension | 11 pages, 1 figure; Major changes in the section on parameters, new
examples. | SIAM J. Discrete Math. Volume 24, no. 2, pp. 655-665 (2010) | 10.1137/090762592 | null | math.AG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is concerned with the minimum distance computation for higher
dimensional toric codes defined by lattice polytopes. We show that the minimum
distance is multiplicative with respect to taking the product of polytopes, and
behaves in a simple way when one builds a k-dilate of a pyramid over a
polytope. This allows us to construct a large class of examples of higher
dimensional toric codes where we can compute the minimum distance explicitly.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 15:51:16 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Apr 2010 21:30:41 GMT"
}
]
| 2015-06-26T00:00:00 | [
[
"Soprunov",
"Ivan",
""
],
[
"Soprunova",
"Evgenia",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1093 | Matt Gibson | Matt Gibson and Kasturi Varadarajan | Decomposing Coverings and the Planar Sensor Cover Problem | 18 pages, 13 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that a $k$-fold covering using translates of an arbitrary convex
polygon can be decomposed into $\Omega(k)$ covers (using an efficient
algorithm). We generalize this result to obtain a constant factor approximation
to the sensor cover problem where the ranges of the sensors are translates of a
given convex polygon. The crucial ingredient in this generalization is a
constant factor approximation algorithm for a one-dimensional version of the
sensor cover problem, called the Restricted Strip Cover (RSC) problem, where
sensors are intervals of possibly different lengths. Our algorithm for RSC
improves on the previous $O(\log \log \log n)$ approximation.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 19:03:57 GMT"
}
]
| 2009-05-08T00:00:00 | [
[
"Gibson",
"Matt",
""
],
[
"Varadarajan",
"Kasturi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0905.1108 | Aram Galstyan | Aram Galstyan, Vahe Musoyan, and Paul Cohen | Maximizing Influence Propagation in Networks with Community Structure | 7 pages, 8 figures | Phys. Rev. E 79, 056102 (2009) | 10.1103/PhysRevE.79.056102 | null | physics.soc-ph cond-mat.stat-mech cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the algorithmic problem of selecting a set of target nodes that
cause the biggest activation cascade in a network. In case when the activation
process obeys the diminishing returns property, a simple hill-climbing
selection mechanism has been shown to achieve a provably good performance. Here
we study models of influence propagation that exhibit critical behavior, and
where the property of diminishing returns does not hold. We demonstrate that in
such systems, the structural properties of networks can play a significant
role. We focus on networks with two loosely coupled communities, and show that
the double-critical behavior of activation spreading in such systems has
significant implications for the targeting strategies. In particular, we show
that simple strategies that work well for homogeneous networks can be overly
sub-optimal, and suggest simple modification for improving the performance, by
taking into account the community structure.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 19:29:48 GMT"
}
]
| 2009-05-08T00:00:00 | [
[
"Galstyan",
"Aram",
""
],
[
"Musoyan",
"Vahe",
""
],
[
"Cohen",
"Paul",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0905.1113 | Bogdan Nicolae | Bogdan Nicolae (INRIA - IRISA), Gabriel Antoniu (INRIA - IRISA, INRIA
Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme), Luc
Boug\'e (INRIA - IRISA, INRIA Rh\^one-Alpes / LIP Laboratoire de
l'Informatique du Parall\'elisme) | BlobSeer: How to Enable Efficient Versioning for Large Object Storage
under Heavy Access Concurrency | null | DAMAP 2009 (2009) | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To accommodate the needs of large-scale distributed P2P systems, scalable
data management strategies are required, allowing applications to efficiently
cope with continuously growing, highly dis tributed data. This paper addresses
the problem of efficiently stor ing and accessing very large binary data
objects (blobs). It proposesan efficient versioning scheme allowing a large
number of clients to concurrently read, write and append data to huge blobs
that are fragmented and distributed at a very large scale. Scalability under
heavy concurrency is achieved thanks to an original metadata scheme, based on a
distributed segment tree built on top of a Distributed Hash Table (DHT). Our
approach has been implemented and experimented within our BlobSeer prototype on
the Grid'5000 testbed, using up to 175 nodes.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 19:37:48 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Nicolae",
"Bogdan",
"",
"INRIA - IRISA"
],
[
"Antoniu",
"Gabriel",
"",
"INRIA - IRISA, INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme"
],
[
"Bougé",
"Luc",
"",
"INRIA - IRISA, INRIA Rhône-Alpes / LIP Laboratoire de\n l'Informatique du Parallélisme"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0905.1129 | Narad Rampersad | James Currie and Narad Rampersad | A proof of Dejean's conjecture | proof details added | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove Dejean's conjecture. Specifically, we show that Dejean's conjecture
holds for the last remaining open values of n, namely 15 <= n <= 26.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 20:19:04 GMT"
},
{
"version": "v2",
"created": "Mon, 11 May 2009 14:49:23 GMT"
},
{
"version": "v3",
"created": "Fri, 22 May 2009 16:50:26 GMT"
}
]
| 2009-05-22T00:00:00 | [
[
"Currie",
"James",
""
],
[
"Rampersad",
"Narad",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.1130 | Juan-Manuel Torres-Moreno | Florian Boudin, Patricia Velazquez-Morales and Juan-Manuel
Torres-Moreno | Statistical Automatic Summarization in Organic Chemistry | 10 pages, 3 figures | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an oriented numerical summarizer algorithm, applied to producing
automatic summaries of scientific documents in Organic Chemistry. We present
its implementation named Yachs (Yet Another Chemistry Summarizer) that combines
a specific document pre-processing with a sentence scoring method relying on
the statistical properties of documents. We show that Yachs achieves the best
results among several other summarizers on a corpus of Organic Chemistry
articles.
| [
{
"version": "v1",
"created": "Thu, 7 May 2009 20:21:45 GMT"
}
]
| 2009-05-11T00:00:00 | [
[
"Boudin",
"Florian",
""
],
[
"Velazquez-Morales",
"Patricia",
""
],
[
"Torres-Moreno",
"Juan-Manuel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0905.1187 | Markus Haltmeier | Markus Grasmair, Markus Haltmeier, and Otmar Scherzer | The Residual Method for Regularizing Ill-Posed Problems | 29 pages, one figure | Appl. Math. Comput. 218(6): pp. 2693-2710 (2011) | 10.1016/j.amc.2011.08.009 | null | math.OC cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although the \emph{residual method}, or \emph{constrained regularization}, is
frequently used in applications, a detailed study of its properties is still
missing. This sharply contrasts the progress of the theory of Tikhonov
regularization, where a series of new results for regularization in Banach
spaces has been published in the recent years. The present paper intends to
bridge the gap between the existing theories as far as possible. We develop a
stability and convergence theory for the residual method in general topological
spaces. In addition, we prove convergence rates in terms of (generalized)
Bregman distances, which can also be applied to non-convex regularization
functionals. We provide three examples that show the applicability of our
theory. The first example is the regularized solution of linear operator
equations on $L^p$-spaces, where we show that the results of Tikhonov
regularization generalize unchanged to the residual method. As a second
example, we consider the problem of density estimation from a finite number of
sampling points, using the Wasserstein distance as a fidelity term and an
entropy measure as regularization term. It is shown that the densities obtained
in this way depend continuously on the location of the sampled points and that
the underlying density can be recovered as the number of sampling points tends
to infinity. Finally, we apply our theory to compressed sensing. Here, we show
the well-posedness of the method and derive convergence rates both for convex
and non-convex regularization under rather weak conditions.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 13:38:17 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Dec 2010 17:13:23 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Jul 2011 14:06:36 GMT"
}
]
| 2012-12-06T00:00:00 | [
[
"Grasmair",
"Markus",
""
],
[
"Haltmeier",
"Markus",
""
],
[
"Scherzer",
"Otmar",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
]
|
0905.1200 | Jan Foniok | Jan Foniok, Jaroslav Nesetril, Claude Tardif | Interleaved adjoints on directed graphs | null | European J. Combin., 32(7), pp. 1018--1024, 2011 | 10.1016/j.ejc.2011.03.013 | null | math.CO cs.DM math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For an integer k >= 1, the k-th interlacing adjoint of a digraph G is the
digraph i_k(G) with vertex-set V(G)^k, and arcs ((u_1, ..., u_k), (v_1, ...,
v_k)) such that (u_i,v_i) \in A(G) for i = 1, ..., k and (v_i, u_{i+1}) \in
A(G) for i = 1, ..., k-1. For every k we derive upper and lower bounds for the
chromatic number of i_k(G) in terms of that of G. In particular, we find tight
bounds on the chromatic number of interlacing adjoints of transitive
tournaments. We use this result in conjunction with categorial properties of
adjoint functors to derive the following consequence. For every integer ell,
there exists a directed path Q_{\ell} of algebraic length ell which admits
homomorphisms into every directed graph of chromatic number at least 4. We
discuss a possible impact of this approach on the multifactor version of the
weak Hedetniemi conjecture.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 08:33:13 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jul 2010 14:40:51 GMT"
}
]
| 2012-08-09T00:00:00 | [
[
"Foniok",
"Jan",
""
],
[
"Nesetril",
"Jaroslav",
""
],
[
"Tardif",
"Claude",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
]
|
0905.1202 | Pedro Pablo P\'erez Velasco | Pedro Pablo Perez Velasco | Matrix Graph Grammars as a Model of Computation | 33 pages, 19 figures. English improved. One new section introducing
an algebra of matrices | null | null | null | cs.DM cs.CC cs.FL | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Matrix Graph Grammars (MGG) is a novel approach to the study of graph
dynamics ([15]). In the present contribution we look at MGG as a formal grammar
and as a model of computation, which is a necessary step in the more ambitious
program of tackling complexity theory through MGG. We also study its relation
with other well-known models such as Turing machines (TM) and Boolean circuits
(BC) as well as non-determinism. As a side effect, all techniques available for
MGG can be applied to TMs and BCs.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 08:35:23 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2009 06:40:21 GMT"
},
{
"version": "v3",
"created": "Mon, 16 Nov 2009 07:00:16 GMT"
}
]
| 2009-11-16T00:00:00 | [
[
"Velasco",
"Pedro Pablo Perez",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.1215 | Dominik Seethaler | Dominik Seethaler, Joakim Jald\'en, Christoph Studer, and Helmut
B\"olcskei | Tail Behavior of Sphere-Decoding Complexity in Random Lattices | To be presented at IEEE ISIT 2009, Seoul, Korea | null | 10.1109/ISIT.2009.5205679 | null | cs.IT cs.CC math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the (computational) complexity distribution of sphere-decoding
(SD) for random infinite lattices. In particular, we show that under fairly
general assumptions on the statistics of the lattice basis matrix, the tail
behavior of the SD complexity distribution is solely determined by the inverse
volume of a fundamental region of the underlying lattice. Particularizing this
result to NxM, N>=M, i.i.d. Gaussian lattice basis matrices, we find that the
corresponding complexity distribution is of Pareto-type with tail exponent
given by N-M+1. We furthermore show that this tail exponent is not improved by
lattice-reduction, which includes layer-sorting as a special case.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 09:41:58 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Seethaler",
"Dominik",
""
],
[
"Jaldén",
"Joakim",
""
],
[
"Studer",
"Christoph",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0905.1235 | Serguei Mokhov | Serguei A. Mokhov, Stephen Sinclair, Ian Cl\'ement, Dimitrios
Nicolacopoulos (for the MARF R&D Group) | The Modular Audio Recognition Framework (MARF) and its Applications:
Scientific and Software Engineering Notes | v2: add missing .ind file for index; 224 pages, 40 figures, 19
tables; index. A comprehensive description of AI and PR algorithms and data
structures, software engineering design and implementation, and experiments.
Source revision is maintained in the CVS at http://marf.sf.net | null | 10.1007/978-1-4020-8741-7_84 10.1007/978-3-540-68825-9_21
10.1145/1370256.1370262 | null | cs.SD cs.CL cs.CV cs.MM cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | MARF is an open-source research platform and a collection of
voice/sound/speech/text and natural language processing (NLP) algorithms
written in Java and arranged into a modular and extensible framework
facilitating addition of new algorithms. MARF can run distributively over the
network and may act as a library in applications or be used as a source for
learning and extension. A few example applications are provided to show how to
use the framework. There is an API reference in the Javadoc format as well as
this set of accompanying notes with the detailed description of the
architectural design, algorithms, and applications. MARF and its applications
are released under a BSD-style license and is hosted at SourceForge.net. This
document provides the details and the insight on the internals of MARF and some
of the mentioned applications.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 14:42:03 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Jul 2009 04:13:29 GMT"
}
]
| 2019-08-14T00:00:00 | [
[
"Mokhov",
"Serguei A.",
"",
"for the MARF R&D Group"
],
[
"Sinclair",
"Stephen",
"",
"for the MARF R&D Group"
],
[
"Clément",
"Ian",
"",
"for the MARF R&D Group"
],
[
"Nicolacopoulos",
"Dimitrios",
"",
"for the MARF R&D Group"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0905.1248 | Giovanni Pighizzini | Giovanni Pighizzini | Deterministic pushdown automata and unary languages | 17 pages. Preprint of an article submitted for consideration in the
International Journal of Foundations of Computer Science (World Scientific
Publishing Company). A preliminary version was presented at the conference
CIAA 2008 | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The simulation of deterministic pushdown automata defined over a one-letter
alphabet by finite state automata is investigated from a descriptional
complexity point of view. We show that each unary deterministic pushdown
automaton of size s can be simulated by a deterministic finite automaton with a
number of states that is exponential in s. We prove that this simulation is
tight. Furthermore, its cost cannot be reduced even if it is performed by a
two-way nondeterministic automaton. We also prove that there are unary
languages for which deterministic pushdown automata cannot be exponentially
more succinct than finite automata. In order to state this result, we
investigate the conversion of deterministic pushdown automata into context-free
grammars. We prove that in the unary case the number of variables in the
resulting grammar is strictly smaller than the number of variables needed in
the case of nonunary alphabets.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 14:24:08 GMT"
}
]
| 2009-05-11T00:00:00 | [
[
"Pighizzini",
"Giovanni",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.1271 | Giovanni Pighizzini | Giovanni Pighizzini | Nondeterministic one-tape off-line Turing machines and their time
complexity | 18 pages. The paper will appear on the Journal of Automata, Languages
and Combinatorics | null | null | null | cs.FL cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the time and the crossing sequence complexities of
one-tape off-line Turing machines. We show that the running time of each
nondeterministic machine accepting a nonregular language must grow at least as
n\log n, in the case all accepting computations are considered (accept
measure). We also prove that the maximal length of the crossing sequences used
in accepting computations must grow at least as \log n. On the other hand, it
is known that if the time is measured considering, for each accepted string,
only the faster accepting computation (weak measure), then there exist
nonregular languages accepted in linear time. We prove that under this measure,
each accepting computation should exhibit a crossing sequence of length at
least \log\log n. We also present efficient implementations of algorithms
accepting some unary nonregular languages.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 14:34:37 GMT"
}
]
| 2009-05-11T00:00:00 | [
[
"Pighizzini",
"Giovanni",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.1300 | John Watrous | Rahul Jain, Sarvagya Upadhyay, and John Watrous | Two-message quantum interactive proofs are in PSPACE | 24 pages | null | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that QIP(2), the class of problems having two-message quantum
interactive proof systems, is a subset of PSPACE. This relationship is obtained
by means of an efficient parallel algorithm, based on the multiplicative
weights update method, for approximately solving a certain class of
semidefinite programs.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 17:22:04 GMT"
}
]
| 2009-05-11T00:00:00 | [
[
"Jain",
"Rahul",
""
],
[
"Upadhyay",
"Sarvagya",
""
],
[
"Watrous",
"John",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0905.1305 | Nestor Chatzidiamantis | Nestor D. Chatzidiamantis and George K. Karagiannidis | On the Distribution of the Sum of Gamma-Gamma Variates and Applications
in RF and Optical Wireless Communications | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Gamma-Gamma (GG) distribution has recently attracted the interest within
the research community due to its involvement in various communication systems.
In the context of RF wireless communications, GG distribution accurately models
the power statistics in composite shadowing/fading channels as well as in
cascade multipath fading channels, while in optical wireless (OW) systems, it
describes the fluctuations of the irradiance of optical signals distorted by
atmospheric turbulence. Although GG channel model offers analytical
tractability in the analysis of single input single output (SISO) wireless
systems, difficulties arise when studying multiple input multiple output (MIMO)
systems, where the distribution of the sum of independent GG variates is
required. In this paper, we present a novel simple closed-form approximation
for the distribution of the sum of independent, but not necessarily identically
distributed GG variates. It is shown that the probability density function
(PDF) of the GG sum can be efficiently approximated either by the PDF of a
single GG distribution, or by a finite weighted sum of PDFs of GG
distributions. To reveal the importance of the proposed approximation, the
performance of RF wireless systems in the presence of composite fading, as well
as MIMO OW systems impaired by atmospheric turbulence, are investigated.
Numerical results and simulations illustrate the accuracy of the proposed
approach.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 17:35:15 GMT"
}
]
| 2009-05-11T00:00:00 | [
[
"Chatzidiamantis",
"Nestor D.",
""
],
[
"Karagiannidis",
"George K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1307 | Michael Goodrich | Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic | An Efficient Dynamic and Distributed RSA Accumulator | Expanded version of a paper appearing in the 5th International
Information Security Conference (ISC) | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how to use the RSA one-way accumulator to realize an efficient and
dynamic authenticated dictionary, where untrusted directories provide
cryptographically verifiable answers to membership queries on a set maintained
by a trusted source. Our accumulator-based scheme for authenticated
dictionaries supports efficient incremental updates of the underlying set by
insertions and deletions of elements. Also, the user can optimally verify in
constant time the authenticity of the answer provided by a directory with a
simple and practical algorithm. We have also implemented this scheme and we
give empirical results that can be used to determine the best strategy for
systems implementation with respect to resources that are available. This work
has applications to certificate revocation in public key infrastructure and
end-to-end integrity of data collections published by third parties on the
Internet.
| [
{
"version": "v1",
"created": "Fri, 8 May 2009 17:49:57 GMT"
}
]
| 2009-05-11T00:00:00 | [
[
"Goodrich",
"Michael T.",
""
],
[
"Tamassia",
"Roberto",
""
],
[
"Hasic",
"Jasminka",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0905.1362 | Joaquin Garcia-Alfaro | Stere Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin
Garcia-Alfaro, and Laurent Toutain | Reliable Process for Security Policy Deployment | 12 pages | Proc. 2007 International Conference on Security and Cryptography
(Secrypt 2007), Barcelona, Spain, July 2007 | null | null | cs.CR cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus in this paper on the problem of configuring and managing network
security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and
Intrusion Detection Systems (IDSs). Our proposal is the following. First, we
formally specify the security requirements of a given system by using an
expressive access control model. As a result, we obtain an abstract security
policy, which is free of ambiguities, redundancies or unnecessary details.
Second, we deploy such an abstract policy through a set of automatic
compilations into the security devices of the system. This proposed deployment
process not only simplifies the security administrator's job, but also
guarantees a resulting configuration free of anomalies and/or inconsistencies.
| [
{
"version": "v1",
"created": "Sat, 9 May 2009 01:37:47 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Preda",
"Stere",
""
],
[
"Cuppens-Boulahia",
"Nora",
""
],
[
"Cuppens",
"Frederic",
""
],
[
"Garcia-Alfaro",
"Joaquin",
""
],
[
"Toutain",
"Laurent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0905.1375 | Yen-Wei Huang | Yen-Wei Huang, Pierre Moulin | Saddle-point Solution of the Fingerprinting Capacity Game Under the
Marking Assumption | 5 pages, to appear in 2009 IEEE International Symposium on
Information Theory (ISIT 2009), Seoul, Korea, June 2009 | null | 10.1109/ISIT.2009.5205882 | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a fingerprinting game in which the collusion channel is unknown. The
encoder embeds fingerprints into a host sequence and provides the decoder with
the capability to trace back pirated copies to the colluders.
Fingerprinting capacity has recently been derived as the limit value of a
sequence of maxmin games with mutual information as the payoff function.
However, these games generally do not admit saddle-point solutions and are very
hard to solve numerically. Here under the so-called Boneh-Shaw marking
assumption, we reformulate the capacity as the value of a single two-person
zero-sum game, and show that it is achieved by a saddle-point solution.
If the maximal coalition size is $k$ and the fingerprint alphabet is binary,
we derive equations that can numerically solve the capacity game for arbitrary
$k$. We also provide tight upper and lower bounds on the capacity. Finally, we
discuss the asymptotic behavior of the fingerprinting game for large $k$ and
practical implementation issues.
| [
{
"version": "v1",
"created": "Sat, 9 May 2009 04:43:44 GMT"
}
]
| 2010-11-05T00:00:00 | [
[
"Huang",
"Yen-Wei",
""
],
[
"Moulin",
"Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1385 | Vit Niennattrakul | Vit Niennattrakul, Chotirat Ann Ratanamahatana | Making Hand Geometry Verification System More Accurate Using Time Series
Representation with R-K Band Learning | In Proceedings of 11th National Computer Science and Engineering
Conference (NCSEC 2007), Bangkok, Thailand, 19/11/2007. 8 pages, 10 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | At present, applications of biometrics are rapidly increasing due to
inconveniences in using traditional passwords and physical keys. Hand geometry,
one of the most well-known biometrics, is implemented in many verification
systems with various feature extraction methods. In recent work, a hand
geometry verification system using time series conversion techniques and
Dynamic Time Warping (DTW) distance measure with Sakoe-Chiba band has been
proposed. This system demonstrates many advantages, especially ease of
implementation and small storage space requirement using time series
representation. In this paper, we propose a novel hand geometry verification
system that exploits DTW distance measure and R-K band learning to further
improve the system performance. Finally, our evaluation reveals that our
proposed system outperforms the current system by a wide margin, in terms of
False Acceptance Rate (FAR), False Rejection Rate (FRR), and Total Success Rate
(TSR) at Equal Error Rate (EER).
| [
{
"version": "v1",
"created": "Sat, 9 May 2009 17:31:37 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Niennattrakul",
"Vit",
""
],
[
"Ratanamahatana",
"Chotirat Ann",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0905.1386 | Pedro Coronel | Pedro Coronel, Markus G\"artner, and Helmut B\"olcskei | Selective-Fading Multiple-Access MIMO Channels: Diversity-Multiplexing
Tradeoff and Dominant Outage Event Regions | Corrections in Section V | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish the optimal diversity-multiplexing (DM) tradeoff for coherent
selective-fading multiple-access MIMO channels and provide corresponding code
design criteria. As a byproduct, on the conceptual level, we find an
interesting relation between the DM tradeoff framework and the notion of
dominant error event regions, first introduced in the AWGN case by Gallager,
IEEE Trans. IT, 1985. This relation allows us to accurately characterize the
error mechanisms in MIMO fading multiple-access channels. In particular, we
find that, for a given rate tuple, the maximum achievable diversity order is
determined by a single outage event that dominates the total error probability
exponentially in SNR. Finally, we examine the distributed space-time code
construction proposed by Badr and Belfiore, Int. Zurich Seminar on Commun.,
2008, using the code design criteria derived in this paper.
| [
{
"version": "v1",
"created": "Sat, 9 May 2009 08:01:15 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2009 09:45:45 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Coronel",
"Pedro",
""
],
[
"Gärtner",
"Markus",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1424 | Dmitry Ignatov | Sergei O. Kuznetsov, Dmitry I. Ignatov | Concept Stability for Constructing Taxonomies of Web-site Users | Sergei O. Kuznetsov, D.I. Ignatov, Concept Stability for Constructing
Taxonomies of Web-site users, in Proc. Social Network Analysis and Conceptual
Structures: Exploring Opportunities, S. Obiedkov, C. Roth (Eds.),
Clermont-Ferrand (France), February 16, 2007 | null | null | null | cs.CY cs.AI cs.SI stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Owners of a web-site are often interested in analysis of groups of users of
their site. Information on these groups can help optimizing the structure and
contents of the site. In this paper we use an approach based on formal concepts
for constructing taxonomies of user groups. For decreasing the huge amount of
concepts that arise in applications, we employ stability index of a concept,
which describes how a group given by a concept extent differs from other such
groups. We analyze resulting taxonomies of user groups for three target
websites.
| [
{
"version": "v1",
"created": "Sat, 9 May 2009 18:35:50 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Nov 2016 19:25:12 GMT"
}
]
| 2016-11-28T00:00:00 | [
[
"Kuznetsov",
"Sergei O.",
""
],
[
"Ignatov",
"Dmitry I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0905.1460 | Feifei Gao | Feifei Gao, Rui Zhang, Ying-Chang Liang, and Xiaodong Wang | Design of Learning Based MIMO Cognitive Radio Systems | 30 pages, 10 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the design issues of the multi-antenna-based cognitive
radio (CR) system that is able to operate concurrently with the licensed
primary radio (PR) system. We propose a practical CR transmission strategy
consisting of three major stages: environment learning, channel training, and
data transmission. In the environment learning stage, the CR transceivers both
listen to the PR transmission and apply blind algorithms to estimate the spaces
that are orthogonal to the channels from the PR. Assuming time-division duplex
(TDD) based transmission for the PR, cognitive beamforming is then designed and
applied at CR transceivers to restrict the interference to/from the PR during
the subsequent channel training and data transmission stages. In the channel
training stage, the CR transmitter sends training signals to the CR receiver,
which applies the linear-minimum-mean-square-error (LMMSE) based estimator to
estimate the effective channel. Considering imperfect estimations in both
learning and training stages, we derive a lower bound on the ergodic capacity
achievable for the CR in the data transmission stage. From this capacity lower
bound, we observe a general learning/training/throughput tradeoff associated
with the proposed scheme, pertinent to transmit power allocation between
training and transmission stages, as well as time allocation among learning,
training, and transmission stages. We characterize the aforementioned tradeoff
by optimizing the associated power and time allocation to maximize the CR
ergodic capacity.
| [
{
"version": "v1",
"created": "Sun, 10 May 2009 09:17:10 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Gao",
"Feifei",
""
],
[
"Zhang",
"Rui",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Wang",
"Xiaodong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1512 | Eitan Yaakobi | Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf, and
Eitan Yaakobi | A Nearly Optimal Construction of Flash Codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Flash memory is a non-volatile computer memory comprised of blocks of cells,
wherein each cell can take on q different values or levels. While increasing
the cell level is easy, reducing the level of a cell can be accomplished only
by erasing an entire block. Since block erasures are highly undesirable, coding
schemes - known as floating codes or flash codes - have been designed in order
to maximize the number of times that information stored in a flash memory can
be written (and re-written) prior to incurring a block erasure. An (n,k,t)_q
flash code C is a coding scheme for storing k information bits in n cells in
such a way that any sequence of up to t writes (where a write is a transition 0
-> 1 or 1 -> 0 in any one of the k bits) can be accommodated without a block
erasure. The total number of available level transitions in n cells is n(q-1),
and the write deficiency of C, defined as \delta(C) = n(q-1) - t, is a measure
of how close the code comes to perfectly utilizing all these transitions. For k
> 6 and large n, the best previously known construction of flash codes achieves
a write deficiency of O(qk^2). On the other hand, the best known lower bound on
write deficiency is \Omega(qk). In this paper, we present a new construction of
flash codes that approaches this lower bound to within a factor logarithmic in
k. To this end, we first improve upon the so-called "indexed" flash codes, due
to Jiang and Bruck, by eliminating the need for index cells in the Jiang-Bruck
construction. Next, we further increase the number of writes by introducing a
new multi-stage (recursive) indexing scheme. We then show that the write
deficiency of the resulting flash codes is O(qk\log k) if q \geq \log_2k, and
at most O(k\log^2 k) otherwise.
| [
{
"version": "v1",
"created": "Sun, 10 May 2009 22:36:59 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Mahdavifar",
"Hessam",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Vardy",
"Alexander",
""
],
[
"Wolf",
"Jack K.",
""
],
[
"Yaakobi",
"Eitan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1537 | Sang Won Choi | Sang Won Choi and Sae-Young Chung | On the Separability of Parallel Gaussian Interference Channels | 5 pages, 1 figure, to appear in proc. IEEE ISIT, June 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The separability in parallel Gaussian interference channels (PGICs) is
studied in this paper. We generalize the separability results in one-sided
PGICs (OPGICs) by Sung \emph{et al.} to two-sided PGICs (TPGICs). Specifically,
for strong and mixed TPGICs, we show necessary and sufficient conditions for
the separability. For this, we show diagonal covariance matrices are sum-rate
optimal for strong and mixed TPGICs.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 04:24:26 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Choi",
"Sang Won",
""
],
[
"Chung",
"Sae-Young",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1543 | Sang-Woon Jeon | Sang-Woon Jeon and Sae-Young Chung | Sum capacity of multi-source linear finite-field relay networks with
fading | 5 pages, 2 figures, to appear in proc. IEEE ISIT, June 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a fading linear finite-field relay network having multiple
source-destination pairs. Because of the interference created by different
unicast sessions, the problem of finding its capacity region is in general
difficult. We observe that, since channels are time-varying, relays can deliver
their received signals by waiting for appropriate channel realizations such
that the destinations can decode their messages without interference. We
propose a block Markov encoding and relaying scheme that exploits such channel
variations. By deriving a general cut-set upper bound and an achievable rate
region, we characterize the sum capacity for some classes of channel
distributions and network topologies. For example, when the channels are
uniformly distributed, the sum capacity is given by the minimum average rank of
the channel matrices constructed by all cuts that separate the entire sources
and destinations. We also describe other cases where the capacity is
characterized.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 05:17:49 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Jeon",
"Sang-Woon",
""
],
[
"Chung",
"Sae-Young",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1546 | Anthony Man-Cho So | Zhisu Zhu, Anthony Man-Cho So, Yinyu Ye | Fast and Near-Optimal Matrix Completion via Randomized Basis Pursuit | 23 pages. New section (Section 3.3) added | null | null | null | cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by the philosophy and phenomenal success of compressed sensing, the
problem of reconstructing a matrix from a sampling of its entries has attracted
much attention recently. Such a problem can be viewed as an
information-theoretic variant of the well-studied matrix completion problem,
and the main objective is to design an efficient algorithm that can reconstruct
a matrix by inspecting only a small number of its entries. Although this is an
impossible task in general, Cand\`es and co-authors have recently shown that
under a so-called incoherence assumption, a rank $r$ $n\times n$ matrix can be
reconstructed using semidefinite programming (SDP) after one inspects
$O(nr\log^6n)$ of its entries. In this paper we propose an alternative approach
that is much more efficient and can reconstruct a larger class of matrices by
inspecting a significantly smaller number of the entries. Specifically, we
first introduce a class of so-called stable matrices and show that it includes
all those that satisfy the incoherence assumption. Then, we propose a
randomized basis pursuit (RBP) algorithm and show that it can reconstruct a
stable rank $r$ $n\times n$ matrix after inspecting $O(nr\log n)$ of its
entries. Our sampling bound is only a logarithmic factor away from the
information-theoretic limit and is essentially optimal. Moreover, the runtime
of the RBP algorithm is bounded by $O(nr^2\log n+n^2r)$, which compares very
favorably with the $\Omega(n^4r^2\log^{12}n)$ runtime of the SDP-based
algorithm. Perhaps more importantly, our algorithm will provide an exact
reconstruction of the input matrix in polynomial time. By contrast, the
SDP-based algorithm can only provide an approximate one in polynomial time.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 06:13:49 GMT"
},
{
"version": "v2",
"created": "Fri, 15 May 2009 03:38:47 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Zhu",
"Zhisu",
""
],
[
"So",
"Anthony Man-Cho",
""
],
[
"Ye",
"Yinyu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1583 | Haim Kaplan | Gy\"orgy Elekes and Haim Kaplan and Micha Sharir | On Lines, Joints, and Incidences in Three Dimensions | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend (and somewhat simplify) the algebraic proof technique of Guth and
Katz \cite{GK}, to obtain several sharp bounds on the number of incidences
between lines and points in three dimensions. Specifically, we show: (i) The
maximum possible number of incidences between $n$ lines in $\reals^3$ and $m$
of their joints (points incident to at least three non-coplanar lines) is
$\Theta(m^{1/3}n)$ for $m\ge n$, and $\Theta(m^{2/3}n^{2/3}+m+n)$ for $m\le n$.
(ii) In particular, the number of such incidences cannot exceed $O(n^{3/2})$.
(iii) The bound in (i) also holds for incidences between $n$ lines and $m$
arbitrary points (not necessarily joints), provided that no plane contains more
than O(n) points and each point is incident to at least three lines. As a
preliminary step, we give a simpler proof of (an extension of) the bound
$O(n^{3/2})$, established by Guth and Katz, on the number of joints in a set of
$n$ lines in $\reals^3$. We also present some further extensions of these
bounds, and give a proof of Bourgain's conjecture on incidences between points
and lines in 3-space, which constitutes a simpler alternative to the proof of
\cite{GK}.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 16:39:03 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Elekes",
"György",
""
],
[
"Kaplan",
"Haim",
""
],
[
"Sharir",
"Micha",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0905.1587 | Dominik Scheder | Dominik Scheder | Unsatisfiable Linear CNF Formulas Are Large and Complex | 12 pages plus a two-page appendix; corrected an inconsistency between
title of the paper and title of the arxiv submission | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We call a CNF formula linear if any two clauses have at most one variable in
common. We show that there exist unsatisfiable linear k-CNF formulas with at
most 4k^2 4^k clauses, and on the other hand, any linear k-CNF formula with at
most 4^k/(8e^2k^2) clauses is satisfiable. The upper bound uses probabilistic
means, and we have no explicit construction coming even close to it. One reason
for this is that unsatisfiable linear formulas exhibit a more complex structure
than general (non-linear) formulas: First, any treelike resolution refutation
of any unsatisfiable linear k-CNF formula has size at least 2^(2^(k/2-1))$.
This implies that small unsatisfiable linear k-CNF formulas are hard instances
for Davis-Putnam style splitting algorithms. Second, if we require that the
formula F have a strict resolution tree, i.e. every clause of F is used only
once in the resolution tree, then we need at least a^a^...^a clauses, where a
is approximately 2 and the height of this tower is roughly k.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 09:55:07 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Dec 2009 15:12:19 GMT"
},
{
"version": "v3",
"created": "Fri, 18 Dec 2009 15:37:15 GMT"
},
{
"version": "v4",
"created": "Wed, 3 Feb 2010 13:55:40 GMT"
},
{
"version": "v5",
"created": "Thu, 28 Oct 2010 08:32:45 GMT"
}
]
| 2010-10-29T00:00:00 | [
[
"Scheder",
"Dominik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.1594 | Marko A. Rodriguez | Marko A. Rodriguez and David W. Allen and Joshua Shinavier and Gary
Ebersole | A Recommender System to Support the Scholarly Communication Process | null | null | null | KRS-2009-02 | cs.DL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The number of researchers, articles, journals, conferences, funding
opportunities, and other such scholarly resources continues to grow every year
and at an increasing rate. Many services have emerged to support scholars in
navigating particular aspects of this resource-rich environment. Some
commercial publishers provide recommender and alert services for the articles
and journals in their digital libraries. Similarly, numerous noncommercial
social bookmarking services have emerged for citation sharing. While these
services do provide some support, they lack an understanding of the various
problem-solving scenarios that researchers face daily. Example scenarios, to
name a few, include when a scholar is in search of an article related to
another article of interest, when a scholar is in search of a potential
collaborator for a funding opportunity, when a scholar is in search of an
optimal venue to which to submit their article, and when a scholar, in the role
of an editor, is in search of referees to review an article. All of these
example scenarios can be represented as a problem in information filtering by
means of context-sensitive recommendation. This article presents an overview of
a context-sensitive recommender system to support the scholarly communication
process that is based on the standards and technology set forth by the Semantic
Web initiative.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 18:58:16 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Allen",
"David W.",
""
],
[
"Shinavier",
"Joshua",
""
],
[
"Ebersole",
"Gary",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0905.1608 | Jean B. Lasserre | Jean Lasserre (LAAS), S. Zeron | Certificates and relaxations for integer programming and the semi-group
membership problem | 21 pages | null | null | null | math.OC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider integer programming and the semi-group membership problem. We
provide the following theorem of the alternative: the system Ax=b has no
nonnegative integral solution x if and only if p(b) <0 for some given
polynomial p whose vector of coefficients lies in a convex cone that we
characterize. We also provide a hierarchy of linear programming relaxations,
where the continuous case Ax=b with x real and nonnegative, describes the first
relaxation in the hierarchy.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 12:16:33 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Lasserre",
"Jean",
"",
"LAAS"
],
[
"Zeron",
"S.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.1609 | Nabil Hathout | Nabil Hathout (CLLE) | Acquisition of morphological families and derivational series from a
machine readable dictionary | proceedings of the 6th D\'ecembrettes | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents a linguistic and computational model aiming at making the
morphological structure of the lexicon emerge from the formal and semantic
regularities of the words it contains. The model is word-based. The proposed
morphological structure consists of (1) binary relations that connect each
headword with words that are morphologically related, and especially with the
members of its morphological family and its derivational series, and of (2) the
analogies that hold between the words. The model has been tested on the lexicon
of French using the TLFi machine readable dictionary.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 12:17:36 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Hathout",
"Nabil",
"",
"CLLE"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0905.1643 | Shiqian Ma | Shiqian Ma, Donald Goldfarb and Lifeng Chen | Fixed Point and Bregman Iterative Methods for Matrix Rank Minimization | null | null | null | null | math.OC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The linearly constrained matrix rank minimization problem is widely
applicable in many fields such as control, signal processing and system
identification. The tightest convex relaxation of this problem is the linearly
constrained nuclear norm minimization. Although the latter can be cast as a
semidefinite programming problem, such an approach is computationally expensive
to solve when the matrices are large. In this paper, we propose fixed point and
Bregman iterative algorithms for solving the nuclear norm minimization problem
and prove convergence of the first of these algorithms. By using a homotopy
approach together with an approximate singular value decomposition procedure,
we get a very fast, robust and powerful algorithm, which we call FPCA (Fixed
Point Continuation with Approximate SVD), that can solve very large matrix rank
minimization problems. Our numerical results on randomly generated and real
matrix completion problems demonstrate that this algorithm is much faster and
provides much better recoverability than semidefinite programming solvers such
as SDPT3. For example, our algorithm can recover 1000 x 1000 matrices of rank
50 with a relative error of 1e-5 in about 3 minutes by sampling only 20 percent
of the elements. We know of no other method that achieves as good
recoverability. Numerical experiments on online recommendation, DNA microarray
data set and image inpainting problems demonstrate the effectiveness of our
algorithms.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 15:45:03 GMT"
},
{
"version": "v2",
"created": "Tue, 12 May 2009 01:52:03 GMT"
}
]
| 2009-05-12T00:00:00 | [
[
"Ma",
"Shiqian",
""
],
[
"Goldfarb",
"Donald",
""
],
[
"Chen",
"Lifeng",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1737 | Russell Martin | J. Czyzowicz, S. Dobrev, L. Gasieniec, D. Ilcinkas, J. Jansson, R.
Klasing, I. Lignos, R. Martin, K. Sadakane, and W.-K. Sung | More efficient periodic traversal in anonymous undirected graphs | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of periodic graph exploration in which a mobile
entity with constant memory, an agent, has to visit all n nodes of an arbitrary
undirected graph G in a periodic manner. Graphs are supposed to be anonymous,
that is, nodes are unlabeled. However, while visiting a node, the robot has to
distinguish between edges incident to it. For each node v the endpoints of the
edges incident to v are uniquely identified by different integer labels called
port numbers. We are interested in minimisation of the length of the
exploration period.
This problem is unsolvable if the local port numbers are set arbitrarily.
However, surprisingly small periods can be achieved when assigning carefully
the local port numbers. Dobrev et al. described an algorithm for assigning port
numbers, and an oblivious agent (i.e. agent with no memory) using it, such that
the agent explores all graphs of size n within period 10n. Providing the agent
with a constant number of memory bits, the optimal length of the period was
previously proved to be no more than 3.75n (using a different assignment of the
port numbers). In this paper, we improve both these bounds. More precisely, we
show a period of length at most 4 1/3 n for oblivious agents, and a period of
length at most 3.5n for agents with constant memory. Moreover, we give the
first non-trivial lower bound, 2.8n, on the period length for the oblivious
case.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 23:51:02 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Czyzowicz",
"J.",
""
],
[
"Dobrev",
"S.",
""
],
[
"Gasieniec",
"L.",
""
],
[
"Ilcinkas",
"D.",
""
],
[
"Jansson",
"J.",
""
],
[
"Klasing",
"R.",
""
],
[
"Lignos",
"I.",
""
],
[
"Martin",
"R.",
""
],
[
"Sadakane",
"K.",
""
],
[
"Sung",
"W. -K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.1738 | Predrag Jelenkovic | Predrag R. Jelenkovic and Mariana Olvera-Cravioto | Information Ranking and Power Laws on Trees | null | null | null | null | math.PR cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the situations when the solution to a weighted stochastic recursion
has a power law tail. To this end, we develop two complementary approaches, the
first one extends Goldie's (1991) implicit renewal theorem to cover recursions
on trees; and the second one is based on a direct sample path large deviations
analysis of weighted recursive random sums. We believe that these methods may
be of independent interest in the analysis of more general weighted branching
processes as well as in the analysis of algorithms.
| [
{
"version": "v1",
"created": "Mon, 11 May 2009 23:57:58 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Oct 2009 17:39:41 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Jul 2010 22:28:53 GMT"
}
]
| 2010-07-30T00:00:00 | [
[
"Jelenkovic",
"Predrag R.",
""
],
[
"Olvera-Cravioto",
"Mariana",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0905.1740 | Bernardo Huberman | Fang Wu, Dennis M. Wilkinson and Bernardo A. Huberman | Feedback loops of attention in peer production | null | null | null | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A significant percentage of online content is now published and consumed via
the mechanism of crowdsourcing. While any user can contribute to these forums,
a disproportionately large percentage of the content is submitted by very
active and devoted users, whose continuing participation is key to the sites'
success. As we show, people's propensity to keep participating increases the
more they contribute, suggesting motivating factors which increase over time.
This paper demonstrates that submitters who stop receiving attention tend to
stop contributing, while prolific contributors attract an ever increasing
number of followers and their attention in a feedback loop. We demonstrate that
this mechanism leads to the observed power law in the number of contributions
per user and support our assertions by an analysis of hundreds of millions of
contributions to top content sharing websites Digg.com and Youtube.com.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 00:00:04 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Wu",
"Fang",
""
],
[
"Wilkinson",
"Dennis M.",
""
],
[
"Huberman",
"Bernardo A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0905.1744 | Fahad Saeed | Fahad Saeed and Ashfaq Khokhar | A Domain Decomposition Strategy for Alignment of Multiple Biological
Sequences on Multiprocessor Platforms | 36 pages, 17 figures, Accepted manuscript in Journal of Parallel and
Distributed Computing(JPDC) | as: F. Saeed, A. Khokhar, A domain decomposition strategy for
alignment of multiple biological sequences on multiprocessor platforms, J.
Parallel Distrib. Comput. (2009) | 10.1016/j.jpdc.2009.03.006 | null | cs.DC q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple Sequences Alignment (MSA) of biological sequences is a fundamental
problem in computational biology due to its critical significance in wide
ranging applications including haplotype reconstruction, sequence homology,
phylogenetic analysis, and prediction of evolutionary origins. The MSA problem
is considered NP-hard and known heuristics for the problem do not scale well
with increasing number of sequences. On the other hand, with the advent of new
breed of fast sequencing techniques it is now possible to generate thousands of
sequences very quickly. For rapid sequence analysis, it is therefore desirable
to develop fast MSA algorithms that scale well with the increase in the dataset
size. In this paper, we present a novel domain decomposition based technique to
solve the MSA problem on multiprocessing platforms. The domain decomposition
based technique, in addition to yielding better quality, gives enormous
advantage in terms of execution time and memory requirements. The proposed
strategy allows to decrease the time complexity of any known heuristic of
O(N)^x complexity by a factor of O(1/p)^x, where N is the number of sequences,
x depends on the underlying heuristic approach, and p is the number of
processing nodes. In particular, we propose a highly scalable algorithm,
Sample-Align-D, for aligning biological sequences using Muscle system as the
underlying heuristic. The proposed algorithm has been implemented on a cluster
of workstations using MPI library. Experimental results for different problem
sizes are analyzed in terms of quality of alignment, execution time and
speed-up.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 01:04:40 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Saeed",
"Fahad",
""
],
[
"Khokhar",
"Ashfaq",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0905.1745 | Tiangao Gou | Tiangao Gou, Syed A. Jafar | Capacity of a Class of Symmetric SIMO Gaussian Interference Channels
within O(1) | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The N+1 user, 1 x N single input multiple output (SIMO) Gaussian interference
channel where each transmitter has a single antenna and each receiver has N
antennas is studied. The symmetric capacity within O(1) is characterized for
the symmetric case where all direct links have the same signal-to-noise ratio
(SNR) and all undesired links have the same interference-to-noise ratio (INR).
The gap to the exact capacity is a constant which is independent of SNR and
INR. To get this result, we first generalize the deterministic interference
channel introduced by El Gamal and Costa to model interference channels with
multiple antennas. We derive the capacity region of this deterministic
interference channel. Based on the insights provided by the deterministic
channel, we characterize the generalized degrees of freedom (GDOF) of Gaussian
case, which directly leads to the O(1) capacity approximation. On the
achievability side, an interesting conclusion is that the generalized degrees
of freedom (GDOF) regime where treating interference as noise is found to be
optimal in the 2 user interference channel, does not appear in the N+1 user, 1
x N SIMO case. On the converse side, new multi-user outer bounds emerge out of
this work that do not follow directly from the 2 user case. In addition to the
GDOF region, the outer bounds identify a strong interference regime where the
capacity region is established.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 06:14:03 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Gou",
"Tiangao",
""
],
[
"Jafar",
"Syed A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1751 | Chao-Yang Pang | Chao-Yang Pang, Chong-Bao Wang and Ben-Qiong Hu | Experiment Study of Entropy Convergence of Ant Colony Optimization | 21 papges, 8 figures | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ant colony optimization (ACO) has been applied to the field of combinatorial
optimization widely. But the study of convergence theory of ACO is rare under
general condition. In this paper, the authors try to find the evidence to prove
that entropy is related to the convergence of ACO, especially to the estimation
of the minimum iteration number of convergence. Entropy is a new view point
possibly to studying the ACO convergence under general condition. Key Words:
Ant Colony Optimization, Convergence of ACO, Entropy
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 12:38:57 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 14:50:03 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Jul 2009 08:11:20 GMT"
},
{
"version": "v4",
"created": "Sun, 25 Oct 2009 03:08:14 GMT"
}
]
| 2009-10-25T00:00:00 | [
[
"Pang",
"Chao-Yang",
""
],
[
"Wang",
"Chong-Bao",
""
],
[
"Hu",
"Ben-Qiong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.1755 | Raymond Chi-Wing Wong | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu | Can the Utility of Anonymized Data be used for Privacy Breaches? | 11 pages | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Group based anonymization is the most widely studied approach for privacy
preserving data publishing. This includes k-anonymity, l-diversity, and
t-closeness, to name a few. The goal of this paper is to raise a fundamental
issue on the privacy exposure of the current group based approach. This has
been overlooked in the past. The group based anonymization approach basically
hides each individual record behind a group to preserve data privacy. If not
properly anonymized, patterns can actually be derived from the published data
and be used by the adversary to breach individual privacy. For example, from
the medical records released, if patterns such as people from certain countries
rarely suffer from some disease can be derived, then the information can be
used to imply linkage of other people in an anonymized group with this disease
with higher likelihood. We call the derived patterns from the published data
the foreground knowledge. This is in contrast to the background knowledge that
the adversary may obtain from other channels as studied in some previous work.
Finally, we show by experiments that the attack is realistic in the privacy
benchmark dataset under the traditional group based anonymization approach.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 03:36:26 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Wong",
"Raymond Chi-Wing",
""
],
[
"Fu",
"Ada Wai-Chee",
""
],
[
"Wang",
"Ke",
""
],
[
"Xu",
"Yabo",
""
],
[
"Yu",
"Philip S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0905.1769 | Sk Sarif Hassan s | Pabitra Pal Choudhury, Sudhakar Sahoo, Sk Sarif Hasssan, Satrajit
Basu, Dibyendu Ghosh, Debarun Kar, Abhishek Ghosh, Avijit Ghosh, Amal K.
Ghosh | Classification of Cellular Automata Rules Based on Their Properties | Releted to Cellular Automata! | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a classification of Cellular Automata rules based on its
properties at the nth iteration. Elaborate computer program has been designed
to get the nth iteration for arbitrary 1-D or 2-D CA rules. Studies indicate
that the figures at some particular iteration might be helpful for some
specific application. The hardware circuit implementation can be done using
opto-electronic components [1-7].
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 06:53:23 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Sahoo",
"Sudhakar",
""
],
[
"Hasssan",
"Sk Sarif",
""
],
[
"Basu",
"Satrajit",
""
],
[
"Ghosh",
"Dibyendu",
""
],
[
"Kar",
"Debarun",
""
],
[
"Ghosh",
"Abhishek",
""
],
[
"Ghosh",
"Avijit",
""
],
[
"Ghosh",
"Amal K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.1778 | Salah A. Aly | Salah A. Aly, Ahmed E. Kamal | Encoding of Network Protection Codes Against Link and Node Failures Over
Finite Fields | null | null | null | null | cs.IT cs.CR cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Link and node failures are common two fundamental problems that affect
operational networks. Hence, protection of communication networks is essential
to increase their reliability, performance, and operations. Much research work
has been done to protect against link and node failures, and to provide
reliable solutions based on pre-defined provision or dynamic restoration of the
domain. In this paper we develop network protection strategies against multiple
link failures using network coding and joint capacities. In these strategies,
the source nodes apply network coding for their transmitted data to provide
backup copies for recovery at the receivers' nodes. Such techniques can be
applied to optical, IP, and mesh networks. The encoding operations of
protection codes are defined over finite fields. Furthermore, the normalized
capacity of the communication network is given by $(n-t)/n$ in case of $t$ link
failures. In addition, a bound on the minimum required field size is derived.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 07:44:45 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Aly",
"Salah A.",
""
],
[
"Kamal",
"Ahmed E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1780 | Tiziana Calamoneri | Tiziana Calamoneri | The L(2, 1)-Labeling Problem on Oriented Regular Grids | The content of this paper has been presented to ICTCS 2009, 28-30
September, Cremona, Italy. This updated version is a longer and more complete
version of the first submission (from 10 to 13 pages, from 5 to 7 figures)
and a wrong figure has been corrected | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The L(2, 1)-labeling of a digraph G is a function f from the node set of $G$
to the set of all nonnegative integers such that $|f(x)-f(y)| \geq 2$ if $x$
and $y$ are at distance 1, and $f(x)=f(y)$ if $x$ and $y$ are at distance 2,
where the distance from vertex $x$ to vertex $y$ is the length of a shortest
dipath from $x$ to $y$. The minimum of the maximum used label over all $L(2,
1)$-labelings of $G$ is called $\lambda(G)$. In this paper we study the L(2,
1)-labeling problem on squared, triangular and hexagonal grids and for them we
compute the exact values of $\lambda$.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 07:48:14 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 12:32:01 GMT"
}
]
| 2009-10-01T00:00:00 | [
[
"Calamoneri",
"Tiziana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.1786 | Swan Dubois | Alain Cournier (MIS), Swan Dubois (LIP6, INRIA Rocquencourt), Vincent
Villain (MIS) | Une CNS pour l'acheminement de messages instantan\'ement stabilisant | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A snap-stabilizing algorithm ensures that it always behaves according to its
specifications whenever it starts from an arbitrary configuration. In this
paper, we interest in the message forwarding problem in a message-switched
network. We must manage network ressources in order to deliver messages to any
processor of the network. In this goal, we need information given by a routing
algorithm. But, due to the context of stabilization, this information can be
initially corrupted. It is why the existence of snap-stabilizing algorithms for
this task (proved in [CDV09]) implies that we can ask the system to begin
forwarding messages even if routing tables are initially corrupted. In this
paper, we generalize the previous result given a necessary and sufficient
condition to solve the forwarding problem in a snap-stabilizing way.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 08:28:47 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Cournier",
"Alain",
"",
"MIS"
],
[
"Dubois",
"Swan",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Villain",
"Vincent",
"",
"MIS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0905.1820 | Nicole Berline | Velleda Baldoni, Nicole Berline (CMLS-EcolePolytechnique), Mich\`ele
Vergne (CMLS-EcolePolytechnique, IMJ) | Summing a polynomial function over integral points of a polygon. User's
guide | null | null | null | null | cs.CG math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This document is a companion for the Maple program \textbf{Summing a
polynomial function over integral points of a polygon}. It contains two parts.
First, we see what this programs does. In the second part, we briefly recall
the mathematical background.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 12:00:08 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Baldoni",
"Velleda",
"",
"CMLS-EcolePolytechnique"
],
[
"Berline",
"Nicole",
"",
"CMLS-EcolePolytechnique"
],
[
"Vergne",
"Michèle",
"",
"CMLS-EcolePolytechnique, IMJ"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0905.1883 | Paul Cuff | Paul Cuff (Stanford University), Han-I Su (Stanford University), Abbas
El Gamal (Stanford University) | Cascade multiterminal source coding | ISIT 2009, 5 pages, 1 eps figure, uses IEEEtran.cls | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate distributed source coding of two correlated sources X and Y
where messages are passed to a decoder in a cascade fashion. The encoder of X
sends a message at rate R_1 to the encoder of Y. The encoder of Y then sends a
message to the decoder at rate R_2 based both on Y and on the message it
received about X. The decoder's task is to estimate a function of X and Y. For
example, we consider the minimum mean squared-error distortion when encoding
the sum of jointly Gaussian random variables under these constraints. We also
characterize the rates needed to reconstruct a function of X and Y losslessly.
Our general contribution toward understanding the limits of the cascade
multiterminal source coding network is in the form of inner and outer bounds on
the achievable rate region for satisfying a distortion constraint for an
arbitrary distortion function d(x,y,z). The inner bound makes use of a balance
between two encoding tactics--relaying the information about X and
recompressing the information about X jointly with Y. In the Gaussian case, a
threshold is discovered for identifying which of the two extreme strategies
optimizes the inner bound. Relaying outperforms recompressing the sum at the
relay for some rate pairs if the variance of X is greater than the variance of
Y.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 16:13:58 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Cuff",
"Paul",
"",
"Stanford University"
],
[
"Su",
"Han-I",
"",
"Stanford University"
],
[
"Gamal",
"Abbas El",
"",
"Stanford University"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1893 | Serena Bradde | S. Bradde, A. Braunstein, H. Mahmoudi, F. Tria, M. Weigt and R.
Zecchina | Aligning graphs and finding substructures by a cavity approach | 5 pages, 4 figures | 2010 Europhys. Lett. 89 37009 | 10.1209/0295-5075/89/37009 | null | q-bio.QM cond-mat.stat-mech cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new distributed algorithm for aligning graphs or finding
substructures within a given graph. It is based on the cavity method and is
used to study the maximum-clique and the graph-alignment problems in random
graphs. The algorithm allows to analyze large graphs and may find applications
in fields such as computational biology. As a proof of concept we use our
algorithm to align the similarity graphs of two interacting protein families
involved in bacterial signal transduction, and to predict actually interacting
protein partners between these families.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 16:09:47 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Apr 2010 13:40:11 GMT"
}
]
| 2010-04-02T00:00:00 | [
[
"Bradde",
"S.",
""
],
[
"Braunstein",
"A.",
""
],
[
"Mahmoudi",
"H.",
""
],
[
"Tria",
"F.",
""
],
[
"Weigt",
"M.",
""
],
[
"Zecchina",
"R.",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.1906 | Michael Goodrich | Michael T. Goodrich, Daniel S. Hirschberg | Improved Adaptive Group Testing Algorithms with Applications to Multiple
Access Channels and Dead Sensor Diagnosis | Expanded version of a paper appearing in ACM Symposium on Parallelism
in Algorithms and Architectures (SPAA), and preliminary version of paper
appearing in Journal of Combinatorial Optimization | Journal of Combinatorial Optimization, Volume 15, Number 1,
January, 2008 | 10.1007/s10878-007-9087-z | null | cs.DS cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study group-testing algorithms for resolving broadcast conflicts on a
multiple access channel (MAC) and for identifying the dead sensors in a mobile
ad hoc wireless network. In group-testing algorithms, we are asked to identify
all the defective items in a set of items when we can test arbitrary subsets of
items. In the standard group-testing problem, the result of a test is
binary--the tested subset either contains defective items or not. In the more
generalized versions we study in this paper, the result of each test is
non-binary. For example, it may indicate whether the number of defective items
contained in the tested subset is zero, one, or at least two. We give adaptive
algorithms that are provably more efficient than previous group testing
algorithms. We also show how our algorithms can be applied to solve conflict
resolution on a MAC and dead sensor diagnosis. Dead sensor diagnosis poses an
interesting challenge compared to MAC resolution, because dead sensors are not
locally detectable, nor are they themselves active participants.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 16:45:01 GMT"
}
]
| 2009-05-13T00:00:00 | [
[
"Goodrich",
"Michael T.",
""
],
[
"Hirschberg",
"Daniel S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1964 | Rony El Haddad | Rony EL Haddad, Brian Smith, Sriram Vishwanath | On Models of Multi-user Gaussian Channels with Fading | 6 pages, 3 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An analytically tractable model for Gaussian multiuser channels with fading
is studied, and the capacity region of this model is found to be a good
approximation of the capacity region of the original Gaussian network. This
work extends the existing body of work on deterministic models for Gaussian
multiuser channels to include the physical phenomenon of fading. In particular,
it generalizes these results to a unicast, multiple node network setting with
fading.
| [
{
"version": "v1",
"created": "Tue, 12 May 2009 20:31:16 GMT"
},
{
"version": "v2",
"created": "Sat, 16 May 2009 00:17:34 GMT"
}
]
| 2009-05-16T00:00:00 | [
[
"Haddad",
"Rony EL",
""
],
[
"Smith",
"Brian",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1990 | Halyun Jeong | Halyun Jeong, Young-Han Kim | Sparse Linear Representation | 5 pages, to appear in proc. IEEE ISIT, June 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the question of how well a signal can be reprsented by a
sparse linear combination of reference signals from an overcomplete dictionary.
When the dictionary size is exponential in the dimension of signal, then the
exact characterization of the optimal distortion is given as a function of the
dictionary size exponent and the number of reference signals for the linear
representation. Roughly speaking, every signal is sparse if the dictionary size
is exponentially large, no matter how small the exponent is. Furthermore, an
iterative method similar to matching pursuit that successively finds the best
reference signal at each stage gives asymptotically optimal representations.
This method is essentially equivalent to successive refinement for multiple
descriptions and provides a simple alternative proof of the successive
refinability of white Gaussian sources.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 00:18:58 GMT"
},
{
"version": "v2",
"created": "Thu, 14 May 2009 01:30:27 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Jeong",
"Halyun",
""
],
[
"Kim",
"Young-Han",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.1993 | Bruno Escoffier | Nicolas Bourgeois, Bruno Escoffier, Vangelis Th. Paschos | Fast algorithms for min independent dominating set | null | null | 10.1007/978-3-642-13284-1_20 | null | cs.DS cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We first devise a branching algorithm that computes a minimum independent
dominating set on any graph with running time O*(2^0.424n) and polynomial
space. This improves the O*(2^0.441n) result by (S. Gaspers and M. Liedloff, A
branch-and-reduce algorithm for finding a minimum independent dominating set in
graphs, Proc. WG'06). We then show that, for every r>3, it is possible to
compute an r-((r-1)/r)log_2(r)-approximate solution for min independent
dominating set within time O*(2^(nlog_2(r)/r)).
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 12:50:52 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Bourgeois",
"Nicolas",
""
],
[
"Escoffier",
"Bruno",
""
],
[
"Paschos",
"Vangelis Th.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.1995 | Michael Schapira | Elchanan Mossel, Christos Papadimitriou, Michael Schapira and Yaron
Singer | VC v. VCG: Inapproximability of Combinatorial Auctions via
Generalizations of the VC Dimension | null | null | null | null | cs.GT cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The existence of incentive-compatible computationally-efficient protocols for
combinatorial auctions with decent approximation ratios is the paradigmatic
problem in computational mechanism design. It is believed that in many cases
good approximations for combinatorial auctions may be unattainable due to an
inherent clash between truthfulness and computational efficiency. However, to
date, researchers lack the machinery to prove such results. In this paper, we
present a new approach that we believe holds great promise for making progress
on this important problem. We take the first steps towards the development of
new technologies for lower bounding the VC dimension of k-tuples of disjoint
sets. We apply this machinery to prove the first computational-complexity
inapproximability results for incentive-compatible mechanisms for combinatorial
auctions. These results hold for the important class of VCG-based mechanisms,
and are based on the complexity assumption that NP has no polynomial-size
circuits.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 01:50:21 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Mossel",
"Elchanan",
""
],
[
"Papadimitriou",
"Christos",
""
],
[
"Schapira",
"Michael",
""
],
[
"Singer",
"Yaron",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.